A Blockchain-empowered Access Control Framework for Smart Devices in Green Internet of Things

2021 ◽  
Vol 21 (3) ◽  
pp. 1-20
Author(s):  
Liang Tan ◽  
Na Shi ◽  
Keping Yu ◽  
Moayad Aloqaily ◽  
Yaser Jararweh

Green Internet of things (GIoT) generally refers to a new generation of Internet of things design concept. It can save energy and reduce emissions, reduce environmental pollution, waste of resources, and harm to human body and environment, in which green smart device (GSD) is a basic unit of GIoT for saving energy. With the access of a large number of heterogeneous bottom-layer GSDs in GIoT, user access and control of GSDs have become more and more complicated. Since there is no unified GSD management system, users need to operate different GIoT applications and access different GIoT cloud platforms when accessing and controlling these heterogeneous GSDs. This fragmented GSD management model not only increases the complexity of user access and control for heterogeneous GSDs, but also reduces the scalability of GSDs applications. To address this issue, this article presents a blockchain-empowered general GSD access control framework, which provides users with a unified GSD management platform. First, based on the World Wide Web Consortium (W3C) decentralized identifiers (DIDs) standard, users and GSD are issued visual identity ( VID ). Then, we extended the GSD-DIDs protocol to authenticate devices and users. Finally, based on the characteristics of decentralization and non-tampering of blockchain, a unified access control system for GSD was designed, including the registration, granting, and revoking of access rights. We implement and test on the Raspberry Pi device and the FISCO-BCOS alliance chain. The experimental results prove that the framework provides a unified and feasible way for users to achieve decentralized, lightweight, and fine-grained access control of GSDs. The solution reduces the complexity of accessing and controlling GSDs, enhances the scalability of GSD applications, as well as guarantees the credibility and immutability of permission data and identity data during access.

The aim of the project is to monitor and control the home appliance using IoT with help of the Google voice assistance. The system consists of the Raspberry PI to perform the total operation and Relay for trig the Loads or home appliances. These Home appliances are interlinked with the IoT (internet of things).We can access the loads, control and monitor anywhere in the world. If we adapt this system for any city and urban areas to save energy and sustainable life style. It will provide good communication compare to automated homes and normal homes


Author(s):  
Scott J. Shackelford

The Internet of Things (IoT) is the notion that nearly everything we use, from gym shorts to streetlights, will soon be connected to the Internet; the Internet of Everything (IoE) encompasses not just objects, but the social connections, data, and processes that the IoT makes possible. Industry and financial analysts have predicted that the number of Internet-enabled devices will increase from 11 billion to upwards of 75 billion by 2020. Regardless of the number, the end result looks to be a mind-boggling explosion in Internet connected stuff. Yet, there has been relatively little attention paid to how we should go about regulating smart devices, and still less about how cybersecurity should be enhanced. Similarly, now that everything from refrigerators to stock exchanges can be connected to a ubiquitous Internet, how can we better safeguard privacy across networks and borders? Will security scale along with this increasingly crowded field? Or, will a combination of perverse incentives, increasing complexity, and new problems derail progress and exacerbate cyber insecurity? For all the press that such questions have received, the Internet of Everything remains a topic little understood or appreciated by the public. This volume demystifies our increasingly “smart” world, and unpacks many of the outstanding security, privacy, ethical, and policy challenges and opportunities represented by the IoE. Scott J. Shackelford provides real-world examples and straightforward discussion about how the IoE is impacting our lives, companies, and nations, and explain how it is increasingly shaping the international community in the twenty-first century. Are there any downsides of your phone being able to unlock your front door, start your car, and control your thermostat? Is your smart speaker always listening? How are other countries dealing with these issues? This book answers these questions, and more, along with offering practical guidance for how you can join the effort to help build an Internet of Everything that is as secure, private, efficient, and fun as possible.


