Vous êtes sur la page 1sur 7

2018 International Conference on Advanced Computing and Applications (ACOMP)

An Approach to Data Privacy in


Smart Home using Blockchain Technology
Thanh Long Nhat DANG Minh Son NGUYEN
University of Information Technology University of Information
r Technology
Ho Chi Minh City, Viet Nam Ho Chi Minh City, Viet Nam
email: nhatdtl.11@grad.uit.edu.vn email: sonnm@uit.edu.vn

Abstract—Nowadays, numerous applications of smart home most IoT business models also hinge on the use of analytics
systems provide recommendations for users, including to sell user data or targeted advertising. While technology
reducing their energy consumption, warnings of defective propels the IoT forward, the lack of compelling and
devices, selecting reliable devices and software, diagnoses, etc
sustainably profitable business models is, at the same time,
[1]. The internet connected, dynamic and heterogeneous nature
of the smart home environment creates new security, holding it back. If the business models of the future don’t
authentication, and privacy challenges [2]. To solve those follow the current business of hardware and software
challenges, an approach to data privacy in smart home using platforms, what will they resemble? After that, this research
blockchain technology, which is called smart home based the talks about blockchain as a technology for democratizing the
IoT-Blockchain (SHIB), is proposed in this paper. In order to digital world. It is illustrated in Fig. 1 a, before 2005 IoT
demonstrate the proposed architecture, an experimental closed and centralized networks and today IoT is open
scenario using Ganache, Remix, and web3.js is built among the access IoT networks, centralized cloud. To be safe, scalable
user, service provider, and smart home to evaluate the and efficient, IoT networks must be re-architected to
performance of the smart contract in the SHIB. Based on the
gradually shift from managing billions of devices to
experiment results, the SHIB architecture brings the
advantages like data privacy, trust access control, and high hundreds of billions of devices, where blockchain
extension ability. In addition, the comparison between the technology can help. The blockchain is the framework
proposed architecture and existing models in different facilitating transaction processing and coordination among
parameters such as smart contract, the privacy of data, usage hundreds of billions of devices, Fig. 1 b. Each manages its
of tokens, updating the policies, and misbehavior judging are own roles and behavior, thus the democratization of the
performed. digital world.
As reported by Statist a , the global blockchain
Keywords—Smart home, Blockchain, Ethereum, Smart technology market is predicted to reach 339.5 million U.S.
Contract, Internet of Things, Privacy
dollars by 2017 and is forecast to grow to 2.3 billion U.S.
dollars by 2021. Today, there are over 1,920
I. INTRODUCTION cryptocurrencies was born b. In the case of a cryptocurrency,
In 2003, there were approximately 6.3 billion people the blockchain acts as a distributed ledger that stores all the
living on the planet and 500 million devices connected to coin transactions that have been performed. IoT shares some
the Internet. The explosive growth of smartphones and common problems with cryptocurrencies, since IoT systems
tablet PCs brought the number of devices connected to the there are many entities. However, there are several aspects
Internet to 12.5 billion in 2010. Looking to the future, Cisco that differentiate IoT from digital, like the amount of
IBSG predicts there will be 25 billion devices connected to computing power available in the nodes or the limitation of
the Internet by 2015 and 50 billion by 2020 [3]. However, the energy consumed in devices. Therefore, the key
such interconnection may also incur crucial security issues contribution of blockchain is that it provides a way to carry
into IoT systems, because adversaries can intrude into the out transactions with another person or entity without
systems to gain illegal access to the provided resources (e.g., having to rely on third-parties [7].
data, services, storage units, computing units) by simply The smart home is an important component of the IoT,
deploying their own or compromising existing IoT devices smart homes serve users effectively by communicating with
[4], [5]. various digital devices based on IoT [1]. In this case, these
IBM specified the current critical challenges of IoT, IoT devices become more popular in homes and collect
including high cost, lack of privacy, not future-proof, lack of more private data uploaded to the cloud, questions about
functional value, and broken business models [6]. First of user privacy become concerning: What data do these IoT
all, many existing IoT solutions are expensive because of devices collect? Where is the data stored, and who has
the high infrastructure and maintenance costs associated ownership and access to the data? How is the data used, if at
with centralized clouds and large server farms, in addition to all? The answers to these questions are still unclear for both
the service costs of middlemen. Second, most solutions consumers and producers, for the market for smart home
today provide the ability for centralized authorities, whether devices remains a nascent space without any regulations or
governments, manufactures or service provides to gain standards [8]. In this paper, the authors present the findings
unauthorized access to and control devices by collecting and that emerged from our study: First, users prioritize the
analyzing user data. Third, while many companies are quick convenience and connectedness of their smart homes, and
to enter the market for smart, connected devices, they have these values dictate their private opinions and behaviors.
yet to discover that it is very hard to exit. Fourth, many IoT
solutions today suffer from a lack of meaningful value
a
creation. The value proposition of many connected devices https://www.statista.com/statistics/647231/worldwide-blockchain-
has been that they are connected – but simply enabling technology-market-size
b
Crypto-Currency Market Capitalizations. Accessed: Sep. 10, 2018.
connectivity does not make a device smarter or better. Fifth,
[Online]. Available: https://coinmarketcap.com/

