Username   Password       Forgot your password?  Forgot your username? 


A Distributed Secure Monitoring System based on Blockchain

Volume 14, Number 10, October 2018, pp. 2393-2402
DOI: 10.23940/ijpe.18.10.p15.23932402

Guangsong Yanga,b, Xinwen Wub, Yiliang Wua, and Chincheng Chena

aSchool of Information Engineering, Jimei University, Xiamen, 361021, China
bSchool of Information and Communication, Griffith University, Gold Coast, 4215, Australia

((Submitted on July 17, 2018; Revised on August 20, 2018; Accepted on September 16, 2018)


Security and reliability are of vital importance for a remote system to facilitate effective monitoring and management of a wide range of equipment. A distributed secure monitoring system based on blockchain and IoT technologies is proposed in the paper. Firstly, a lightweight security scheme (LSS) is proposed to provide a high level of security with reduced computational and communication costs. Secondly, the architecture of remote monitoring system is presented. An identity authentication method based on the LSS is proposed to authenticate any new node when joining the network. A secure access control method based on blockchain is also proposed to increase the security of the system in a lightweight and scalable manner. Finally, the proposed monitoring system is analyzed with regard to the security against several well-known attacks.


References: 17

                1. J. Yick, B. Mukherjee, and D. Ghosal, “Wireless Sensor Network Survey,” Computer networks, Vol.52, No.12, pp. 2292-2330, 2008
                2. B.Schneier, “IoT Security: What’s Plan B?” IEEE Security and Privacy, Vol. 15, No. 5, pp. 96, 2017
                3. S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System (, last accessed on April 10, 2018)
                4. P. K. Sharma, S. Singh, Y. S. Jeong, and J. H. Park, “DistBlockNet: A Distributed Blockchains-based Secure SDN Architecture for IoT Networks,” IEEE Communications Magazine, Vol. 55, No. 9, pp. 78-85, 2017
                5. V. Skwarek, “Blockchains as Security-Enabler for Industrial IoT Applications,” Asia Pacific Journal of Innovation and Entrepreneurship, Vol. 11, No. 3, pp. 301-311, December 2017
                6. M. A. Khan and K. Salah, “IoT Security: Review, Blockchain Solutions, and Open Challenges,” Future Generation Computer Systems. Vol. 82, pp. 395-411, May 2018
                7. A. Jolfaei, X. W. Wu, and V. Muthukkumarasamy, “A Secure Lightweight Texture Encryption Scheme,” Lecture Notes in Computer Science, pp. 344-356, 2016
                8. A. Bahga and V. K. Madisetti, “Blockchain Platform for Industrial Internet of Things,” Journal of Software Engineering and Applications, Vol. 9, No. 10, pp. 533, October 2016
                9. N. Rifi, E. Rachkidi, N. Agoulmine, and N. C. Taher, “Towards Using Blockchain Technology for IoT Data Access Protection,” in Proceedings of 2017 IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB), pp. 1-5, Salamanca, Spain, September 2017
                10. A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “LSB: A Lightweight Scalable Blockchain for IoT Security and Privacy,” arXiv, December 2017
                11. J. Sun, J. Yan, and K. Z. Zhang, “Blockchain-based Sharing Services: What Blockchain Technology can Contribute to Smart Cities,” Financial Innovation, Vol. 2, No. 1, pp. 26, December 2016
                12. S. K. Lee, M. Bae, and H. Kim, “Future of IoT Networks: A Survey,” Applied Sciences, Vol. 7, No. 10, pp. 1072, October 2017
                13. A. Dorri, S. S. Kanhere, and R. Jurdak, “Towards An Optimized Blockchain for IoT,” in Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, pp. 173-178, Orlando, USA, April 2017
                14. D. W. Kravitz and J. Cooper, “Securing User Identity and Transactions Symbiotically: IoT Meets Blockchain,” in Proceedings of Global Internet of Things Summit (GIoTS), pp.1-6, 2017
                15. R. Mariacristina, “Smart District through IoT and Blockchain,” in Proceedings of 2017 IEEE 6th International Conference on Renewable Energy Research and Applications, pp. 462-467, Paris, France, Oct 2017
                16. A. J. Paverd and A. P. Martin, “Hardware Security for Device Authentication in the Smart Grid,” in Proceedings of International Workshop on Smart Grid Security, pp. 72-84, Springer, Berlin, Heidelberg, December 2012
                17. E. H. Yang and X. W. Wu, “Information-Theoretically Secure Key Generation and Management,” in Proceedings of 2017 IEEE International Symposium on Information Theory (ISIT), pp. 1529-1533, Aachen, Germany, June 2017


                              Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

                              This site uses encryption for transmitting your passwords.