Towards an optimized BlockChain for IoT

Slides:



Advertisements
Similar presentations
A Survey of Secure Wireless Ad Hoc Routing
Advertisements

Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1© Copyright 2015 EMC Corporation. All rights reserved. SDN INTELLIGENT NETWORKING IMPLICATIONS FOR END-TO-END INTERNETWORKING Simone Mangiante Senior.
Cloud Usability Framework
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
1 Bitcoin A Digital Currency. Functions of Money.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, Prateek.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Block Chain 101 May 2017.
Presented by Edith Ngai MPhil Term 3 Presentation
chownIoT Secure Handling of Smart Home IoT Devices Ownership Change
About Me Name: Yaokai Feng, from Kyushu University
The Revolutionary Benefits Of Blockchain
Resource subscription using DDS in oneM2M
BLOCKCHAIN APPLICATION IN CORE BANKING
Blockchain Infrastructure for e-Science
Raihana Ferdous, Vallipuram Muthukkumarasamy
University of Maryland College Park
Microsoft Windows NT 4.0 Authentication Protocols
Passion for building stronger business
Evaluation Forms for Blockchain- Based System ver. 1.0
System Design of Internet-of-Things for Residential Smart Grid
Vonage use of Cloud-based Communication
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Bitcoin - a distributed virtual currency system
Phalanx : Withstanding Multimillion-Node Botnets
Product Datasheet AppSense DataNow 4.1
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Algorithms for Big Data Delivery over the Internet of Things
Blockchain beyond cryptocurrencies
National Mining University
Deanonymization of Clients in Bitcoin P2P Network
{ BLOCKCHAIN Technology. BSEtecBSEtec is a digital solution provider company which offers the best service with the implement of the latest technologies.
Advanced Cryptography Protocols
Network Security: IP Spoofing and Firewall
Including Current Uses James Slupsky September 2017
GNuggies: A Proposal for Hosting Resilient Stateless Services Using Untrusted Nodes Harshit Agarwal.
XinFin Blockchain for global Trade and Finance
Blockchain technology at Change Healthcare
Setting the Stage for a Community Blockchain Incubator
Consideration on IPv6 Address Management
Uplink Broadcast Service
Distributed Ledger Technology (DLT) and Blockchain
Blockchain Alexander Prenta 9/27/2018.
Privacy in Content-Oriented Networking: Threats and Countermeasures
Consideration on applying ICN to Edge Computing
2018/7/28 GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
Blockchain Principles
Blockchain Concepts RISK FORUM 2017 Hash function (e.g. SHA-256)
Reengineering the Audit with Blockchain and Smart Contracts
CS 6290 Many-core & Interconnect
Blockchains and Smart Contracts for the Internet of Things
An Overview of Security Issues in Sensor Network
10th International Conference on Telecommunication, ICT’2003,
Faculty Seminar Series Blockchain Technology
TELE3119: Trusted Networks Week 10
Blockchain Tech Big Picture
Bitcoin and Blockchain
Explore Txs, block, blockchain in Bitcoin
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
Cryptocurrency and Blockchain Technology
Presentation transcript:

Towards an optimized BlockChain for IoT Ali Dorri*#, Salil Kanhere*#, Raja Jurdak#* *University of New South Wales #CSIRO Data61

IoT security and privacy is challenging DDOS attack on DNS IoT security and privacy is challenging DDOS attack in the US in 2016. Simple IoT devices were compromised and used to launch a large DDOS attack by flooding DNS service provider called Dyn coming from "tens of millions of IP addresses at the same time. 2 hours downtime Source: Downdetector.com. Optimised BlockChain for IoT | Raja Jurdak

Possible Solution Optimised BlockChain for IoT | Raja Jurdak

BlockChain Overview A distributed immutable time-stamped ledger Creates a secure network over untrusted users Changeable PKs as users identity introduce high level privacy Demands for solving a puzzle to append blocks to the BlockChain (mining) Optimised BlockChain for IoT | Raja Jurdak

BlockChain challenges in IoT Resource Consuming Resource-constrained devices Block mining is time consuming Demands low latency Scales poorly with network size Very large scale Bandwidth-inefficient Limited bandwidth and energy resource Poor scaling due to fully distributed nature Optimised BlockChain for IoT | Raja Jurdak 4

Optimising the BlockChain for IoT Hierarchical structure Private centralized BlockChain at local level Public distributed BlockChain at overlay Clustered overlay topology - limited nodes process BlockChain Optimised BlockChain for IoT | Raja Jurdak

IoT BlockChain Features Separate data and transactions flow - decreased delay Distributed trust between CHs – reduced processing Optimised BlockChain for IoT | Raja Jurdak

Local Immutable Ledger Smart Home Local Immutable Ledger LBM Smart home devices are managed centrally by the home manager Devices can share data with each other or the cloud storage when they receive permission from the owner LBM manages a local immutable ledger that has transactions and policy header. Policy is used by the home owner to enable user to have control over the smart home communications Uses DHsymmetric encryption for efficiency Optimised BlockChain for IoT | Raja Jurdak

Transactions handling CHs Request data Forwarding Authorization Transaction to be stored Request data Request device data Request data Request data note separation of data and transaction flow CHs exchange blocks and cross-verify blocks from others Establish consistency and distributed trust to reduce proportion of verified blocks from trusted sources Optimised BlockChain for IoT | Raja Jurdak

Comparison with Bitcoin Blockchain Feature Bitcoin BlockChain Immutable Ledger Public BlockChain Mining requirement POW None Forking Not allowed Allowed Double spending Not acceptable Not applicable Encryption Asymmetric Symmetric BlockChain visibility Public Private Transaction dissemination Broadcast Unicast Unicast/Multicast Distributed verification All Some Optimised BlockChain for IoT | Raja Jurdak

Performance evaluation – Processing Simulations using NS3 to study the trust method - 50 nodes of which 13 are CHs Optimised BlockChain for IoT | Raja Jurdak

Evaluation - Accessibility threats DDOS attack Devices are not directly accessible Home manager controls all incoming and outgoing transactions Keylists on CHs Target threshold of received transactions Optimised BlockChain for IoT | Raja Jurdak

Accessibility threats Dropping attack Optimised BlockChain for IoT | Raja Jurdak

Accessibility threats Dropping attack Elect new cluster head Optimised BlockChain for IoT | Raja Jurdak

Accessibility threats Dropping attack Appending attack Elect new cluster head False block False block Inject fake transactions in a block Optimised BlockChain for IoT | Raja Jurdak

Accessibility threats Dropping attack Appending attack Elect new cluster head Detected by other CHs False block False block Detected by other cluster heads Graceful degradation with proportion of compromised CHs Optimised BlockChain for IoT | Raja Jurdak

Summary Optimised blockchain for IoT Main features Future directions Maintains security/privacy benefits of classic BC Significantly reduces classic BC overhead Main features Two blockchain tiers Separate data and transaction flow Remove proof-of-work Introduce distributed trust Future directions More extensive performance evaluations Mobile scenarios Optimised BlockChain for IoT | Raja Jurdak

Thank you Raja Jurdak, PhD Senior Principal Research Scientist & Research Group Leader, Distributed Sensing Systems Cyberphysical Systems Program t +61 7 3327 4355 e raja.jurdak@csiro.au w http://research.csiro.au/dss