978-1-5386-9186-1/18/$31.00 ©2018 IEEE 58


DOI 10.1109/ACOMP.2018.00017
cases of the blockchain, out of which four cases are for IoT.
The four use case categories for IoT include an immutable
log of events and management of access control to data [11],
trading of collected IoT data [12], [13], manage symmetric
and asymmetric key for the IoT devices [14], [15]. The
authors [16] have laid out the challenges for the identity in
IoT. These basic challenges include relationships between
a) Past, today, and future of IoT ownership and identification, authentication and
authorization, data management and privacy.
Motivated by the recent explosion of interest around
blockchain technology numerous architectures were
proposed to apply blockchain into IoT environment.
Applications of the smart contracts in the IoT were
investigated in [17]. This paper describes how smart
contracts of blockchain can facilitate, support self-operation
workflow and share service between IoT devices. Authors
also show how IoT can take advantage of the blockchain
network in terms of billing, e-transactions, delivery, and
supply chain management. In addition, they describe a
scenario, which blockchain can conveniently purchase and
b) The blockchain is the framework facilitating transaction processing sale of automated energy between the IoT devices as smart
and coordination among hundreds of billions of devices meters. Many smart contracts can construct a set of criteria,
Fig. 1. The blockchain works for the IoT [6] defined by users, for energy transactions. A blockchain-
based architecture for Industrial IoT (IIoT) is proposed that
Second, user opinions about who should have access to their allows the IoT devices to communicate with Cloud as well
smart home data depend on the perceived benefit. Third, as blockchain network [18]. Each of the IoT devices was
users assume their privacy is protected because they trust equipped with a single PC which is capable of controlling
the manufacturers of their IoT devices. The findings of and communicating interface with the cloud and Ethereum
authors bring up several implications for IoT privacy, which blockchain. IoT devices were designed to send data to the
include the need for design for privacy and evaluation cloud where stores and analyzes sending or receiving
standards. transactions from other devices in the blockchain network
Unlike the research previously mentioned, this work and also activate smart contract. To proof concept, authors
presents an approach to data privacy using blockchain executed a basic foundation uses Arduino Uno chain and
technology for the smart home. The remainder of this paper
Ethereum smart contracts, a brief description of how the
is structured as follows. Section II presents research related
to blockchain technology and its application in the IoT platform can be used to operate a machine and predict the
environment. Ethereum platform and the proposed information.
architecture apply blockchain technology into the IoT, IoT- In [19], a lightweight architecture, privacy and security
Blockchain environment, specifically, the smart home for the IoT based on blockchain technology is proposed. The
environment will be the main content of Section III. Section method was built in the smart home scenario as a specific
IV presents the experimental scenario and Section V case study to open further IoT applications. The proposed
provides experimental results, evaluating the proposed architecture was a hierarchical form, including many smart
architecture for users, service provider, and smart homes. homes, an overlay network, and the Cloud storage devices
Conclusion and future research directions are specified in combine transaction data with blockchain to provide privacy
Section VI. and security. Their designs use blockchain types depending
on the hierarchical network takes place in a transaction and
II. RELATED WORKS use the reliable scattered methods to ensure the
decentralization of structure. The quality architecture
In [9], a survey is performed to review the main security evaluation based on common threat models highlights
issues in the Internet of Things (IoT) environment. This effective security providing and privacy to the IoT
paper offers the general IoT security requirements based on applications.
attack problems, threat agents, and the latest solutions. In Authors in [20] also outlined the various core
addition, the authors categorized and mapped the IoT components of the smart home tier and discussed the
security issues from the solutions found in the survey. More various transactions and procedures associated with it. In
importantly, they mentioned how to the blockchain, which is this paper, they presented an all-inclusive analysis regarding
a foundation technology Bitcoin, can solve security its security and privacy. Their simulation results
requirements in IoT. In the survey, research works on IoT demonstrate that the overheads incurred by their method are
security and blockchain is limited, with the majority of work low and manageable for low resource IoT devices. They
being focused on blockchain technology to benefit IoT in also argue that these overheads are worth their weight gave
general. The authors in [10] have categorized eighteen use a significant security and privacy benefits on offer.

