You are currently viewing a new version of our website. To view the old version click .
Mathematics
  • Article
  • Open Access

28 September 2023

BIoTS-Path: Certification Transmission of Supply Chains Based on Blockchain–Internet of Things Architectures by Validating the Information Path

,
,
,
and
1
Departamento de Telemática, Universidad del Cauca, Popayán 190002, Cauca, Colombia
2
Department of Computer Science and Engineering, Universidad Carlos III de Madrid, 28911 Madrid, Spain
3
TelemaTics Research Group, Universidad Pedagógica y Tecnológica de Colombia, Tunja 150002, Boyacá, Colombia
*
Authors to whom correspondence should be addressed.

Abstract

A food traceability system (FTS) can record information about processes along a production chain to determine their safety and quality. Under the Internet of Things (IoT) concept, the communication technologies that support FTSs act as platforms for mass access to information with limited security. However, the integrity of the collected data is not immune to security attacks. This paper proposes a point-to-point information transmission path with no edges or access boundaries (no intermediaries) to transmit data with integrity. This route is possible thanks to the architectural articulation of a hardware device (sensor BIoTS) at the perception layer, with the Blockchain architecture at the application layer. This pairing makes an ecosystem with the ability to trace and certify in parallel the products, the supply chain processes, and the data recorded in it possible. The design of the security testing ecosystem is based on the theoretical and technical principles of cybersecurity. It is executed through mathematical models that define the probability of attacks’ success against the transmitted data’s integrity. The security tests performed allow for establishing that this BIoTS information transmission route is unlikely to suffer from transmission vulnerabilities and that it is not prone to security attacks against integrity. This work paves the way toward fully integrating Blockchain technology in dedicated IoT architectures.

1. Introduction

The IoT paradigm allows us to design ecosystems and devices under the concepts of orchestration, choreography, and ubiquity of sensor and actuator devices connected to the Internet and interoperate with each other to accomplish a task. These concepts make the IoT architecture (perception layer, transport layer, and application layer) conceived for lightweight systems capable of guaranteeing coverage and data management through devices with limited processing, storage, and security resources [1,2]. The hardware characteristics in the perception layer of the IoT architecture require specificity in size, interoperability, processing, power, position, and storage according to the technologies implemented and the application field.
Every day, more security issues are identified in IoT ecosystems deployed in application domains where data handling is sensitive. From an IoT architecture point of view, it is possible to manage system security at any layer. However, the most critical security issue is maintaining data integrity from the source (sensor) at the perception layer, through the transport layer, to the user at the application layer. This process is known as the information transmission path.
Generally, data integrity is lost or in doubt when the information passes through intermediary devices or managers at the transport layer of the IoT architecture. The most popular solution to security issues related to data integrity is currently implemented at the application layer through the authentication protocol. Usually, the IoT device is authenticated to authorize or prevent unauthorized participants in the network and guarantee the origin of the information, conferring certainty of the data by identifying the transmission source [3]. However, the more intermediary devices act between the information source (sensor) and the destination (application), the higher the risk of data corruptibility because they act as open access points to the data flow. Open access points in an IoT system are attributed to the incompatibility of architectures between the hardware firmware and the software that governs the IoT ecosystem.
The communication protocol defines the security of the system and the interoperability of the devices involved in many ways. For example, a sensor device housed in the perception layer has resources to acquire data and transmit them to a breaker device housed in the transport layer, which is responsible for collecting, managing, and sending the information to a superior entity accountable for storing and processing data before they are transmitted to the end-user [4]. For this reason, IoT systems design requires a high degree of technological compatibility and interoperability of devices. However, most devices do not have free access to the firmware and specific configurations needed to generate adaptability in security requirements, giving rise to one of the principal vulnerabilities of IoT architectures in terms of security.
Blockchain is the foundation technology for crypto-assets with capabilities extended to various fields, including IT security. Blockchain and IoT define a new paradigm from the point of view of IoT systems as secure, decentralized, and transparent communication systems [1]. A Blockchain–IoT system can manage information in a technologically controlled environment and allows for the massive deployment of incorruptible data securely and transparently. For the reasons above, Blockchain implementations to IoT systems have recently been proposed. However, applying this type of technology in IoT systems also requires implementing intermediary devices with specific processing capabilities (for processing cryptographic algorithms) and storage (due to the nature of the decentralized network). This alternative solves critical security problems in the transport and application layer of the IoT architecture by implementing architectural requirements (in devices) that fulfill the function of connection to the Blockchain. However, the advance that Blockchain represents concerning IoT security also reveals, due to the characteristics of the architecture (high processing and storage capacity), the impossibility of being implemented in the perception layer from the sensor where the data originate.
The contributions of this work can be summarized as follows: (i) the implementation of Blockchain technology in IoT systems from hardware development to achieve a marriage of architectures capable of avoiding intermediary devices and with the ability to operate across the perception, transport, and application layers of the IoT architecture, (ii) a proposal for the design of an information transmission path based on Blockchain–IoT, where the transmitted data are less prone to security attacks against integrity, (iii) the guarantee, in food traceability systems as in any other application field, of data traceability and certification in the collection and transmission of data.
This article is organized as follows: Section 1 introduces the research context of this paper. Section 2 presents the state-of-the-art review. Section 2.1 details the Blockchain–IoT ecosystem description and the Blockchain–IoT in food safety context. Section 3 presents the intrusion detection system (IDS) for the BIoTS network. Section 4 introduces the results of the security assessment ecosystem for the BIoTS network. Section 5 presents the conclusions.

