Sunteți pe pagina 1din 8

BLOCKCHAINS FOR SCALABLE IOT MANAGEMENT, ACCESS, AND

ACCOUNTABILITY

Blockchain for Managing Heterogeneous Internet of Things: A Perspective Architecture


Lewis Tseng, Liwen Wong, Safa Otoum, Moayad Aloqaily, and Jalel Ben Othman

Abstract [4] proposed a distributed capability-based access


control method for sensitive information access;
IoT has the potential to transform the way we however, their proposed work compromises user
think about information and communication tech- privacy. On the other hand, the work proposed in
nology. IoT has been studied extensively across [5] aimed to provide authentication and privacy
many disciplines such as the networking, com- for IoT, but the proposed method is inappropriate
munication, security, business, and management for resource-limited IoT devices.
communities. However, many unsolved challeng- Blockchain, an emerging technology with
es, especially in managing heterogeneous IoTs, great success in cryptocurrencies, has gained
remain to be discussed. Recent studies propose interest for its use in many application domains.
using blockchain, an emerging technology that The foremost advantage of blockchain is its inher-
enables decentralized coordination, to address ent security guarantees and resistance to various
inherent challenges in IoT. This article presents a attacks [7]. The other important advantage is a
preliminary study on an architecture that imple- tamper-resistant mechanism to enable decentral-
ments blockchain in managing heterogeneous IoT ized coordination and storage without the need
systems. We start by pointing out the limitations for a trusted third party. Fundamentally, IoT shares
of prior IoT systems and the difficulties of integrat- some common problems with cryptocurrencies.
ing IoT and blockchain. Then we outline an archi- For example, in an IoT system, there are many
tecture to manage a large-scale heterogeneous entities such as nodes, gateways, and users that
IoT system. Our main goal is to stimulate further do not automatically trust each other when per-
effort and cross-disciplinary collaboration by pro- forming connections [8]. Hence, several prior
viding guidance and reference for future studies. works have proposed using blockchain to address
various issues in IoT (e.g., [7–9]).
Introduction In spite of its desirable advantages, blockchain
In recent years, we have observed various Internet has its own disadvantages, as pointed out in [9],
of Things (IoT) systems, consisting of devices, net- for example, scalability issues, encryption process-
works, technologies, and human resources, deliv- ing time and power, and high storage overhead.
er exciting results across numerous sectors and In addition to these technical limitations, we iden-
applications including business, intelligent trans- tify and categorize unsolved challenges that have
portation, tracking and monitoring, smart health, to be addressed in blockchain-based IoT. The goal
and smart home, among others. In IoT systems, of this article is to outline our design to address
the information is sent from a device to the cloud these challenges. Specifically, we propose a per-
in which the received data is processed using ana- spective architecture to support and manage a
lytics procedures and sent back to the IoT device. large-scale heterogeneous IoT system by seam-
IoT management is a daunting task due to numer- lessly integrating IoT and blockchain. Further-
ous joined devices and complicated interaction more, by having a modular and easy-to-configure
among devices. Moreover, in a highly scalable architecture, we hope to stimulate further effort
and large-scale IoT system, weak and unsecured and cross-disciplinary collaboration.
points will unavoidably be detected and exploited The article is structured as follows. In the fol-
[1]. Therefore, there is a strong need for efficient, lowing section, we briefly discuss IoT applications
scalable, and secure management of IoT systems and state-of-the-art IoT systems. Then we present
with heterogeneous devices. an overview on blockchain and related applica-
With the growth of IoT in the research and tions. Following that, we identify key unsolved
industry fields, security and privacy weaknesses challenges in managing heterogeneous IoT sys-
have arisen. Unfortunately, a number of securi- tems, pointing out that it is nontrivial to integrate
ty and privacy techniques are unsuitable for IoT, blockchains and IoT systems. Finally, we outline
mainly due to devices’ resource constraints and a novel architecture that addresses the identified
its decentralized and unmediated topology that challenges.
allows devices to constantly share critical infor-
mation back and forth over the Internet [2]. This Blockchain: Features and Applications
makes IoT a prime target for malicious third par- Interest in blockchain technology gradually devel-
ties, which leads to autonomous decision making. oped after Bitcoin was introduced in 2008, and
Plentiful security weaknesses have been acknowl- has grown exponentially as Bitcoin became a
edged in connected devices [3–6]. The work in household name in 2017.
Digital Object Identifier:
10.1109/MNET.001.1900103 Lewis Tseng and Liwen Wong are with Boston College; Safa Otoum is with Zayed University; Moayad Aloqaily is with Al Ain University and xAnalytics Inc.; Jalel Ben
Othman is with L2S lab CNRS Centrale Supélec, University Paris Sud, and University of Paris 13.

