Cargando…

Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network

The Internet of Things (IoT) paradigm allows the connection and exchange of information between millions of smart devices. This paradigm grows and develops exponentially as do the risks and attacks on IoT infrastructures. Security, privacy, reliability, and autonomy are the most important requiremen...

Descripción completa

Detalles Bibliográficos
Autores principales: Guerrero-Sanchez, Alma E., Rivas-Araiza, Edgar A., Gonzalez-Cordoba, Jose Luis, Toledano-Ayala, Manuel, Takacs, Andras
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7287648/
https://www.ncbi.nlm.nih.gov/pubmed/32423025
http://dx.doi.org/10.3390/s20102798
_version_ 1783545096707244032
author Guerrero-Sanchez, Alma E.
Rivas-Araiza, Edgar A.
Gonzalez-Cordoba, Jose Luis
Toledano-Ayala, Manuel
Takacs, Andras
author_facet Guerrero-Sanchez, Alma E.
Rivas-Araiza, Edgar A.
Gonzalez-Cordoba, Jose Luis
Toledano-Ayala, Manuel
Takacs, Andras
author_sort Guerrero-Sanchez, Alma E.
collection PubMed
description The Internet of Things (IoT) paradigm allows the connection and exchange of information between millions of smart devices. This paradigm grows and develops exponentially as do the risks and attacks on IoT infrastructures. Security, privacy, reliability, and autonomy are the most important requirements in IoT Systems. If these issues are not guaranteed, the IoT system could be susceptible to malicious users and malicious use. In centralized IoT systems, attacks and risks are greater, especially when data is transmitted between devices and shared with other organizations. To avoid these types of situations, this work presents a decentralized system that guarantees the autonomy and security of an IoT system. The proposed methodology helps to protect data integrity and availability based on the security advantages provided by blockchain and the use of cryptographic tools. The accuracy of the proposed methodology was measured on a temperature and humidity sensing IoT-based Wireless Sensor Network (WSN). The obtained results prove that the proposal fulfils the main requirements of an IoT system. It is autonomous, secure to share and send information between devices and users, has privacy, it is reliable, and the information is available in the infrastructure. Furthermore, this research demonstrates that the proposal is less susceptible to the most frequent attacks against IoT systems, such as linking attack, man in the middle, and Distributed Denial of Service (DDoS) attack.
format Online
Article
Text
id pubmed-7287648
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-72876482020-06-15 Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network Guerrero-Sanchez, Alma E. Rivas-Araiza, Edgar A. Gonzalez-Cordoba, Jose Luis Toledano-Ayala, Manuel Takacs, Andras Sensors (Basel) Article The Internet of Things (IoT) paradigm allows the connection and exchange of information between millions of smart devices. This paradigm grows and develops exponentially as do the risks and attacks on IoT infrastructures. Security, privacy, reliability, and autonomy are the most important requirements in IoT Systems. If these issues are not guaranteed, the IoT system could be susceptible to malicious users and malicious use. In centralized IoT systems, attacks and risks are greater, especially when data is transmitted between devices and shared with other organizations. To avoid these types of situations, this work presents a decentralized system that guarantees the autonomy and security of an IoT system. The proposed methodology helps to protect data integrity and availability based on the security advantages provided by blockchain and the use of cryptographic tools. The accuracy of the proposed methodology was measured on a temperature and humidity sensing IoT-based Wireless Sensor Network (WSN). The obtained results prove that the proposal fulfils the main requirements of an IoT system. It is autonomous, secure to share and send information between devices and users, has privacy, it is reliable, and the information is available in the infrastructure. Furthermore, this research demonstrates that the proposal is less susceptible to the most frequent attacks against IoT systems, such as linking attack, man in the middle, and Distributed Denial of Service (DDoS) attack. MDPI 2020-05-14 /pmc/articles/PMC7287648/ /pubmed/32423025 http://dx.doi.org/10.3390/s20102798 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Guerrero-Sanchez, Alma E.
Rivas-Araiza, Edgar A.
Gonzalez-Cordoba, Jose Luis
Toledano-Ayala, Manuel
Takacs, Andras
Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network
title Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network
title_full Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network
title_fullStr Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network
title_full_unstemmed Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network
title_short Blockchain Mechanism and Symmetric Encryption in A Wireless Sensor Network
title_sort blockchain mechanism and symmetric encryption in a wireless sensor network
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7287648/
https://www.ncbi.nlm.nih.gov/pubmed/32423025
http://dx.doi.org/10.3390/s20102798
work_keys_str_mv AT guerrerosanchezalmae blockchainmechanismandsymmetricencryptioninawirelesssensornetwork
AT rivasaraizaedgara blockchainmechanismandsymmetricencryptioninawirelesssensornetwork
AT gonzalezcordobajoseluis blockchainmechanismandsymmetricencryptioninawirelesssensornetwork
AT toledanoayalamanuel blockchainmechanismandsymmetricencryptioninawirelesssensornetwork
AT takacsandras blockchainmechanismandsymmetricencryptioninawirelesssensornetwork