3. Intrusion Detection System (IDS)

The BIoTS ecosystem is evaluated under theoretical criteria, standards, and concepts of the cybersecurity domain. The architecture where the system is deployed needs to be assessed. However, the control plane and some network infrastructure characteristics are involved.
In network, computer, and access security, the concept of AAA (access control, authentication, and auditing) protects data and systems from damage. These concepts support the principles of confidentiality, integrity, and availability in a network. Confidentiality ensures that data are not disclosed, integrity ensures that data remain intact and cannot be modified, and availability guarantees access to data if allowed.
The proposed BIoTS system guarantees access control with the policies of the software component of the configured Blockchain network. Additionally, access control is guaranteed from the VPN (virtual private network) created to deploy the system evaluation. User authentication is subject to the Blockchain network’s characteristics, with asymmetric cryptography, consensus, and cryptographic algorithms.

3.1. Features of BIoTS Network Based on IDS

Pros: Networks tapped by an IDS can be evaluated on multiple nodes, a single node, or on devices, subjecting them to data traffic overload. BIoTS network devices are mostly passive devices prone to direct attacks against network performance.
Cons: The IDS implemented in BIoTS may require additional network configurations depending on the service provider and the type of security it has by default. Sometimes these limitations may mean that traffic cannot be monitored or analyzed. For this reason, injected security attacks must be performed under this premise. It also cannot report on whether attack attempts succeed or fail. Therefore, network-based IDSs require some active, manual involvement by network administrators to assess the effects of reported attacks on encrypted networks.

3.2. Technical Considerations of the Security Assessment Ecosystem

The BIoTS network access control determines the testing and injection of security attacks necessary to evaluate the information transmission path proposed in this work, which passes through the three layers of the BIoTS architecture. The three possible network access types depend on the devices, resources, and deployment of technologies. There are three types: MAC (mandatory access control), DAC (discretionary access control), and RBAC (role-based access control). Based on transferability, discretionality, and controllability considerations, the BIoTS network is assumed to have DAC access control. The nature of the database distribution throughout the network, the delegation of access and participation permissions, and the operating system that governs the system allow it to be identified.
Figure 6 describes the technical and architectural configuration of the security testing ecosystem. As can be seen, in the application layer of the architecture, a private Blockchain network is deployed with three participating nodes (two computers and a BIoTS sensor) directed to an access point access node (upper right corner). In this network, the values proposed as a transaction by each node will be validated with the help of the network consensus algorithms. As this communication action suggests modifications or regulations in the network, they are described in layers in the image.
Figure 6. Technical disposition of BIoTS network.
Authentication in the BIoTS network has two characteristics. (I) In the WLAN network, only three devices are configured (two computers and the BIoTS device) through the IP address (Internet protocol). (II) The authentication is performed through the consensus algorithm and cryptography within the Blockchain network operation. In this way, the authentication in the BIoTS network is guaranteed and will also determine the type of intrusion detection system.
The goal of auditing is to restore the data integrity of a network or system. The audit is obtained thanks to the property of the Blockchain network to distribute the database throughout the network. In this log-in, we can track events, errors, authentication, and access attempts. The objective of obtaining this data type is to develop a path to define better security policies and rules that will allow for a subsequent judicial investigation to collect evidentiary material.
The main objective of this work is to certify processes and products in a production process (food traceability system) by evaluating the integrity of the data transported along the information transmission path within a Blockchain–IoT-based architecture. Thus, the characteristics of the BIoTS system promote, from every point of view, the digital validation of identity and the verification of created, distributed, or stored information. Access control and authentication in cryptography-based systems already guarantee much of the certification. However, implementing security protocols based on authentication or those that are part of the public key infrastructure (PKI), used as a plan or as a method for exchanging information authenticated and protecting such data, can ensure the integrity and transparency of data within a network. Therefore, we sought to immerse the BIoTS device and the designed network in a security intrusion testing system that contains a security attack injection mechanism to validate the proposed path.
The BIoTS ecosystem is configured over a WLAN network. This deployment of 802.11 wireless LAN nature is based on the wireless equivalent privacy (WEP) protocol and needs to be regulated for successful security attacks and evaluation. Although these protocols are useful in the normal operation of the network in terms of authentication, for this experiment, they can prevent vulnerabilities that we precisely want to evaluate with BIoTS.

3.3. Vulnerability Scanning

This system’s design involves tools to identify potential problems that could lead to a security breach. The method may have the ability to test the strength and compliance of password policies, measure the ability to access networks from an outside network, provide analysis of known security vulnerabilities in NOS or hardware devices, or test the responses of a system in various scenarios that could lead to a denial of service (DoS) or other problems such as system downtime.
This system allows us to evaluate the performance of the BIoTS device through network monitoring. In the case of this proposal, the scanning system will be provided with the following features:
  • Scanning of security vulnerabilities in an information transmission path.
  • Analysis of security vulnerabilities in hardware devices.
  • Evaluation of system responses to an attack scenario.

Security Attacks (Test Design—Data Integrity Attacks)

