Blockchain-based security layer for identification and isolation of malicious things in IoT: A conceptual design

Mandrita Banerjee, Junghee Lee, Qian Chen, Kim Kwang Raymond Choo

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Abstract

Internet-of-Things (IoT) is increasingly becoming the norm in both civilian and military settings. In this paper, we present a comprehensive security abstraction layer for IoT systems based on blockchain, which provides us a logical view of a system that comprises trusted devices. The goal of the proposed layer is to detect and isolate untrusted devices. The proposed abstraction layer provides three services, namely: Authorization, authentication, and auditing by using blockchain and smart contract-based approaches. We adopt a hardware based approach, where dedicated hardware modules are used to monitor the behavior of the firmware without incurring excessive performance overhead.

Original languageEnglish
Title of host publicationICCCN 2018 - 27th International Conference on Computer Communications and Networks
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538651568
DOIs
Publication statusPublished - 2018 Oct 9
Externally publishedYes
Event27th International Conference on Computer Communications and Networks, ICCCN 2018 - Hangzhou City, Zhejiang Province, China
Duration: 2018 Jul 302018 Aug 2

Publication series

NameProceedings - International Conference on Computer Communications and Networks, ICCCN
Volume2018-July
ISSN (Print)1095-2055

Conference

Conference27th International Conference on Computer Communications and Networks, ICCCN 2018
Country/TerritoryChina
CityHangzhou City, Zhejiang Province
Period18/7/3018/8/2

Keywords

  • Blockchain
  • Internet-of-Things
  • Security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint

Dive into the research topics of 'Blockchain-based security layer for identification and isolation of malicious things in IoT: A conceptual design'. Together they form a unique fingerprint.

Cite this