12 0890-8044/19/$25.00 © 2019 IEEE IEEE Network • January/February 2020


While Satoshi Nakamoto’s work [10] eventu-
ally served as the foundation upon which block-
chain has been studied and adopted, his work
focuses on blockchain in the context of an alter-
native currency and store of value rather than in
non-currency settings such as land registration,
constituent voting, and supply chain traceability.
Blockchain can be better thought of as an amal-
gamation of several existing technologies: peer-
to-peer (P2P) networking, cryptographic hashing
functions, trusted timestamping, and digital sig-
natures. We give a short overview on blockchain
below.
Intuitively, blockchain (or so-called distributed FIGURE 1. Representation of blockchain’s structure: each block of the chain con-
ledger, DLT) is a decentralized database designed tains a header and a body, where the header includes the identifier of the
to enable multiple independent participants in the previous block, and the body contains stored transactions in a Merkle tree.
network to reach consensus about changes to the
state of the shared data without needing a trusted decentralization, fault tolerance, and immutability.
third party. Blockchain is a subset of DLT, in which Blockchain has the potential to ensure transparen-
a special data structure bundles transactions into cy by reducing the need for trust between multi-
blocks with a unique hash code and broadcasts ple parties, reducing dependence on intermediary
them to every node. Consensus models such as service providers, building a secure value transfer
“proof of work” and “proof of authority” allow system (of assets and of information), streamlin-
the determination of which node has the right ing business processes, and increasing regulatory
to publish the next block. Participants reach an practices and ease of auditing.
agreement over transactions and records through Decentralization: Blockchain is built on top of
a consensus mechanism (e.g., proof of work, a P2P network where every entity can join it at
proof of stake, or PBFT), ensuring that each par- will; that is, if the blockchain is permissionless.
ty’s view of the shared database is consistent with Fault Tolerance/Security: Blockchain is
that of all other parties. This eliminates the need designed to tolerate malicious behavior as long
to trust other participants who may have differ- as a certain threshold of participants are correct
ent motives or malicious behaviors. Through the (typically the majority). All participants in the
consensus mechanism, any tampering or improp- blockchain hold identical copies of the ledger.
er modification of the data will be independent- Any tampering with the data will be detected and
ly detected and rejected by honest participants. rejected by blockchain peers. This verification sys-
As a result, digital assets and records cannot be tem, built on consensus algorithms, eliminates the
forged once they are recorded on the blockchain, “double-spending” problem and is one of the key
or transferred, without the participants’ consent in benefits of using blockchain.
the form of a digital signature. Immutability: Blockchain’s core idea is based
In order to explore the potential application on a chain of immutable blocks that contains
of blockchain in IoT, it is important to first under- important data (e.g., transaction details in Bitcoin).
stand the features of blockchains, in particular Since all transactions that take place in the block-
how blockchains help in solving the challenges chain are verified with the consensus mechanism,
posed above. In the rest of this section, we dis- the blockchain is tamper-resistant given that any
cuss the main features of blockchain as well as its changes in the blockchain would easily be detect-
applications. ed. In order to alter any previous and existing
records, an attacker would have to attempt to
Structure of Blockchains compromise all nodes within the network.
A blockchain consists of a chain of blocks that Auditability/Privacy: Since all participants hold
contain details of stored transactions within the a replica of the blockchain, network participants
network (Fig. 1). Each block contains a header have access to all transaction records. This trans-
and a body. The first block of the chain is also parency in records allows participants to look
called the “genesis” block. The header contains up desired blockchain addresses. However, the
the identifier, which is obtained by taking the blockchain does provide a sense of pseudo-ano-
cryptographic hash of the previous block, among nymity. It is difficult to use blockchain transaction
other fields, whereas the body consists of stored records to trace back to the parties involved in
transactions that are being broadcast. Details of the transactions.
the transactions can be regarded as a kind of
data exchange or the transfer of tokens that takes Types of Blockchain
place in a network. The blocks are connected in Public: Public blockchains are also called per-
a chain, and can be thought of as a linked list. missionless blockchains. Public blockchains are
Immutability refers to the linking of each block decentralized; anyone is allowed to maintain a
to a previous block. Should any participant with- replica of the blockchain and engage in validating
in the network attempt to alter or tamper with new blocks. Bitcoin [10] and Ethereum are a type
the contents of a past block, the block’s identifi- of public or “open” blockchain.
er would no longer be valid. Consequently, this Private: The terms “private,” “closed,” and
labels the subsequent block hashes as invalid. “permissioned” are often used interchangeably.
Permissioned or closed blockchains refer to those
Features of Blockchains whose access is restricted to a specific set of vet-
Blockchains offer attractive features, mainly ted participants. The permission model is built on