The design and injection of security attacks in the BIoTS network have several implicit challenges. Various methods for launching security attacks depend on the intended target (data integrity attacks). However, as we see below, authentication will also be considered a security attack target. There are three categories into which attack methods can be grouped:
  • By the general objective (integrity assessment) and particular objective of the attack (application layer, BIoTS network, or combination).
  • By the type of attack with harmful intrusion or observation and analysis (active or passive).
  • By the nature of the attack (corruption of passwords, cryptographic algorithms, hardware devices).
This categorization becomes complex given the nature of the BIoTS ecosystem since, in this case, we have an application and network-based architecture. Active attacks such as man-in-the-middle (MITM), cryptographic attacks, software exploitation, and mathematical attacks are used. In addition, other attacks, such as DDoS (distributed denial of service) and buffer overflow, directly affect the state of the data moving along an information transmission path. Therefore, they are combined and somewhat sophisticated attacks.
Man-in-the-middle and data modification are the security attacks that will be the focus of the BIoTS security assessment. The best example of this attack is known as SSHMITM. This attack acts against SSH security, intercepting information from the client and attempting to replicate the response from a fake server to the server where the application is hosted. This attack is identified and traced (vectorized and sample traces) and is the only one from which technical samples of network behavior are taken.
Figure 7 summarizes the security attacks’ logic, order, and configuration in the BIoTS ecosystem security assessment scenario. The left part of the figure represents the network layout in three zones (purple, red, and green): (I) the intrusion detection system (IDS) purple zone, with the center at the router from where it detaches the nodes and routes the information to the Blockchain hosted on the local server; (II) the red zone and dotted red line information transmission path (ITP), which is the zone that will be subject to monitoring and data acquisition concerning security attacks against the integrity of the data conducted over this channel; (III) the green zone, which is the demilitarized zone (DMZ) configured from the ISP (firewalls, firewalls, and active intrusion protection are eliminated). This zone is configured in a primitive way to make the exercise of concentrated security attacks possible. In the middle of the figure, we can observe the list of the security test flows from the native configuration of the Internet service in the upper part to the attack injection in the lower part (the penetration test is conducted from Kali Linux). Finally, on the right side of the figure, we find the sequence diagram for security procedures discriminated by stages and layers of the BIoTS architecture. In the vertical line that seeks data integrity, we see in the limits: UE: user equipment, eNB: evolved node B, MME: mobility management entity, and HSS: home subscriber server [47].
Figure 7. Graphical summary of the security evaluation on the BIoTS network.
This paper will not address the security issues of Blockchain technology because these are widely tested and analyzed. However, transmitted packets are analyzed to evaluate the potential for attacks such as brute force attacks in the BIoTS ecosystem. The tools also detect the potential risk in the Windows operating systems that govern the BIoTS network. Still, they need to be analyzed in depth because they do not influence the integrity of the data along the information transmission path proposed in this work.
It is considered a passive attack to capture information but not attack the integrity of the data. Sniffing and eavesdropping are also identified by scanning tools on transmission paths and access points to application and hardware devices.

3.4. Testing Ecosystem

The BIoTS network is based on wireless communication technology. For this reason, scanning vulnerabilities in the system and the injected security attacks will have typical orientations of the physical devices, the network configuration, the operating system that governs it, and the adaptability of the cybersecurity tools used in the test ecosystem.
Due to the nature of the Blockchain technology (based on cryptography) deployed in the BIoTS ecosystem, specific security attacks related to authentication and information transport, such as TCP/IP hijacking, replay attacks, spoofing, SYN attacks, or war dialing, are impossible. However, as the BIoTS network has been manipulated to unbundle security elements implemented by the Internet service provider, it has the configuration of an internal and transparent private primitive network. The Windows operating system will govern the network, and the monitoring deployment makes the ecosystem acquire variables of complexity and vulnerability in the access and connection points throughout the network. These elements will then determine the configurable elements of the test ecosystem. In this case, the tool (Kali Linux) will be used.
As stated above, the BIoTS network is WEP; therefore, the security attack must concentrate on access points, edges, or boundaries along the entire architecture. These access nodes are the sensor, the router, and the application.

3.5. Security Topologies

The local-network-configured BIoTS has a computer (laptop) of the network as its deployment center. This computer runs with the Windows operating system and hosts the Blockchain server. For this reason, it is necessary to configure the firewall deactivation at two network points: (I) in the computer from where the network and the server are deployed, and (II) in the router (AP) that provides the service. This configuration is software. However, the deactivation of the AP firewall is carried out from the external distribution point and has some hardware implications. The latter arrangement is requested from the service provider.
The classification of IDSs varies according to the activity: they can be traffic, supervisory, or transaction IDSs. Therefore, since we want to evaluate elements of network traffic, it is necessary to distinguish whether our IDS is network-based, host-based, or application-based. The IDS applied to BIoTS is network-based and application-based since we are interested in evaluating the integrity of data moving bidirectionally along a network path.
The reason why the IDS is a hybrid is that network and application IDSs have characteristics that make them complementary for this evaluation. Some of these characteristics will be described below.

4. Results

Wireless networks have wide vulnerabilities due to the nature of transmission since there is no restriction on the coverage space, and scanning is easy for external agents. Technically and scientifically, extensive vulnerabilities have been discovered in WAP and WEP-type networks. They will not be described here, nor will the attacks be so oriented, given the complexity of the analysis. However, we will concentrate on the most common attack that jeopardizes the integrity of transmitted data.
In the case of our experiment, we can simulate a rogue access point in the range line of the wireless network. This access will allow us to reach the edge of the BIoTS device and the application layer with the MITM attack. This type of intrusion is effective for the experiment in question. This way, we will test the vulnerability to this attack more specifically since the BIoTS network will always be deployed in wireless networks.

4.1. MITM Attacks on Wireless Networks

Spoofing is a security challenge in wireless networks. The user can be spoofed if the hacker obtains the network node’s MAC address and IP address information. While the data can be copied, by the nature of the BIoTS network, it can resist this type of attack. However, it will be checked with basic tests.
Hackers in wireless network APs such as hubs and routers often use sniffing and eavesdropping. Although in encrypted communication, it is unlikely to alter the data (integrity), it is possible to monitor the network activity and obtain the information and decode it by brute force processing (in this case, it is straightforward given the size of the network (three nodes)).
The injection of MITM attacks to BIoTS describes the behavior of the network in the face of the imminent hijacking and modification of information. As network and security administrators, we are able to identify the intent and attack or legitimacy of the traffic.
We also act as network hijackers with the use of the Kali Linux tool from which we will be able to view and interfere with physical network devices. The intervention of TCP/IP packets passing through the routers or AP provides us with the local addresses and, with them, the transported information. It is important that the source and destination are tracked in the anomaly analysis.
The source and destination table of information packets record the local MACs of the device and become dynamic depending on the information flow and network variation. In our case, BIoTS participation is constant; therefore, the table becomes static and easier to read to identify attacks. As these attack tests do not provide vectors or data sequence traces, these BIoTS network security tests will only have statistical probability evaluation by mathematical analysis.
Data integrity can also be attacked by the application deployed on the web; in the case of the BIoTS system, this aspect will not be evaluated, and probability tests will not be considered since server security is beyond the scope of this work.
From the point of view of the (physical) devices dedicated to security in the BIoTS network and due to the network’s typology, only the router (firewall) configuration will be considered to deploy the security tests.

