
Research Article
Implementing a Blockchain-Based Security System Applied to IoT
@INPROCEEDINGS{10.1007/978-3-030-68737-3_9, author={Mart\^{\i} Miquel Mart\^{\i}nez and Eva Mar\^{\i}n-Tordera and Xavi Masip-Bruin and Sergio S\^{a}nchez-L\^{o}pez and Jordi Garc\^{\i}a}, title={Implementing a Blockchain-Based Security System Applied to IoT}, proceedings={Broadband Communications, Networks, and Systems. 11th EAI International Conference, BROADNETS 2020, Qingdao, China, December 11--12, 2020, Proceedings}, proceedings_a={BROADNETS}, year={2021}, month={2}, keywords={IoT Cybersecurity Blockchain}, doi={10.1007/978-3-030-68737-3_9} }
- Martí Miquel Martínez
Eva Marín-Tordera
Xavi Masip-Bruin
Sergio Sánchez-López
Jordi García
Year: 2021
Implementing a Blockchain-Based Security System Applied to IoT
BROADNETS
Springer
DOI: 10.1007/978-3-030-68737-3_9
Abstract
Several discussions regarding IoT devices and Blockchain came out recently. On one hand, IoT devices have been widely adopted by a notable set of Internet services driven by their capacity to cover several needs (for example, monitoring a manufacturing process, guiding an autonomous car, or tracking a train). On the other hand, Blockchain technology has been considered by several companies to support some critical functionalities, such as security provisioning or data protection. Nowadays, many challenges on both technologies remain yet unsolved, in spite of the unstoppable and ever-growing interest both technologies are attracting. Actually, a substantial push to them both comes from their agnosticism, i.e., many scenarios, particularly those considered as smart, are considered as proper candidates for their deployment, for example smart transportation, smart manufacturing or smart cities, just to name a few. This paper focuses on the latter, proposing a preliminary architecture using both technologies intended to provide security and robustness in Smart Cities. Several Blockchain strategies are analysed in the paper to identify unequivocally every device that belongs to the proposed architecture, also describing the operation of the chosen Blockchain to meet the security requirements. In summary, in this paper, an architecture able to resist certain attacks and proven to be useful to the previous mentioned examples is designed and implemented.