59
a) IoT-Blockchain proposed in [23] b) IoT-Blockchain for smart home (SHIB) is proposed in this study
Fig. 2. IoT-Blockchain architecture for smart home (SHIB) is proposed in this study

An approach based on blockchain technology to publish computational problem if enough time and space are
the policies expressing the right to access a resource and to provided. There are two types of accounts in Ethereum:
allow the distributed transfer of such right among users [21]. Externally Owned Account (EOA) controlled by private
In this paper, the policies and the rights exchanges are
keys and Contract Accounts controlled by the code in the
publicly visible on the blockchain, consequently, any user
Contract and activated only by the EOA. The term "Smart
can know at any time the policy paired with a resource and
the subjects who currently have the rights to access the Contract" refers to the code in a Contract Account, the code
resource. The paper validated the proposed method through a in the Contract is executed only when there is a transaction
possible working implementation based on XACML sent to it.
policies, deployed on the Bitcoin blockchain. An OM- AM The term "mining" means process add a new block into
framework that consists of 4 layers (Objective, Model, blockchain by authentic nodes on a network called miner,
Architecture and Mechanism, named FairAccess, is proposed which is nodes in Ethereum network task receive, propagate,
as a fully decentralized pseudonymous and privacy- verify and execute a transaction. The miner gathers into a
preserving authorization management framework that block and implements consensus the Proof of Work
enables users to own and control their data [22]. FairAccess consensus algorithm, where miner continually guesses
used access tokens to represent access rights and the tokens random numbers to solve extremely complex encode related
can be delivered from one peer to another through problem to its block until one of them to triumph over and
transactions. Unlike financial bitcoin transactions, this miner wins will advertise block on blockchain network to
method introduces new types of transactions that are used to authenticate. If the authentication process is successful,
grant, get, delegate, and revoke access. other nodes will add the new block to their string,
conversely, that block will be discarded. For each block is
III. ETHEREUM AND IOT-BLOCKCHAIN ARCHITECTURE successfully threaded, miners will gain corresponding
reward (in event Ethereum is ETH coin).
A. Ethereum - A new generation Blockchain
B. IoT-BlockChain system architecture for smart home
The blockchain is a technology platform of Bitcoin, first
described by anonymous author Satoshi Nakamoto in the IoT devices in the smart home typically include sensors,
article “Bitcoin: A Peer-to-Peer Electronic Cash System”, in actuators, switches, and light bulbs. Most IoT devices come
2008 c . The blockchain is a distributed computing from many vendors, heterogeneous, limited battery life, and
architecture, therein, each network node executes and low computing power, so adapting blockchain technology,
which requires high capacity, is difficult at IoT devices. To
records the same transactions, grouped into blocks. At the
solve this problem, an architecture which combines
end of 2013, Ethereum was proposed by Vitalik Buterin d, blockchain with IoT is proposed, Fig. 2 a [23]. This
who research and program cryptocurrency. architecture has many following advantages.
Ethereum is a decentralized platform runs smart
contracts: Applications run exactly as programmed without • First, the architecture uses smart contracts based on
censor, no fraud or interference by any third parties. blockchain technology to achieve trust access control
Decentralized applications can be programmed to a and IoT dispersal. Three types of smart contracts
complete Turing language called Solidity. A complete include Access Control Contract (ACC), Judge
Turing language is a programming language can solve any Contract (JC) and Register Contract (RC). These
functions mainly include registering, updating and
deleting an access control method; registering and
c
https://bitcoin.org/bitcoin.pdf updating the misbehavior-judging method; adding,
d
https://github.com/ethereum/wiki/wiki/White-Paper updating and deleting a policy of an ACC.

