{"title":"Blockchain and Internet of Things Opportunities and Challenges","authors":"Kimheng Sok, Jean-Noel Colin, Kimtho Po","doi":"10.1145/3287921.3287933","DOIUrl":null,"url":null,"abstract":"We are now living in the significant era where technologies are advancing very quickly. Among the leading technologies, Internet of Things or IoT in short is standing at the peak of inflated expectation in the Gartner Hype Cycle [1]. The application of IoT has evolved from home appliances in the smart home environment such as smart tv, smart refrigerator, smart door and has grown into smart building, smart city, smart healthcare, smart industry. We could imagine that everything could go online to cut cost, add value to businesses and increase users convenience. The prediction has been made [2] that there will be 50 Billion IoT devices by 2020. Along the new revolution there has also been threats that significantly warned us if we didn't take security into account some bad things could happen, such as Mirai botnet [3] attacked dyn DNS server by using vulnerable IoT devices which turned smart devices became exploitable or vulnerable devices and named as the weakness link of the network. At the same time another hype among technology communities of using Blockchain Technology to secure the Internet of Things is getting mainstream. Blockchain is not a silver bullet to secure Internet of Things, in this paper we will propose an architecture model of using a Blockchain called Hyperledger Fabric to secure the Internet of Things network in a smart classroom scenario and integrated with The Thing Networks (TTN) cloud server and demonstrates the opportunities and challenges of this concept by taking security properties such as confidentiality, integrity, availability and non-repudiation to evaluate the concept.","PeriodicalId":448008,"journal":{"name":"Proceedings of the 9th International Symposium on Information and Communication Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 9th International Symposium on Information and Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3287921.3287933","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
We are now living in the significant era where technologies are advancing very quickly. Among the leading technologies, Internet of Things or IoT in short is standing at the peak of inflated expectation in the Gartner Hype Cycle [1]. The application of IoT has evolved from home appliances in the smart home environment such as smart tv, smart refrigerator, smart door and has grown into smart building, smart city, smart healthcare, smart industry. We could imagine that everything could go online to cut cost, add value to businesses and increase users convenience. The prediction has been made [2] that there will be 50 Billion IoT devices by 2020. Along the new revolution there has also been threats that significantly warned us if we didn't take security into account some bad things could happen, such as Mirai botnet [3] attacked dyn DNS server by using vulnerable IoT devices which turned smart devices became exploitable or vulnerable devices and named as the weakness link of the network. At the same time another hype among technology communities of using Blockchain Technology to secure the Internet of Things is getting mainstream. Blockchain is not a silver bullet to secure Internet of Things, in this paper we will propose an architecture model of using a Blockchain called Hyperledger Fabric to secure the Internet of Things network in a smart classroom scenario and integrated with The Thing Networks (TTN) cloud server and demonstrates the opportunities and challenges of this concept by taking security properties such as confidentiality, integrity, availability and non-repudiation to evaluate the concept.