Special Issues
Table of Content

Security and Privacy for Blockchain-empowered Internet of Things

Submission Deadline: 16 December 2024 View: 992 Submit to Special Issue

Guest Editors

Dr. Chuan Zhang, Beijing Institute of Technology, Beijing, China
Dr. Jinwen Liang, Hong Kong Polytechnic University, China
Prof. Ximeng Liu, Fuzhou University, China
Dr. Bowen Zhao, Guangzhou Institute of Technology, Xidian University, China


Summary

The Internet of Things (IoT) has dramatically developed in recent years. Massive data is generated and collected with the deployment of various IoT devices, which contains the considerable value in many fields, such as smart healthcare and transportation. However, due to constrained resources and distributed architecture, IoT systems are also suffering from severe security and trust problems. With public consensus, blockchain is a promising technique to deal with the above problems in IoT systems. This emerging paradigm, known as the blockchain-empowered Internet of Things, can provide multiple desirable characteristics to IoT systems, such as data integrity and traceability. Recently, the blockchain-empowered Internet of Things has attracted extensive attention from both academia and industrial communities.

Despite the great success, the inherent properties (such as transparency and immutability) of the blockchain-empowered Internet of Things also introduce new security and privacy concerns to users, especially considering various data regulations, such as GDPR. For example, transparency means that the data is accessible to all users, violating the right to restriction of processing of users. Also, the immutability of blockchain hinders the right to be forgotten, which may lead to the spread of improper data. Currently, there is a great need to make a balance between these challenging problems and the advantages of the blockchain-empowered Internet of Things.


Keywords

This Special Issue aims to explore recent advances that address fundamental and practical challenges related to security and privacy in the blockchain-empowered Internet of Things. High-quality original research and review articles in this area are expected. Potential topics include, but are not limited to, the following:
 Secure data sharing mechanisms in the blockchain-empowered Internet of Things;
 Secure data analysis mechanisms in the blockchain-empowered Internet of Things;
 User trust and incentive mechanisms in the blockchain-empowered Internet of Things;
 Privacy-enhanced technologies for in the blockchain-empowered Internet of Things;
 Controllable redaction in the blockchain-empowered Internet of Things;
 Cyber attacks in the blockchain-empowered Internet of Things;
 Design and deployment of novel and secure blockchain-empowered Internet of Things systems

Published Papers


  • Open Access

    ARTICLE

    Secure Transmission Scheme for Blocks in Blockchain-Based Unmanned Aerial Vehicle Communication Systems

    Ting Chen, Shuna Jiang, Xin Fan, Jianchuan Xia, Xiujuan Zhang, Chuanwen Luo, Yi Hong
    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2195-2217, 2024, DOI:10.32604/cmc.2024.056960
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract In blockchain-based unmanned aerial vehicle (UAV) communication systems, the length of a block affects the performance of the blockchain. The transmission performance of blocks in the form of finite character segments is also affected by the block length. Therefore, it is crucial to balance the transmission performance and blockchain performance of blockchain communication systems, especially in wireless environments involving UAVs. This paper investigates a secure transmission scheme for blocks in blockchain-based UAV communication systems to prevent the information contained in blocks from being completely eavesdropped during transmission. In our scheme, using a friendly jamming UAV… More >

  • Open Access

    ARTICLE

    Blockchain-Based Certificateless Cross-Domain Authentication Scheme in the Industrial Internet of Things

    Zhaobin Li, Xiantao Liu, Nan Zhang, Zhanzhen Wei
    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3835-3854, 2024, DOI:10.32604/cmc.2024.053950
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The Industrial Internet of Things (IIoT) consists of massive devices in different management domains, and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during information exchange. To address the above challenges, a viable solution that combines Certificateless Public Key Cryptography (CL-PKC) with blockchain technology can be utilized. However, as many existing schemes rely on a single Key Generation Center (KGC), they are prone to problems such as single points of failure and high computational overhead. In this case, this paper proposes a novel blockchain-based certificateless cross-domain authentication… More >

