b-iot: blockchain driven internet of things with credit

43
B-IoT: Blockchain Driven Internet of Things with Credit-Based Consensus Mechanism ICDCS 2019, Dallas, Texas Junqin Huang, Linghe Kong, Guihai Chen, Long Cheng, Kaishun Wu and Xue Liu Shanghai Jiao Tong University 1

Upload: others

Post on 10-Dec-2021

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: B-IoT: Blockchain Driven Internet of Things with Credit

B-IoT: Blockchain Driven Internet of Things with Credit-Based Consensus

MechanismICDCS 2019, Dallas, Texas

Junqin Huang, Linghe Kong, Guihai Chen, Long Cheng, Kaishun Wu and Xue Liu

Shanghai Jiao Tong University

1

Page 2: B-IoT: Blockchain Driven Internet of Things with Credit

Internet of Things Systems

2

Transportation Healthcare Industrial/Manufacturing Field

Page 3: B-IoT: Blockchain Driven Internet of Things with Credit

Internet of Things Systems

2

IoT smart objects are expected to reach 212 billion entities deployed

globally by the end of 2020

Transportation Healthcare Industrial/Manufacturing Field

Page 4: B-IoT: Blockchain Driven Internet of Things with Credit

Open Issues in IoT Systems

• Single point of failure [1]

• Malicious attacks such as DDoS, Sybil attack [2], [3]

• Data disclosure & credibility [4]

• System scalability [5]

3

[1] I. J. Vergara-Laurens, L. G. Jaimes, and M. A. Labrador, “Privacy-preserving mechanisms for crowdsensing:

Survey and research challenges,” IEEE Internet of Things Journal, vol. 4, no. 4, pp. 855–869, 2017.

[2] H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, “Sybillimit: A near-optimal social network defense against sybil attacks,” in IEEE

Symposium on Security and Privacy (S&P), May 2008, pp. 3–17.

[3] Y. Lu and L. D. Xu, “Internet of things (iot) cybersecurity research: A review of current research topics,” IEEE Internet of Things Journal, pp.

1–1, 2018.

[4] IoTeX, “Blockchain & iot: What’s it all about?” Oct 2018. [Online]. Available: https://hackernoon.com/blockchain-iot-whats-it-all-about-

f594b3f0da1e

[5] K. Iwanicki, “A distributed systems perspective on industrial iot,” in IEEE 38th International Conference on Distributed Computing Systems

(ICDCS), July 2018, pp. 1164–1170.

Page 5: B-IoT: Blockchain Driven Internet of Things with Credit

Combine Blockchain with IoT?

• Why Blockchain in IoT

• non-manipulated source of data

• break down monolithic data silos and enable trust across parties

• Related Work

• A scalable access management system in IoT [IOTJ’18]

• vulnerable to the single point failure and attacks

• Consortium blockchain for secure energy trading in IIoT [TII’18]

• data disclosure risk

• A blockchain platform for clinical trial and precision medicine [ICDCS’17]

• stuck in the concept stage

• Integrating low power IoT devices to a blockchain-based infrastructure [EMSOFT’17]

• bring too much overloads in IoT systems

4

Page 6: B-IoT: Blockchain Driven Internet of Things with Credit

Main Challenges

• The conflicts between high concurrency and low throughput

• The trade-off between efficiency and security

• The coexistence of transparency and privacy

5

Page 7: B-IoT: Blockchain Driven Internet of Things with Credit

Main Challenges

• The conflicts between high concurrency and low throughput

• We explore a DAG-structured blockchain based solution

• The trade-off between efficiency and security

• The coexistence of transparency and privacy

5

Page 8: B-IoT: Blockchain Driven Internet of Things with Credit

Blockchains

• Distributed ledgers or databases that enable parties which do not fully trust each other to form and maintain consensus

6

0

1

2

3

4

6

5

7

8

9

10

11

1214

13

16

19

17

15

18

Chain-structured blockchain

(bitcoin, Ethereum, Hyperledger, etc.)

Directed acyclic graph (DAG)-structured blockchain

(IOTA, Byteball, NANO, etc.)

Page 9: B-IoT: Blockchain Driven Internet of Things with Credit

Blockchains

• Distributed ledgers or databases that enable parties which do not fully trust each other to form and maintain consensus

6

0

1

2

3

4

6

5

7

8

9

10

11

1214

13

16

19

17

15

18

Chain-structured blockchain

(bitcoin, Ethereum, Hyperledger, etc.)

Directed acyclic graph (DAG)-structured blockchain

(IOTA, Byteball, NANO, etc.)

