Abstract
Security has always been the main concern for the internet of things (IoT)-based systems. Blockchain, with its decentralized and distributed design, prevents the risks of the existing centralized methodologies. Conventional security and privacy architectures are inapplicable in the spectrum of IoT due to its resource constraints. To overcome this problem, this paper presents a Blockchain-based security mechanism that enables secure authorized access to smart city resources. The presented mechanism comprises the ACE (Authentication and Authorization for Constrained Environments) framework-based authorization Blockchain and the OSCAR (Object Security Architecture for the Internet of Things) object security model. The Blockchain lays out a flexible and trustless authorization mechanism, while OSCAR makes use of a public ledger to structure multicast groups for authorized clients. Moreover, a meteor-based application is developed to provide a user-friendly interface for heterogeneous technologies belonging to the smart city. The users would be able to interact with and control their smart city resources such as traffic lights, smart electric meters, surveillance cameras, etc., through this application. To evaluate the performance and feasibility of the proposed mechanism, the authorization Blockchain is implemented on top of the Ethereum network. The authentication mechanism is developed in the node.js server and a smart city is simulated with the help of Raspberry Pi B+. Furthermore, mocha and chai frameworks are used to assess the performance of the system. Experimental results reveal that the authentication response time is less than 100 ms even if the average hand-shaking time increases with the number of clients.
Keywords: information security, blockchain, internet of things, smart cities, authentication, authorization, Ethereum
1. Introduction
The internet of things (IoT) refers to a system of interrelated computing devices, physical and virtual objects, digital and mechanical machines, actuators, home appliances, etc., that enables these things to connect, interact, and transfer data over the internet [1]. It allows Internet Protocol (IP) enabled objects to be sensed or controlled through the network and integrate these devices with existing internet infrastructure [2]. IoT is the most emerging point of discussion these days [3]. All the bigwigs of Information Technology (IT) are considering it as a future option. Every coming day brings a new IoT implementation to enable products and applications. The most prominent IoT applications are smart homes, smart cities, smart grid, smart retail, smart farming, smart supply chain, wearable’s, connected car, connected health, industrial internet, etc. [4]. The deployment of IoT-based applications brings a revolution in the life of human beings.
Even though there is a dramatic increment in the deployment of IoT enabled products and applications, IoT still has many addressable security challenges [5]. People still believe that security issues are the basic hurdle in the evolution of IoT-based solutions. The main issue with IoT is that there is no proposed generalized security system that would be able to counter different types of security attacks because each gadget taking part in the system has its security risks, limitations, and vulnerabilities.
A smart city is an urban area in which diverse kinds of electronic sensors are used to gather data from devices, assets, and citizens [6,7]. The collected data are analyzed and processed to monitor and manage power plants, waste management, hospital, schools, libraries, traffic, transportation systems, information systems, and other community services [8,9,10]. Figure 1 depicts the main features of smart cities. As the model for smart cities involves the use of public data, many security attacks and privacy risks are possible at multiple levels of the smart city architecture. So, it is the key requirement for such an architecture that security and privacy must be ensured.
Blockchain is the foundation of Bitcoin and was firstly proposed in 2008-9 [11,12,13,14]. At present, all tycoons of IT are considering it as a security option because of its versatility and trustless way of authorization. Blockchain is a distributed ledger technology (DLT). It offers a consensus-based validation process. Moreover, it also provides peer-to-peer networking that removed the requirement for any centralized mechanism for operating in terms of security and privacy [15]. Blockchain records all the transactions in the ledger which are available to all nodes, and transactions are performed in a decentralized manner. Blockchain-based applications are rapidly growing in different fields such as IoT, reputation system, financial services, etc.
So, the most feasible solution for security problems in IoT is the Blockchain. Let us take an example of CCTV cameras operating in a smart city to clarify this concept. Government organization deploys these cameras at several public points for security surveillance. Here, the government organization serves as the resource owner and CCTV cameras are considered as a single resource of the smart city. Security department officials are the clients of this resource. To authenticate the clients, the government organization publishes a smart contract on the Blockchain. To prove the authenticity of the client, the smart contract may need some kind of proof. This proof is necessary to ensure whether a particular client belongs to a security department or not. This proof then becomes the part of the transaction’s data field that is sent to the smart contract. On the execution of the smart contract, a token is generated for the client. The account address of the client is referred by the token. A token has a life-time field and is associated with a particular resource. There can be many smart contracts offered by a single resource owner that may be deployed on the same resource server on Blockchain. Each contract has different parameters and there could be many smart contracts for the different resources of smart city; each one of these may have different parameters and attributes. In such a context, the smart contract has the parameters which would be used to identify and authenticate the legitimacy of the security institution’s personnel. If they are a legitimate one, then tokens would be assigned to them, otherwise the request would be abandoned by the smart contract.
Blockchain is recently used to provide security and privacy to IoT devices and related topologies [16,17,18,19,20,21,22]. IoTChain is a Blockchain-based architecture to provide an end-to-end (E2E) solution for secure authorized access to IoT resources [23,24]. It is a combination of the Object Security Architecture for the Internet of Things (OSCAR) and the ACE (Authentication and Authorization for Constrained Environments) authorization framework of the Internet Engineering Task Force (IETF). Preventing unauthorized access to resources of the smart city is a serious concern. A strong temper-proof authentication mechanism is required to accomplish it. Moreover, there is also a need for a user interface to control and monitor resources of the smart city. The proposed mechanism should be comprehensive in nature. All the implementation details must be clear to the reader and transparent to the end-users.
Conventional security and privacy architectures are not suitable in the spectrum of IoT due to its resource constraints [25]. Moreover, most of the IoT devices are not designed to meet the basic security and privacy parameters which produce the security, confidentiality, privacy, authentication, data integrity, and access control issues. Blockchain is gaining significance in the field of IoT by enhancing security and empowering the incorporation of increasing devices into the ecosystem [26,27,28].
In order to provide such a solution, a Blockchain-based mechanism is presented in this work for secure authorization of smart city resources. It consists of the ACE framework-based authorization Blockchain and the OSCAR object security model. The Blockchain offers a flexible and trustless authorization mechanism. On the other hand, OSCAR makes use of a public ledger to establish multicast groups for authorized clients. Moreover, a meteor-based application is developed to provide a user-friendly interface for heterogeneous technologies belonging to the smart city to interact and control the smart city’s resources. To evaluate the performance and feasibility of the proposed mechanism, the implementation of authorization Blockchain is made on the top of the Ethereum network. The security mechanism is developed in node.js server and a smart city is simulated with the help of Raspberry Pi B+. Furthermore, mocha and chai frameworks are used to access the performance of different components of the mechanism. Following are the main contributions of this paper:
Designed an efficient Blockchain-based authentication and trust management mechanism for smart cities;
A practical implementation of a Blockchain-based security mechanism for secure authorization of smart city resources;
Developed a user-friendly hybrid application to interact and control heterogeneous IoT resources.
It would help to provide the following security goals:
To mutually authenticate clients and servers and establish trust among them so that only legitimate users may access the system and the servers may become validated by the clients;
To secure the key exchange mechanism among clients and servers;
To authorize the users so that a resource can only be accessed by the users authorized for that resource;
To provide monitoring and control of the smart city resources to the manager/admin of the system.
