Abstract
As the Internet of Things (IoT) has become prevalent, a massive number of logs produced by IoT devices are transmitted and processed every day. The logs should contain important contents and private information. Moreover, these logs may be used as evidences for forensic investigations when cyber security incidents occur. However, evidence legality and internal security issues in existing works were not properly addressed. This paper proposes an autonomous log storage management protocol with blockchain mechanism and access control for the IoT. Autonomous model allows sensors to encrypt their logs before sending it to gateway and server, so that the logs are not revealed to the public during communication process. Along with blockchain, we introduce the concept “signature chain”. The integration of blockchain and signature chain provides efficient management functions with valuable security properties for the logs, including robust identity verification, data integrity, non-repudiation, data tamper resistance, and the legality. Our work also employs attribute-based encryption to achieve fine-grained access control and data confidentiality. The results of security analysis using AVSIPA toolset, GNY logic and semantic proof indicate that the proposed protocol meets various security requirements. Providing good performance with elliptic curve small key size, short BLS signature, efficient signcryption method, and single sign-on solution, our work is suitable for the IoT.
Highlights
With the popularization of computers and rapid development of mobile network technologies, Internet of Things (IoT) has become prevalent
Our work proposes an autonomous log storage management protocol with blockchain mechanism and access control for IoT environments
Fine-grained access control with ciphertext policy attribute-based encryption is proposed in our work
Summary
With the popularization of computers and rapid development of mobile network technologies, Internet of Things (IoT) has become prevalent. Enabled with fifth generation (5G) technology, communication in IoT environments is performed with super low latency, high-peak data rates and massive network capacity [1]. Data aggregation and transmission in IoT networks have been significantly improved, in order to provide better efficiency of energy consumption, network control overhead, delay time, loss packet and aggregation rates [2]. Due to these advances, IoT has huge potentials to change the information technology, enhance reliability of communication systems, as well as improve our life quality. Logs generated by IoT devices contain important contents and sensitive information. Specific uses of the logs include device monitoring [11], user behavior analysis [12], or digital forensics [13]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have