【Author】
Ferrag, Mohamed Amine; Shu, Lei
【Source】IEEE INTERNET OF THINGS JOURNAL
【Abstract】This article presents research challenges and a tutorial on performance evaluation of blockchain-based security and privacy systems for the Internet of Things (IoT). We start by summarizing the existing surveys that deal with blockchain security for IoT networks. Then, we review the blockchain-based security and privacy systems for seventeen types of IoT applications, e.g., Industry 4.0, software-defined networking, edge computing, Internet of Drones, Internet of Cloud, Internet of Energy, Internet of Vehicles, etc. We also review various consensus algorithms and provide a comparison with respect to the nine properties, such as latency, throughput, computation, storage, and communication costs, scalability, attack model, advantage, disadvantage, etc. Moreover, we present the security analysis techniques and provide a classification into four categories, including Burrows, Abadi, and Needham (BAN) logic, game theory, theory analysis, and AVISPA tool. In addition, we analyze the performance metrics, blockchain testbeds, and cryptography libraries used in the performance evaluation of blockchain-based security and privacy systems for the IoT networks. Based on the current survey, we discuss the major steps to follow for building and evaluating blockchain-based security and privacy systems. Finally, we discuss and highlight open challenges and future research opportunities.
【Keywords】Security; Internet of Things; Blockchain; Privacy; Consensus algorithm; Performance evaluation; Cryptography; Blockchain; experimentation environments; Internet of Things (IoT); privacy; security; testbeds
【标题】基于区块链的物联网安全和隐私系统的性能评估:教程
【摘要】本文介绍了针对物联网 (IoT) 的基于区块链的安全和隐私系统的性能评估的研究挑战和教程。我们首先总结处理物联网网络区块链安全的现有调查。然后,我们回顾了工业 4.0、软件定义网络、边缘计算、无人机互联网、云互联网、能源互联网、车联网等 17 种物联网应用的基于区块链的安全和隐私系统。我们还回顾了各种共识算法,并就延迟、吞吐量、计算、存储和通信成本、可扩展性、攻击模型、优势、劣势等九个属性进行了比较。此外,我们还介绍了安全分析技术并提供分为四类的分类,包括 Burrows、Abadi 和 Needham (BAN) 逻辑、博弈论、理论分析和 AVISPA 工具。此外,我们分析了用于物联网网络的基于区块链的安全和隐私系统的性能评估中使用的性能指标、区块链测试平台和密码库。根据目前的调查,我们讨论了构建和评估基于区块链的安全和隐私系统的主要步骤。最后,我们讨论并强调了开放的挑战和未来的研究机会。
【关键词】安全;物联网;区块链;隐私;共识算法;绩效评估;密码学;区块链;实验环境;物联网(IoT);隐私;安全;试验台
评论