The rest of the paper is organized as follows: Related work is given in Section 2. The overview of Blockchain technology is given in Section 3. Section 4 describes the proposed solution. The experimental analysis and discussion is made in Section 5. Finally, a conclusion is drawn in Section 6.
2. Related Work
Many researchers proposed different architectures for the use of Blockchain in multiple domains. Samaniego and Deters [29] presented software-defined IoT devices in combination with permissioned Blockchain for enabling the edge hosts to IoT services. How to implement software-defined IoT devices as a smart contract is an interesting research question. Kravitz and Cooper [30] presented a theoretical methodology for establishing an ecosystem using permissioned Blockchain. Identity management is a built-in part of it for devices and users. It is an interesting framework, but no implementation has been conducted yet.
Dorri et al. [31] proposed a lightweight implementation of Blockchain for resource- and energy-constrained devices of IoT. Proof-of-work protocol used in most of the IoT consumes a lot of energy, so it is a major research problem to overtake it. Ethereum Casper protocol was recently released which should provide a possibility to create more robust IoT-Blockchain systems. IOTA [32] is a third-generation decentralized cryptocurrency. It is an application of IoT having advanced features for keeping records and processing transactions. Its implementation is not yet available. IoTeX [33] is a decentralized network for IoT. It claims fast consensus and built-in privacy-preserving techniques that enable the physical and virtual things to securely exchange information and value at a global scale. So, it is the coming future technology based on the IoT-Blockchain platform having more privacy, security, and scalability for developing new IoT-based applications.
Watson IoT platform [34] enables you to add chosen IoT data into a private Blockchain through a built-in function. It makes use of the IBM cloud, so it is helpful to use in a corporate environment in terms of scalability and quick adaptation to the changing business needs. Ambrosus [35] is a Blockchain-based IoT network. It was developed for the field of the pharmaceutical and food departments. It enables IoT sensors to talk to Blockchain. It assures data integrity for products and improves the standard and tracking of items throughout the supply chain process. Waltonchain [36] opens up the epoch of value internet of things (VIOT). It alters label, trade, organization, and network. It is useful in RFID technology and mobile phones. It uses asymmetric encryption algorithms and uses a combination of Blockchain and IoT [19].
Origin trail [37] is the protocol of Blockchain-powered data exchange for interconnected devices. It is a decentralized protocol running on a network of public nodes and enables Blockchain-supported data sharing in the supply chain. Atonomi [38] provides security protocol and enables IoT devices to have security and reliability in data for eCommerce applications. It is bringing enormous IoT devices on Blockchain’s immutable ledger [16]. This architecture is only specific to E-commerce devices and is not extended to smart cities. IoTChain [23] uses OSCAR and ACE schemes. It is used to provide an E2E solution for secure authorization access to the internet of things resources. It makes the process of resource access secure, scalable, robust, and flexible.
Yup et al. [39] presented a Blockchain-based technique for intelligent healthcare. They developed a data gateway and data access control to ensure the user’s privacy. Liang et al. [40] utilized Blockchain technology to develop a system to share healthcare records through a mobile application. They suggested a user-centric technique to provide secure access control and privacy with the help of channel formation methodology. Jiang et al. [41] presented a Blockchain-based medical information exchange system. They developed an on-chain and off-chain verification mechanism to secure the system storage. Fan et al. [42] suggested Blockchain-based patient medical data along with improved consensus protocol to enhance the overall security and privacy of the system. Tanwar et al. [43] targeted healthcare 4.0 applications and proposed an electronic healthcare record system based on Blockchain. They presented a patient-centric scheme to provide symmetric key cryptographic access control to various healthcare providers. They also used the concept of chaincode to develop a permission-based electronic health recode sharing system.
Habibzadeh et al. [44] performed a survey on security and policy issues for the systems deployed in the smart city environment. The authors showed that applications developed for smart cities are vulnerable and technology and government policies must work together to eliminate these vulnerabilities. They visualized smart city as a multi-level system having certain security level. Technical and policy challenges and future directions for a secure smart city are encapsulated in this work. Khan et al. [45] presented a Blockchain-based system to verify data of CCTV cameras in smart cities. The system helps to identify fake video recordings, enabling the investigation officers to find the tempered videos. Blockchain is used to avoid the single point of failure issue of such systems and also ensures that video recordings are authentic and not modified. Hyperledger fabric is used to implement and evaluate the proposed system. Results show that data are distributed among different nodes and once a transaction is performed, the system becomes temper-proof. Only view rights are granted to the users.
Malik et al. [46] presented a framework for analyzing the patterns of users’ physical activity in a small city environment. These patterns may help to authenticate a user passively. Several machine learning algorithms are exploited to validate the identity of users by using three different datasets. The authors claimed that the proposed system provided better results than the existing systems. Meshram et al. [47] presented an authentication protocol for the smart cities environment. The proposed protocol is based on smart card and user password-based authentication and uses extended chaotic map. Some of the key features of the proposed protocol are insider attacks detection, detection of wrong password, stolen smart card detection, cancelation of lost smart cards, mutual authentication, and protection against client’s impersonation attacks. Multiple hypotheses are given and tested under the proposed protocol which shows its robustness. Esposito et al. [48] exploited Blockchain for authentication and authorization issues in smart cities applications. The authors discussed the need of security-related information management through a decentralized way. For this purpose, they integrated FIWARE with Blockchain-based access control and identity management. The comparison of the proposed system with the one using databases shows the superiority of it.
Ibba et al. [49] performed a bibliometric review based on article co-citation analysis and keyword co-occurrence network. They highlighted the challenges and discussed trends related to the deployment of Blockchain in smart cities. Suciu et al. [50] presented Tangle and Blockchain technologies and their main attributes to perform a detailed comparison of their techniques. Rejeb et al. [51] presented a Blockchain-based solution for sensors data storage and management. They applied SCRUM methodology to make Blockchain-based software due to its adaptive, flexible, and iterative nature.
In short, there is a need for a practical framework that can be deployed as such to provide security for smart cities. The heterogeneity aspect and complexity of the implementation must be transparent to the end-users. It should not only provide security but should also be scalable, robust, and flexible.
3. Overview of Blockchain Technology
In this era, Blockchain and smart ledger technologies are the leading research domains after the dawn of cryptocurrencies such as Ethereum and bitcoin. In Blockchain, data are stored and shared in a distributed, immutable, trusted fashion but are not editable. There is no need for intermediaries and centralized dependency to examine transactions [52,53]. The transparent nature of the Blockchain offers a low complexity procedure to retrieve the ledger-based transactions over networks. Blockchain consists of different services and approaches such as hash cryptography, mining, immutable ledger, consensus protocol, and distributed P2P Networking. Following is the detail of these methods and services:
A Blockchain exploits hash-based encryption algorithms for the addition or updating of transactions to the ledger. The main characteristics that belong to hashing techniques are the avalanche effect, deterministic, one-way cryptography, must withstand collisions, and faster computation. Blockchain uses the SHA-256 hashing algorithm.