4.2. IDS Features Based on Applications

Pros: This application-based IDS focuses on scanning nodes, edges, or borders within an architecture where a specific application runs. The BIoTS information transmission path carries data that are subject to intrusion theft or modification. The IDS designed for BIoTS can track unauthorized activity and work with encrypted data, as is the case with the SHA-256 algorithm.
Cons: Sometimes, application-based IDs are more vulnerable than host-based IDs given the physical access points available.
As the IDS implemented in the BIoTS ecosystem has an integrity assessment approach on a specific network path, signature detection was implemented, consisting of a database that stores data characteristics, patterns, and/or activity related to known attacks. This database serves as a reference to compare and assimilate the data recorded in the current flow. This process is known as signature detection and we use it to identify MITMs in the information transmission path in the BIoTS ecosystem. The rules designed for comparison are what make it possible for certain traffic to be marked as normal or abnormal and to be counted in the statistics.
The IDS in BIoTS is configured to monitor access points, hostile activity, and known intruders. Typically, these systems are triggered by comparing network activity against a database of attack signatures. An alert is raised and logged for future reference if a match occurs.
The most important characteristic of signatures and with which we identify attacks is the profile that is generated when the data are marked as malicious, defective, or intrusive. These characteristics are usually emulated to facilitate entry into the information channel. However, in the BIoTS network, the IDS will emulate intrusion attempts as realistically and maliciously as possible. Most of the signatures created in the BIoTS IDS were built by running an exploit emulating the real and clean network traffic several times. In this way, we were able to effectively inject attacks for the purpose of data integrity assessment within the data transmission path.
Configuring network devices (such as BIoTS, laptops, and routers) with the modified installation configuration for BIoTS leaves the system critically vulnerable. Ideally, it would be best to test and secure the configurations before activating the devices on the network. However, the basic arrangements of the physical devices do not allow this. They are set for convenience and not for control and security (two computers with Windows OS and the BIoTS sensor). A simple configuration is made from the Windows device that deploys the Blockchain only with default settings, but to the detriment of security. In our case, it will open the door to an attack against integrity on a specific path.

4.3. Technical Characterization of the BIoTS Network for an Integrity Attack

Data transport in the BIoTS network is performed using cryptographic encryption executed by the SHA-256 algorithm. This Blockchain power for the encryption of the transmitted data prevents intrusion in the transport. A cryptographic and consensus algorithm in a Blockchain network is a set of instructions to prevent tampering and ensure security in the data domain. For this reason, the encryption and decryption of this information will influence the results of both the success of the attack and the evaluation of the attacked route.
In the case of the BIoTS network, the algorithms impose an additional challenge in the nature of the security attack and its detection. The blocks generated by the transactions cannot discriminate if the data have been corrupted; for this reason, this work projects a contribution in that aspect of limit or edge of the application.
Cryptography and consensus using Blockchain is a way to guarantee integrity. The asymmetry in encryption and decryption and the use of public and private keys make our experiment an opportunity for validation through digital signatures based on security analysis of attacks against data integrity in a Blockchain network. The MITM attack in the BIoTS ecosystem reassigns importance to the edges or borders of an ecosystem based on these technologies.
It may be that some asymmetric algorithms such as SHA-256 are immune to MITM attacks. However, when a third party intercepts the data and the route in general, if carried out with the appropriate technique, it will be entering through the weakest link in the communication lines between the participating nodes, and from there to the application layer.
Asymmetric cryptography can authenticate a sender by their private key, assuming it is kept confidential. Since each person is responsible for their private key, only they can decrypt messages encrypted with their public key. Similarly, only those persons can sign with their private key messages validated with their public key. Thus, in addition to the MITM attack to which the BIoTS system is prone, there is also an authentication attack. BIoTS is then prone to man-in-the-middle attacks on information transport and user or distributed network participant authentication.

4.4. Security Metrics Calculation

Next, we describe the security assessment model in terms of the probability of occurrence in the BIoTS network, the subnetwork (nodes: laptops and sensors), and the vulnerabilities described in the previous section. The BIoTS network indicators are (i) a subnetwork S (sensor and laptops), (ii) a set of IoT nodes N (three; specifically, two laptops and one BIoTS sensor), and (iii) a set of vulnerabilities V. In notation, we determine a subnetwork as s S , a node as n N , and a vulnerability as v V . The goal of the penetration test is to find one or more attack routes to tap the network through one or more entry points. Therefore, we consider a set of all AP attack paths to achieve data integrity corruption. The information transmission path a p A P has three access or edge nodes where the attacks are printed. The nodes, depending on their location in the ecosystem, have various vulnerabilities calculated here. The definition of the mathematical notation used is described in Table 5.
Table 5. Notations and definitions of security metrics.
The attributes of the BIoTS network are B I o T S = ( S , N , V ) . Each subnetwork s S has a name S n a m e and a set of BIoTS network nodes S n o d e N . Each node n N has a name N n a m e , a type N T y p e { s e n s o r , p c } , an information mobility N m o b i l i t y { s t a t i c , m o b i l e } , a set of vulnerabilities N v u l n V , and a set of security metrics N m e t r i c s { a s p n , a c n , a i m n } . Each vulnerability v V has a name V n a m e and a set of security metrics V m e t r i c s { a s p v , a c v , c r v } .
Probability of attack success: the attack success probability measures the probability of an attacker achieving the attack target. At the nodes, the metric shows the probability of success of the attack on a node. First, the probability of success of the attack on the BIoTS sensor node and the laptop nodes immersed in the BIoTs network is calculated using Equation (1). Then, we calculate the attack success probability at a node n N by Equation (2). And finally, at the path level, the metric is the probability of an attack compromising the channel through the attack path and is calculated by Equation (3). For terminology and logical assignment reasons, an AND relationship is established for selecting nodes to attack and evaluate (see Figure 8).
a s p n = a c ( n ) a s p n , a A 1 a c ( n ) ( 1 a s p n ) , a N = > V ( n ) = A N D
a s p n = a s p r o o t
a s p n = n a p a s p n , a p A P
Attack impact: The damage caused by an attack on a node generates the impact values of the attack on that node. They are recorded in the attack list, and each node n N in the network is calculated using Equations (4) and (5). In the network paths (Una), the measure is the damage caused and the successful intrusion to compromise the BIoTS device through the information transmission path. The value of the impact of the attack on the attack path (BIoTS) is calculated by Equation (6). At the network level, the measure is the maximum loss caused by an attack to compromise the BIoTS device among the three possible paths. The AIM value at the network level is given by Equation (7).
a i m n = a c ( n ) a i m n , a A m a x a p A P a i m a p , a N = > V ( n ) = A N D
a i m n = a i m r o o t
a i m a p = n a p a i m n , a p A P
A I M = m a x a p A P a i m a p
Figure 8. The attack path and node in the wireless sensor network (BIoTS).

