4.8 Article

Public-Key Reinforced Blockchain Platform for Fog-IoT Network System Administration

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 9, Issue 22, Pages 22366-22374

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3104740

Keywords

Blockchains; Security; Servers; Internet of Things; Cryptography; Public key; Edge computing; Fog computing; Fog-IoT network; Internet of Things (IoT); permissioned blockchain; privacy; security

Funding

  1. Natural Sciences and Engineering Research Council (NSERC) of Canada

Ask authors/readers for more resources

The number of embedded devices connecting to wireless networks has increased, leading to the need for secure fog-based IoT networks. This study proposes a platform that uses public-key encryption and permissioned blockchains to protect network endpoints and track encryption processes, ultimately fortifying the network against malicious attacks.
The number of embedded devices that connect to a wireless network has been growing for the past decade. This interaction creates a network of Internet-of-Things (IoT) devices where data travel continuously. With the increase of devices and the need for the network to extend via fog computing, we have fog-based IoT networks. However, with more endpoints introduced to it, the network becomes open to malicious attackers. This work attempts to protect fog-based IoT networks by creating a platform that secures the endpoints through public-key encryption. The servers are allowed to mask the data packets shared within the network. To be able to track all of the encryption processes, we incorporated the use of permissioned blockchains. This technology completes the security layer by providing an immutable and automated data structure to function as a hyper ledger for the network. Each data transaction incorporates a handshake mechanism with the use of a public-key pair. This design guarantees that only devices that have proper access through the keys can use the network. Hence, management is made convenient and secure. The implementation of this platform is through a wireless server-client architecture to simulate the data transactions between devices. The conducted qualitative tests provide an in-depth feasibility investigation on the network's levels of security. The results show the validity of the design as a means of fortifying the network against endpoint attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available