A Survey of Blockchain-Based Solutions for IoTs, VANETs, and FANETs

A Survey of Blockchain-Based Solutions for IoTs, VANETs, and FANETs

Maroua Abdelhafidh, Nadia Charef, Adel Ben Mnaouer, Lamia Chaari
DOI: 10.4018/978-1-7998-5839-3.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Recently, the internet of things (IoT) has gained popularity as an enabling technology for wireless connectivity of mobile and/or stationary devices providing useful services for the general public in a collaborative manner. Mobile ad-hoc networks (MANETs) are regarded as a legacy enabling technology for various IoT applications. Vehicular ad-hoc networks (VANETs) and flying ad-hoc networks (FANETs) are specific extensions of MANETs that are drivers of IoT applications. However, IoT is prone to diverse attacks, being branded as the weakest link in the networking chain requiring effective solutions for achieving an acceptable level of security. Blockchain (BC) technology has been identified as an efficient method to remedy IoT security concerns. Therefore, this chapter classifies the attacks targeting IoT, VANETs, and FANETs systems based on their vulnerabilities. This chapter explores a selection of blockchain-based solutions for securing IoT, VANETs, and FANETs and presents open research directions compiled out of the presented solutions as useful guidelines for the readers.
Chapter Preview
Top

Introduction

Nowadays, Internet of Things (IoT) (Stoyanova et al.2020) has experienced tremendous opportunities and potential interest from various applications allowing a seamless connection of multiple and diverse devices to the internet in order to exchange efficiently collected data.

With the growth of IoT applications, a rise of Mobile Ad Hoc Networks (MANETs) (Tripathy et al.2020), Vehicular Ad Hoc Networks (VANETs) (Hamdi et al.2020) and Flying Ad Hoc Networks (Mukherjee et al.2018) applications is recognized. MANETs is a network of mobile nodes that are connected wirelessly and characterized by a dynamic network topology. FANET is another class of ad-hoc networks that is a subcategory of VANETs which is a sub form of MANET as illustrated in figure 1.

Figure 1.

MANET, VANET, FANET and IoT

978-1-7998-5839-3.ch006.f01

At present, IoT systems are often dependent upon a centralized architecture where information is sent from the connected devices and equipment to a proprietary cloud where the data is processed using analytics and then sent back to those tiny IoT devices to coordinate them as with all centralized systems. All devices are identified, authenticated and connected through cloud servers and the data collected by the devices is stored in the cloud for further processing (Ali et al.2018).

This centralized network architecture cannot be able to respond to the growing needs of the huge IoT ecosystems with the growth of connected devices that will be approximately 75.44 billion, as announced in (Alam2018). This gathered data, stored in centralized servers, can be tampered and consequently lacks traceability. Furthermore, through the current architecture, users have limited control over their data and are made to trust the cloud and have no choice but to rely on their promises of security. Accordingly, IoT security efforts mostly focus on securing point-to-point communication and fall short in addressing security during the lifecycle of data by thinking about this problem of trust. IoT devices need to confidently exchange data without having to rely on an intermediary which adds friction and costs reconciliation problems and all sorts of transactional challenges.

In this context, Blockchain (BC) (Lu2019) is a tailored technology for such problems. It has attracted a tremendous interest from various IoT applications thanks to its distributed nature that implies no single entity controls the ledger, but rather the participating peers together validate the authenticity of records. These records are organized in blocks which are linked together using cryptographic hashes (Ferrag et al.2018). All the BC peers have to validate each record to get added to a block (Reyna et al.2018) in order to be uploaded to the BC. This agreement is achieved through consensus algorithms such as Proof of Work (PoW), Proof of Stake (PoS), Delegated Proof-of-Stake (DPoS), and Proof-of-Authority (PoA). Accordingly, BC keeps track through the data records and achieves a sort of distributed trust that can drastically reduce the cost of verification and bootstrap IoT platform without assigning a lot of market power or much control to one single entity.

Due to this distribution of computing power of resources or IoT devices with BC and its high traceability and trust level, the system designed with BC is much more resilient to attackers.

This technology is currently revolutionizing several IoT applications but still in its early stage of research with VANETs and FANETs.

Several surveys (Wang et al.2020) (Wang et al.2019b) (Fernández-Caramés and Fraga-Lamas2018) (Ferrag et al.2018) have been already proposed to present the IoT security challenges and to explain the integration of BC technology. However, to the best of our knowledge, there is no work on efficient handling of security vulnerabilities of various IoT, VANET and FANET applications by leveraging the benefits offered by BC technology, that has been discussed recently in the literature. In addition, there is no relevant work highlighting the taxonomy of security threats and their BC-based solutions. Hence, our chapter is presenting a synthesis of several BC-based solutions proposed for securing the IoT, VANET and FANET systems considering the inclusion of Edge, Fog and Cloud computing layers in their overall proposed architectures.

Key Terms in this Chapter

Security and Privacy: Set of policies and practices adopted to prevent and monitor unauthorized access or modification of an IT operation. It ensures the efficient system functioning.

Internet of Things: Intelligent and autonomous connected objects that communicate with each other via the Internet. It encompasses the areas of the current Information Technology (IT) and uses other technologies such as Cloud Computing, Big data, or even the Blockchains.

Vulnerabilities and Attacks: Malicious actions exploiting a weakness in a system to achieve a specific goal. These goals could be illegally gaining access to the system, interrupting or disrupting a service, or exploiting system resources.

VANET: A sub-category of MANET which is addressed for traffic management by intelligent transportation systems.

MANET: A wireless network and without central entity (unlike a centralized or cellular communication network). It is based on the nodes ability to cooperate and form a network between them.

Blockchain: A decentralized system based on a peer-to-peer network. Each network object keeps a copy of the ledger to avoid having a single point of failure. This technology can be explored in many use cases and used as a secure way to manage and protect all kinds of data.

FANET: A sub-category of the MANET that involves the deployment of a set of drones and ground stations through an ad hoc wireless network.

Complete Chapter List

Search this Book:
Reset