International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Blockchain-Enabled Consensus Routing Protocol Improving the Security Data Communication in Internet of Things Applications

Author NameAuthor Details

Monika Parmar, Harsimran Jit Kaur

Monika Parmar[1]

Harsimran Jit Kaur[2]

[1]Chitkara University School of Engineering and Technology, Chitkara University, Himachal Pradesh, India

[2]Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India

Abstract

The Internet of Things (IoT) and Blockchain distribution ledger technology as a concept is enchanting facilities and industrial developments with advanced implements in many applications. The IoT and Blockchain market is further expected to develop three times from current development by 2025. Though many IoT applications have major challenges in safest data transaction and scalability issues while increasing the number of IoT devices. Practical Byzantine Fault Tolerance (PBFT) is a widely used form of decentralized consent, however the network node's confidence in PBFT cannot be guaranteed, as well as the mechanism of reaching consensus will consume a large amount of network services. The article suggests the novel consensus process, which is referred to a Hybrid consensus blockchain algorithm and control authentication on Trust. The Internet of Things applications are integrated with a blockchain-based decentralized system that authenticates the IoT devices through distributed control authentication. This hybrid consensus blockchain method provides security for transactions and access to unauthorized devices is restricted. The PBFT algorithm using a decentralized network system using blockchain has no restriction of IoT devices. Even malicious users create the grouping into the network that has been controlled by the distributed control authentication method. Further then malicious users are rejected from the decentralized network. In this paper, we propose the Hybrid consensus blockchain and PBFT algorithm ensure the safest data transaction through blockchain technology and improves the performance of the decentralized network. Finally, we have presented a Hybrid Consensus algorithm to be utilized in the PBFT method which enables the safest data transaction.

