A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things
Abstract
:1. Introduction
- The cloud-edge collaboration architecture of the smart factory is analyzed, and the edge-end network architecture based on edge servers is established. Then, the Intelligent Elliptic Curve Digital Signature Algorithm (IECDSA) is proposed to determine the ownership of the smart factory’s private information. In contrast to the traditional method, trusted storage and distribution of keys was implemented by the Key Distribution Smart Contract (KDSC), which reduces the risk of keys being tampered with and more securely guarantees the ownership of the shared private information by smart factories.
- The working principle of the DPoS consensus algorithm is analyzed, and in view of the situation that the malicious node is selected as a proxy node due to “hoarding” in the election process, the Reputation-based Delegated Proof-of-Stake consensus algorithm (RDPoS) is proposed. The algorithm performs a weighted operation on the number of node votes and reputation values and selects proxy nodes to participate in the consensus process according to the weighted operation results. Compared with the existing DPoS consensus algorithm, the probability of malicious nodes being selected as proxy nodes is reduced, and the security and reliability of the consensus reached between blockchain nodes are effectively improved.
- In view of the phenomenon that smart factories protect their own private information and refuse to participate in information sharing, a trusted incentive smart contract based on information attributes is constructed. Furthermore, a trusted network incentive environment without third party involvement is implemented, sending reward points to smart factories that provide private information sharing and ensuring the enthusiasm of smart factories in sharing information. Compared with the traditional incentive mechanism, the incentive mechanism realized by smart contracts is not interfered with by external factors, ensuring the fairness, impartiality, and openness of the incentive mechanism.
2. Related Work
3. Scheme in Detail
3.1. The Overall Scheme
3.2. The Network Architecture
3.3. Security Analysis
3.3.1. The Security of Information Storage
3.3.2. The Security of Information Sharing
3.3.3. The Fairness of Information Sharing
4. Methods
4.1. Intelligent Elliptic Curve Digital Signature Algorithm (IECDSA)
Algorithm 1 Key Distribution Smart Contract (KDSC) |
Input:, // is public key. is information set of edge nodes in the network. Output: State of public key distribution.
|
Algorithm 2 Intelligent Elliptic Curve Digital Signature Algorithm (IECDSA) |
Input:, // is the information shared set by the edge nodes of the message sender. is information set of edge nodes in the network. Output: Status of signatures and verification of signatures.
|
4.2. Reputation-Based Delegated Proof of Stake (RDPoS)
Algorithm 3 Reputation Model Algorithm (RMA) |
Input: node , penalty coefficient x, incentive increase factor y. Output:. // The reputation value of node is
|
Algorithm 4 Reputation-Based Delegated Proof of Stake Algorithm (RDPoS) |
Input: Hash value of the current block. Output: Status of the block on the chain.
|
4.3. Incentive Mechanism Based on Information Attributes
5. Simulation Experiments
5.1. The Experiments of IECDSA
5.2. The Experiments of RDPoS
5.3. The Experiments of Incentive Mechanism
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A. The Data Storage of Block
References
- Song, C.; Xu, W.; Han, G.; Zeng, P.; Wang, Z.; Yu, S. A cloud edge collaborative intelligence method of insulator string defect detection for power IIoT. IEEE Internet Things J. 2020, 8, 7510–7520. [Google Scholar] [CrossRef]
- Ding, L.; Wang, Z.; Wang, X.; Wu, D. Security information transmission algorithms for IoT based on cloud computing. Comput. Commun. 2020, 155, 32–39. [Google Scholar] [CrossRef]
