• Tidak ada hasil yang ditemukan

A thesis submitted in fulfilment of the requirements for the degree of

N/A
N/A
Protected

Academic year: 2023

Membagikan "A thesis submitted in fulfilment of the requirements for the degree of "

Copied!
234
0
0

Teks penuh

The traditional adoption of the blockchain protocol for Bitcoin is common, but it cannot be used for IoT because Bitcoin is a payment system, while the IoT ecosystem has a different architecture. In addition, anyone who knows the traffic symbol of the vehicle can access the traffic fine history. Security of the data including confidentiality, integrity and availability of the data transmitted by sensors and.

H4: The system and network performance of the proposed architecture is better than the traditional centralized architecture of IoT. These results are used to create the final architecture given in Chapter 4, and the implementation and outcome of the architecture is briefly discussed in Chapter 8. It also provides a comparison of the different platforms, architectures, and consensus used in IoT blockchain.

The implementation, performance evaluation and security analysis of the proposed architecture is described in this chapter. It includes background in PKI, a proposed architecture, implementation details, and comparison of the proposed system with the existing architecture.

L ITERATURE S URVEY

Due to the limited computing power of the IoT, it is inefficient to use some of the conventional public key cryptosystems. The block structure contains the block version, the hash of the previous block, the timestamp, a nonce value that starts at 0 and increments for each hash calculation, the number of transactions, and the MerkleRoot (i.e., the hash value of the root of a tree Merkel by linking the hash values ​​of all transactions in the block) (Nakamoto 2008). Whenever a component "A" tries to transmit an "x" value, the other components are allowed to discuss with each other and verify the consistency of "A"'s transmission and eventually settle on a common "y" value.

The transaction includes the recipient's public key and is signed by the sender. The sender signs the transactions with the private key, and receivers validate the authenticity of the transaction with the sender's public key. In most IoT deployments, sensors send data directly to the cloud or use a gateway.

Mobile Edge Computing: MEC brings compute and storage capacity to the edge of the network within the Radio Access Network. In the case of IoT, this will affect IoT device performance due to the resource-constrained nature of these devices. A selection of blockchain use-cases for IoT available in the literature is listed in Table 3.2.

However, in the case of IoT, the confidentiality of data generated by sensors depends on the sensitivity of the data. It is the extension of cloud computing services to the network edge to reduce network latency and congestion. DoS attack - An attack on a centralized server can affect data security.

However, it is not possible to authenticate a fake transaction unless the device's private key is compromised. Therefore, it is understood that authentication of the system's public key is part of creating trust in the system. After generating the key, the client provides a copy of the public key to the CA to certify.

A certificate is basically signing a user's public key with a CA's private key. One of the major challenges is the sensitivity of data generated by sensors in the IoT. Here, id is an arbitrary string used as the client's public key and 'd' is the corresponding private key.

A group of edge nodes act as miners who verify the signature of the transaction and add it to the block chain.

Figure 2.1:Architecture of IoT
Figure 2.1:Architecture of IoT

One of the consensus nodes was disconnected during the consensus process and all other nodes were waiting for this node to create the block (Buntinx 2018). Miners calculate the hash of the header to find a value less than the specified target. The next field is the hash of the previous block, and then Merkely is root, which is a special hash of all the transactions in the block.

Some of the attacks in consensus protocols are the 51% attack (Kroll, Davey & Felten 2013), the risk attack and the nothing-at-risk attack (ethereumwiki 2018). Therefore, without interrupting the normal service of sensors, blockchain technology can be introduced into the IoT. In this chapter, we will present the details of the implementation and evaluation methodology we used to evaluate the proposed system.

The first approach is to measure the performance of the system to identify the performance of the system during the blockchain process. In order to evaluate the effectiveness of the proposed approach, we measured the performance of the system using geth metrics. An example of disk usage data generated by geth metrics in Figure 8.7 and an example of memory usage data is given in Table 8.1.

It still suffers from some minor threats that can be considered a drawback of the proposed approach. In this chapter, we briefly summarize the finding of the thesis and test the validity of the hypothesis. The main contribution of the research is to provide a secure blockchain architecture for event-driven IoT devices.

One of the major problems in a private blockchain is to identify the node that will execute the consensus. H4: The system and network performance of the proposed architecture is better than the traditional centralized IoT architecture- Our experiment showed that the system and network performance is high with the traditional centralized approach compared to the proposed system. In the traditional approach, when a vehicle receives a speeding ticket, the details of the vehicle along with the location and amount of the ticket are transparent.

Table 7.1:Consensus Used in Cryptocurrencies
Table 7.1:Consensus Used in Cryptocurrencies

R EFERENCES

Gambar

Figure 2.2:Security architecture for IoT    (Yang et al. 2013)
Figure 2.9:Gateway devices/ Edge Nodes with IoT    (Ali, Vecchio, et al. 2018)
Figure 2.11:Interconnected edge devices as end-points to the Blockchain
Figure 2.12:Cloud-blockchain hybrid with the IoT edge  (Ali, Vecchio, et al. 2018)
+7

Referensi

Dokumen terkait

Speaking in English Class (A Case Study in a Senior High School in South Tangerang, Banten, Indonesia)‖. The study aims to find out psychological factors that hinder