Index Terms

Byzantine Attack

Internet of Things

Blockchain

Consensus

Decentralized Control System

Reference

  1. 1.
    M. Abu-elkheir, M. Hayajneh, and N. A. Ali, “Data Management for the Internet of Things: Design Primitives and Solution,” pp. 15582–15612, 2013, doi: 10.3390/s131115582.
  2. 2.
    M. S. Ferdous, M. J. M. Chowdhury, M. A. Hoque, and A. Colman, “Blockchain consensus algorithms: a survey,” arXiv, no. January, 2020.
  3. 3.
    M. J. Mihaljevi?, “A Blockchain Consensus Protocol Based on Dedicated Time-Memory-Data Trade-Off,” IEEE Access, vol. 8, pp. 141258–141268, 2020, doi: 10.1109/ACCESS.2020.3013199.
  4. 4.
    J. Skrzypczak, F. Schintke, and T. Schutt, “RMWPaxos: Fault-Tolerant In-Place Consensus Sequences,” IEEE Trans. Parallel Distrib. Syst., vol. 31, no. 10, pp. 2392–2405, 2020, doi: 10.1109/TPDS.2020.2981891.
  5. 5.
    M. Du, Q. Chen, and X. Ma, “MBFT: A New Consensus Algorithm for Consortium Blockchain,” IEEE Access, vol. 8, pp. 87665–87675, 2020, doi: 10.1109/ACCESS.2020.2993759.
  6. 6.
    G. Yu, B. Wu, and X. Niu, “Improved Blockchain Consensus Mechanism Based on PBFT Algorithm,” Proc. - 2020 2nd Int. Conf. Adv. Comput. Technol. Inf. Sci. Commun. CTISC 2020, pp. 14–21, 2020, doi: 10.1109/CTISC49998.2020.00009.
  7. 7.
    J. Sedlmeir, H. U. Buhl, G. Fridgen, and R. Keller, “The Energy Consumption of Blockchain Technology: Beyond Myth,” Bus. Inf. Syst. Eng., vol. 62, no. 6, pp. 599–608, 2020, doi: 10.1007/s12599-020-00656-x.
  8. 8.
    T. M. Silva Filho, B. A. Pimentel, R. M. C. R. Souza, and A. L. I. Oliveira, “Hybrid methods for fuzzy clustering based on fuzzy c-means and improved particle swarm optimization,” Expert Syst. Appl., vol. 42, no. 17–18, pp. 6315–6328, 2015, doi: 10.1016/j.eswa.2015.04.032.
  9. 9.
    D. Yaga, P. Mell, N. Roby, and K. Scarfone, “Blockchain Technology Overview,” arXiv, 2019, doi: 10.6028/NIST.IR.8202.
  10. 10.
    H. M. Xin and K. Yang, “Routing protocols analysis for internet of things,” Proc. - 2015 2nd Int. Conf. Inf. Sci. Control Eng. ICISCE 2015, no. i, pp. 447–450, 2015, doi: 10.1109/ICISCE.2015.104.
  11. 11.
    R. Yasaweerasinghelage, M. Staples, and I. Weber, “Predicting Latency of Blockchain-Based Systems Using Architectural Modelling and Simulation,” Proc. - 2017 IEEE Int. Conf. Softw. Archit. ICSA 2017, no. October, pp. 253–256, 2017, doi: 10.1109/ICSA.2017.22.
  12. 12.
    He, Li, and Zhixin Hou. "An improvement of consensus fault tolerant algorithm applied to alliance chain." 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC). IEEE, 2019.
  13. 13.
    F. Dang et al., “Understanding fileless attacks on linux-based IoT devices with HoneyCloud,” MobiSys 2019 - Proc. 17th Annu. Int. Conf. Mob. Syst. Appl. Serv., pp. 482–493, 2019, doi: 10.1145/3307334.3326083.
  14. 14.
    Y. Ren et al., “Data query mechanism based on hash computing power of blockchain in internet of things,” Sensors (Switzerland), vol. 20, no. 1, 2020, doi: 10.3390/s20010207.
  15. 15.
    P. Gotovtsev, “How IoT can integrate biotechnological approaches for city applications-review of recent advancements, issues, and perspectives,” Appl. Sci., vol. 10, no. 11, pp. 1–20, 2020, doi: 10.3390/app10113990.
  16. 16.
    D. V. Jose and A. Vijyalakshmi, “An overview of security in internet of things,” Procedia Comput. Sci., vol. 143, pp. 744–748, 2018, doi: 10.1016/j.procs.2018.10.439.
  17. 17.
    A. Al Hayajneh, M. Z. A. Bhuiyan, and I. McAndrew, “Improving internet of things (IoT) security with software-defined networking (SDN),” Computers, vol. 9, no. 1, pp. 1–14, 2020, doi: 10.3390/computers9010008.
  18. 18.
    J. Choi, Y. In, C. Park, S. Seok, H. Seo, and H. Kim, “Secure IoT framework and 2D architecture for End-To-End security,” J. Supercomput., vol. 74, no. 8, pp. 3521–3535, 2018, doi: 10.1007/s11227-016-1684-0.
  19. 19.
    O. Flauzac, C. Gonzalez, and F. Nolot, “New security architecture for IoT network,” Procedia Comput. Sci., vol. 52, no. 1, pp. 1028–1033, 2015, doi: 10.1016/j.procs.2015.05.099.
  20. 20.
    B. Ndibanje, H. J. Lee, and S. G. Lee, “Security analysis and improvements of authentication and access control in the internet of things,” Sensors (Switzerland), vol. 14, no. 8, pp. 14786–14805, 2014, doi: 10.3390/s140814786.
  21. 21.
    A. Kaushik and D. Thomas, “Blockchain – Literature Survey,” pp. 2145–2148, 2017.
  22. 22.
    J. Sun, J. Yan, and K. Z. K. Zhang, “Blockchain-based sharing services: What blockchain technology can contribute to smart cities,” Financ. Innov., vol. 2, no. 1, 2016, doi: 10.1186/s40854-016-0040-y.
SCOPUS
SCImago Journal & Country Rank