Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security

被引:2
|
作者
Buenrostro, Erick D. [1 ]
Rivera, Abel O. Gomez [1 ]
Tosh, Deepak [1 ]
Acosta, Jaime C. [2 ]
Njilla, Laurent [3 ]
机构
[1] Univ Texas El Paso, Dept Comp Sci, El Paso, TX 79968 USA
[2] CCDC Army Res Lab, El Paso, TX USA
[3] Air Force Res Lab AFRL, Rome, NY USA
关键词
IoBT; Blockchain; Sawtooth; Cybersecurity;
D O I
10.1109/milcom47813.2019.9020736
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Military technology is ever-evolving to increase the safety and security of soldiers on the field while integrating Internet-of-Things solutions to improve operational efficiency in mission oriented tasks in the battlefield. Centralized communication technology is the traditional network model used for battlefields and is vulnerable to denial of service attacks, therefore suffers performance hazards. They also lead to a central point of failure, due to which, a flexible model that is mobile, resilient, and effective for different scenarios must be proposed. Blockchain offers a distributed platform that allows multiple nodes to update a distributed ledger in a tamper-resistant manner. The decentralized nature of this system suggests that it can be an effective tool for battlefields in securing data communication among Internet-of-Battlefield Things (IoBT). In this paper, we integrate a permissioned blockchain, namely Hyperledger Sawtooth, in IoBT context and evaluate its performance with the goal of determining whether it has the potential to serve the performance needs of IoBT environment. Using different testing parameters, the metric data would help in suggesting the best parameter set, network configuration and blockchain usability views in IoBT context. We show that a blockchain-integrated IoBT platform has heavy dependency on the characteristics of the underlying network such as topology, link bandwidth, jitter, and other communication configurations, that can be tuned up to achieve optimal performance.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Blockchain-Empowered Secure Internet-of-Battlefield Things (IoBT) Architecture
    Tosh, Deepak K.
    Shetty, Sachin
    Foytik, Peter
    Njilla, Laurent
    Kamhoua, Charles A.
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 593 - 598
  • [2] Enabling Device Trustworthiness for SDN-Enabled Internet-of-Battlefield Things
    Rivera, Abel O. Gomez
    White, Evan M.
    Acosta, Jaime C.
    Tosh, Deepak
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [3] A Service-Oriented Permissioned Blockchain for the Internet of Things
    Qiu, Chao
    Yao, Haipeng
    Yu, F. Richard
    Jiang, Chunxiao
    Guo, Song
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (02) : 203 - 215
  • [4] Permissioned Blockchain and Deep Reinforcement Learning Enabled Security and Energy Efficient Healthcare Internet of Things
    Liu, Long
    Li, Zhichao
    IEEE ACCESS, 2022, 10 : 53640 - 53651
  • [5] Blockchain Security and Privacy for the Internet of Things
    Picone, Marco
    Cirani, Simone
    Veltri, Luca
    SENSORS, 2021, 21 (03) : 1 - 4
  • [6] IoBTChain: an Integration Framework of Internet of Battlefield Things (IoBT) and Blockchain
    Lang, Weimin
    Shan, Desheng
    Zhang, Han
    Wei, Shengyun
    Yu, Liangqin
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 607 - 611
  • [7] An Internet of Things Access Control Scheme Based on Permissioned Blockchain and Edge Computing
    Zhang, Lihua
    Li, Boping
    Fang, Haodong
    Zhang, Ganzhe
    Liu, Chunhui
    APPLIED SCIENCES-BASEL, 2023, 13 (07):
  • [8] Securing the access control policies to the Internet of Things resources through permissioned blockchain
    Rizzardi, Alessandra
    Sicari, Sabrina
    Miorandi, Daniele
    Coen-Porisini, Alberto
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (15):
  • [9] Quantifying Location Privacy in Permissioned Blockchain-Based Internet of Things (IoT)
    Shahid, Abdur R.
    Pissinou, Niki
    Njilla, Laurent
    Alemany, Sheila
    Imteaj, Ahmed
    Makki, Kia
    Aguilar, Edwin
    PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19), 2019, : 116 - 125
  • [10] Expandable Mix-Zones as a Deception Technique for Providing Location Privacy on Internet-of-Battlefield Things (IoBT)
    Butun, Ismail
    Mahgoub, Imad
    2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,