Privacy and Security in Blockchain-Based Internet of Things (IoT)

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (10 October 2022) | Viewed by 17537

Special Issue Editor


E-Mail Website
Guest Editor
1. Electronics and Telecommunications Research Institute, Daejeon 34129, Korea
2. Kyungpook National University, Daegu 41566, Korea
Interests: IT security; security; information security; network security; computer networks security

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) connects multiple objects and provides convenient services in various fields through the internet, including healthcare, smart farm, smart home, smart grid, and so on. Thus, it has received interest in a range of fields of academia and industry. However, proactive actions are needed to resolve abnormal behaviors and bottlenecks because IoT technologies generate massive amounts of data from hundreds of thousands of sensors integrated into smart objects. Moreover, traditional IoT systems have confronted technical challenges: (i) security and privacy, (ii) interoperability across diverse IoT domains, and (iii) efficiency for constrained resources.

Blockchain technology is considered a promising solution to resolve the technical challenges of traditional systems, ensuring the decentralization, immutability, transparency, and integrity of information by sharing records with multiple distributed nodes. However, there are still technical problems to be solved before applying it in real life.

Thus, this Special Issue (SI) of Electronics solicits innovative and robust cryptographic techniques and security protocols that are suitable for IoT environments with blockchain technology. It also provides an opportunity for discussions to explore new challenges and frontiers in the various application fields of IoT security and privacy under blockchain technologies.

The topics of interest include, but are not limited to:

  • Security and privacy in IoT
  • Decentralized IoT architecture
  • Privacy-preserving systems with smart contracts
  • IoT security using zero-knowledge proof
  • Cryptographic protocols for IoT
  • IoT systems using decentralized identifier (DID) technologies

Dr. KiSung Park
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptographic protocols
  • blockchain
  • decentralized identifiers
  • zero-knowledge proof
  • security and privacy
  • internet of things

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

17 pages, 1026 KiB  
Article
A Hierarchical Searchable Encryption Scheme Using Blockchain-Based Indexing
by Yuxi Li, Fucai Zhou, Dong Ji and Zifeng Xu
Electronics 2022, 11(22), 3832; https://doi.org/10.3390/electronics11223832 - 21 Nov 2022
Cited by 1 | Viewed by 1385
Abstract
Focusing on the fine-grained access control challenge of multi-user searchable encryption, we propose a hierarchical searchable encryption scheme using blockchain-based indexing (HSE-BI). First, we propose a hierarchical search index structure based on a DAG-type access policy and a stepwise hierarchical key derivation mechanism; [...] Read more.
Focusing on the fine-grained access control challenge of multi-user searchable encryption, we propose a hierarchical searchable encryption scheme using blockchain-based indexing (HSE-BI). First, we propose a hierarchical search index structure based on a DAG-type access policy and a stepwise hierarchical key derivation mechanism; which we outsourced to the blockchain network to achieve reliable hierarchical search. We design a dynamic append-only update protocol for the blockchain-based index to deal with adding and deleting files. Secondly, we propose a hierarchical authorization mechanism based on broadcast encryption to achieve fine-grained search permission granting and revoking, which can prevent a malicious server from colluding with corrupted users. The security and complexity analysis shows that HSE-BI achieves optimal search time while satisfying adaptive secure and revocation secure. Our experimental results are encouraging, e.g., compared with the traditional multi-user searchable encryption schemes, HSE-BI’s hierarchical search policy does not impact the search performance visually. The growth rate of the search latency decreases with the increasing number of hierarchical users, which can act as an efficient crypto tool to open up venues for other applications. We demonstrate that HSE-BI is more suitable for actual applications with fine-grained access requirements and can act as an efficient crypto tool to open up venues for other applications. Full article
(This article belongs to the Special Issue Privacy and Security in Blockchain-Based Internet of Things (IoT))
Show Figures

Figure 1

22 pages, 859 KiB  
Article
PUF-PSS: A Physically Secure Privacy-Preserving Scheme Using PUF for IoMT-Enabled TMIS
by Sungjin Yu and Kisung Park
Electronics 2022, 11(19), 3081; https://doi.org/10.3390/electronics11193081 - 27 Sep 2022
Cited by 2 | Viewed by 1659
Abstract
With the development of telecare medical information system (TMIS), doctors and patients are able to access useful medical services via 5G wireless communications without visiting the hospital in person. Unfortunately, TMIS should have the essential security properties, such as anonymity, mutual authentication, and [...] Read more.
With the development of telecare medical information system (TMIS), doctors and patients are able to access useful medical services via 5G wireless communications without visiting the hospital in person. Unfortunately, TMIS should have the essential security properties, such as anonymity, mutual authentication, and privacy, since the patient’s data is transmitted via a public channel. Moreover, the sensing devices deployed in TMIS are resource-limited in terms of communication and computational costs. Thus, we design a physically secure privacy-preserving scheme using physical unclonable functions (PUF) in TMIS, called PUF-PSS to resolve the security requirements and efficiency of the existing related schemes. PUF-PSS prevents the security threats and also guarantees anonymity, key freshness, and authentication. We evaluate the security of PUF-PSS by performing formal and informal security analyses, including AVISPA implementation and ROR oracle model. We perform the test bed experiments utilizing well-known MIRACL based on a Raspberry PI 4 and compare the communication and computational costs of PUF-PSS with the previous schemes for TMIS. Consequently, PUF-PSS guarantees better efficiency and security than previous schemes and can be applied to TMIS environments. Full article
(This article belongs to the Special Issue Privacy and Security in Blockchain-Based Internet of Things (IoT))
Show Figures

Figure 1

Review

Jump to: Research

35 pages, 791 KiB  
Review
Blockchain for IoT Applications: Taxonomy, Platforms, Recent Advances, Challenges and Future Research Directions
by Abdelzahir Abdelmaboud, Abdelmuttlib Ibrahim Abdalla Ahmed, Mohammed Abaker, Taiseer Abdalla Elfadil Eisa, Hashim Albasheer, Sara Abdelwahab Ghorashi and Faten Khalid Karim
Electronics 2022, 11(4), 630; https://doi.org/10.3390/electronics11040630 - 18 Feb 2022
Cited by 70 | Viewed by 13701
Abstract
The Internet of Things (IoT) has become a popular computing technology paradigm. It is increasingly being utilized to facilitate human life processes through a variety of applications, including smart healthcare, smart grids, smart finance, and smart cities. Scalability, interoperability, security, and privacy, as [...] Read more.
The Internet of Things (IoT) has become a popular computing technology paradigm. It is increasingly being utilized to facilitate human life processes through a variety of applications, including smart healthcare, smart grids, smart finance, and smart cities. Scalability, interoperability, security, and privacy, as well as trustworthiness, are all issues that IoT applications face. Blockchain solutions have recently been created to help overcome these difficulties. The purpose of this paper is to provide a survey and tutorial on the use of blockchain in IoT systems. The importance of blockchain technology in terms of features and benefits for constituents of IoT applications is discussed. We propose a blockchain taxonomy for IoT applications based on the most significant factors. In addition, we examine the most widely used blockchain platforms for IoT applications. Furthermore, we discuss how blockchain technology can be used to broaden the spectrum of IoT applications. Besides, we discuss the recent advances and solutions offered for IoT environments. Finally, we discuss the challenges and future research directions of the use of blockchain for the IoT. Full article
(This article belongs to the Special Issue Privacy and Security in Blockchain-Based Internet of Things (IoT))
Show Figures

Figure 1

Back to TopTop