4.5. A MITM Attack in a BIoTS Network

The attack against BIoTS is directed at all three network paths, with a specific concentration on the BIoTS sensor path. Once the connection node of this sensor is identified, we make the attack compromise the consensus algorithm of the Blockchain network according to MITM attacks [48].
The attacker can remotely compromise the BIoTS network to tap information that is transmitted over the information transmission path. Several papers in the literature address remote attacks of this type [38,42,49,50]. According to the practical proofs of concept in the articles, attackers remotely tap information transmitted in a distant wireless network. Subsequently, they can use it as full access to exploit network vulnerabilities as shown in Figure 8.
Based on the vulnerabilities described in Section 4.4, we make assumptions about the metric values of the vulnerabilities in the BIoTS network and show the values in Table 6. The table presents the vulnerabilities in the network’s three nodes and displays the metrics assignment for attack success probability and impact. The compromise rate indicates how often the vulnerability can be successfully exploited. As node 2 (n2) contains the BIoTS sensor, this information transmission path is the target of the attack and monitoring ( v u l n n 2 ).
Table 6. Metric values for vulnerability.
It is necessary to identify the attack paths and decide which devices—in this case, the BIoTS sensor—are included in the MITM attack. Risks are measured according to the evaluation of IDS metrics and algorithms.
We estimate the vulnerability information of node 2, where the BIoTS sensor is located. We reconstruct the IoT network using the IoT generator to calculate the metric values after injecting the MITM attack. The results of the security vulnerability analysis calculations are shown in Table 6.
In Algorithm 1, we use the reliability graph model in the SHARPE (Symbolic Hierarchical Automated Reliability and Performance Evaluator (Version 2001-MS-DOS PROMPT for WINDOWS and LINUX.)) software package [51] to calculate the probability that there is or is not a vulnerability in the information transmission path from the attacker (Kali-pen-testing tool) to the target (sensor BIoTS). After the execution of the network model, we run one minus that probability to calculate ASP with Equation (3).
Algorithm 1: Calculation of ASP
  • Data: AP ← and a s p n (n ∈ ap)               ▹ Define variable to answer
  • Result: ASP
  • H { n n a p f o r s o m e a p A P }
  • Construct a direct graph with node set H
  • for each attack path (n1, … , n3) ∈ AP do
  •     for each i { 2 , . . . , n }  do
  •         include edge ( n i 1 , n i ) with value 1 a s p n in graph
  •     end for
  • end for
  • ASP ← Calculate Probability(graph)
a s p v = a s p r o o t v = 1 ( 1 a s p v n 1 ) ( 1 a s p v n 2 ) ( 1 a s p v n 3 ) = 1 ( 1 0.45 ) ( 1 0.3 ) ( 1 0.8 ) = 0.215 a s p a p = a s p v n = 0.215
At the node level, the metric values show that the BIoTS node attack has a lower probability of success, and lower cost, but a lower impact than attacking another node. Therefore, the attacker is likelier to choose computer nodes as an entry point. However, these nodes must be protected to prevent the attacker from entering the network. For defense, a s p v decreases (see Equation (8)), which means that encryption and a direct channel with no intermediary strategies effectively reduce the probability of attack success and extend the mean time to compromise. At the same time, a i m a p does not change since the impact values of nodes 1 and 2 are the same (see Equation (9)).
a i m n = a i m r o o t v = m a x ( a i m r o o t n 1 , a i m r o o t n 2 , a i m r o o t n 3 ) = m a x ( 10.0 , 10.0 , 2.0 ) = 22.0 a i m a p = a i m n = 10.0
For a s p N (see Equation (10)), since tapping node 3 (n3) requires a lower cost than tapping node 2 (n2), deploying defense is more costly for the attacker. For a s p a p (see Table 7), since tapping node 3 (n3) has a higher probability of success than tapping node 2 (n2), deploying defense decreases the likelihood of success of the attack. In our case, we do not deploy any network defense strategy as it causes a lower probability of attack success and a higher cost for the attacker. Since each sensor has only one vulnerability, we calculate a s p a p using Equation (2). We also estimate a s p n 1 and a s p n 2 using Equation (3). ASP2 is calculated using Algorithm 1, where the SHARPE result is 0.11 and 0.70 (see Table 7 and Table 8).
a s p N = a s p r o o t n 2 = 0.3 a s p a p 1 = a s p v n 1 a s p v n 2 a s p v n 3 = ( 0.45 ) ( 0.3 ) ( 0.8 ) = 0.215 a s p a p = a s p v n = 0.108 a s p a p 2 = a s p v n 1 a s p v n 2 a s p a p 2 = ( 0.3 ) ( 0.8 ) = 0.24
Table 7. Security analysis of the attack path.
Table 8. Security analysis of the network.
A I M 2 does not change since the metric values do not change after the attack. Thus, we can observe that without protecting the BIoTS sensor node, it is more effective than safeguarding any of the other two nodes (see Equation (11)).
a i m V n = a i m r o o t v n = 10.0 a i m a p 1 = ( a i m N 1 + ( a i m N 2 + ( a i m N 3 ) a i m a p 1 = ( 10.0 + 10.0 + 2.0 ) = 22.0 a i m a p 2 = ( 10.0 + 10.0 ) = 20.0 A I M 2 = m a x ( a i m a p 1 , a i m a p 2 ) = m a x ( 22.0 , 20.0 ) = 22.0