- Zhang, W.; Yang, D.; Xu, Y.; Huang, X.; Zhang, J.; Gidlund, M. DeepHealth: A self-attention based method for instant intelligent predictive maintenance in industrial Internet of things. IEEE Trans. Ind. Inform. 2020, 17, 5461–5473. [Google Scholar] [CrossRef]
- Meng, T.; Jing, X.; Yan, Z.; Pedrycz, W. A survey on machine learning for data fusion. Inf. Fusion 2020, 57, 115–129. [Google Scholar] [CrossRef]
- Xiao, Y.; Jia, Y.; Liu, C.; Cheng, X.; Yu, J.; Lv, W. Edge computing security: State of the art and challenges. Proc. IEEE 2019, 107, 1608–1631. [Google Scholar] [CrossRef]
- Jiang, D. The construction of smart city information system based on the Internet of Things and cloud computing. Comput. Commun. 2020, 150, 158–166. [Google Scholar] [CrossRef]
- Nichols, K. Trust schemas and icn: Key to secure home iot. In Proceedings of the 8th ACM Conference on Information-Centric Networking, Online. 22–24 September 2021; pp. 95–106. [Google Scholar]
- Yugha, R.; Chithra, S. A survey on technologies and security protocols: Reference for future generation IoT. J. Netw. Comput. Appl. 2020, 169, 102763. [Google Scholar] [CrossRef]
- Shi, W.; Cao, J.; Zhang, Q.; Li, Y.; Xu, L. Edge computing: Vision and challenges. IEEE Internet Things J. 2016, 3, 637–646. [Google Scholar] [CrossRef]
- Wang, Y.; Yu, J.; Yan, B.; Wang, G.; Shan, Z. BSV-PAGS: Blockchain-based special vehicles priority access guarantee scheme. Comput. Commun. 2020, 161, 28–40. [Google Scholar] [CrossRef]
- Esposito, C.; Ficco, M.; Gupta, B.B. Blockchain-based authentication and authorization for smart city applications. Inf. Process. Manag. 2021, 58, 102468. [Google Scholar] [CrossRef]
- Huang, H.; Zhu, P.; Xiao, F.; Sun, X.; Huang, Q. A blockchain-based scheme for privacy-preserving and secure sharing of medical data. Comput. Secur. 2020, 99, 102010. [Google Scholar] [CrossRef] [PubMed]
- Torky, M.; Hassanein, A.E. Integrating blockchain and the internet of things in precision agriculture: Analysis, opportunities, and challenges. Comput. Electron. Agric. 2020, 178, 105476. [Google Scholar] [CrossRef]
- Dhumwad, S.; Sukhadeve, M.; Naik, C.; Manjunath, K.; Prabhu, S. A peer to peer money transfer using SHA256 and Merkle tree. In Proceedings of the 2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM), Bangalore, India, 8–10 September 2017; pp. 40–43. [Google Scholar]
- Sayeed, S.; Marco-Gisbert, H. Assessing blockchain consensus and security mechanisms against the 51% attack. Appl. Sci. 2019, 9, 1788. [Google Scholar] [CrossRef] [Green Version]
- Xiao, Y.; Zhang, N.; Lou, W.; Hou, Y.T. A survey of distributed consensus protocols for blockchain networks. IEEE Commun. Surv. Tutor. 2020, 22, 1432–1465. [Google Scholar] [CrossRef] [Green Version]
- Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev. 2008, 2008, 21260. [Google Scholar]
- King, S.; Nadal, S. Ppcoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake. 2012, Volume 19. Available online: https://www.semanticscholar.org/paper/PPCoin%3A-Peer-to-Peer-Crypto-Currency-with-King-Nadal/0db38d32069f3341d34c35085dc009a85ba13c13 (accessed on 1 April 2022).
- Larimer, D. Delegated Proof-of-Stake (Dpos). Bitshare Whitepaper. 2014, Volume 81, p. 85. Available online: https://www.geeksforgeeks.org/delegated-proof-of-stake/ (accessed on 1 April 2022).
- Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance, 1999. In Proceedings of the Third Symposium on Operating Systems Design and Implementation, New Orleans, LA, USA, 22–25 February 2020. [Google Scholar]
- Zheng, X.; Cai, Z. Privacy-preserved data sharing towards multiple parties in industrial IoTs. IEEE J. Sel. Areas Commun. 2020, 38, 968–979. [Google Scholar] [CrossRef]
- Lu, Y.; Huang, X.; Zhang, K.; Maharjan, S.; Zhang, Y. Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles. IEEE Trans. Veh. Technol. 2020, 69, 4298–4311. [Google Scholar] [CrossRef]
- Liu, L.; Feng, J.; Pei, Q.; Chen, C.; Ming, Y.; Shang, B.; Dong, M. Blockchain-enabled secure data sharing scheme in mobile-edge computing: An asynchronous advantage actor–critic learning approach. IEEE Internet Things J. 2020, 8, 2342–2353. [Google Scholar] [CrossRef]
