Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2021 Jan 7;21(2):359.
doi: 10.3390/s21020359.

Hyperledger Fabric Blockchain for Securing the Edge Internet of Things

Affiliations

Hyperledger Fabric Blockchain for Securing the Edge Internet of Things

Houshyar Honar Pajooh et al. Sensors (Basel). .

Abstract

Providing security and privacy to the Internet of Things (IoT) networks while achieving it with minimum performance requirements is an open research challenge. Blockchain technology, as a distributed and decentralized ledger, is a potential solution to tackle the limitations of the current peer-to-peer IoT networks. This paper presents the development of an integrated IoT system implementing the permissioned blockchain Hyperledger Fabric (HLF) to secure the edge computing devices by employing a local authentication process. In addition, the proposed model provides traceability for the data generated by the IoT devices. The presented solution also addresses the IoT systems' scalability challenges, the processing power and storage issues of the IoT edge devices in the blockchain network. A set of built-in queries is leveraged by smart-contracts technology to define the rules and conditions. The paper validates the performance of the proposed model with practical implementation by measuring performance metrics such as transaction throughput and latency, resource consumption, and network use. The results show that the proposed platform with the HLF implementation is promising for the security of resource-constrained IoT devices and is scalable for deployment in various IoT scenarios.

Keywords: Internet of Things; data provenance; edge computing; hyperledger fabric; security and privacy; smart contract.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Overview of the RAFT consensus protocol and block creation.
Figure 2
Figure 2
Conceptual framework of the integrated IoT blockchain platform.
Figure 3
Figure 3
Local authentication flow.
Figure 4
Figure 4
Blockchain-based edge services.
Figure 5
Figure 5
Proposed HLF network transaction flow.
Figure 6
Figure 6
Ledger implementation flow.
Figure 7
Figure 7
Experimental setup and system under test.
Figure 8
Figure 8
Effects of transaction sizes on the throughput and average response times in Desktop setup.
Figure 9
Figure 9
Effects of transaction sizes on the throughput and average response times in Raspberry Pi setup.
Figure 10
Figure 10
Latency for all ChainCode operation.
Figure 11
Figure 11
Latency vs. transaction sending rate.
Figure 12
Figure 12
CPU and memory use for varying data sizes for peer process in the Desktop setup.
Figure 13
Figure 13
CPU and memory use for varying data sizes for client process in the Desktop setup.
Figure 14
Figure 14
CPU and memory use for varying data sizes for peer process in RPi setup.
Figure 15
Figure 15
CPU and memory for varying data sizes for client process in RPi setup.
Figure 16
Figure 16
Network use for peer process with no transactions.
Figure 17
Figure 17
Network use vs. load sizes with/without external storage.

Similar articles

Cited by

References

    1. Ali M.S., Vecchio M., Pincheira M., Dolui K., Antonelli F., Rehmani M.H. Applications of blockchains in the Internet of Things: A comprehensive survey. IEEE Commun. Surv. Tutor. 2018;21:1676–1717. doi: 10.1109/COMST.2018.2886932. - DOI
    1. Lao L., Li Z., Hou S., Xiao B., Guo S., Yang Y. A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling. ACM Comput. Surv. (CSUR) 2020;53:1–32. doi: 10.1145/3372136. - DOI
    1. Javaid U., Siang A.K., Aman M.N., Sikdar B. Mitigating loT device based DDoS attacks using blockchain; Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems; Munich, Germany. 15 June 2018; pp. 71–76.
    1. Zhou X., Tang X. Research and implementation of RSA algorithm for encryption and decryption; Proceedings of the 2011 6th International Forum on Strategic Technology; Harbin, China. 22–24 August 2011; pp. 1118–1121.
    1. Suárez-Albela M., Fernández-Caramés T.M., Fraga-Lamas P., Castedo L. A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications. Sensors. 2017;17:1978. - PMC - PubMed

LinkOut - more resources