Mining: It is the process of securing and verifying transactions. It demands high computing speed to attain and acquire the reward. It requires miners to add transaction data to the ledger. In the ledgers, blocks are connected and develop a chain that is secured by Blockchain miners.
Immutable ledger: In a Blockchain network, all transactions are recorded. An immutable ledger means recorded transactions cannot be altered or tampered with.
Consensus protocol: It is a procedure through which all the Blockchain nodes reach a common consensus regarding the present state of the distributed ledger. It helps in achieving reliability and establishing trust between unknown nodes in the Blockchain network.
Distributed P2P Networking: To distribute and update the data at the nodes of the Blockchain network, all transactions are broadcasted over the network.
Blockchain technology stores records in unaltered form in a distributed network. The addition or updating of transactions is made through the creation of new hash values. Blockchain technology has several advantages, e.g., decentralization, security, immutability, and transparency, that give it an edge over other existing technologies. Figure 2 describes the transaction process of Blockchain.
Ethereum Blockchain Architecture
Ethereum ledger consists of blocks, transactions, and consensus. The architecture comprises of Ethereum virtual machine (EVM), transactions, minor, consensus, accounts, smart contract, ethers, and gas. Figure 3 illustrates the Ethereum-oriented blockchain architecture.
A Blockchain network comprises numerous nodes. Some nodes are miners, while the rest of the nodes do not mine but facilitate smart contract execution. These are known as EVMs. These nodes are connected to establish the network and utilize peer-to-peer protocol for communication purposes. All miner nodes contain an instance of a ledger. The ledger keeps all blocks belonging to the chain. The synchronization among miners is made on an ongoing basis to ensure consistency.
In Ethereum Blockchain, there exists a parent–child relationship among blocks. This relationship is one to one. In this way, a chain is established. Figure 4 explains the parent–child relationship.
Blocks keep a record of the transactions. How many transactions a block can contain is determined by the upper gas limit. Each transaction consumes a certain amount of gas. So, when the quota of the gas for a certain block is reached, a new transaction becomes part of the next block. These hashed transactions are saved in the blocks. The hashes of two transactions are combined to produce a new hash. This mechanism keeps on running until there is a single hash from all transactions belonging to the block. The resultant single hash for the block is known as Transaction Merkle root hash and is saved in the blocks’ header. This makes the chain immutable. Figure 5 shows the relationship between transactions and blocks.
All miners at some points gather all transactions from the pool. The miner inserts these transactions in a new block provided that these transactions are not already present in the block. A timestamp and nonce are also added to the block header. Figure 6 shows the block header and its contents.
4. Proposed Solution
The proposed Blockchain-based architecture to ensure security and authorization for accessing smart city resources is shown in Figure 7. It represents the main components of the architecture and illustrates the steps toward authorized access of smart city resources. To clarify confusion related to taxonomy and working of distinct entities, the nomenclature as specified by the Internet Engineering Task Force (IETF) is as follows:
Authorization Servers: These are used to generate access tokens.
Resource servers: These generate/store protected resources.
Proxy Servers: These store protected resources and act as access interface for clients.
Resource Publishers/Owners: These are the original owners of resource servers and their corresponding resources.
Key Servers: These are used to generate keys for encryption/decryption of the resources.
Client/User application: Third party that requests access to the protected resources.
4.1. Authorization Blockchain
Generally, a Blockchain may be conceived as a log having persistency and whose records are saved in timestamped blocks. Transactions are contained by blocks. Each block is recognized by its cryptographic hash value, and it mentions the hash of the previous block. The Blockchain is maintained by the nodes that have the copy of the last n blocks (at least).
The authorization Blockchain has key servers, authorization servers, and clients as its nodes. All of these nodes do not need to store complete Blockchain and take part in the consensus protocol. There are some full nodes (e.g., authorization servers and key servers). These store the complete information of the Blockchain. Only authorization servers behave as miners. Resource owners set up the key servers who are responsible for the keys-related material of the resource servers. All other nodes are identified by a unique Blockchain address which is a pair of asymmetric keys. A smart contract is created to describe access rights by the resource owner; access tokens are then automatically generated by it. Transactions are performed to interact with smart contracts or among clients and resource owners. These transactions are signed by the private key of the respective nodes. These transactions are then broadcasted to the Blockchain network. The authorization servers (miners) verify the transactions and store those in blocks. Sealing of these blocks is performed by some consensus protocol and then these are appended to the Blockchain. The key servers and resource servers must have valid certificates to authenticate themselves. A client requests a key server to provide a decryption key for their desired resources. The client’s authorization is verified by the key server by checking the smart contract storage of Blockchain. If the client is verified, then it obtains the required key through which it can download and decrypt the desired resource.
In this work, the Ethereum [54] Blockchain network is used as an authorization Blockchain for smart city resources. In Ethereum Blockchain, customers and contractors’ records (accounts and information) are stored in timestamped blocks. It is a publicly available permissionless Blockchain for decentralized applications. Following is the rationale for using Ethereum Blockchain:
One of the prominent features of Ethereum is that it is programmable. All the contracts and agreements are part of the code enabling transactions to be executed automatically. With the help of its smart contracts, users can exchange anything having value, e.g., money, property, etc. These smart contracts can also invoke other contracts and may have lots of conditions and supported formats.
Ethereum is not only confined to cryptocurrency transactions but any transactions related to supply chains, energy grids, real estate, government registries, etc.
It is proven that Ethereum is robust in nature against security attacks.
It is open, flexible, and supports both permissionless and permissioned implementations.
An Ethereum network can support up to hundreds of nodes and millions of users, a number much larger than its competitors.
Ethereum consortia are not dependent on some single vendor, rather it is interoperable.
Because of Ethereum’s large ledger size, each transaction for any action/task which is written or verified from the ledger takes too much time and resources, e.g., huge gas consumption. Because of the large ledger size, e.g., 80 GB, it is not feasible to perform the development of real-time tasks on a public Blockchain until or unless the system fully matures and passes through all testing frameworks.
In this work, Ganache [55] local Ethereum Blockchain is used to deploy smart contracts and migrations without bulky ledger and gas consumptions. Ganache provides ten accounts for the users. Here, the users would be either resource owners or clients. Figure 8 shows the test-net for the proof of concept. Out of these ten accounts, one is allocated to a resource server, proxy server, key server, and resource owner, each. To deploy the smart contract on the Blockchain, the resource owner connects to a full node. The smart contracts are shown in Figure 9.
Clients can start interacting with smart contracts by invoking the public functions of it. An access token is created for a client by the function addToken(). This token is saved in the persistent memory of the contract. It contains both the client and resource server addresses. When a client sends requests to a key server for a decryption key, the TTL value of the access token is checked by the key server. To revoke the access rights of the client earlier, the deleteToken() function can be used. The smart contract can be activated by any entity in the Blockchain network.
More complex contracts might need some modifiers that control access to certain functions or to check if a particular condition is satisfied before function execution by the EVM, e.g., did this client pay for the access token?