IEEE Network • January/February 2020 13


ries of challenges below and in Table 1.
Consortium blockchains are used as a synchronized distributed database, keeping track of data Integration: Since IoT and blockchains are
exchanges between consortium network participants. While these blockchains provide faster latency developed by different communities with dis-
tinct design goals, technical issues arise during
in transactions and more auditability, they are not completely decentralized. the attempt to integrate the two systems into one
coherent design seamlessly.
Management/Operation: As pointed out ear-
Category Challenges lier, many different standards and designs exist
for IoT systems. Moreover, large-scale practical
Layer of integration applications are likely to use multiple IoT devic-
Energy constraints es, possibly from different vendors, at the same
Integration
Supportability and compatibility time. Managing such an IoT system is a nontriv-
Heterogeneity ial task. Additionally, IoT is a fast-evolving area;
Failure recovery most IoT devices are fragile and resource-con-
Management/deployment Monitoring and auditability strained. Hence, deploying and operating IoT
Extensibility and flexibility systems smoothly is an important element to be
addressed.
TABLE 1. Challenges of blockchain-based IoT. In the following section, we present a novel
architecture that addresses all the challenges iden-
three key types of permission configurations that tified in this section.
can be used when setting up a blockchain, giving
permission to those who can: Integration Challenges
• Read: access the ledger and see transactions Layer of Integration: As mentioned previously,
• Write: generate transactions and see transac- IoT is a complex system consisting of many com-
tions ponents: devices, networks, technologies, and
• Commit: update the state of the ledger human resources. To define a common interface
Unlike public blockchains, private blockchains do for different components, the Internet of Things
not require processing fees. Hyperledger [11] is World Forum (IoTWF) proposed a seven-layer
one popular private chain. IoT reference model [12], which includes the
Consortium: Consortium blockchains (also following layers: Physical Devices & Control-
dubbed federated blockchains) are similar to pri- lers, Connectivity, Edge (Fog) Computing, Data
vate blockchains in that they are permissioned Accumulation, Data Abstraction, Application, and
networks. Consortium blockchains are used as a Collaboration & Processes. Figure 2 presents the
synchronized distributed database, keeping track seven-layer reference model.
of data exchanges between consortium network To keep the architecture clean and simple, it is
participants. While these blockchains provide fast- tempting to treat a blockchain-based system as a
er latency in transactions and more auditability, blackbox and plug it in at certain layers in the IoT
they are not completely decentralized. reference model. In fact, many blockchain-based
IoT systems surveyed in [13] adopt this method.
Applications of Blockchain However, such a blackbox method has two main
The public and private sectors have been explor- issues:
ing blockchain use cases in recent years. To name • From a technical point of view, such a meth-
a few applications that are being examined: od is prone to downgrades in performance.
1. Secure decentralized applications with trust- • From a business point of view, following a
ed hardware and blockchains common reference model is necessary so
2. Decentralized markets that different vendors can work together
3. Private digital currencies and closed payment with minimal coordination efforts.
communities Regarding the first issue, observe that, as men-
4. Payment regulation tioned previously, blockchains in their simplest
5. Automation for high-assurance smart con- form are commonly viewed as a distributed led-
tracts ger or a distributed database. Naturally, block-
6. Voting applications chains can be used as a blackbox interacting with
7. Identity system to secure government records layers 3 (edge/fog computing) and 4 (data accu-
8. Land registration and real estate transactions mulation) since these layers are related to storing
The system presented in this article is most rel- and exchanging data. Using this vanilla design,
evant to application 1 above. As we point out, the however, will hinder performance. This is due to
proposed framework is sufficiently different from the fact that in layers 3 and 4, the conceptual
prior works due to our focus on addressing chal- model is “data-in-motion” [14], where data is gen-
lenges in IoT ecosystems. Specifically, our system erated or captured in continuous streams at high
is useful for managing multiple IoT systems in an data transfer rates. In fact, typical blockchains are
autonomous and scalable fashion. not able to deal with this kind of scenario due
to its strong immutability constraint. In short, we
Key Challenges need to have a different blockchain design to deal
In this section, we identify key categories of with data-in-motion. Otherwise, blockchain should
unsolved challenges. Some of them are inherent be integrated with IoT differently, possibly in a
challenges of heterogeneous IoT systems that are different layer or as an auxiliary system.
not addressed in prior studies, and can be solved Energy Constraints: Most IoT devices come
by novel components based on blockchain. Other with limited battery power because of cost con-
challenges are due to the difficulty of integrating straints. Most popular blockchain-based systems
blockchain and IoT. We summarize two catego- use proof of work (PoW) [10] (e.g., Bitcoin and

