Abstract

Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of Things (IoTs) device in the client’s house and connect it with the IoT main controller; then, the IoT main controller connects to the security control center (SCC). Once there is an event triggered (e.g., a break-in or fire incident) by the IoTs device, the controller sends a message to the SCC. The SCC allocates a security guard (SG) to the incident scene immediately. After the task is accomplished, the SG sends a message to the SCC. All of these record the messages and events chained in the blockchain center. The proposed scheme makes security event records have the following characteristics: authenticated, traceable, and integral. The proposed scheme is proved by a security analysis with mutual authentication, traceability, integrity, and non-repudiation. The known attacks (e.g., man-in-the-middle attack, replay attack, forgery attack) are avoided by message encryption and a signing mechanism. Threat models in the communication phase can also be avoided. Finally, computation cost, communication performance, and comparison with related works are also discussed to prove its applicability. We also provide an arbitration mechanism, so that the proposed scheme can reduce disputes between private security companies and the client.

Highlights

  • To strengthen the security of the city, except for the police placed by the government in the city, the general company or the community will sign a contract with a private security company, and that company provides the security service to ensure the property of the client

  • Our research aims to accomplish the following goals: an automated alarm system that communicates with the security control center to propose an authentication protocol that supports real-time event status report/record, data traceability, data integrity, data non-repudiation, and proposes an arbitration mechanism when the dispute occurs

  • Key generation phase: We assume that any participant must apply to our blockchain center for public and private keys, and the key generation with the Elliptic Curve Digital Signature Algorithm (ECDSA) is as follows: QX = d X G, where X is the participant ID, QX is the public key, d X is the private key, and G is a generating point based on the elliptic curve

Read more

Summary

Background

The economy has become more and more prosperous, but the security of the city has not improved along with economic growth. Many Internet of Things (IoTs)-related products have been developed, e.g., door/window sensors, smoke detectors, motion sensors, and alarm sirens Those devices can be integrated into the security system which makes the system automated. Private blockchains are more suitable for protecting customer privacy, and it is maintainable by the security service provider. Those security events are stored in an immutable ledger, and the ledger will be mainly stored with the security company, official agency, and client, to ensure that the information will not be arbitrarily altered. Our research aims to accomplish the following goals: an automated alarm system that communicates with the security control center to propose an authentication protocol that supports real-time event status report/record, data traceability, data integrity, data non-repudiation, and proposes an arbitration mechanism when the dispute occurs

Related Works
Objective
Smart Contract and Blockchain
BAN Logic
Threat Model
The Proposed Scheme
System Architecture
C Xi h Xi
Initialization Phase
Communication Phase
Authentication Phase
Event–Trigger Phase
Task Allocating Phase
Task Accomplished Phase
Arbitration Phase
3.10. Key Recovery Phase
Mutual Authentication
G4: G5: G6: G7: G8
Traceable
Integrity
Non-Repudiation
Man-in-the-Middle Attack
Replay Attack
Side-Channel Attack
Forgery Attack
Threat Models in the Communication Phase
Computation Cost
Communication Performance
Comparison
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call