4.2. Resource Servers
The protected resources of smart cities are stored and generated by resource servers. In the case of smart cities, traffic lights, security surveillance cameras, power plants, water supply network components, etc., are the resources. In this work, the resource server is developed on Raspberry Pi B+ [56].
4.3. Resource Owners/Publishers
Resource owners are the legal owners of the resource servers and their generated resources. In the case of smart cities, a resource owner is a government institution or controlling authority.
4.4. Key Servers
The necessary keys to encrypt and decrypt the resources are generated by key servers. When the user meets the contract requirements, a key would be generated for a specific time for using the resources. In this work, the key server is developed on the Core i7 machine with 4GB RAM, Sony Vaio CPU 2.6 GHz, and Ubuntu 16. 04.1 operating system. The key server has a full node status in the Blockchain.
4.5. Simulation/Creation of Smart City
The smart city utilizes different types of electronic sensors to acquire information and then use this information to control and manage resources efficiently. In this work, Raspberry Pi B+ is used for the simulation of a smart city. Two main functionalities of smart cities, i.e., traffic lights and security surveillance cameras, are simulated. In Figure 10, general purpose input pins (enclosed in the yellow rectangle) are controlled through tokens generated by the smart contract and output pins are connected with the physical smart city’s objects. To control the physical devices of the smart city, the node.js framework and git repository are installed on Raspberry Pi B+.
4.6. Integration of Smart City with Authorization Blockchain
To connect the smart city with authorization Blockchain, the truffle framework [55] is used. It makes the integration of smart contracts, binary management assets, contract migrations, and deployment easier.
4.6.1. Smart Contract Writing
Smart contracts are a part of Ethereum Blockchain. Ethereum invokes it whenever a user is validated to have a sufficient transaction fee. After validation, resources are allocated to the stack holder. These are basically the applications that run over Ethereum virtual machines. Ethereum virtual machine (EVM) executes it in byte-code or a string of 0s and 1s readable and interpretable by the network. Solidity [57] is an object-oriented high-level programming language used for Ethereum-based contract writing. The sample contracts are given in Figure 11.
4.6.2. Migrations
After the contract writing and module development, the migration process is performed. In the migration process, all modules such as Raspberry Pi integration with node.js [58] and smart contract integration at the js level are performed. Whenever the application is launched, the migration process executes first.
4.6.3. Access Control for Blockchain at Application/Browser Level (Metamask)
To access the Ganache Blockchain, Remote Procedural Calls (RPC) are used. RPC is time taking, so to speed up the development process, metamask [59] is used which gives us Ethereum Blockchain access at the browser level. The main advantage of metamask is that developers do not need any type of RPC calls over the internet for performing any test action. To deploy proposed systems in smart cities/homes, an obvious shift is required from Ganache metamask testing Blockchain to the geth Ethereum ledger.
4.6.4. Data Fetching from Smart Contract
Data fetching is performed to present the contract data (name, location, resource name, resource price, resource provider, etc.) at the application level for publishing resources, for the insertion of resources and users. In this work, Web3.js [60] is used for data fetching and insertion. Web3.js is a collection of libraries that allows the user to interact with the local and remote Ethereum using HTTP RPC.
4.7. User Application
To interact and control IoTchain-based secure smart city resources, an application is required. In this work, a hybrid application is developed which can be used for mobiles (Android, iOS, Windows, Blackberry) and computers. This application is developed in Meteor.js [61] framework. To use the proposed application, the user has to perform the following steps:
Create an Ethereum Blockchain wallet and acquire the public and private keys for wallet authentication.
Connect wallet to metamask by providing public and private keys. The metamask provides a 14-word memic which can be used for the retrieval of the wallet in case of keys stolen.
Open the application that asks the user to provide the necessary information as shown in Figure 12. The information provided at the time of startup is used for contract and resources provision.
4.8. Overall Working Flow
The following is the working flow of the proposed system and is shown in Figure 7.
The resource owner/provider (government institutions) creates a smart contract to publish it to the Blockchain.
The client that wants to acquire the protected resources sends a transaction to the particular smart contract address. The transaction is broadcast to all the Blockchain network nodes. The process of validation will be started, and miners will take part in it.
If the client meets certain requirements of the contract, then an access token will be generated. The access token describes the specific access rights (start time, expiry time, location, resource name) for the protected resources.
After the consensus, when the transaction is confirmed, smart contracts will be executed.
The contract transaction will be added to the contract and a token will be generated which will be the basic key for further processing.
The client then requests the key server for the necessary decryption keys to decrypt the resources.
The key server has a replica of the token. For the access token, the key server queries the internal storage of the responsible smart contract.
The key server generates a challenge response based on the client address given in the token to prove the authenticity of the client. This challenge can be solved by only the legitimate client that triggered the smart contract.
The client receives a personal key and takes part in the self-healing group key distribution process after completing the challenge.
Finally, the encrypted resources can be downloaded by client proxy or resource server. Both of these servers offer RESTful CoAP API which enables GET, POST, and PUT resources using Uniform Resource Identifier (URI).
It is to be noted that no authentication is necessary at this point because only an authorized client can obtain decryption cryptographic keys. In the case where the protected resources are acquired directly from the resource servers, a symmetric key would be used to secure the resources. On the other hand, when the proxy server is used to obtain the resources, an asymmetric signature would be used to protect the integrity of the resources. In both cases, necessary keys are provided by the key servers.
5. Experimental Analysis and Discussion
This section presents the performance evaluation of the main components of the proposed framework, discusses the security aspects and technical challenges, and highlights the limitations.
5.1. Evaluation of Key Server and Resource Server
To record the performance of different components of the Blockchain-based security mechanism, different types of tools and technologies (mocha framework and chai assertion library) are used. Mocha is a JS-based framework used for testing each module and measuring its performance. To GET, POST, or PUT data over the servers, mocha uses an assertion library named chai. To request data from a specified resource, GET method is used. For sending data to a server in order to create/update a resource, PUT method is used.
The key server is executed on Ubuntu 16.4 LTS. Figure 13 shows the average time required to accomplish the hand-shake process. It is observed that the average hand-shaking time increases with the increase in the number of clients. For 60 clients, average hand-shaking time is 200 ms which doubled for 120 clients. The machine used as the client is equipped with an Intel Core i7-4600M CPU @ 2.60 GHz (4 virtual cores), 4 GB RAM.
In this work, the resource server is deployed on Raspberry Pi B+ and is developed in C language. Figure 14 demonstrates the response time in milliseconds (ms) for a PUT and GET request from a client to a resource server. Moreover, it shows the time required to complete the DTLS handshake between a resource server and the key server which is indicated by AUTH. It illustrates the lowest, highest, and average response time for each request. It can be noted that lowest, average, and highest response time for PUT method are 50, 55, and 175 ms, respectively. Similarly, for GET method, lowest, average, and highest response time are 75, 125, and 483 ms, respectively. The lowest, average, and highest response time are 65, 84, and 99 ms, respectively, for AUTH.
To further test the efficacy of the proposed system, several experiments were performed by varying different parameters, e.g., transaction rate, block size, etc. First of all, the transaction rate is varied. Transaction rate is mentioned by . The value of is varied between 50–300 transactions/sec and average latency is computed against each value. Figure 15 shows the transaction commit time of this experiment. It is evident that as the transaction rate is increased, also increases.