60
Fig. 3. Scenario for evaluating the SHIB architecture

to the blockchain network. Thus, the IoT gateway


• Second, IoT devices have no Ethereum clients, IoT that connects the smart home to the blockchain
gateways act as agents for their local IoT devices to network is proposed. Each IoT gateway connects a
conduct access control for the resources of the IoT. cluster of IoT devices to blockchain network via
short-range communications technologies like Wifi.
• Third, the proposed architecture has very high ability
of extension. Adding or removing of IoT devices in B. Smart contract compiling mechanism
the smart home system just remove or add the
corresponding smart contracts built for the IoT device The proposed architecture has three types of smart contracts
in the smart home. Notice that only the creator of for IoT-Blockchain system, ACC, RC, and JC.
smart contracts can add a new policy, update or delete • ACC Contract. An ACC is deployed for one Subject
an existing policy. – Object pair, each pair can be associated with
multiple ACCs, but one ACC can be associated with
one and only one subject-object pair. ACC also
IV. PROPOSED RESEARCH ARCHITECTURE provides the Application Binary Interface (ABI) to
manage policy and control access like policyAdd(),
A. Proposed architecture policyUpdate(), accessControl(), setJC(), and
As mentioned in Section III, based on three advantages deleteACC().
of the proposed architecture in [23], an approach to data • JC Contract. The JC implements a misbehavior
privacy in the smart home using blockchain technology, judging method, which judges the misbehavior of the
which is called Smart home based on the IoT-Blockchain subject and determines the corresponding penalty.
(SHIB), is proposed. The details of the proposed After determining the penalty, the JC returns the
architecture are shown in Fig. 2 b. decision to the ACC for further operation. JC also
• Service provider. The service provider is a device or provides the ABI for judging the misbehavior like
a cluster of devices that can interact with the IoT misbehaviorJudge(), and deleteJC().
devices and storage devices to provide the service • RC Contract. The main role of the RC in the system
recommendations for users. is to manage the access control and misbehavior-
• Storage devices. The device sets which are capable judging methods. To achieve this goal, the RC
of storing the collected data from the IoT devices. maintains a lookup table. With the help of the lookup
• User. The owner of a smart home. The user has a table, the RC provides the following main ABIs to
device (e.g., laptops, smartphones) through which manage these methods like methodRegister(),
users can enjoy the recommendations services methodUpdate(), methodDelele(), and getContract().
provided by the service provider and read data from
or write data to the storage devices. V. EXPERIMENTS AND RESULTS
• Smart home. A smart home where the IoT devices
are connected and the users can monitor the IoT A. Software and hardware
devices at every moment. The IoT devices in the Hardware. The experiment is implemented on a laptop
system mainly include sensors, which can perceive (MacBook Pro, CPU 2.4 GHz Intel Core i5, macOS High
environmental data and send these data to the service Serria operating system, 4 GB memory, and 128 GB SSD
provider or the users. Based on the fact that the IoT hard drive).
devices in a smart home cannot directly be connected

61
Fig. 4. The access request results are returned for user 1 and the service provider

Fig. 5. The misbehavior of the service provider and determines the corresponding penalty