14 IEEE Network • January/February 2020


Ethereum) or Practical Byzantine Fault Tolerance
(PBFT) [15] (e.g., Hyperledger [11]) to achieve
coordination. Unfortunately, these protocols
require heavy communication and/or compu-
tation. Therefore, they are not adequate for IoT
devices since energy consumption is positively
correlated to communication and computation
overhead. To have a practical blockchain-based
IoT system, energy consumption needs to be
reduced at each IoT device.
Supportability and Compatibility: It is unlikely
to deploy an entirely new IoT system all at once
due to its scale and intricate interaction with
other components. Therefore, it is not practical
to roll out a completely new design that requires
all devices to support blockchain and/or a new
architecture. Instead, a system must support IoT
devices with different designs, and particularly be
comparable to out-of-date devices that may not
have enough computation power and/or battery
to participate in a blockchain protocol.
Heterogeneity: In a practical setting, it is com-
mon to deploy multiple types of devices from
different vendors. From a design perspective, it
suffices to define common communication pro-
tocols or interfaces to coordinate multiple devic-
es. The IoTWF reference model [12] portrays FIGURE 2. Seven-layer IoT reference model proposed by IoTWF [12].
this effort. However, in terms of operation, it is
quite challenging due to different reliability guar-
antees, communication protocols, and levels of and devices so that deploying new protocols and
computation power. If we treat all devices as the changing its configuration can be completed with
same entity and require them to participate in the minimal human intervention.
blockchain, the resulting performance and reli-
ability would likely be poor. Hence, we need to Our Perspective Architecture
take heterogeneity into account and design a flex- In this section, we present our novel block-
ible architecture. This is another reason why using chain-based design for managing heterogeneous
blockchain as a blackbox is not the most effective IoT. Particularly, our system allows users and
method. administrators to organize and locate IoT devices,
monitor and maintain the health of the devices,
Management/Deployment Challenges configure the devices, and integrate multiple IoT
Failure Recovery: Most blockchain-based sys- subsystems. Due to space limits, we do not pres-
tems ensure immutable chains of data. It is not an ent the details of these functions, since these are
easy task to remove state of transactions that are relatively easy to implement on top of the pro-
generated in the blockchain due to unfortunate posed architecture. Instead, we focus on how our
events, for example, frequent communication architecture addresses the challenges identified
failures, devices’ transient failures, configuration above. The key components and features are
error, and so on. As a result of this inconsistency, summarized in Table 2.
some devices might not be able to operate cor-
rectly. Therefore, we need to address the issue of Architecture Overview
recovering from such erroneous state. We implement our system in layers 3, 4, and 5 of
Monitoring and Auditability: An administrator the IoT reference model of IoTWF [12], as shown
must learn to deal with the complexity of config- in Fig. 3.
uration and provision. To perform these two tasks Layer 3 (Edge/Fog Computing) is where the
effectively, the administrator needs to accurately device collects data. We interact this layer with
monitor the system’s health and performance with the cloud in order to offload important data and
different granularity. Additionally, to ensure securi- decide when to collect it.
ty, the administrator will need to audit the behav- Layer 4 (Data Accumulation) is where the sys-
ior of the devices to identify potentially malicious tem converts data-in-motion into data-in-rest, that
behavior or devices with degraded performance. is, the system determines whether to persist data,
Extensibility and Flexibility: One might think and decides where to store and organize such
blockchains are autonomous and self-stabilizing data. This layer requires coordination among dif-
due to their decentralizing nature. However, ferent devices and IoT subsystems to obtain data
blockchains usually require human intervention to from different sources and deliver it to different
ensure their operations run smoothly. For exam- destinations. We propose using blockchain in this
ple, Bitcoin relies on a human’s decision in deter- layer to achieve coordination and store different
mining the puzzle’s level of difficulty (also related types of data (both data-in-motion and data-in-
to hash and transaction rates), block size, and so rest).
on. For a large-scale IoT system, such fine-grained Layer 5 (Data Abstraction) is where the sys-
human operation is not practical. We need a sys- tem aggregates important information and dis-
tem that is flexible and supports future protocols cards unnecessary data. In other words, the

IEEE Network • January/February 2020 15


Feature/Component Challenges addressed are application-specific and hence lack the glob-
al view with respect to the whole system, which
Hierarchical system Layer of integration, energy constraint, heterogeneity makes performance tuning tough.
One of our major design choices is to adopt
Sleep and Wake-up Energy constraint, heterogeneity the modular and hierarchical architecture. Since
both IoT and blockchain are young ecosystems
Off-loading Layer of integration, energy constraint, heterogeneity whose technology, demand, and service are
evolving rapidly, it is unrealistic to implement a
Configurable consensus and holistic system that addresses all the issues. Our
Layer of integration, energy constraint, heterogeneity
reputation system proposed framework allows experts in different
domains to innovate, and as long as the interface
Chain selection Layer of integration, heterogeneity
is well defined, we can integrate different compo-
Daemon Energy constraint, supportability and compatibility, heterogeneity nents together cleanly.