  • Open Access

    ARTICLE

    PARE: Privacy-Preserving Data Reliability Evaluation for Spatial Crowdsourcing in Internet of Things

    Peicong He, Yang Xin, Yixian Yang
    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3067-3084, 2024, DOI:10.32604/cmc.2024.054777
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The proliferation of intelligent, connected Internet of Things (IoT) devices facilitates data collection. However, task workers may be reluctant to participate in data collection due to privacy concerns, and task requesters may be concerned about the validity of the collected data. Hence, it is vital to evaluate the quality of the data collected by the task workers while protecting privacy in spatial crowdsourcing (SC) data collection tasks with IoT. To this end, this paper proposes a privacy-preserving data reliability evaluation for SC in IoT, named PARE. First, we design a data uploading format using blockchain More >

  • Open Access

    ARTICLE

    A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles

    Feng Zhao, Hongtao Ding, Chunhai Li, Zhaoyu Su, Guoling Liang, Changsong Yang
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 567-585, 2024, DOI:10.32604/cmc.2024.052233
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The Internet of Vehicles (IoV) is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network. However, due to the open and variable nature of its network topology, vehicles frequently engage in cross-domain interactions. During such processes, directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers, thus compromising the security of the cross-domain authentication process. Additionally, IoV imposes high real-time requirements, and existing cross-domain authentication schemes for IoV often encounter efficiency issues. To mitigate More >

  • Open Access

    ARTICLE

    QBIoT: A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature

    Ang Liu, Qing Zhang, Shengwei Xu, Huamin Feng, Xiu-bo Chen, Wen Liu
    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1727-1751, 2024, DOI:10.32604/cmc.2024.051233
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The Internet of Things (IoT) is a network system that connects physical devices through the Internet, allowing them to interact. Nowadays, IoT has become an integral part of our lives, offering convenience and smart functionality. However, the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats, such as device vulnerabilities, data privacy concerns, and network susceptibilities. Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security. Nevertheless, the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used… More >

  • Open Access

    ARTICLE

    A Federated Learning Framework with Blockchain-Based Auditable Participant Selection

    Huang Zeng, Mingtian Zhang, Tengfei Liu, Anjia Yang
    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5125-5142, 2024, DOI:10.32604/cmc.2024.052846
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract Federated learning is an important distributed model training technique in Internet of Things (IoT), in which participant selection is a key component that plays a role in improving training efficiency and model accuracy. This module enables a central server to select a subset of participants to perform model training based on data and device information. By doing so, selected participants are rewarded and actively perform model training, while participants that are detrimental to training efficiency and model accuracy are excluded. However, in practice, participants may suspect that the central server may have miscalculated and thus… More >

  • Open Access

    ARTICLE

    Blockchain-Based Key Management Scheme Using Rational Secret Sharing

    Xingfan Zhao, Changgen Peng, Weijie Tan, Kun Niu
    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 307-328, 2024, DOI:10.32604/cmc.2024.047975
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract Traditional blockchain key management schemes store private keys in the same location, which can easily lead to security issues such as a single point of failure. Therefore, decentralized threshold key management schemes have become a research focus for blockchain private key protection. The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security. The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress, but these schemes do not consider participants’ self-interested behavior, and require trusted nodes to keep private key… More >

  • Open Access

    ARTICLE

    ResNeSt-biGRU: An Intrusion Detection Model Based on Internet of Things

    Yan Xiang, Daofeng Li, Xinyi Meng, Chengfeng Dong, Guanglin Qin
    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1005-1023, 2024, DOI:10.32604/cmc.2024.047143
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasing demands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device has caught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. This has resulted in a myriad of security challenges, including information leakage, malware propagation, and financial loss, among others. Consequently, developing an intrusion detection system to identify both active and potential intrusion traffic in IoT networks is of paramount importance. In this paper, we propose… More >