- Zhang, W.; Ge, Y. Improvement of DPoS consensus based on block chain. In Proceedings of the 2019 4th International Conference on Intelligent Information Processing, Hong Kong, China, 16–17 November 2019; pp. 352–355. [Google Scholar]
- Luo, Y.; Chen, Y.; Chen, Q.; Liang, Q. A new election algorithm for DPos consensus mechanism in blockchain. In Proceedings of the 2018 7th International Conference on Digital Home (ICDH), Guilin, China, 30 November–1 December 2018; pp. 116–120. [Google Scholar]
- Tan, C.; Xiong, L. DPoSB: Delegated Proof of Stake with node’s behavior and Borda Count. In Proceedings of the 2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC), Chongqing, China, 12–14 June 2020; pp. 1429–1434. [Google Scholar]
- Ren, Y.; Liu, Y.; Ji, S.; Sangaiah, A.K.; Wang, J. Incentive mechanism of data storage based on blockchain for wireless sensor networks. Mob. Inf. Syst. 2018, 2018, 6874158. [Google Scholar] [CrossRef] [Green Version]
- Kang, J.; Xiong, Z.; Niyato, D.; Xie, S.; Zhang, J. Incentive mechanism for reliable federated learning: A joint optimization approach to combining reputation and contract theory. IEEE Internet Things J. 2019, 6, 10700–10714. [Google Scholar] [CrossRef]
- Zhan, Y.; Li, P.; Qu, Z.; Zeng, D.; Guo, S. A learning-based incentive mechanism for federated learning. IEEE Internet Things J. 2020, 7, 6360–6368. [Google Scholar] [CrossRef]
- Chang, Z.; Guo, W.; Guo, X.; Zhou, Z.; Ristaniemi, T. Incentive mechanism for edge-computing-based blockchain. IEEE Trans. Ind. Inform. 2020, 16, 7105–7114. [Google Scholar] [CrossRef]
- Tezuka, S. Linear congruential generators. In Uniform Random Numbers; Springer: Boston, MA, USA, 1995; pp. 57–82. [Google Scholar]
- Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Gener. Comput. Syst. 2019, 100, 779–796. [Google Scholar] [CrossRef] [Green Version]
Value of Behavior | Voting Node | Agent Node |
---|---|---|
1 | Voting active | Generate blocks and upload them to the blockchain |
2 | Voting inactivity | Block not generated on time |
0 | Vote invalid | Generate invalid blocks |
Trusted Status | Reputation Value (R) | Weight of the R () | Weight of the Number of Votes () |
---|---|---|---|
Good | [a, 1] 1 | [0.3, 0.5) | (0.5, 0.7] |
Normal | [0.5, a) | 0.5 | 0.5 |
Abnormal | [b, 0.5) 2 | (0.5, 0.7] | [0.3, 0.5) |
Error | 0 | 0 |
Account | Edge Node | Reputation Value | Node Statu | Number of Vote |
---|---|---|---|---|
A | 0.5 | Normal | 13 | |
B | 0.5 | Normal | 4 | |
C | 0.5 | Normal | 22 | |
D | 0.5 | Normal | 21 | |
E | 0.5 | Normal | 23 | |
F | 0.5 | Normal | 0 | |
G | 0.5 | Normal | 3 | |
H | 0.5 | Normal | 0 | |
I | 0.5 | Normal | 6 | |
J | 0.5 | Normal | 2 | |
K | 0.5 | Normal | 0 | |
L | 0.5 | Normal | 6 | |
M | 0.5 | Normal | 0 | |
N | 0.5 | Normal | 4 | |
O | 0.5 | Normal | 0 |
Edge Nodes | Amount of Information Shared | |
---|---|---|
Incentive Mechanisms | No Incentive Mechanisms | |
A | 453 | 200 |
B | 502 | 321 |
C | 433 | 365 |
D | 625 | 432 |
E | 425 | 430 |
F | 335 | 332 |
G | 249 | 230 |
H | 587 | 438 |
I | 442 | 445 |
J | 443 | 246 |
K | 332 | 296 |
L | 629 | 516 |
M | 587 | 540 |
N | 368 | 352 |
O | 321 | 332 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, Y.; Che, T.; Zhao, X.; Zhou, T.; Zhang, K.; Hu, X. A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things. Sensors 2022, 22, 3426. https://doi.org/10.3390/s22093426
Wang Y, Che T, Zhao X, Zhou T, Zhang K, Hu X. A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things. Sensors. 2022; 22(9):3426. https://doi.org/10.3390/s22093426
Chicago/Turabian StyleWang, Yue, Tingyu Che, Xiaohu Zhao, Tao Zhou, Kai Zhang, and Xiaofei Hu. 2022. "A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things" Sensors 22, no. 9: 3426. https://doi.org/10.3390/s22093426
APA StyleWang, Y., Che, T., Zhao, X., Zhou, T., Zhang, K., & Hu, X. (2022). A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things. Sensors, 22(9), 3426. https://doi.org/10.3390/s22093426