Monitoring service Monitoring and auditability Design and Analysis


Here, we present the functionality and salient fea-
Roll-back, garbage collection Failure recovery tures of each component, along with the design
rationale. Specifically, we point out how each
Modular and flexible design Energy constraint, heterogeneity, extensibility and flexibility component addresses the challenges summarized
TABLE 2. Features of the design. in Table 1.
Hierarchical System: Our architecture adopts
a hierarchical design. Its foundation consists of an
IoT subsystem based on private chains, namely
core IoT. Several core IoTs jointly participate in
a public blockchain and are used to exchange
data, achieve coordination, and realize import-
ant features of our systems (i.e., monitoring and
roll-back). Each core IoT interacts with the cloud
to perform offloading. The overall structure is
presented in Fig. 4. Note that each core IoT is
based on the seven-layer model in Fig. 2, where
our components reside in layers 3, 4, and 5 (Fig.
3). For simplicity, Fig. 4 only shows one public
blockchain for both monitoring and roll-back. If
needed, one can deploy separate public chains.
The hierarchical design improves the integra-
tion of blockchain and IoT, given that different
types of blockchains are appropriate for different
purposes. Moreover, heterogeneous IoT devices
can choose the most appropriate parameters for
the protocols to interact with each other, helping
FIGURE 3. Representation of the seven-layer IoT reference model by IoTWF, to reduce computation and communication over-
implemented with proposed designs. head and energy consumption.
Sleep/Wake-up: Small-scale IoT devices with
limited battery only participate in the protocol
system needs to consolidate data and reconcile intermittently based on a sleep/wake-up protocol,
potential conflicts. A “selection protocol” is need- and only store meta-data (or no data at all). The
ed to select data that ensures consistent seman- edge/fog servers at layer 3 (edge/fog computing)
tics from the underlying blockchain(s). will need to “wake up” devices if computation
Our system also has three auxiliary compo- power or votes are not enough to ensure the cor-
nents: the cloud, monitoring service, and roll-back rectness of the consensus protocol in the private
service. The cloud is simply Internet cloud-based chain for core IoT. Such an on-demand design
storage that handles the offloaded data from layer allows devices to save energy compared to the
3, thereby reducing the workload and storage always-on design. Moreover, this design addresses
overhead of IoT devices. The second and third the heterogeneity issue as different devices have
components are based on a public blockchain. different responsibilities in the system.
Depending on the need, one can configure these Offloading: Offloading stored states onto
components in such a way that they interact with the cloud periodically is a common technique,
layer 4 or layer 5. These details are discussed given that IoT devices usually have limited storage
later. space. In our system, an offloading mechanism
The main reason to integrate blockchains in is coupled with the sleep/wake-up protocol to
layers 3 to 5 is that our system has the “right ensure low energy consumption. Different IoT
amount of relevant information” in these three devices will offload different amounts of data
layers. Layers 1 and 2 have too much raw data and states at different rates depending on their
that is irrelevant to users and applications, and resources and the desired trade-off between per-
too little system-specific information (e.g., amount formance and energy consumption.
of available data storage) for optimizing perfor- The reason that we choose to implement
mance. Layers 6 and 7 have too much program the offloading component in layer 3 (edge/fog
logic, which would make low-level storage and computing) is because most existing solutions
processing difficult. Moreover, these two layers for efficient edge and fog are an integral part of