Sensors ◽  
2019 ◽  
Vol 19 (7) ◽  
pp. 1492 ◽  
Author(s):  
Pantaleone Nespoli ◽  
David Useche Pelaez ◽  
Daniel Díaz López ◽  
Félix Gómez Mármol

The Internet of Things (IoT) became established during the last decade as an emerging technology with considerable potentialities and applicability. Its paradigm of everything connected together penetrated the real world, with smart devices located in several daily appliances. Such intelligent objects are able to communicate autonomously through already existing network infrastructures, thus generating a more concrete integration between real world and computer-based systems. On the downside, the great benefit carried by the IoT paradigm in our life brings simultaneously severe security issues, since the information exchanged among the objects frequently remains unprotected from malicious attackers. The paper at hand proposes COSMOS (Collaborative, Seamless and Adaptive Sentinel for the Internet of Things), a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using multiple defensive rings, resulting in a more accurate and robust protection. Additionally, we discuss the current deployment of the sentinel on a commodity device (i.e., Raspberry Pi). Exhaustive experiments are conducted on the sentinel, demonstrating that it performs meticulously even in heavily stressing conditions. Each defensive layer is tested, reaching a remarkable performance, thus proving the applicability of COSMOS in a distributed and dynamic scenario such as IoT. With the aim of easing the enjoyment of the proposed sentinel, we further developed a friendly and ease-to-use COSMOS App, so that end-users can manage sentinel(s) directly using their own devices (e.g., smartphone).


Energies ◽  
2018 ◽  
Vol 11 (8) ◽  
pp. 2089 ◽  
Author(s):  
Rehman Abdul ◽  
Anand Paul ◽  
Junaid Gul M. ◽  
Won-Hwa Hong ◽  
Hyuncheol Seo

Internet of Things (IoT) has been at the center of attention among researchers for the last two decades. Their aim was to convert each real-world object into a virtual object. Recently, a new idea of integrating the Social Networking concept into the Internet of Things has merged and is gaining popularity and attention in the research society due to its vast and flexible nature. It comprises of the potential to provide a platform for innovative applications and network services with efficient and effective manners. In this paper, we provide the sustenance for the Social Internet of Things (SIoT) paradigm to jump to the next level. Currently, the SIoT technique has been proven to be efficient, but heterogeneous smart devices are growing exponentially. This can develop a problematic scenario while searching for the right objects or services from billions of devices. Small world phenomena have revealed some interesting facts and motivated many researchers to find the hidden links between acquaintances in order to reach someone across the world. The contribution of this research is to integrate the SIoT paradigm with the small world concept. By integrating the small world properties in SIoT smart devices, we empower the Smart Social Agent (SSA). The Smart Social Agent ensures the finding of appropriate friends (i.e., the IoT devices used by our friend circle) and services that are required by the user, without human intervention. The Smart Social Agent can be any smart device in SIoTs, e.g., mobile phones.


2016 ◽  
Vol 23 (5) ◽  
pp. 17-23 ◽  
Author(s):  
Yun Li ◽  
Kok Keong Chai ◽  
Yue Chen ◽  
Jonathan Loo

2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Qi Gao ◽  
Junwei Zhang ◽  
Jianfeng Ma ◽  
Chao Yang ◽  
Jingjing Guo ◽  
...  

With the fast development of Logistics Internet of Things and smart devices, the security of express information processed by mobile devices in Logistics Internet of Things has attracted much attention. However, the existing secure express schemes only focus on privacy protection of personal information but do not consider the security of the logistics information against couriers with malicious mobile devices. For example, a privacy-preserving delivery path should be required in order to prevent the privacy leakage in the express delivery procedure. Therefore, besides the security of personal information, the privacy protection of logistics information and authentication of mobile devices used in express company are important to security in Logistics Internet of Things. In this paper, we propose a secure logistics information scheme LIP-PA to provide privacy protection of both personal information and logistics information. First, we define the basic requirements of Logistics Internet of Things. Then, using attribute-based encryption and position-based key exchange, we propose a logistics information privacy protection scheme with position and attribute-based access control for mobile devices. The analysis results show that our scheme satisfies the defined requirements. Finally, the performance of our scheme is evaluated and the experiment results show that our scheme is efficient and feasible for mobile devices in real parcel delivery scenario.


Sign in / Sign up

Export Citation Format

Share Document