Enhancing IoT Security: A Blockchain-Based Approach for Preventing Spoofing Attacks
Authors: Salha Alshamrani, Maha Aljohni, Eman Aldhaheri
Abstract:
With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.
Keywords: Internet of Thing, Spoofing, IoT, Access control, Blockchain, Raspberry pi.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 129References:
[1] S. Singh, A. S. M. S. Hosen, and B. Yoon, “Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network,” IEEE Access, vol. 9, pp. 13938–13959, Jan. 2021, doi: 10.1109/access.2021.3051602.
[2] H.-N. Dai, Z. Zheng, and Y. Zhang, “Blockchain for Internet of Things: A Survey,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8076–8094, Oct. 2019, doi: 10.1109/jiot.2019.2920987.
[3] N. Khan and M. A. Chishti, “Security Challenges in Fog and IoT, Blockchain Technology and Cell Tree Solutions: A Review,” Scalable Computing: Practice and Experience, vol. 21, no. 3, pp. 515–542, Aug. 2020, doi: 10.12694/scpe.v21i3.1782.
[4] S. Ahmed and M. Khan, "Securing the Internet of Things (IoT): A comprehensive study on the intersection of cybersecurity, privacy, and connectivity in the IoT ecosystem," AI, IoT and the Fourth Industrial Revolution Review, vol. 13, no. 9, pp. 1–17, 2023.
[5] A. Valencia-Arias, J. D. González-Ruiz, L. Verde Flores, L. Vega-Mori, P. Rodríguez-Correa, and G. Sánchez Santos, "Machine Learning and Blockchain: A Bibliometric Study on Security and Privacy," Information, vol. 15, no. 1, p. 65, 2024
[6] Oh, J., Choi, Y., & In, J. (2023). "A conceptual framework for designing blockchain technology enabled supply chains," International Journal of Logistics Research and Applications, pp. 1–19.
[7] H. Shafagh, L. Burkhalter, A. Hithnawi, and S. Duquennoy, Towards Blockchain-based Auditable Storage and Sharing of IoT Data. 2017. doi: 10.1145/3140649.3140656.
[8] N. Tariq et al., “The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey,” Sensors, vol. 19, no. 8, p. 1788, Apr. 2019, doi: 10.3390/s19081788.
[9] K. Azbeg, O. Ouchetto, and S. J. Andaloussi, “BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security,” Egyptian Informatics Journal, vol. 23, no. 2, pp. 329–343, Jul. 2022, doi: 10.1016/j.eij.2022.02.004.
[10] B. K. Mohanta, D. Jena, S. Ramasubbareddy, M. Daneshmand, and A. H. Gandomi, "Addressing security and privacy issues of IoT using blockchain technology," IEEE Internet of Things Journal, vol. 8, no. 2, pp. 881–888, 2020.
[11] E. J. Scheid, T. Hegnauer, B. Rodrigues, and B. Stiller, "Bifröst: a modular blockchain interoperability API," in Proceedings of the 2019 IEEE 44th Conference on Local Computer Networks (LCN), October 2019, pp. 332–339.
[12] S. K. Singh and S. Kumar, “Blockchain Technology: Introduction, Integration, and Security Issues with IoT,” in Apple Academic Press eBooks, 2021, pp. 3–26. doi: 10.1201/9781003231332-2.
[13] S. D. Babar, A. Stango, N. R. Prasad, J. Sen, and R. Prasad, Proposed embedded security framework for Internet of Things (IoT). 2011. doi: 10.1109/wirelessvitae.2011.5940923.
[14] R. Lyda and J. Hamrock, “Using Entropy Analysis to Find Encrypted and Packed Malware,” IEEE Security & Privacy, vol. 5, no. 2, pp. 40–45, Mar. 2007, doi: 10.1109/msp.2007.48.
[15] M. Díaz, C. Martín, and B. Rubio, “State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing,” Journal of Network and Computer Applications, vol. 67, pp. 99–117, May 2016, doi: 10.1016/j.jnca.2016.01.010.
[16] M. Cui, D. Han, J. Wang, K.-C. Li, and C.-C. Chang, “ARFV: An Efficient Shared Data Auditing Scheme Supporting Revocation for Fog-Assisted Vehicular Ad-Hoc Networks,” IEEE Transactions on Vehicular Technology, vol. 69, no. 12, pp. 15815–15827, Dec. 2020, doi: 10.1109/tvt.2020.3036631.
[17] Salama and Barhoom, “Using Blockchain Technology to Prevent Spoofing Attack in IoT Environment,” The Islamic Universityof Gaza, Aug. 2021, (Online). Available: https://blog.ajsrp.com/wp-content/uploads/2021/10/Using-Blockchain-Technology-to-Prevent-Spoofing-Attack-in-IoT-Environment.pdf