4.6 Article

A Traceable and Authenticated IoTs Trigger Event of Private Security Record Based on Blockchain

Journal

APPLIED SCIENCES-BASEL
Volume 11, Issue 6, Pages -

Publisher

MDPI
DOI: 10.3390/app11062843

Keywords

private security guard; blockchain; Internet of Things (IoTs); traceable

Funding

  1. Chaoyang University of Technology

Ask authors/readers for more resources

The proposed private security service scheme incorporates blockchain technology and smart contracts to ensure real-time monitoring and response to security events. It guarantees the authenticity, traceability, and integrity of security event records, with security analysis and encryption mechanisms in place to fend off known attacks. Additionally, an arbitration mechanism is provided to address potential disputes between private security companies and clients.
Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of Things (IoTs) device in the client's house and connect it with the IoT main controller; then, the IoT main controller connects to the security control center (SCC). Once there is an event triggered (e.g., a break-in or fire incident) by the IoTs device, the controller sends a message to the SCC. The SCC allocates a security guard (SG) to the incident scene immediately. After the task is accomplished, the SG sends a message to the SCC. All of these record the messages and events chained in the blockchain center. The proposed scheme makes security event records have the following characteristics: authenticated, traceable, and integral. The proposed scheme is proved by a security analysis with mutual authentication, traceability, integrity, and non-repudiation. The known attacks (e.g., man-in-the-middle attack, replay attack, forgery attack) are avoided by message encryption and a signing mechanism. Threat models in the communication phase can also be avoided. Finally, computation cost, communication performance, and comparison with related works are also discussed to prove its applicability. We also provide an arbitration mechanism, so that the proposed scheme can reduce disputes between private security companies and the client.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available