Software. The writing and compiling of the smart consists of the IoT gateway that connects the IoT devices to
contracts are executed on Remix IDE e , an IDE on the blockchain network. The IoT devices in smart home 1
browser for Solidity f . In order to deploy the Ethereum include two motion sensors (Sensor A, Sensor B), and a
blockchain for the smart contract operation control in the smart door (Door A). Smart home 2 consists of the IoT
proposed architecture, Ganache g , which is an application gateway that connects the IoT device to blockchain network.
initializes a personal Ethereum blockchain fast and simply, is Three IoT devices in smart home 2 include two motion
used. sensors (Sensor C, Sensor D), and a smart garage door
(Garage). All of the devices are connected IoT gateway by
B. Experimental scenario Wifi. The service provider has the ability to collect sensor
An experimental scenario is designed that includes five data in smart homes and provides the service
peers using web3.js h to interact with the smart contracts, Fig. recommendations.
3. Those peers include user 1, user 2, smart home 1, smart
home 2, and the service provider are detailed in Table I. User C. Experimental results
1 and user 2 are the users of the system. Smart home 1 The results of the access request from user 1 and the
service provider into sensor A, Fig. 4. First, user 1 (blue
frame), and the service provider (red frame) send the access
e
https://remix.ethereum.org/ request to smart home 1. Next, smart home 1 will check the
f
https://solidity.readthedocs.io/en/develop/ policies in ACC to return the access request results. The
g
https://truffleframework.com/ganache access request results have parameters in Table II. When the
h
https://github.com/ethereum/wiki/wiki/JavaScript-API

62
TABLE I.  THE RELATIONSHIP BETWEEN PEERS frame shows the results of the nearest access control before
Information User 1 User 2 Service locked, the orange frame displays the warning result with
provider over-policy access behavior and offers the "Requests are
Smart Sensor A Read data x Read data blocked for 1 minute!" access handle method, the red frame
home 1
Sensor B Read data x Read data
displays the penalty result when receipt warning, but still
over-policy access and offers the “Requests are blocked!”
Door A Open, Close, x State access handle method.
State
Smart Sensor C x Read data Read data The above results show in the SHIB architecture, the
home 2
Sensor D x Read data Read data
policies have been defined times accessed at the concrete
time in ACC. If a third-party intentional attack or take the
Garage x Open, State
Close, State
user data with bad intentions, smart contracts will be
operated lock/block transactions from the third-party. It
TABLE II.  ACCESS CONTROL PARAMETERS
strengthened the privacy and the security of the user in the
smart home. In other words, JC judges the misbehavior of
Parameter Meaning the service provider and determines the corresponding
Contract ACC address in Ethereum network penalty that is presented in Table III. Access request results
for smart home 1 and smart home 2 are detailed in Table IV.
Block number Block number
Tx Hash Transaction Hash
D. Comparison with another model
Block Hash Block hash
In this section, a comparison between the proposed
Subject Subject accesses into the smart home architecture and two models in the related work [21], [22] is
Time Transaction execution time (ns) detailed in Table V, which shows different parameters like
smart contract, the privacy of data, usage of tokens,
Message Access authorization message
updating the policies, and Misbehavior judging. Model in
Result The result of the access request [21] authenticated based on Bitcoin, where the policies are
directly stored on the blockchain, so this model does not use
TABLE III.  THE MISBEHAVIOR OF THE SERVICE PROVIDER AND smart contracts for self-execution policies.
THE CORRESPONDING PENALTY
Information Check Time/min Service provider
As proposed architecture uses smart contracts that are
Smart Door A State 1 Access authorized used for self-execution policies. Model in [22], the authors
home 1 used access tokens to represent access rights and the tokens
2 Access authorized can be delivered from one peer to another through
3 Request are blocked for 1 transactions. If there are no tokens, then the user cannot
minute initiate the transaction which is not happening in SHIB
4 Requests are blocked architecture.
Smart Garage State 1 Access authorized
home 2
2 Access authorized The biggest difference in the proposed architecture is the
use of the JC contract to judge the misbehavior of the
3 Request are blocked for 1
minute subject and determines the corresponding penalty, which is
4 Requests are blocked not used in existing models. The using of JCs and ACCs
helps users to develop privacy policies and to be ensured
service provider wants to access Door A and check the state that those policies operate correctly based on blockchain
multiple times, exceeds the policies min Interval = 60s, technology.
threshold = 2, smart home 1 will determine the
corresponding penalty by blocking access request. In Fig. 5, VI. CONCLUSION
the smart home 1 indicates the access behavior exceeds The research describes an approach to data privacy in the
policies and lock access from the service provider. The green smart home using blockchain technology that applies IoT-
TABLE IV.  THE EXPERIMENTAL RESULTS OF THE ACCESS REQUEST FOR SMART HOME 1 AND SMART HOME 2

