4.5 Article

Trust-Based Blockchain Authorization for IoT

Journal

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
Volume 18, Issue 2, Pages 1646-1658

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNSM.2021.3077276

Keywords

Blockchain; Authorization; Smart contracts; Proposals; Privacy; Trust management; Biological system modeling; Trust management; privacy; authorization; blockchain; IoT; reputation

Funding

  1. Cyber Security Research Centre Limited through the Australian Government's Cooperative Research Centres Programme

Ask authors/readers for more resources

This paper introduces a decentralized attribute-based access control mechanism with an auxiliary Trust and Reputation System (TRS) for IoT authorization. The system quantifies trust and reputation scores of each node and incorporates them into the access control mechanism for dynamic and flexible access control. The solution is implemented on a public Rinkeby Ethereum test-network with sensitive information stored on private sidechains for privacy preservation.
Authorization or access control limits the actions a user may perform on a computer system, based on predetermined access control policies, thus preventing access by illegitimate actors. Access control for the Internet of Things (IoT) should be tailored to take inherent IoT network scale and device resource constraints into consideration. However, common authorization systems in IoT employ conventional schemes, which suffer from overheads and centralization. Recent research trends suggest that blockchain has the potential to tackle the issues of access control in IoT. However, proposed solutions overlook the importance of building dynamic and flexible access control mechanisms. In this paper, we design a decentralized attribute-based access control mechanism with an auxiliary Trust and Reputation System (TRS) for IoT authorization. Our system progressively quantifies the trust and reputation scores of each node in the network and incorporates the scores into the access control mechanism to achieve dynamic and flexible access control. We design our system to run on a public blockchain, but we separate the storage of sensitive information, such as user's attributes, to private sidechains for privacy preservation. We implement our solution in a public Rinkeby Ethereum test-network interconnected with a lab-scale testbed. Our evaluations consider various performance metrics to highlight the applicability of our solution for IoT contexts.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

A blockchain-based IoT data marketplace

Michael Sober, Giulia Scaffino, Stefan Schulte, Salil S. Kanhere

Summary: With the steady growth of the Internet of Things (IoT), the amount of generated data has also increased. To address the challenges of finding and using relevant data, a data marketplace implemented with blockchain technology is proposed. Smart contracts are used to enable various functionalities and enforce data exchange rules, while a proxy, broker, and GUIs facilitate data trading.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)

Article Computer Science, Hardware & Architecture

UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies

Mohammad Reza Nosouhi, Shui Yu, Keshav Sood, Marthie Grobler, Raja Jurdak, Ali Dorri, Shigen Shen

Summary: In this article, a secure mix-based approach called UCoin is proposed to address the issues in preserving privacy of users in cryptocurrencies. It breaks the link between input and output addresses in transactions, utilizes a secure shuffling protocol, and achieves higher performance and compatibility with the existing cryptocurrency architecture.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Information Systems

Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage: A Redactable Blockchain Approach

Rahul Mishra, Dharavath Ramesh, Salil S. Kanhere, Damodar Reddy Edla

Summary: This paper introduces a blockchain-based secure decentralized public auditing model and an efficient deduplication scheme. By using blockchain instead of a centralized third-party auditor, it reduces the waste of computational and storage resources. By employing redactability to address security issues and efficient deduplication scheme, it achieves storage savings and data protection.

ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

Survey of Deep Representation Learning for Speech Emotion Recognition

Siddique Latif, Rajib Rana, Sara Khalifa, Raja Jurdak, Junaid Qadir, Bjorn Schuller

Summary: Traditionally, speech emotion recognition (SER) relied on manual feature engineering, but this approach requires significant manual effort and impedes innovation. Representation learning techniques have been adopted to automatically learn intermediate representations without manual engineering, leading to improved SER performance and rapid innovation. Deep learning further enhances the effectiveness of representation learning by enabling the automatic learning of hierarchical representations. This article presents a comprehensive survey on deep representation learning for SER, highlighting techniques, challenges, and future research areas.