5. Conclusions

Designing the BIoTS network and assessing the security of an information transmission path have implicit challenges regarding technical configuration and algorithmic and architectural logic. For this reason, modeling security to calculate the probability of success of computer security attacks, such as MITM in networks and systems based on IoT–Blockchain, is critical in application fields such as food traceability. This evaluation allows for certifying data obtained from the sensing layer, through the transport layer, and up to the application layer in the IoT architecture.
This article presents the architectural configuration of the BIoTS (sensor and system) evaluation ecosystem to characterize heterogeneous devices facing security threats: (i) the information collected from the BIoTS network behavior is processed, (ii) an IDS (intrusion detection system) is configured and deployed, (iii) a network security analysis and visualization is performed, and (iv) a mathematical modeling of the vulnerability of an information transmission path in the network is performed.
From the analysis results, the information transport route proposed by the BIoTS sensor effectively safeguards the integrity of the data transmitted over the channel. The information transmission path of the BIoTS device is less prone to data integrity security attacks (MITM) than other devices in the network.
The implemented concept of the BIoTS ecosystem, which acts as a dedicated device with specific hybrid architectural features of Blockchain and IoT technologies, has the proven guarantee to work for any field in which the use of data is a critical issue. For this reason, interesting future work is to deploy a network of nodes with BIoTS devices and generate the validation of data suitable for certification from any node or stakeholder involved in the application field disseminated by stages or processes.
A cybersecurity-assessed architecture that enables point-to-point data certification in an information transmission path requires less logistical and technical effort to deploy than an independent Blockchain and IoT network design but is adapted to work together. For this reason, it is concluded that adapting architectures is practical and mitigates implementation and development difficulties.

Author Contributions

C.A.G.-A., A.F.V., G.A.R.-G. and J.C.C.M. proposed the concept of this research. M.A.M.-M. and A.F.V. contributed to the state of art and final paper draft revisions. C.A.G.-A., G.A.R.-G., J.C.C.M. and A.F.V. wrote the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This research is funded by Colciencias Doctoral scholarship 779-2017 for the Ph.D. in Telematic Engineering at the Universidad del Cauca, Popayán, Colombia and by the Universidad del Cauca (501100005682). and for “Incremento de la oferta de prototipos tecnológicos en estado pre-comercial derivados de resultados de I + D para el fortalecimiento del sector agropecuario en el departamento del Cauca” funding by SGR (BPIN 2020000100098).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
IDSIntrusion Detection System
ITPInformation Transmission Path
DMZDemilitarized Zone
BIoTSBlockchain–IoT-Sensor
CoAPConstrained Application Protocol
AAAAccess Control, Authentication, and Auditing
CIAConfidentiality, Integrity, and Availability
VPNVirtual Private Network
MACMandatory Access Control
DACDiscretionary Access Control
PKIPublic Key Infrastructure
DoSDenial of Service
MITMMan-in-the-Middle
PKIPublic Key Infrastructure