Information Behavior User 1 User 2 Service Provider

Smart Sensor A Read data Access authorized Wrong subject or object Access authorized
Home 1 Sensor B Read data Access authorized Wrong subject or object Access authorized
Door A Open Access authorized Wrong subject or object Static check failed
Close Access authorized Wrong subject or object Static check failed
State Access authorized Wrong subject or object Access authorized
Smart Sensor C Read data Wrong subject or object Access authorized Access authorized
Home 2 Sensor D Read data Wrong subject or object Access authorized Access authorized
Garage Open Wrong subject or object Access authorized Static check failed
Close Wrong subject or object Access authorized Static check failed
State Wrong subject or object Access authorized Access authorized

63
TABLE V.  THE COMPARISON BETWEEN SHIB PROPOSED 23rd International Conference on Automation and Computing
ARCHITECTURE AND EXISTING MODELS (ICAC). https://doi.org/10.23919/IConAC.2017.8082057I.
[3] D. Evans. The Internet of Things how the next evolution of the
Parameter Proposed Model in FairAccess
internet is changing everything. Technical report, 04 2011.
architecture [21] in [22]
Smart The proposed No Yes [4] C. J. D’Orazio, K. K. R. Choo, and L. T. Yang, “Data exfiltration
contract architecture has from internet of things devices: ios devices as case studies,” IEEE
three types of smart Internet Things J., vol. 4, no. 2, pp. 524–535, 2017.
contracts that are [5] E. Bertino and N. Islam, “Botnets and internet of things security,”
ACC, RC, and JC Computer, vol. 50, no. 2, pp. 76–79, Feb. 2017. [Online]. Available:
doi.ieeecomputersociety.org/10.1109/MC.2017.62
The privacy The data are stored The data are The data are
of data in the storage stored in the stored in the [6] Device Democracy: Saving the Future of the Internet of Things, IBM,
devices that public public New York, NY, USA, 2015.
increases the privacy blockchain blockchain [7] T. M, Fernández, P. Fraga-Lamas, “A Review on the Use of
of the data user database database Blockchain for the Internet of Things,” IEEE Access, vol. 6, pp.
32979-33001, May. 2018. doi: 10.1109/ACCESS.2018.2842685
Usage of No No Yes
tokens [8] S. Zheng, M. Chetty, N. Feamster, "User Perceptions of Privacy in
Updating the Policies are updated Policy needs Policy needs Smart Homes," arXiv preprint arXiv:1802.08182
policies that through to be to be updated [9] M.A. Khan, K. Salah, "IoT security: Review, blockchain solutions,
policyUpdate() updated at at each place and open challenges," Future Generation Computer Systems (2017),
function of ACC each place where ever it https://doi.org/10.1016/j.future.2017.11.022
where ever it is used [10] M. Conoscenti, A. Vetro, J.C.D. Martin, "Blockchain for the internet
is used of things: a systematic literature review," in:The 3rd International
Misbehavior Judging the No No Symposium on Internet of Things: Systems, Management, and
Judging misbehavior of the Security (IOTSMS-2016),2016.
subject and [11] G. Zyskind, O. Nathan, A. Pentland, "Enigma: Decentralized
determines the computation platform with guaranteed privacy" (June 2015).
corresponding URLhttp://enigma.media.mit.edu/enigma full.pdf
penalty [12] Y. Zhang, J. Wen, "An IoT electric business model based on the
protocol of bitcoin," in: 2015 18th International Conference on
blockchain architecture into smart home environment. An Intelligence in Next Generation Networks, 2015, pp. 184–191.
experimental scenario using Ganache, Remix, and web3.js is doi:10.1109/ICIN.2015.7073830.
built for evaluating the smart contract operation ability in [13] D. Wo ̈ rner, T. von Bomhard, "When your sensor earns money:
proposed architecture. Through the experiment results, the Exchanging data for cash with bitcoin," in: Proceedings of the 2014
SHIB architecture specified and solved the challenges in the ACM International Joint Conference on Pervasive and Ubiquitous