16 IEEE Network • January/February 2020


the cloud. Therefore, integrating offloading in this
layer reduces the complexity of development,
for example, taking care of data discrepancy and
meta-data mismatch due to the different design
choice and program logic in other layers or com-
ponents.
Consensus Protocol: Consensus protocol is
the foundation of blockchain-based systems, and
affects performance, scalability, and provided
guarantees of the system. Our system deploys
blockchains to two places: i) the public chain FIGURE 4. Hierarchy in our architecture.
for monitoring and roll-back services, and ii) the
private chain for core IoTs. Our public chain is
based on common blockchains like Hyperledg- We have implemented a novel aggregation mechanism that provides useful application semantics
er [11], and the private chain is based on our
such as read-my-write and eventual consistency using DAG-blockchain and an efficient chain selection
novel blockchain. For core IoT, we propose a
new blockchain called DAG-blockchain, where protocol. A preliminary evaluation demonstrated that it achieved 2 to 5 performance improvement
DAG stands for directed acyclic graph. In con- over the original PoW-based mechanism in various scenarios.
trast to traditional blockchains that maintain a sin-
gle chain, DAG-blockchains may have multiple
branches simultaneously. The term DAG refers branches of DAG-blockchain (in layer 4) to deter-
to the fact that these branches do not contain mine which data to use, and to resolve any per-
any cycle. The relaxation on the guarantee allows taining conflict. The exact mechanism to select
higher throughput and scalability. Recall that we the “branch” of data and resolve conflict depends
use a private blockchain in layer 4 (data accumu- on the application semantics. In most cases, the
lation), where data is still in motion. Therefore, Last-Write-Win rule, which picks the data with the
there is no reason to enforce strong consistency most recent timestamp, would work reasonably
(e.g., a single consistent chain). We rely on the well. Note that layer 5 (data abstraction) shares
selection protocol in layer 5 (data abstraction) to the knowledge of application semantics, which
resolve the conflict and find the “correct” branch allows us to integrate chain selection efficient-
for aggregating useful data. This also follows the ly and seamlessly. Moreover, depending on the
guideline of IoTWF, where data-in-motion is con- device constraints, one can choose how deep the
verted into data-in-rest in layers 4 and 5. graph traversal should be performed, allowing a
DAG-blockchain is based on PoS and PBFT flexible trade-off between performance and pro-
consensus protocols, which follow the assump- vided guarantees.
tion that the membership is known in our sys- We have implemented a novel aggregation
tem. Since core IoT is using a private chain (i.e., mechanism that provides useful application
a permissioned blockchain), this is a reasonable semantics such as read-my-write and eventual
choice. Additionally, PoS and PBFT are more effi- consistency using DAG-blockchain and an effi-
cient and scalable because they do not need to cient chain selection protocol. A preliminary eval-
solve computation puzzles to ensure correctness. uation demonstrated that it achieved 2 to 5
We reduce PBFT’s communication overhead by performance improvement over the original PoW-
adopting a weighted voting approach. Generally based mechanism in various scenarios (e.g., dif-
speaking, reliable IoT devices with sufficient com- ferent network communication quality and PoW
putation power have a vote that carries heavi- quality).
er weight. When a certain threshold is achieved, Daemon: A daemon is a standard tool in
consensus can be achieved despite the fact that operation systems, which is a long-running back-
some devices may fail. ground process that handles some core services
Concretely, our PoS and PBFT protocols use for other processes To make our system back-
the following approaches to address concerns ward compatible, we need a mechanism for old
regarding heterogeneity: or small devices that lack the technology to par-
• Devices with higher levels of reputation, ticipate in blockchain-based systems. Our idea is
computation power, and energy should have to have multiple daemon processes running on
a higher stake (or more votes) in our consen- each of the larger-scale devices with more com-
sus protocol. putation power and battery, where each daemon
• Our system has a reputation protocol that will interact with blockchains on behalf of one
takes the following criteria into account: other device.
devices’ past interaction record, company’s Should a case arise where no daemon is idle,
history, and known bugs and security threats. old and small devices may find themselves unable
We envision that the second and third part to interact with blockchain. This leads to two con-
can either be maintained by a third-party sequences:
database or government, or be built on a 1. The system enters an erroneous state due to
separate interacting subsystem. unexpected behaviors.
• Based on new information, stake (in PoS) or 2. Some state is lost and cannot be stored in
votes (in PBFT) will be recalculated. This can the blockchain.
be done periodically by an administrator or a Case 2 is fine, since devices can wait until
background protocol. some daemon becomes available, and we only
Chain Selection: To aggregate data for lose some efficiency. We rely on the roll-back ser-
upper-level applications (layer 6), one needs to vice (discussed below) to handle case 1.
perform a graph traversal algorithm on multiple Monitoring Service: In our design, each core