IEEE TRANSACTIONS ON AFFECTIVE COMPUTING (2023)

Review Energy & Fuels

Barriers to blockchain-based decentralised energy trading: a systematic review

Samuel Karumba, Subbu Sethuvenkatraman, Volkan Dedeoglu, Raja Jurdak, Salil S. Kanhere

Summary: The increasing adoption of clean energy technologies has led to the evolution of traditional electricity markets into Distributed Energy Trading (DET) systems. Blockchain technology has the potential to provide decentralised trust, immutability, security, and transparency in DET systems. However, the integration of blockchain in DET systems faces technical, administrative, standardisation, and economic barriers, which need to be addressed.

INTERNATIONAL JOURNAL OF SUSTAINABLE ENERGY (2023)

Article Computer Science, Theory & Methods

Exploring edge TPU for network intrusion detection in IoT

Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, Raja Jurdak, Marius Portmann

Summary: This paper explores the implementation of a practical network intrusion detection system (NIDS) at the edge of IoT using Google's Edge TPU and a deep learning approach. It focuses on the computational and energy efficiency of deep learning-based NIDS at the IoT edge. The study uses various scaled model sizes of deep neural network architectures and compares the performance of Edge TPU-based implementation with an energy-efficient embedded CPU.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2023)

Article Computer Science, Artificial Intelligence

Self Supervised Adversarial Domain Adaptation for Cross-Corpus and Cross-Language Speech Emotion Recognition

Siddique Latif, Rajib Rana, Sara Khalifa, Raja Jurdak, Bjorn Schuller

Summary: Despite recent advancements in speech emotion recognition (SER) within a single corpus, the performance of these systems degrades significantly for cross-corpus and cross-language scenarios. This is due to the lack of generalization in SER systems towards unseen conditions. Adversarial methods have been used to address this issue, but many only focus on cross-corpus SER and ignore the cross-language performance degradation. This study proposes an adversarial dual discriminator (ADDi) network and a self-supervised ADDi (sADDi) network to improve cross-corpus and cross-language SER without requiring target data labels. Experimental results demonstrate improved performance compared to state-of-the-art methods.

IEEE TRANSACTIONS ON AFFECTIVE COMPUTING (2023)

Article Computer Science, Information Systems

Exploring Edge TPU for deep feed-forward neural networks

Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Brano Kusy, Raja Jurdak, Marius Portmann

Summary: This paper examines the performance of Google's Edge TPU on feed-forward neural networks. It considers the Edge TPU as a hardware platform and explores different architectures of deep neural network classifiers, which have traditionally been challenging to run on resource-constrained edge devices. By utilizing a spectrogram data representation, the study examines the trade-off between classification performance and energy consumption for inference. The energy efficiency of the Edge TPU is compared to that of the widely-used embedded CPU ARM Cortex-A53. The results provide insights into the impact of neural network architecture on the performance of the Edge TPU and offer guidance for selecting the optimal operating point based on classification accuracy and energy consumption. Additionally, the evaluations highlight the performance crossover between the Edge TPU and Cortex-A53, depending on the neural network specifications. The analysis also provides a decision chart to assist in platform selection based on model parameters and context.

INTERNET OF THINGS (2023)

Proceedings Paper Computer Science, Information Systems

Privacy-preserving Trust Management for Blockchain-based Resource Sharing in 6G-IoT

Guntur Dharma Putra, Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak

Summary: 6G-enabled IoT networks require effective resource allocation for massive scale network capacity. While blockchain-based resource sharing schemes lack trust monitoring, Trust and Reputation Management (TRM) can address this. However, changeable keys in blockchains may hinder TRM's usability. This paper proposes a privacy-preserving TRM using interconnected public-private blockchains, allowing nodes to use changeable keys and ensuring minimal overheads.