In the second experiment, is kept constant, i.e., 150, and the number of nodes performing these transactions keeps increasing from 1 to 8. The transaction average is shown in Figure 16. It is reflected from the results that as the number of nodes taking part in transactions increases, also increases. It is lowest when the single node is performing the 150 transactions per second and is highest when 8 nodes are sharing these 150 transactions.
Figure 17 shows that as the number of nodes taking part in transactions increases, the transaction throughput decreases.
Another observation regarding CPU usage is recorded when is changed. It is shown in Figure 18 that CPU utilization keeps on increasing as the is increased, keeping the block size constant.
In all the above experiments, transaction size and block size are kept constant, i.e., 2 transactions/block. All the transactions are performed in the read mode. A new set of observations are recorded by varying the block sizes and finding the for varying . Figure 19 shows the results for this configuration. First, the block size is kept as 5, and values are calculated by varying . After that, the block size is increased to 10 and values are recorded. It can be noted that block size 10 has a slightly lower latency than block size 5. The mode of transactions is read in all of these experiments.
In a nutshell, it is observed that low on small block sizes may improve the performance of a Blockchain system. Similarly, high on larger block sizes also improves the performance of the system.
5.2. Smart City Resource Publishing and Controlling through User Application
5.2.1. Publishing Resource
The resource provider can add or publish the smart city resource (CCTV camera, traffic lights, electricity meter, etc.) contracts to the Blockchain through user application. Let us consider a scenario; a smart city management authority has deployed smart CCTV cameras and street lights. The authority publishes a smart contract on the Blockchain in order to authorize the clients. Some kind of proof, i.e., the client lives at a particular address, may be required by the smart contracts. This proof is included in the transaction’s data field which is then sent to the smart contract. The contract generates a token for the client on execution. The token references the address of the client (i.e., a public key). The access token also has a lifetime field and describes which resources are accessible. A resource owner has the option to deploy many smart contracts for the same resource server on the Blockchain. Every contract is different in the sense that it takes dissimilar input parameters and produces tokens with different privileges. Figure 20 exhibits the page that is used for publishing the resource. Three fields are there, i.e., recourse name, resource cost, and company.
5.2.2. Accessing and Controlling of Resources
The client will be able to see and manage the available resources in its area to whom that is authenticated. Figure 21 shows the client dashboard that consists of available resources and their status.
After the selection, the users can visualize and access the details related to the particular resource. Figure 22 shows the details of traffic lights located in Area 1 and information related to camera 1. The user can control these resources.
5.3. Comparative Analysis
In this work, a comparative analysis among proposed and existing techniques has been made on the basis of targeted domain, design, implementation, and user interface. Table 1 enlists the features supported by the proposed and existing solutions. It illustrates that most of the existing solutions do not incorporate all the essential features. Yue et al. [39] exploited Blockchain technology for the healthcare domain. Their work is comprehensive in nature comprising design, implementation, and user application. A Blockchain-based mechanism is presented in this work for secure authorization of smart city resources. It consists of the design and implementation of ACE framework-based authorization Blockchain and the OSCAR object security model. The Blockchain offers a flexible and trustless authorization mechanism. On the other hand, OSCAR makes use of a public ledger to establish multicast groups for authorized clients. Moreover, a meteor-based application is developed to provide a user-friendly interface for heterogeneous technologies belonging to the smart city to interact and control the smart city’s resources through this application.
Table 1.
Techniques | Domain | Design | Implementation | User Interface |
---|---|---|---|---|
Yue et al. [39] | Blockchain in Healthcare | ✓ | ✓ | ✓ |
Liang et al. [40] | Blockchain in Healthcare | ✓ | ✗ | ✗ |
Jiang et al. [41] | Blockchain in Healthcare | ✓ | ✓ | ✗ |
Fan et al. [42] | Blockchain in Healthcare | ✓ | ✓ | ✗ |
Tanwar et al. [43] | Blockchain in Healthcare | ✗ | ✗ | ✗ |
Habibzadeh et al. [44] | Cybersecurity in smart cities | ✗ | ✗ | ✗ |
Khan et al. [45] | Blockchain for Smart cities | ✓ | ✓ | ✗ |
Malik et al. [46] | Blockchain for Smart cities | ✓ | ✓ | ✗ |
Meshram et al. [47] | Authentication in Smart cities | ✓ | ✗ | ✗ |
Espositoa et al. [48] | Blockchain for Smart cities | ✓ | ✓ | ✗ |
Proposed | Blockchain for Smart cities | ✓ | ✓ | ✓ |
5.4. Security Analysis
The secure authorized access to the IoT resources is the key to the proposed framework. Several aspects of security are being considered and implemented, as below.
5.4.1. Formal Security Analysis
To formally analyze the security of the proposed system, authorization and authentication services provided by the proposed system have been evaluated as follows:
Authorization: In the context of a Blockchain-based proposed mechanism, authorization means that an attacker should not be able to acquire or use encrypted resources accessible to some authorized clients at resource server until more than 50% of nodes of authorization Blockchain are corrupted. Formally, it can be said that is secure with respect to authorization under the following conditions: if at a point an attacker can access the encrypted resources that are accessible to some authorized client at for some resource owner , then the is corrupt or, if ≠ ⊥, it implies or at least one of the trusted of must be corrupted. As we know, if = ⊥, then the resource is accessed in the client credentials mode and is not related to a client.
Authentication: In the context of a Blockchain-based proposed mechanism, authentication for resource server means that an attacker should not be able to acquire an access token under the identity of a valid client unless certain parties involved are corrupted. Being authenticated at means to have a valid access token from authorization server (). Formally, it can be said that is secure with respect to authentication under the following conditions: if an attacker is able to access the service token issued by a valid for a client , then either the client or one of the valid resource servers must be corrupted. In the case of the proposed Blockchain-based mechanism, the authentication and authorization are performed by authorization Blockchain nodes. Until more than 50% of nodes of are corrupted, the authorization can never fail. It is the realistic assumption adopted by the Blockchain that it would carry more honest nodes than the malicious nodes . So, in our case, unauthorized access would not be possible because > .
Session Integrity: The session integrity from the authorization perspective is (1) a client is only authorized to access the resources of the resource server when a client has a valid access token and (2) no other client can generate the access request on the behalf of the valid client because each access request is signed by the corresponding valid client . Formally, it can be said that is secure with respect to session integrity for authorization if the following conditions are fulfilled: (1) if in an iteration for , the challenge response flow is successful for a particular client and (2), additionally, the resource server is honest to provide resources only to a client who already has successfully completed the challenge response flow. The authorization Blockchain is secure with respect to session integrity for authentication if the following conditions are fulfilled: (1) if in an iteration for , the transaction request sent by a client is successfully verified by the miners and a valid access token is granted to it as a result of the execution of the smart contract and (2), additionally, the resource server is honest to provide resources only to a client who already has successfully acquired the valid access token.