  • Open Access

    ARTICLE

    An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data

    Linlin Yuan, Tiantian Zhang, Yuling Chen, Yuxiang Yang, Huang Li
    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1561-1579, 2024, DOI:10.32604/cmc.2023.046907
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The development of technologies such as big data and blockchain has brought convenience to life, but at the same time, privacy and security issues are becoming more and more prominent. The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users’ privacy by anonymizing big data. However, the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability. In addition, ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced. Based… More >

  • Open Access

    ARTICLE

    Robust and Trustworthy Data Sharing Framework Leveraging On-Chain and Off-Chain Collaboration

    Jinyang Yu, Xiao Zhang, Jinjiang Wang, Yuchen Zhang, Yulong Shi, Linxuan Su, Leijie Zeng
    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2159-2179, 2024, DOI:10.32604/cmc.2024.047340
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The proliferation of Internet of Things (IoT) systems has resulted in the generation of substantial data, presenting new challenges in reliable storage and trustworthy sharing. Conventional distributed storage systems are hindered by centralized management and lack traceability, while blockchain systems are limited by low capacity and high latency. To address these challenges, the present study investigates the reliable storage and trustworthy sharing of IoT data, and presents a novel system architecture that integrates on-chain and off-chain data manage systems. This architecture, integrating blockchain and distributed storage technologies, provides high-capacity, high-performance, traceable, and verifiable data storage… More >

  • Open Access

    ARTICLE

    RPL-Based IoT Networks under Decreased Rank Attack: Performance Analysis in Static and Mobile Environments

    Amal Hkiri, Mouna Karmani, Omar Ben Bahri, Ahmed Mohammed Murayr, Fawaz Hassan Alasmari, Mohsen Machhout
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 227-247, 2024, DOI:10.32604/cmc.2023.047087
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) protocol is essential for efficient communication within the Internet of Things (IoT) ecosystem. Despite its significance, RPL’s susceptibility to attacks remains a concern. This paper presents a comprehensive simulation-based analysis of the RPL protocol’s vulnerability to the decreased rank attack in both static and mobile network environments. We employ the Random Direction Mobility Model (RDM) for mobile scenarios within the Cooja simulator. Our systematic evaluation focuses on critical performance metrics, including Packet Delivery Ratio (PDR), Average End to End Delay (AE2ED), throughput, Expected Transmission Count More >

  • Open Access

    ARTICLE

    Lightweight Intrusion Detection Using Reservoir Computing

    Jiarui Deng, Wuqiang Shen, Yihua Feng, Guosheng Lu, Guiquan Shen, Lei Cui, Shanxiang Lyu
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1345-1361, 2024, DOI:10.32604/cmc.2023.047079
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The blockchain-empowered Internet of Vehicles (IoV) enables various services and achieves data security and privacy, significantly advancing modern vehicle systems. However, the increased frequency of data transmission and complex network connections among nodes also make them more susceptible to adversarial attacks. As a result, an efficient intrusion detection system (IDS) becomes crucial for securing the IoV environment. Existing IDSs based on convolutional neural networks (CNN) often suffer from high training time and storage requirements. In this paper, we propose a lightweight IDS solution to protect IoV against both intra-vehicle and external threats. Our approach achieves More >

  • Open Access

    ARTICLE

    A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things

    Hongliang Tian, Junyuan Tian
    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1297-1310, 2024, DOI:10.32604/cmc.2024.047058
    (This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
    Abstract The Internet of Things (IoT) access control mechanism may encounter security issues such as single point of failure and data tampering. To address these issues, a blockchain-based IoT reputation value attribute access control scheme is proposed. Firstly, writing the reputation value as an attribute into the access control policy, and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control; Secondly, storing a large amount of resources from the Internet of Things in Inter Planetary File System (IPFS) to improve system More >

Share Link