Computing: Adjunct Publication, UbiComp 14 Adjunct, ACM, New
smart home environment like data privacy, trust access York, NY, USA, 2014, pp. 295–298. doi:10.1145/2638728.2638786.
control, and the ability of extension. Allowing users to build URL http://doi.acm.org/10.1145/2638728.2638786
the privacy policies in ACC, be stored on Ethereum [14] L. Axon, "Privacy-awareness in blockchain-based pki," Tech.rep.
blockchain network, and only the creator of ACC can add a (October2015). URL https://ora.ox.ac.uk/objects/uuid:f8377b69-
new policy, update or delete the privacy policies in ACC. 599b- 4cae-8df0- f0cded53e63b/datastreams/ATTACHMENT01
[15] C. Fromknecht, D. Velicanu, S. Yakoubov, "Certcoin: A namecoin
The SHIB architecture is only for the related parties, based decentralized authentication system," (May 2014). URL
who agreed on the smart contract with the smart home https://courses.csail.mit.edu/6.857/2014/files/19-fromknecht-
owner. If another party has the misbehavior or taking data velicann- yakoubov- certcoin.pdf
with the bad purpose, the smart contracts will be activated to [16] I. Friese, J. Heuer, N. Kong, "Challenges from the identities of things:
block the access requests based on the defined policies Introduction of the identities of thingsdiscussion group within
kantara initiative," in: 2014 IEEE World Forum on Internet of Things
about the access times at a specific time period in ACC. (WF- IoT), 2014, pp. 1–4. doi:10.1109/WF- IoT.2014.6803106.
This helps decrease the possibility of being hacked IoT data [17] K. Christidis, M. Devetsikiotis, "Blockchains and smart contracts for
from objects who have a bad purpose, enhancing the the internet of things," IEEE Access 4 (2016) 2292–2303. doi:
security and the privacy of data in the smart home. High 10.1109/ACCESS.2016.2566339.
extension ability. When users want to add or delete IoT [18] A. Bahga, V. K. Madisetti, "Blockchain platform for industrial
devices in the smart home, they only need execute the internet of things," Tech. rep. (October 2016). URL
manipulation like add or delete corresponding IoT devices. http://file.scirp.org/pdf/JSEA 2016102814012798.pdf
[19] A. Dorri, S. S. Kanhere, R. Jurdak, “Blockchain in internet of things:
Finally, a comparison between the proposed architecture Challenges and solutions,” arXiv preprint arXiv:1608.05187, 2016.
and existing models in different parameters, which such as [20] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram. 2017.
Smart contract, The privacy of data, Usage of tokens, “Blockchain for IoT Security and Privacy: The Case Study of a Smart
Updating the policies, and Misbehavior judging, is Home,” In IEEE Percom workshop on security privacy and trust in
performed. The biggest difference in the SHIB proposed the internet of thing. IEEE, 2017.
architecture is the using of the JC contract to judge the [21] D. D. F. Maesa, P. Mori, and L. Ricci, “Blockchain based access
control,” [Online]. Available:
misbehavior of the subject and determine the corresponding https://www.iit.cnr.it/sites/default/files/main_21.pdf. [Accessed 19
penalty, which is not used in existing models. August 2018].
[22] Ouaddah, A. Abou Elkalam, and A. Ait Ouahman, “Fairaccess: a new
REFERENCES blockchain-based access control framework for the internet of
things,” [Online]. Available:
[1] M. Alaa, A.A. Zaidan, B.B. Zaidan, Mohammed Talal and M.L.M. https://onlinelibrary.wiley.com/doi/full/10.1002/sec.1748. [Accessed
Kiah, “A Review of Smart Home Applications based on Internet of 19 August 2018].
Things,” Journal of Network and Computer Applications, [23] Y. Zhang, S. Kasahara, Y. Shen, X. Jiang, J. Wan, “Smart Contract-
http://dx.doi.org/10.1016/j.jnca.2017.08.017. Based Access Control for the Internet of Things,” arXiv
[2] W. Ali, G. Dustgeer, M. Awais, M. A. Shah, “IoT based Smart Home: preprint arXiv:1802.04410v1 [cs.CR]
Security Challenges, Security Requirements and Solutions,” in: 2017

64

Vous aimerez peut-être aussi