5.4.2. Informal Security Analysis
To informally analyze the security of the proposed system, the following scenarios have been considered:
-
Scenario-1: Personal keys may become compromised while sharing
The personal keys are exchanged on DTLS channels which are based on TLS. So, there is no chance of eavesdropping, tampering, or message forgery while exchanging the keys. It ensures secure exchange of personal keys among different servers and clients. So, only the authorized client/server may obtain its key.
-
Scenario-2: An unauthorized client may request a resource or a fake key server may be there
Certificates are used to provide authentication between key and resource servers. The clients and key servers authenticate themselves through a challenge/response mechanism. Integrity of transactions are preserved by the use of signatures.
-
Scenario-3: The access token may be captured and misused by the attacker
The proposed system is built upon ACE. In ACE, the client identity is bounded with the access token using the concept of proof of possession (PoP). Whenever a request is sent from a client for the token, the ACE server binds a key to the token. The resource server can access this key and it is known to the client that placed the request. The resource server in turn creates a challenge response based on this key to verify whether the client is the owner of the token or not. So, what the attacker needs to do is to compromise only one authorization server to capture the valid tokens. In the proposed framework, this issue was resolved by demanding a public key from the client that triggers the smart contract. This public key of the client becomes part of the access token and is saved on Blockchain. The key server creates a challenge/response with the help of this key to verify the client’s identity who is demanding decryption keys. Now, an attacker is required to compromise at-least 51% of the miners to accomplish the desired task.
-
Scenario-4: DoS attack can be performed on any network
Denial of Service (DoS) attack possibility is always there and also on any infrastructure of Blockchain. Several measures are taken in the proposed framework to reduce the risk associated with such types of attacks. One possible scenario may be that a malicious user may repeatedly trigger smart contracts. This would create a huge volume of traffic in the Blockchain network as all requests need to be broadcasted and verified by the miners. It is minimized in a Blockchain-based network by presenting a client with some kind of a cryptographic puzzle before every transaction. This would flatten the attack. Furthermore, the execution time limit on the smart contracts is set on a lower side in the proposed framework. This helped in identifying the bogus requests without providing the gas value as is required in the Ethereum Blockchain. So, the smart contract would be halted in this case and all changes would be roll-backed.
5.5. Technical Challenges and Limitations
Following are the technical challenges for using Blockchain technology in a smart city environment:
Both smart cities and Blockchain are in their infancy so a lot of research work is still required to integrate these.
Shifting from a conventional centralized IoT system to a decentralized Blockchain network requires technical efforts to be made in right directions.
Conventional security and privacy architectures are inapplicable in the spectrum of smart cities due to its resource constraints. Most of the IoT devices are not designed to meet the basic security and privacy parameters which produce the security, confidentiality, privacy, authentication, data integrity, and access control issues.
A permissionless Blockchain is hard to implement and deploy in some institutions because it lacks in trust and is uncontrollable in nature.
There are only a limited number of accounts available (i.e., 10 in the case of Ganache) to implement and test the efficacy of any proposed solution.
Although, Blockchain provides a decentralized security mechanism that helps to secure the authentication process, it has numerous limitations. The public Blockchain is hard to implement and deploy in government institutions due to its trustless and uncontrollable nature. All nodes in the ledger download and repeat the same data in mining at the same time which makes it more costly with respect to time and transactions. Every node takes part in the mining process which makes it slower as compared to the other centralized approaches. When any transaction is broadcasted, it will increase the size of the ledger at every node.
It is observed that public Blockchain in the proposed solution makes this framework less deployable due to speed, cost, complexity, and a bulk of data issues. However, it is useful for any type of pure private Blockchain such as multichain [62], hyperledger [63], chain core [64], etc. When the proposed architecture is developed on private Blockchain, then cost complexity, all node mining problems, and ledger size increment in the transaction can be controlled. Moreover, the speed issue can be reduced and solved with private Blockchain. There are many constrains that could also be applied to private Blockchain that may help to control unnecessary attachment of the user by blocking and controlling. Nodes can also be increased and decreased for the mining which can resolve speed issues. Private Blockchain such as multichain does not charge a cost for anything which solves the cost with respect to the execution cost such as satoshi in bitcoin [65], Ethereum gas [66], and eos [67]. The public Blockchains [65,66,67] have a cost factor that makes them less deployable, while some private Blockchains are open source and free [18]. It can be concluded that the proposed solution is more appropriate, fast, and secure for private Blockchain instead of public. Private Blockchain may also control area-wise access as well which makes it implementable by the government of any territory and state.
6. Conclusions and Future Directions
This paper presented a secure and reliable authentication and trust management mechanism for smart cities. The proposed mechanism is based on Blockchain technology. Moreover, a practical implementation of a Blockchain-based security mechanism for secure authorization of smart city resources is presented. Furthermore, a hybrid application is developed to provide a user-friendly interface for heterogeneous technologies belonging to the smart cities. The users would be able to interact and control the smart city’s devices such as traffic lights and surveillance with the help of this application. In the future, this work can be extended for healthcare, hospitality, medication, education, etc.
Author Contributions
Data curation, A.K. and A.G.; Formal analysis, A.K., M.A. and M.B.A.; Funding acquisition, Z.A.; Investigation, M.B.A. and H.A.W.; Methodology, M.A., M.B.A., H.A.W. and A.G.; Project administration, M.A., Z.A.; Resources, Z.A.; Software, A.K., H.A.W.; Supervision, M.A.; Writing—original draft, H.A.W., M.A.; Writing—review & editing, M.A., M.B.A. and A.G. All authors have read and agreed to the published version of the manuscript.