References

  1. Feng, H.; Wang, X.; Duan, Y.; Zhang, J.; Zhang, X. Applying blockchain technology to improve agri-food traceability: A review of development methods, benefits and challenges. J. Clean. Prod. 2020, 260, 121031. [Google Scholar] [CrossRef]
  2. Demestichas, K.; Peppes, N.; Alexakis, T.; Adamopoulou, E. Blockchain in Agriculture Traceability Systems: A Review. Appl. Sci. 2020, 10, 4113. [Google Scholar] [CrossRef]
  3. Alzahrani, N.; Bulusu, N. Block-Supply Chain: A New Anti-Counterfeiting Supply Chain Using NFC and Blockchain. In Proceedings of the CryBlock’18: 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, New York, NY, USA, 10–15 June 2018; pp. 30–35. [Google Scholar] [CrossRef]
  4. Lin, Q.; Wang, H.; Pei, X.; Wang, J. Food Safety Traceability System Based on Blockchain and EPCIS. IEEE Access 2019, 7, 20698–20707. [Google Scholar] [CrossRef]
  5. Ruiz-Rosero, J.; Ramirez-Gonzalez, G.; Viveros-Delgado, J. Software survey: ScientoPy, a scientometric tool for topics trend analysis in scientific publications. Scientometrics 2019, 121, 1165–1188. [Google Scholar] [CrossRef]
  6. Cheung, K.F.; Bell, M.G.H.; Bhattacharjya, J. Cybersecurity in logistics and supply chain management: An overview and future research directions. Transp. Res. Part E-Logist. Transp. Rev. 2021, 146, 102217. [Google Scholar] [CrossRef]
  7. Chanson, M.; Bogner, A.; Bilgeri, D.; Fleisch, E.; Wortmann, F. Blockchain for the IoT: Privacy-Preserving Protection of Sensor Data. J. Assoc. Inf. Syst. 2019. [Google Scholar] [CrossRef]
  8. Vangala, A.; Das, A.K.; Chamola, V.; Korotaev, V.; Rodrigues, J.J.P.C. Security in IoT-enabled smart agriculture: Architecture, security solutions and challenges. Clust. Comput.-J. Netw. Softw. Tools Appl. 2023, 26, 879–902. [Google Scholar] [CrossRef]
  9. Kaur, A.; Singh, G.; Kukreja, V.; Sharma, S.; Singh, S.; Yoon, B. Adaptation of IoT with Blockchain in Food Supply Chain Management: An Analysis-Based Review in Development, Benefits and Potential Applications. Sensors 2022, 22, 8174. [Google Scholar] [CrossRef]
  10. Al-Rakhami, M.S.; Al-Mashari, M. A Blockchain-Based Trust Model for the Internet of Things Supply Chain Management. Sensors 2021, 21, 1759. [Google Scholar] [CrossRef]
  11. Pérez, D.; Rivera, M.; Fuentes-Peñailillo, F.; Díaz, A.; Pérez, R.; Villar, J. Traceability System for an Agricultural Supply Network based on Blockchain. In Proceedings of the 2022 IEEE International Conference on Automation/XXV Congress of the Chilean Association of Automatic Control (ICA-ACCA), Curico, Chile, 24–28 October 2022; pp. 1–6. [Google Scholar] [CrossRef]
  12. Shahzad, A.; Zhang, K. An Integrated IoT-Blockchain Implementation for End-to-End Supply Chain. In Proceedings of the Proceedings of the Future Technologies Conference (FTC) 2020, Vancouver, BC, Canada, 5–6 November 2020; Arai, K., Kapoor, S., Bhatia, R., Eds.; Springer: Cham, Switzerland, 2021; Volume 2, pp. 987–997. [Google Scholar]
  13. Pranto, T.H.; Noman, A.A.; Mahmud, A.; Haque, A.B. Blockchain and smart contract for IoT enabled smart agriculture. PeerJ Comput. Sci. 2021, 7, e407. [Google Scholar] [CrossRef]
  14. Ahmed, M.; Taconet, C.; Ould, M.; Chabridon, S.; Bouzeghoub, A. IoT Data Qualification for a Logistic Chain Traceability Smart Contract. Sensors 2021, 21, 2239. [Google Scholar] [CrossRef] [PubMed]
  15. Sunny, J.; Undralla, N.; Pillai, V.M. Supply chain transparency through blockchain-based traceability: An overview with demonstration. Comput. Ind. Eng. 2020, 150, 106895. [Google Scholar] [CrossRef]
  16. Rahman, M.S.; Khalil, I.; Moustafa, N.; Kalapaaking, A.P.; Bouras, A. A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems. IEEE Trans. Ind. Inform. 2022, 18, 5007–5017. [Google Scholar] [CrossRef]
  17. Sun, Z.H.; Chen, Z.; Cao, S.; Ming, X. Potential Requirements and Opportunities of Blockchain-Based Industrial IoT in Supply Chain: A Survey. IEEE Trans. Comput. Soc. Syst. 2022, 9, 1469–1483. [Google Scholar] [CrossRef]
  18. Mishra, R.A.; Kalla, A.; Braeken, A.; Liyanage, M. Blockchain Regulated Verifiable and Automatic Key Refreshment Mechanism for IoT. IEEE Access 2023, 11, 21758–21770. [Google Scholar] [CrossRef]
  19. Madhwal, Y.; Borbon-Galvez, Y.; Etemadi, N.; Yanovich, Y.; Creazza, A. Proof of Delivery Smart Contract for Performance Measurements. IEEE Access 2022, 10, 69147–69159. [Google Scholar] [CrossRef]
  20. Raza, Z.; Ul Haq, I.; Muneeb, M. Agri-4-All: A Framework for Blockchain Based Agricultural Food Supply Chains in the Era of Fourth Industrial Revolution. IEEE Access 2023, 11, 29851–29867. [Google Scholar] [CrossRef]
  21. Gonzalez-Amarillo, C.; Cardenas-Garcia, C.; Mendoza-Moreno, M.; Ramirez-Gonzalez, G.; Corrales, J.C. Blockchain-IoT Sensor (BIoTS): A Solution to IoT-Ecosystems Security Issues. Sensors 2021, 21, 4388. [Google Scholar] [CrossRef]
  22. Hong, W.; Cai, Y.; Yu, Z.; Yu, X. An Agri-product Traceability System Based on IoT and Blockchain Technology. In Proceedings of the 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), Shenzhen, China, 15–17 August 2018; pp. 254–255. [Google Scholar] [CrossRef]
  23. Huh, S.; Cho, S.; Kim, S. Managing IoT devices using blockchain platform. In Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Republic of Korea, 9–22 February 2017; pp. 464–467. [Google Scholar] [CrossRef]
  24. Jemal, J.; Kornegay, K.T. Security Assessment of Blockchains in Heterogenous IoT Networks: Invited Presentation. In Proceedings of the 2019 53rd Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA, 20–22 March 2019; pp. 1–4. [Google Scholar] [CrossRef]