2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY, ICBC (2023)

Proceedings Paper Computer Science, Information Systems

DeWS: Decentralized and Byzantine Fault-tolerant Web Services

Gowri Sankar Ramachandran, Thi Thuy Linh Tran, Raja Jurdak

Summary: Many real-world applications use web service frameworks to provide APIs to businesses and end-consumers. However, in applications like supply chain management, the organization running the web server may act dishonestly or the server may be compromised. To address this, we propose DeWS, a decentralized and Byzantine fault-tolerant web service framework that provides transparency and auditability through a blockchain ledger. Our proof-of-concept implementation shows that DeWS can tolerate Byzantine failures, although at the cost of high latency. This framework can support the shift towards more decentralized web services for safety-critical and mission-critical applications.

2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY, ICBC (2023)

Proceedings Paper Computer Science, Information Systems

A Blockchain-Based Framework for Scalable and Trustless Delegation of Cyber Threat Intelligence

Kealan Dunnett, Shantanu Pal, Zahra Jadidi, Raja Jurdak

Summary: This paper proposes a blockchain-based CTI sharing framework that utilizes trustless delegates for dynamic trust-based decision-making and decentralized trust evaluation. Unlike existing approaches, delegates within our framework facilitate direct sharing of CTI with consumers, enabling scalable CTI sharing.

2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY, ICBC (2023)

Proceedings Paper Computer Science, Information Systems

PPoS : Practical Proof of Storage for Blockchain Full Nodes

Jun Wook Heo, Gowri Ramachandran, Raja Jurdak

Summary: This paper proposes a decentralized Practical Proof of Storage (PPoS) solution for blockchain full nodes, which uses asymmetric latency for encryption and decryption, and introduces a chained architecture to detect attacks and reduce performance overhead. Experimental results demonstrate that this approach significantly reduces decryption time while maintaining a high degree of decentralization.

2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY, ICBC (2023)

Proceedings Paper Computer Science, Information Systems

BAILIF: A Blockchain Agnostic Interoperability Framework

Samuel Karumba, Raja Jurdak, Salil S. Kanhere, Subbu Sethuvenkatraman

Summary: Blockchain technology can revolutionize the energy sector by enabling peer-to-peer energy trading, demand-side flexibility trading, and renewable energy certificate trading, among other decentralised energy trading use cases. However, the lack of interoperability between blockchain networks and platforms is a significant challenge that leads to data and information silos. To address this challenge, a Blockchain Agnostic Interoperability Framework (BAILIF) is proposed, which provides a decentralized notary service and a cross-chain attestation and verification protocol. A proof of concept for a distributed energy trading application demonstrates the solution's feasibility, with BAILIF achieving a throughput of up to 666 transactions per second, indicating its potential to enable seamless data sharing across blockchain platforms and promote the adoption of renewable energy sources.

2023 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY, ICBC (2023)

Article Computer Science, Information Systems

HARBIC: Human activity recognition using bi-stream convolutional neural network with dual joint time-frequency representation

Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Brano Kusy, Raja Jurdak, Marius Portmann

Summary: This study explores different joint time-frequency representations of sensor data and utilizes a Convolutional Neural Network (ConvNet) for activity classification based on wearable devices. The concurrent use of two different data representations in a cooperative bi-stream ConvNet configuration is also considered. The proposed method achieves high classification accuracy and F1 score on a real-world public HAR dataset, surpassing the state-of-the-art. Furthermore, the method is implemented on a resource-constrained edge device to evaluate the trade-off between energy consumption and classification performance in IoT applications.

INTERNET OF THINGS (2023)

Proceedings Paper Computer Science, Interdisciplinary Applications

VCTP: A Verifiable Credential-based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms

Rahma Mukta, Rue C. Teh, Hye-young Paik, Qinghua Lu, Salil S. Kanhere

Summary: Self Sovereign Identity (SSI) is an emerging identity system that enables secure credential issuance and verification without relying on a centralized authority. However, current SSI platforms face trust issues as individual issuers lack sufficient trust support. This paper proposes a trust propagation protocol that uses blockchain to establish a trust propagation credential template, allowing individual users to be trusted verifiable issuers in the SSI platform.

2023 IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES, DAPPS (2023)

No Data Available