Funding
This research work is supported by the School of Science, Engineering, and Environment, The University of Salford, The Crescent, Salford M5 4WT, United Kingdom.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
Footnotes
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
- 1.Ratasich D., Khalid F., Geissler F., Grosu R., Shafique M., Bartocci E. A Roadmap Toward the Resilient Internet of Things for Cyber-Physical Systems. Access IEEE. 2019;7:13260–13283. doi: 10.1109/ACCESS.2019.2891969. [DOI] [Google Scholar]
- 2.Yang C., Li X., Yu Y., Wang Z. Basing Diversified Services of Complex IoT Applications on Scalable Block Graph Platform. Access IEEE. 2019;7:22966–22975. doi: 10.1109/ACCESS.2019.2899000. [DOI] [Google Scholar]
- 3.Jindal F., Jamar R., Churi P. Future and Challenges of Internet of Things. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 2018;10:13–25. doi: 10.5121/ijcsit.2018.10202. [DOI] [Google Scholar]
- 4.Ali M.S., Vecchio M., Pincheira M., Dolui K., Antonelli F., Rehmani M.H. Applications of Blockchains in the Internet of Things: A Comprehensive Survey. Commun. Surv. Tutor. IEEE. 2019;21:1676–1717. doi: 10.1109/COMST.2018.2886932. [DOI] [Google Scholar]
- 5.Hassija V., Chamola V., Saxena V., Jain D., Goyal P., Sikdar B. A Survey on IoT Security: Application Areas Security Threats and Solution Architectures. Access IEEE. 2019;7:82721–82743. doi: 10.1109/ACCESS.2019.2924045. [DOI] [Google Scholar]
- 6.Yetis R., Sahingoz O.K. Blockchain Based Secure Communication for IoT Devices in Smart Cities; Proceedings of the 7th International Istanbul Smart Grids and Cities Congress and Fair (ICSG); Istanbul, Yurkey. 25–26 April 2019; pp. 134–138. [Google Scholar]
- 7.Jyothi V., Krishna M.G., Raveendranadh B., Rupalin D. IOT Based Smart Home System Technologies. Int. J. Eng. Res. Dev. 2017;13:31–37. [Google Scholar]
- 8.Alkandari A., Alnasheet M., Alshekhly I.F.T. Smart Cities: Survey. J. Adv. Comput. Sci. Technol. Res. 2012;2:79–90. [Google Scholar]
- 9.Sun Y., Song H., Jara A.J., Bie R. Internet of Things and Big Data Analytics for Smart and Connected Communities. IEEE Access. 2016;4:766–773. doi: 10.1109/ACCESS.2016.2529723. [DOI] [Google Scholar]
- 10.Song H., Srinivasan R., Sookoor T., Jeschke S. Smart Cities: Foundations, Principles and Applications. Wiley; Hoboken, NJ, USA: 2017. pp. 1–906. [Google Scholar]
- 11.Zheng Z., Xie S., Dai H., Chen X., Wang H. An overview of Blockchain technology: Architecture, consensus, and future trends; Proceedings of the IEEE International Congress on in Big Data (BigData Congress); Honolulu, HI, USA. 25–30 June 2017. [Google Scholar]
- 12.Chen J., Lv Z., Song H. Design of personnel big data management system based on blockchain. Future Gener. Comput. Syst. 2019;101:1122–1129. doi: 10.1016/j.future.2019.07.037. [DOI] [Google Scholar]
- 13.Kim S.-K. Enhanced IoV Security Network by Using Blockchain Governance Game. Mathematics. 2021;9:109. doi: 10.3390/math9020109. [DOI] [Google Scholar]
- 14.Kim S.-K. Blockchain Governance Game. Comput. Ind. Eng. 2019;136:373–380. doi: 10.1016/j.cie.2019.07.004. [DOI] [Google Scholar]
- 15.Crosby M., Nachlappan, Pattanayak P., Verma S., Kalyanarman V. Blockchain Technology. University of California; Berkeley, CA, USA: 2015. [(accessed on 24 March 2022)]. Sutardja Center for Entrepreneurship and Technology Technical Report. Available online: https://scet.berkeley.edu/wp-content/uploads/BlockchainPaper.pdf. [Google Scholar]
- 16.Sairam R., SankarBhunia S., Thangavel V., Gurusamy M. NETRA: Enhancing IoT Security Using NFV-Based Edge Traffic Analysis. Sens. J. IEEE. 2019;19:4660–4671. doi: 10.1109/JSEN.2019.2900097. [DOI] [Google Scholar]
- 17.Sagirlar G., Carminati B., Ferrari E., Sheehan J.D., Ragnoli E. Hybrid-IoT: Hybrid Blockchain Architecture for Internet of Things—PoW Sub-Blockchains; Proceedings of the Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) 2018 IEEE International Conference; Halifax, NS, Canada. 30 July–3 August 2018; pp. 1007–1016. [Google Scholar]
- 18.Paillisse J., Subira J., Lopez A., Rodriguez-Natal A., Ermagan V., Maino F., Cabellos A. Distributed Access Control with Blockchain; Proceedings of the IEEE International Conference on Communications (ICC); Shanghai, China. 20–24 May 2019; pp. 1–6. [Google Scholar]
- 19.Siris V.A., Dimopoulos D., Fotiou N., Voulgaris S., Polyzos G.C. OAuth 2.0 meets Blockchain for Authorization in Constrained IoT Environments; Proceedings of the IEEE 5th World Forum on Internet of Things (WF-IoT); Limerick, Ireland. 15–18 April 2019; pp. 364–367. [Google Scholar]
- 20.Riabi I., Ayed H.K.B., Saidane L.A. A survey on Blockchain-based access control for Internet of Things; Proceedings of the 15th International Wireless Communications and Mobile Computing Conference (IWCMC); Tangier, Morocco. 24–28 June 2019; pp. 502–507. [Google Scholar]
- 21.Siris V.A., Dimopoulos D., Fotiou N., Voulgaris S., Polyzos G.C. Trusted D2D-Based IoT Resource Access Using Smart Contracts; Proceedings of the IEEE 20th International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM); Washington, DC, USA. 10–12 June 2019; pp. 1–9. [Google Scholar]
- 22.Dawod A., Kopoulos D.G., Jayaraman P.P., Nirmalathas A. Advancements towards Global IoT Device Discovery and Integration; Proceedings of the IEEE International Congress on Internet of Things (ICIOT); Milan, Italy. 8–13 July 2019; pp. 147–155. [Google Scholar]
- 23.Alphand O., Amoretti M., Claeys T., Asta S.D., Duda A., Ferrari G., Rousseau F., Tourancheau B., Veltri L., Zanichelli F. IoTChain: A Blockchain security architecture for the Internet of Things; Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC); Barcelona, Spain. 15–18 April 2018. [Google Scholar]
- 24.Rescorla E., Modadugu N. Datagram Transport Layer Security Version 1.2. Internet Requests for Comments, RFC Editor, RFC 6347, January 2012. [(accessed on 2 February 2022)]. Available online: http://www.rfc-editor.org/rfc/rfc6347.txt.
- 25.Dorri A., Kanhere S.S., Jurdak R. Blockchain in Internet of Things: Challenges and Solutions. 2016. [(accessed on 2 February 2022)]. Available online: https://arxiv.org/ftp/arxiv/papers/1608/1608.05187.pdf.
- 26.Ferrag M.A., Derdour M., Mukherjee M., Derhab A., Maglaras L., Janicke H. Blockchain Technologies for the Internet of Things: Research Issues and Challenges. Internet Things J. IEEE. 2019;6:2188–2204. doi: 10.1109/JIOT.2018.2882794. [DOI] [Google Scholar]
- 27.Danzi P., Kalør A.E., Stefanović Č., Popovski P. Delay and Communication Tradeoffs for Blockchain Systems with Lightweight IoT Clients. Internet Things J. IEEE. 2019;6:2354–2365. doi: 10.1109/JIOT.2019.2906615. [DOI] [Google Scholar]
- 28.Novo O. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT. IEEE Internet Things J. 2018;8:1184–1195. doi: 10.1109/JIOT.2018.2812239. [DOI] [Google Scholar]
- 29.Samaniego M., Deters R. Using Blockchain to Push Software- Defined IoT Components Onto Edge Hosts; Proceedings of the International Conference on Big Data and Advanced Wireless Technologies; Blagoevgrad, Bulgaria. 10–11 November 2016. [Google Scholar]
- 30.Kravitz D.W., Cooper J. Securing User Identity and Transactions Symbiotically: IoT meets Blockchain; Proceedings of the 2017 Global Internet of Things Summit (GIoTS); Geneva, Switzerland. 6–9 June 2017; pp. 1–6. [Google Scholar]
- 31.Dorri A., Kanhere S.S., Jurdak R. Towards an Optimized Blockchain for IoT; Proceedings of the Second International Conference on Internet-of-Things Design and Implementation; Pittsburgh, PA, USA. 18–21 April 2017; pp. 173–178. [Google Scholar]
- 32.IOTA. [(accessed on 2 February 2022)]. Available online: https://www.iota.org/
- 33.Internet of Trusted Things (IoTeX) [(accessed on 2 February 2022)]. Available online: https://www.iotex.io/
- 34.Securely Connect, Manage and Analyze IoT Data with Watson IoT Platform. [(accessed on 2 February 2022)]. Available online: https://www.ibm.com/internet-of-things/solutions/iot-platform/watson-iot-platform.