  25. Bhutta, M.N.M.; Ahmad, M. Secure Identification, Traceability and Real-Time Tracking of Agricultural Food Supply During Transportation Using Internet of Things. IEEE Access 2021, 9, 65660–65675. [Google Scholar] [CrossRef]
  26. Guo, J.; Cengiz, K.; Tomar, R. An IOT and Blockchain Approach for Food Traceability System in Agriculture. Scalable Comput. Pract. Exp. 2021, 22, 127–137. [Google Scholar] [CrossRef]
  27. Grecuccio, J.; Giusto, E.; Fiori, F.; Rebaudengo, M. Combining Blockchain and IoT: Food-Chain Traceability and Beyond. Energies 2020, 13, 3820. [Google Scholar] [CrossRef]
  28. Bumblauskas, D.; Mann, A.; Dugan, B.; Rittmer, J. A blockchain use case in food distribution: Do you know where your food has been? Int. J. Inf. Manag. 2020, 52, 102008. [Google Scholar] [CrossRef]
  29. Lee, M.J.; Luo, J.T.; Shao, J.J.; Huang, N.F. A Trustworthy Food Resume Traceability System Based on Blockchain Technology. In Proceedings of the 2021 International Conference on Information Networking (ICOIN), Jeju Island, Republic of Korea, 13–16 January 2021; pp. 546–552. [Google Scholar] [CrossRef]
  30. Tsang, Y.P.; Choy, K.L.; Wu, C.H.; Ho, G.T.S.; Lam, H.Y. Blockchain-Driven IoT for Food Traceability With an Integrated Consensus Mechanism. IEEE Access 2019, 7, 129000–129017. [Google Scholar] [CrossRef]
  31. Haji, M.; Kerbache, L.; Muhammad, M.; Al-Ansari, T. Roles of Technology in Improving Perishable Food Supply Chains. Logistics 2020, 4, 33. [Google Scholar] [CrossRef]
  32. Lin, W.; Huang, X.; Fang, H.; Wang, V.; Hua, Y.; Wang, J.; Yin, H.; Yi, D.; Yau, L. Blockchain Technology in Current Agricultural Systems: From Techniques to Applications. IEEE Access 2020, 8, 143920–143937. [Google Scholar] [CrossRef]
  33. Astill, J.; Dara, R.A.; Campbell, M.; Farber, J.M.; Fraser, E.D.; Sharif, S.; Yada, R.Y. Transparency in food supply chains: A review of enabling technology solutions. Trends Food Sci. Technol. 2019, 91, 240–247. [Google Scholar] [CrossRef]
  34. Baralla, G.; Pinna, A.; Tonelli, R.; Marchesi, M.; Ibba, S. Ensuring transparency and traceability of food local products: A blockchain application to a Smart Tourism Region. Concurr. Comput. Pract. Exp. 2021, 33, e5857. [Google Scholar] [CrossRef]
  35. Iftekhar, A.; Cui, X. Blockchain-Based Traceability System That Ensures Food Safety Measures to Protect Consumer Safety and COVID-19 Free Supply Chains. Foods 2021, 10, 1289. [Google Scholar] [CrossRef]
  36. Tagarakis, A.C.; Benos, L.; Kateris, D.; Tsotsolas, N.; Bochtis, D. Bridging the Gaps in Traceability Systems for Fresh Produce Supply Chains: Overview and Development of an Integrated IoT-Based System. Appl. Sci. 2021, 11, 7596. [Google Scholar] [CrossRef]
  37. Amentae, T.K.; Gebresenbet, G. Digitalization and Future Agro-Food Supply Chain Management: A Literature-Based Implications. Sustainability 2021, 13, 12181. [Google Scholar] [CrossRef]
  38. Bayramova, A.; Edwards, D.J.; Roberts, C. The Role of Blockchain Technology in Augmenting Supply Chain Resilience to Cybercrime. Buildings 2021, 11, 283. [Google Scholar] [CrossRef]
  39. Balamurugan, S.; Ayyasamy, A.; Joseph, K.S. IoT-Blockchain driven traceability techniques for improved safety measures in food supply chain. Int. J. Inf. Technol. 2021, 14, 1087–1098. [Google Scholar] [CrossRef]
  40. Patra, S.S.; Misra, C.; Singh, K.N.; Gourisaria, M.K.; Choudhury, S.; Sahu, S. qIoTAgriChain: IoT Blockchain Traceability Using Queueing Model in Smart Agriculture. In Blockchain Applications in IoT Ecosystem; Springer: Berlin/Heidelberg, Germany, 2021; pp. 203–223. [Google Scholar]
  41. Jing, Q.; Vasilakos, A.V.; Wan, J.; Lu, J.; Qiu, D. Security of the Internet of Things: Perspectives and challenges. Wirel. Netw. 2014, 20, 1572–8196. [Google Scholar] [CrossRef]
  42. Urien, P. Blockchain IoT (BIoT): A New Direction for Solving Internet of Things Security and Trust Issues. In Proceedings of the 2018 3rd Cloudification of the Internet of Things (CIoT), Paris, France, 2–4 July 2018; pp. 1–4. [Google Scholar] [CrossRef]
  43. Khan, M.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar] [CrossRef]
  44. Zhou, J.; Cao, Z.; Dong, X.; Vasilakos, A.V. Security and Privacy for Cloud-Based IoT: Challenges. IEEE Commun. Mag. 2017, 55, 26–33. [Google Scholar] [CrossRef]
  45. Young, M.; Boutaba, R. Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious Interference. IEEE Commun. Surv. Tutor. 2011, 13, 617–641. [Google Scholar] [CrossRef]
  46. Chen, Y.; Yang, J.; Trappe, W.; Martin, R.P. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks. IEEE Trans. Veh. Technol. 2010, 59, 2418–2434. [Google Scholar] [CrossRef]
  47. Kwon, S.; Park, S.; Cho, H.; Park, Y.; Kim, D.; Yim, K. Towards 5G-Based IoT Security Analysis against Vo5G Eavesdropping. Computing 2021, 103, 425–447. [Google Scholar] [CrossRef]
  48. Olazabal, A.A.; Kaur, J.; Yeboah-Ofori, A. Deploying Man-In-the-Middle Attack on IoT Devices Connected to Long Range Wide Area Networks (LoRaWAN). In Proceedings of the 2022 IEEE International Smart Cities Conference (ISC2), Paphos, Cyprus, 26–29 September 2022; pp. 1–7. [Google Scholar] [CrossRef]
  49. Noubir, G.; Lin, G. Low-power DoS Attacks in Data Wireless LANs and Countermeasures. SIGMOBILE Mob. Comput. Commun. Rev. 2003, 7, 29–30. [Google Scholar] [CrossRef]
  50. Chen, Y.; Trappe, W.; Martin, R.P. Detecting and Localizing Wireless Spoofing Attacks. In Proceedings of the 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, San Diego, CA, USA, 18–21 June 2007; pp. 193–202. [Google Scholar] [CrossRef]
  51. Sahner, R.; Trivedi, K.; Puliafito, A. Performance And Reliability Analysis Of Computer Systems (an Example-based Approach Using The Sharpe Software. IEEE Trans. Reliab. 1997, 46, 441. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.