DAG-structured blockchains have a higher throughput than chain-

structured blockchains

Page 10: B-IoT: Blockchain Driven Internet of Things with Credit

B-IoT: System Overview

• Node type:

• Light nodes

• Full nodes

• A case study of smart factory:

• Wireless sensors

• Gateways

• Manager

• Tangle network

7

Tangle Network

Smart Factory

Gateway

Topology

Manager

Manage

IoT devices

Wireless sensors

Wireless sensors

Credit-based PoW Mechanism

AES

Page 11: B-IoT: Blockchain Driven Internet of Things with Credit

B-IoT: System Overview

• Node type:

• Light nodes

• Full nodes

• A case study of smart factory:

• Wireless sensors

• Gateways

• Manager

• Tangle network

7

Tangle Network

Smart Factory

Gateway

Topology

Manager

Manage

IoT devices

Wireless sensors

Wireless sensors

Credit-based PoW Mechanism

AES

Page 12: B-IoT: Blockchain Driven Internet of Things with Credit

B-IoT: System Overview

• Node type:

• Light nodes

• Full nodes

• A case study of smart factory:

• Wireless sensors

• Gateways

• Manager

• Tangle network

7

Tangle Network

Smart Factory

Gateway

Topology

Manager

Manage

IoT devices

Wireless sensors

Wireless sensors

Credit-based PoW Mechanism

AES

Page 13: B-IoT: Blockchain Driven Internet of Things with Credit

B-IoT: System Overview

• Node type:

• Light nodes

• Full nodes

• A case study of smart factory:

• Wireless sensors

• Gateways

• Manager

• Tangle network

7

Tangle Network

Smart Factory

Gateway

Topology

Manager

Manage

IoT devices

Wireless sensors

Wireless sensors

Credit-based PoW Mechanism

AES

Page 14: B-IoT: Blockchain Driven Internet of Things with Credit

Main Challenges

• The conflicts between high concurrency and low throughput

• We explore a DAG-structured blockchain based solution

• The trade-off between efficiency and security

• The coexistence of transparency and privacy

8

Page 15: B-IoT: Blockchain Driven Internet of Things with Credit

Main Challenges

• The conflicts between high concurrency and low throughput

• We explore a DAG-structured blockchain based solution

• The trade-off between efficiency and security

• We design a moderate-cost credit-based PoW mechanism

• The coexistence of transparency and privacy

8

Page 16: B-IoT: Blockchain Driven Internet of Things with Credit

Tuning the difficulty of PoW algorithm

• Less than the target hash value, i.e. the length of prefix zero

• E.g. hash space is 0x00000000~0xffffffff

9

Whole hash space

<0x00111111

<0x00001111

Page 17: B-IoT: Blockchain Driven Internet of Things with Credit

Positive Component

Negative Component

Credit Value

Credit-Based PoW Mechanism

10

Page 18: B-IoT: Blockchain Driven Internet of Things with Credit

Positive Component

Negative Component

Credit Value

Credit-Based PoW Mechanism

10

Page 19: B-IoT: Blockchain Driven Internet of Things with Credit

Positive Component

Negative Component

Credit Value

Credit-Based PoW Mechanism

10

Page 20: B-IoT: Blockchain Driven Internet of Things with Credit

Positive Component

Negative Component

Credit Value

Credit-Based PoW Mechanism

10

Page 21: B-IoT: Blockchain Driven Internet of Things with Credit

• Double-spending

• Lazy-tips

Malicious Behaviours

11

Page 22: B-IoT: Blockchain Driven Internet of Things with Credit

• Double-spending

• Lazy-tips

Malicious Behaviours

11

Page 23: B-IoT: Blockchain Driven Internet of Things with Credit

• Double-spending

• Lazy-tips

Malicious Behaviours

11

Page 24: B-IoT: Blockchain Driven Internet of Things with Credit

• Double-spending

• Lazy-tips

Malicious Behaviours

11

Page 25: B-IoT: Blockchain Driven Internet of Things with Credit

Positive Component

Negative Component

Credit Value

Credit-Based PoW Mechanism

12

Page 26: B-IoT: Blockchain Driven Internet of Things with Credit

Main Challenges

• The conflicts between high concurrency and low throughput

• We explore a DAG-structured blockchain based solution

• The trade-off between efficiency and security

• We design a moderate-cost credit-based PoW mechanism

• The coexistence of transparency and privacy

13

Page 27: B-IoT: Blockchain Driven Internet of Things with Credit

Main Challenges

• The conflicts between high concurrency and low throughput

• We explore a DAG-structured blockchain based solution

• The trade-off between efficiency and security

• We design a moderate-cost credit-based PoW mechanism

• The coexistence of transparency and privacy

• We propose an efficient data authority management method

13

Page 28: B-IoT: Blockchain Driven Internet of Things with Credit

Data Authority Management Method( , )D DPK SK ( , )M MPK SK

Generate symmetric

secret keySSK

1( )DSKDec M

2( )SSKDec M

3( )Sb SKnonce Dec M

Distribute the symmetric secret key without

central trust server

IoT Device Manager

1 1{ ( , , )}D MPK SK S aM Enc sign SK TS nonce=

2 2{ ( , , )}S DSK SK b aM Enc sign nonce TS nonce=

3 3{ ( , )}S MSK SK bM Enc sign nonce TS=

14

Page 29: B-IoT: Blockchain Driven Internet of Things with Credit

Data Authority Management Method( , )D DPK SK ( , )M MPK SK

Generate symmetric

secret keySSK

1( )DSKDec M

2( )SSKDec M

3( )Sb SKnonce Dec M

Distribute the symmetric secret key without

central trust server

IoT Device Manager

1 1{ ( , , )}D MPK SK S aM Enc sign SK TS nonce=

2 2{ ( , , )}S DSK SK b aM Enc sign nonce TS nonce=

3 3{ ( , )}S MSK SK bM Enc sign nonce TS=

14

Page 30: B-IoT: Blockchain Driven Internet of Things with Credit

Data Authority Management Method( , )D DPK SK ( , )M MPK SK

Generate symmetric

secret keySSK

1( )DSKDec M

2( )SSKDec M

3( )Sb SKnonce Dec M

Distribute the symmetric secret key without

central trust server

IoT Device Manager

1 1{ ( , , )}D MPK SK S aM Enc sign SK TS nonce=

2 2{ ( , , )}S DSK SK b aM Enc sign nonce TS nonce=

3 3{ ( , )}S MSK SK bM Enc sign nonce TS=

14

Page 31: B-IoT: Blockchain Driven Internet of Things with Credit

Data Authority Management Method( , )D DPK SK ( , )M MPK SK

Generate symmetric

secret keySSK

1( )DSKDec M

2( )SSKDec M

3( )Sb SKnonce Dec M

Distribute the symmetric secret key without

central trust server

IoT Device Manager

1 1{ ( , , )}D MPK SK S aM Enc sign SK TS nonce=

2 2{ ( , , )}S DSK SK b aM Enc sign nonce TS nonce=

3 3{ ( , )}S MSK SK bM Enc sign nonce TS=

14

Page 32: B-IoT: Blockchain Driven Internet of Things with Credit

Data Authority Management Method( , )D DPK SK ( , )M MPK SK

Generate symmetric

secret keySSK

1( )DSKDec M

2( )SSKDec M

3( )Sb SKnonce Dec M

Distribute the symmetric secret key without

central trust server

IoT Device Manager

1 1{ ( , , )}D MPK SK S aM Enc sign SK TS nonce=

2 2{ ( , , )}S DSK SK b aM Enc sign nonce TS nonce=

3 3{ ( , )}S MSK SK bM Enc sign nonce TS=

14

Distribute the symmetric secret key without the central trust server

Page 33: B-IoT: Blockchain Driven Internet of Things with Credit

Implementation

• Full nodes: manager & gateway

• commercial computer

• implemented based on IRI

• SHA-256 & AES encryption

• Light nodes: IoT devices

• Raspberry Pi Model 3B

• implemented based on PyOTA

• Extended with local PoW

• AES encryption

15

Page 34: B-IoT: Blockchain Driven Internet of Things with Credit

Performance in Credit-Based PoW

16

When one malicious attack happens When two malicious attacks happen

Page 35: B-IoT: Blockchain Driven Internet of Things with Credit

Performance in Credit-Based PoW

16

When one malicious attack happens When two malicious attacks happen

Page 36: B-IoT: Blockchain Driven Internet of Things with Credit

Performance in Credit-Based PoW

16

When one malicious attack happens When two malicious attacks happenIt will take longer time to recover normal transaction rate if the node

conducts malicious attacks twice or more

Page 37: B-IoT: Blockchain Driven Internet of Things with Credit

• Four control experiments:

• PoW

• Cr-PoW w/o malicious attacks

• Cr-PoW with a malicious attack

• Cr-PoW with two malicious attacks

Performance in Credit-Based PoW

17

Page 38: B-IoT: Blockchain Driven Internet of Things with Credit

• Four control experiments:

• PoW

• Cr-PoW w/o malicious attacks

• Cr-PoW with a malicious attack

• Cr-PoW with two malicious attacks

Performance in Credit-Based PoW

17

Page 39: B-IoT: Blockchain Driven Internet of Things with Credit

• Four control experiments:

• PoW

• Cr-PoW w/o malicious attacks

• Cr-PoW with a malicious attack

• Cr-PoW with two malicious attacks

Performance in Credit-Based PoW

17

Credit-based PoW can speed up transactions for honest nodes, also can

defend malicious attacks efficiently

Page 40: B-IoT: Blockchain Driven Internet of Things with Credit

Efficiency of Data Authority Management

18

Page 41: B-IoT: Blockchain Driven Internet of Things with Credit

Efficiency of Data Authority Management

18

Page 42: B-IoT: Blockchain Driven Internet of Things with Credit

Efficiency of Data Authority Management

18

The data authority management method has tiny impact on the whole

transaction process

Page 43: B-IoT: Blockchain Driven Internet of Things with Credit

Conclusion & Thank you!

• A general DAG-structured blockchain-based IoT system to address aforementioned challenges for IoT

• The credit-based PoW mechanism helps to make the blockchain more suitable for IoT systems

• The data authority management method can protect data privacy without affecting the system performance

• Future directions:

• sensor data quality control

• storage limitations

19