Special lssues
Table of Content

Security and Privacy for Blockchain-empowered Internet of Things

Submission Deadline: 30 October 2024 Submit to Special Issue

Guest Editors

Dr. Chuan Zhang, Beijing Institute of Technology, Beijing, China
Dr. Jinwen Liang, Hong Kong Polytechnic University, China
Prof. Ximeng Liu, Fuzhou University, China
Dr. Bowen Zhao, Guangzhou Institute of Technology, Xidian University, China

Summary

The Internet of Things (IoT) has dramatically developed in recent years. Massive data is generated and collected with the deployment of various IoT devices, which contains the considerable value in many fields, such as smart healthcare and transportation. However, due to constrained resources and distributed architecture, IoT systems are also suffering from severe security and trust problems. With public consensus, blockchain is a promising technique to deal with the above problems in IoT systems. This emerging paradigm, known as the blockchain-empowered Internet of Things, can provide multiple desirable characteristics to IoT systems, such as data integrity and traceability. Recently, the blockchain-empowered Internet of Things has attracted extensive attention from both academia and industrial communities.

Despite the great success, the inherent properties (such as transparency and immutability) of the blockchain-empowered Internet of Things also introduce new security and privacy concerns to users, especially considering various data regulations, such as GDPR. For example, transparency means that the data is accessible to all users, violating the right to restriction of processing of users. Also, the immutability of blockchain hinders the right to be forgotten, which may lead to the spread of improper data. Currently, there is a great need to make a balance between these challenging problems and the advantages of the blockchain-empowered Internet of Things.


Keywords

This Special Issue aims to explore recent advances that address fundamental and practical challenges related to security and privacy in the blockchain-empowered Internet of Things. High-quality original research and review articles in this area are expected. Potential topics include, but are not limited to, the following:
 Secure data sharing mechanisms in the blockchain-empowered Internet of Things;
 Secure data analysis mechanisms in the blockchain-empowered Internet of Things;
 User trust and incentive mechanisms in the blockchain-empowered Internet of Things;
 Privacy-enhanced technologies for in the blockchain-empowered Internet of Things;
 Controllable redaction in the blockchain-empowered Internet of Things;
 Cyber attacks in the blockchain-empowered Internet of Things;
 Design and deployment of novel and secure blockchain-empowered Internet of Things systems

Published Papers


  • Open Access

    ARTICLE

    Robust and Trustworthy Data Sharing Framework Leveraging On-Chain and Off-Chain Collaboration

    Jinyang Yu, Xiao Zhang, Jinjiang Wang, Yuchen Zhang, Yulong Shi, Linxuan Su, Leijie Zeng
    CMC-Computers, Materials & Continua, DOI:10.32604/cmc.2024.047340
    (This article belongs to this Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The proliferation of Internet of Things (IoT) systems has resulted in the generation of substantial data, presenting new challenges in reliable storage and trustworthy sharing. Conventional distributed storage systems are hindered by centralized management and lack traceability, while blockchain systems are limited by low capacity and high latency. To address these challenges, the present study investigates the reliable storage and trustworthy sharing of IoT data, and presents a novel system architecture that integrates on-chain and off-chain data manage systems. This architecture, integrating blockchain and distributed storage technologies, provides high-capacity, high-performance, traceable, and verifiable data storage and access. The on-chain system,… More >

  • Open Access

    ARTICLE

    RPL-Based IoT Networks under Decreased Rank Attack: Performance Analysis in Static and Mobile Environments

    Amal Hkiri, Mouna Karmani, Omar Ben Bahri, Ahmed Mohammed Murayr, Fawaz Hassan Alasmari, Mohsen Machhout
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 227-247, 2024, DOI:10.32604/cmc.2023.047087
    (This article belongs to this Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) protocol is essential for efficient communication within the Internet of Things (IoT) ecosystem. Despite its significance, RPL’s susceptibility to attacks remains a concern. This paper presents a comprehensive simulation-based analysis of the RPL protocol’s vulnerability to the decreased rank attack in both static and mobile network environments. We employ the Random Direction Mobility Model (RDM) for mobile scenarios within the Cooja simulator. Our systematic evaluation focuses on critical performance metrics, including Packet Delivery Ratio (PDR), Average End to End Delay (AE2ED), throughput, Expected Transmission Count (ETX), and Average Power Consumption… More >

  • Open Access

    ARTICLE

    Lightweight Intrusion Detection Using Reservoir Computing

    Jiarui Deng, Wuqiang Shen, Yihua Feng, Guosheng Lu, Guiquan Shen, Lei Cui, Shanxiang Lyu
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1345-1361, 2024, DOI:10.32604/cmc.2023.047079
    (This article belongs to this Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The blockchain-empowered Internet of Vehicles (IoV) enables various services and achieves data security and privacy, significantly advancing modern vehicle systems. However, the increased frequency of data transmission and complex network connections among nodes also make them more susceptible to adversarial attacks. As a result, an efficient intrusion detection system (IDS) becomes crucial for securing the IoV environment. Existing IDSs based on convolutional neural networks (CNN) often suffer from high training time and storage requirements. In this paper, we propose a lightweight IDS solution to protect IoV against both intra-vehicle and external threats. Our approach achieves superior performance, as demonstrated by… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things

    Hongliang Tian, Junyuan Tian
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1297-1310, 2024, DOI:10.32604/cmc.2024.047058
    (This article belongs to this Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The Internet of Things (IoT) access control mechanism may encounter security issues such as single point of failure and data tampering. To address these issues, a blockchain-based IoT reputation value attribute access control scheme is proposed. Firstly, writing the reputation value as an attribute into the access control policy, and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control; Secondly, storing a large amount of resources from the Internet of Things in Inter Planetary File System (IPFS) to improve system throughput; Finally, map resource access… More >

Share Link