IEEE Network • January/February 2020 17


to identify a consistent snapshot in the future.
The hierarchical design of our proposed model improves the integration of blockchain and IoT. Modular and Flexible Design: First, our design
Moreover, heterogeneous IoT devices can choose their own protocols to interact with each other, follows the IoTWF recommended reference
model as closely as possible; hence, integrating
helping to reduce computation and communication overhead and energy consumption. new devices with the system should require mini-
mal effort. Second, our system is modular, and the
interaction logic between components are clean.
IoT subsystem is based on a private blockchain Consequently, each component can adopt a dif-
where the identity of all entities (or devices) in the ferent design as long as it follows the predefined
chain is known. This makes our monitoring possi- interface and interaction logic. Third, we provide
ble. Since many IoT devices have limited battery several “tuning knobs” to explore the trade-off
and storage, our monitoring does not rely on a between performance and reliability, which allows
common mechanism that uses a log-based data the system to be flexible enough to accommo-
structure. Instead, a special process that resides in date different needs. Fourth, each core IoT can be
larger devices will randomly and periodically poll flexibly configured. Depending on the need (e.g.,
other devices to ask whether something malicious performance, reliability, ease of management),
or unexpected has been observed. The polling each core IoT can contain a different set of devic-
results will be uploaded and collected in an auxil- es and protocols. Some criteria include vendor,
iary blockchain, and are later examined to ensure device location, type of data collected, power
that the record is consistent. consumption, and so on. Fifth, the monitoring ser-
This design might not catch a malicious event vice allows the administrator to obtain the current
instantaneously. However, by using the poll- status, and could use the information to better
ing-based mechanism with the failure recovery tune the knobs.
service (discussed next), it is possible to identify
malicious behavior and roll back to a correct state Conclusion
eventually. Such a design choice is motivated by The integration of blockchain and IoT is influ-
the fact that battery and storage resources are ential; blockchain achieves the desired resilient,
potential bottlenecks in most IoT deployment. distributed peer-to-peer networks, as well as the
The adjustment of the polling period also allows ability to interact with others in an auditable
our system to explore the trade-off between the manner. In this article, we present a preliminary
time it takes for detection and the resources con- study on an architecture that uses blockchain to
sumed. manage heterogeneous IoT systems. We also dis-
The auxiliary blockchain is a public blockchain cuss the challenges in integration and develop-
because in some extreme cases, most devices in ment. The hierarchical design of our proposed
the same core IoT might be corrupted, and all the model improves the integration of blockchain and
prior correct records would be lost or tampered. IoT. Moreover, heterogeneous IoT devices can
Hence, we rely on the fact that it is harder to cor- choose their own protocols to interact with each
rupt enough core IoTs to ensure the reliability of other, helping to reduce computation and com-
the public blockchain. Note that our monitoring munication overhead and energy consumption.
service supports auditability by the administrator. Furthermore, the adoption of the failure recovery
Roll-Back Service: To make the system self-sta- service helps our system to maintain stable perfor-
bilizing, we need to record the state of the system mance under transient failures.
(i.e., checkpoint) and be able to “roll back” to
the most recent correct state. In our design, we References
use an auxiliary blockchain to store relevant state [1] G. Ho et al., “Smart Locks: Lessons for Securing Commod-
ity Internet of Things Devices,” Proc. 11th ACM Asia Conf.
information, including states from both daemons Computer and Commun. Security, 2016, pp. 461–72.
and devices in core IoT. Then periodically, a “mas- [2] I, Al Ridhawi et al., “A Profitable and Energy-Efficient Coop-
ter” process residing in the auxiliary blockchain erative Fog Solution for IoT Services,” IEEE Trans. Industrial
performs the investigation procedure. If it finds an Informatics, 2019.
[3] M. Amoozadeh et al., “Security Vulnerabilities of Connected
erroneous state, it performs the following steps: Vehicle Streams and Their Impact on Cooperative Driving,”
• Scan prior states and identify a snapshot that IEEE Commun. Mag., vol. 53, no. 6, June 2015, pp. 126–32.
is consistent with all interacting systems and [4] A. F. Skarmeta, J. L. Hernandez-Ramos, and M. V. More-
daemons using a well established distributed no, “A Decentralized Approach for Security and Privacy
Challenges in the Internet of Things,” Proc. 2014 IEEE World
snapshot algorithm. Forum on Internet of Things, Mar. 2014, pp. 67–72.
• Notify the daemons and devices to roll back [5] H. Gross et al., “Privacy-Aware Authentication in the Internet
to the previous snapshot of states. of Things,” M. Reiter and D. Naccache, Eds., Cryptology and
• Identify affected devices and perform a Network Security, 2015, Springer, pp. 32–39.
[6] B. Cao et al., “When Internet of Things Meets Blockchain:
recovery procedure. Challenges in Distributed Consensus,” IEEE Network, 2019.
• Perform “garbage collection” to archive old [7] M. Salimitari and M. Chatterjee, “An Overview of Blockchain
state information. and Consensus Protocols for IoT Networks,” 2018.
The master process is implemented using a [8] T. M. Fernndez-Carams and P. Fraga-Lamas, “A Review
on the Use of Blockchain for the Internet of Things,” IEEE
long-lived smart contract in the blockchain. Note Access, vol. 6, 2018, pp. 32979–33001.
that our roll-back service is external to the block- [9] A. Banafa, “IoT and Blockchain Convergence: Benefits and
chain, whose main purpose is to roll back data Challenges; https://iot.ieee.org/newsletter/january-2017/
and states at daemons and IoT devices. It does iot-and-blockchain-convergence-benefits-and-challenges.
html, accessed Feb. 13, 2019.
not revert the operations in the blockchain, as [10] S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash Sys-
this will violate the typical immutability guaran- tem,” bitcoin.org, Oct. 2008.
tee at blockchain. Archiving old state information [11] The Linux Foundation, “Hyperledger Architecture, Volume
improves the performance, because the master 1: Introduction to Hyperledger Business Blockchain Design
Philosophy and Consensus”; https://www.hyperledger.
process does not need to revisit this information

