Communications on Applied Electronics |
Foundation of Computer Science (FCS), NY, USA |
Volume 7 - Number 34 |
Year of Publication: 2020 |
Authors: Osama Emam, Hanan Fahmy, Menna Mamdouh |
10.5120/cae2020652871 |
Osama Emam, Hanan Fahmy, Menna Mamdouh . Securing IoT Systems using Blockchain Algorithms. Communications on Applied Electronics. 7, 34 ( Sep 2020), 10-17. DOI=10.5120/cae2020652871
Internet of Things (IoT) is an advanced computing network where all physical objects are connected to the internet. All these objects are able to communicate and interact with each other using many technologies such as radio-frequency identification (RFID) technology, wireless technologies and other sensors technologies. Security concept is the main concern to ensure the sustainable development in IoT and to achieve confidentiality, Integrity, Availability (CIA) and Privacy. Blockchain (BC) is a technology based on the concept of trust and security that is the base of in the cryptocurrency such as Bitcoin and Ethereum. BC has three main pillars of transparency, immutability and distributed DB. Nowadays, Blockchain is paving the way to provide security and privacy in peer-to-peer networks with similar topologies to IoT. This paper proposes an integrated framework for implementing IoT with blockchain technology to guarantee high level of security and validation process based on the integration between consensus algorithms of blockchain (PBFT and Tangle). In addition, this paper proposes a direction algorithm to direct IoT transactions to appropriate BC algorithm to be validated by PBFT or Tangle. The propose framework ensure security, scalability and high performance by optimizing the data transmission overhead and enhancing the validation process by using the propose direction algorithm with reducing both of the resource utilization and the latency time. The conducted experimental results for the propose framework state that the latency time is reduced by 50% than using each consensus BC algorithm separately and mitigate the apprehensive from Sybil attack because of the load balance between consensus algorithms and the dynamic of validation.