- 35.Ambrosus- Decentralized IoT Networks. [(accessed on 2 February 2022)]. Available online: https://ambrosus.com/
- 36.Waltonchain-The Global Leader in Blockchain+IoT. [(accessed on 2 February 2022)]. Available online: https://www.waltonchain.org/en/
- 37.Origintrail. [(accessed on 2 February 2022)]. Available online: https://origintrail.io/
- 38.Atonomi-Bringing Trust and Security to IoT. [(accessed on 2 February 2022)]. Available online: https://atonomi.io/
- 39.Yue X., Wang H., Jin D., Li M., Jiang W. Healthcare data gateways: Found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 2016;40:218. doi: 10.1007/s10916-016-0574-6. [DOI] [PubMed] [Google Scholar]
- 40.Liang X., Zhao J., Shetty S., Liu J., Li D. Integrating blockchain for data sharing and collaboration in mobile healthcare applications; Proceedings of the IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC); Montreal, QC, Canada. 8–13 October 2017; pp. 1–5. [Google Scholar]
- 41.Jiang S., Cao J., Wu H., Yang Y., Ma M., He J. Blochie: A blockchain-based platform for healthcare information exchange; Proceedings of the IEEE International Conference on Smart Computing (SMARTCOMP); Taormina, Italy. 18–20 June 2018; pp. 49–56. [Google Scholar]
- 42.Fan K., Wang S., Ren Y., Li H., Yang Y. Medblock: Efficient and secure medical data sharing via blockchain. J. Med. Syst. 2018;42:136. doi: 10.1007/s10916-018-0993-7. [DOI] [PubMed] [Google Scholar]
- 43.Tanwar S., Parekh K., Evans R. Blockchain-based electronic healthcare record system for healthcare 4.0 applications. J. Inf. Secur. Appl. 2020;50:102407. doi: 10.1016/j.jisa.2019.102407. [DOI] [Google Scholar]
- 44.Habibzadeh H., Nussbaum B.H., Anjomshoa F., Kantarci B., Soyata T. A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustain. Cities Soc. 2019;50:101660. doi: 10.1016/j.scs.2019.101660. [DOI] [Google Scholar]
- 45.Khan P.W., Byun Y.-C., Park N. A Data Verification System for CCTV Surveillance Cameras Using Blockchain Technology in Smart Cities. Electronics. 2020;9:484. doi: 10.3390/electronics9030484. [DOI] [Google Scholar]
- 46.Malik M.N., Azam M.A., Ehatisham-Ul-Haq M., Ejaz W., Khalid A. ADLAuth: Passive Authentication Based on Activity of Daily Living Using Heterogeneous Sensing in Smart Cities. Sensors. 2019;19:2466. doi: 10.3390/s19112466. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 47.Meshram C., Ibrahim R.W., Deng L., Shende S.W., Meshram S.G., Barve S.K. A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment. Soft Comput. 2021;25:10037–10051. doi: 10.1007/s00500-021-05929-5. [DOI] [Google Scholar]
- 48.Espositoa C., Ficco M., Gupta B.B. Blockchain-based authentication and authorization for smart city applications. Inf. Process. Manag. 2021;58:102468. doi: 10.1016/j.ipm.2020.102468. [DOI] [Google Scholar]
- 49.Ibba S., Pinna A., Seu M., Pani F.E. CitySense: Blockchain-oriented Smart Cities; Proceedings of the XP2017 Scientific Workshops; Cologne, Germany. 22–26 May 2017; pp. 1–5. [Google Scholar]
- 50.Suciu G., Nădrag C., Istrate C., Vulpe A., Ditu M., Subea O. Comparative Analysis of Distributed Ledger Technologies; Proceedings of the IEEE Global Wireless Summit (GWS); Chiang Rai, Thailand. 25–28 November 2018. [Google Scholar]
- 51.Rejeb A., Rejeb K., Simske S.J., Keogh J.G. Blockchain technology in the smart city: A bibliometric review. Qual. Quant. 2021:1–32. doi: 10.1007/s11135-021-01251-2. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 52.Mistry I., Tanwar S., Tyagi S., Kumar N. Blockchain for 5g-enabled IoT for industrial automation: A systematic review, solutions, and challenges. Mech. Syst. Signal Process. 2019;135:1–19. doi: 10.1016/j.ymssp.2019.106382. [DOI] [Google Scholar]
- 53.Kabra N., Bhattacharya P., Tanwar S., Tyagi S. Mudrachain: Blockchain-based framework for automated cheque clearance in financial institutions. Future Gener. Comput. Syst. 2020;102:574–587. doi: 10.1016/j.future.2019.08.035. [DOI] [Google Scholar]
- 54.Ethereum. [(accessed on 2 February 2022)]. Available online: https://www.ethereum.org/
- 55.Ganache-One Click Blockchain. [(accessed on 2 February 2022)]. Available online: https://www.trufflesuite.com/ganache.
- 56.Rasberry. [(accessed on 2 February 2022)]. Available online: https://www.raspberrypi.org/
- 57.Solidity. [(accessed on 2 February 2022)]. Available online: https://en.wikipedia.org/wiki/Solidity.
- 58.Node.js. [(accessed on 2 February 2022)]. Available online: https://nodejs.org/
- 59.Metamask. [(accessed on 2 February 2022)]. Available online: https://metamask.io/
- 60.Web3.js—Ethereum JavaScript API. [(accessed on 2 February 2022)]. Available online: https://web3js.readthedocs.io/en/v1.2.1/
- 61.Meteor: Build Apps with JavaScript. [(accessed on 2 February 2022)]. Available online: https://www.meteor.com/
- 62.MutiChain. [(accessed on 2 February 2022)]. Available online: https://www.multichain.com/
- 63.Hyperledger. [(accessed on 2 February 2022)]. Available online: https://www.hyperledger.org/
- 64.Chain Core. [(accessed on 2 February 2022)]. Available online: http://fedchains.com/core/
- 65.Bitcoin. [(accessed on 2 February 2022)]. Available online: https://bitcoin.org/en/
- 66.Gas(Ethereum) [(accessed on 2 February 2022)]. Available online: https://www.investopedia.com/terms/g/gas-ethereum.asp.
- 67.Eos Wallet. [(accessed on 2 February 2022)]. Available online: https://www.ledger.com/eos-wallet/
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
Not applicable.