18 IEEE Network • January/February 2020


org/wp-content/uploads/ 2017/08/Hyperledger Arch WG
Paper 1 Consensus.pdf, accessed July 2018.
[12] J. Green, “IoT Reference Model Whitepaper,” Costco, Nov.
2014; https://www.iotwf.com/resources/71.
[13] M. S. Ali et al., “Applications of Blockchains in the Internet
of Things: A Comprehensive Survey,” IEEE Commun. Surveys
& Tutorials, 2018.
[14] M. Hirzel et al., “IBM Streams Processing Language: Ana-
lyzing Big Data in Motion,” IBM J. R&D, vol. 57, nos. 3–4,
May 2013.
[15] M. Castro and B. Liskov, “Practical Byzantine Fault Toler-
ance,” Proc. Third USENIX Symp. Operating Systems Design
and Implementation, New Orleans, LA, Feb. 22–25, 1999,
pp. 173–86.

Biographies
Lewis Tseng [M] is an assistant professor with the department of
Computer Science, Boston College, Massachusetts. Prior to join-
ing Boston College, he was with Toyota Info Technology Center,
U.S.A. He has a Ph.D. in computer science from the University
of Illinois at Urbana-Champaign, 2010–2016, and a B.S. in com-
puter science and a B.S. in economics from the University of
Illinois at Urbana-Champaign, 2005–2010. His research interest
includes distributed computing/systems, fault-tolerant comput-
ing, blockchain-based systems, and applications in intelligent
traffic systems.

Liwen Wong [S] is a senior at Boston College pursuing a dual


degree in computer science and economics. Her research inter-
ests include blockchain-based systems, applications in intelligent
transportation systems, and distributed computing/systems.

S afa O toum [M] received her M.A.Sc. and Ph.D degrees in


computer engineering from the University of Ottawa, Canada,
in 2014 and 2016, respectively. She is an assistant professor of
computer engineering in the College of Technological Innova-
tion, Zayed University, United Arab Emirates and a researcher
in the field of communications and network security. She was
a postdoctoral fellow at the University of Ottawa and has been
a data scientist in CheetahNetworks Inc. Ottawa since 2019.
Her research interests include network security issues, intrusion
detection and prevention, wireless sensor networks, and block-
chain solutions.

Moayad Aloqaily [S’12, M’17] received his M.Sc. degree in


ECE from Concordia University, Canada, in 2012, and his Ph.D.
degree in ECE from the University of Ottawa, Canada, in 2016.
In 2017, he was an instructor in the Systems and Computer
Engineering Department at Carleton University, Canada. He has
worked at Gnowit Inc. as a senior researcher and data scien-
tist since 2016. He is the managing director of xAnalytics Inc.,
Ottawa, Ontario, Canada. Currently, he is with the Faculty of
Engineering, Al Ain University, United Arab Emirates. His current
research interests include AI and ML, connected vehicles, block-
chain solutions, and sustainable energy and data management.

Jalel Ben Othman received his B.Sc. and M.Sc. degrees, both in
computer science, from the University of Pierre et Marie Curie
(Paris 6), France, in 1992 and 1994, respectively. He received
his Ph.D. degree from the University of Versailles, France, in
1998. He is currently a full professor at the University of Paris
13 where he has been since 2011 and a member of the L2S
lab at CentraleSupélec. His research interests are in the area of
wireless ad hoc and sensor networks, VANETs, IoT, performance
evaluation, and security in wireless networks in general.

IEEE Network • January/February 2020 19

S-ar putea să vă placă și