J. James, Daniel Hawthorne-Madell, K. Duncan, A. S. Leger, Joseph Sagisi, Michael Collins
{"title":"An experimental framework for investigating hashgraph algorithm transaction speed","authors":"J. James, Daniel Hawthorne-Madell, K. Duncan, A. S. Leger, Joseph Sagisi, Michael Collins","doi":"10.1145/3362744.3363342","DOIUrl":"https://doi.org/10.1145/3362744.3363342","url":null,"abstract":"Power grids around the world have experienced a growing number of malicious cyber attacks. This paper provides an overview of recent use of the Hyperledger Fabric distributed operating system to prototype use of a permissioned blockchain consensus algorithm to trust shared state estimation and control data and another effort to alter local sensor data to destroy the integrity of the shared data. The paper also provides justification for an experiment to prototype use of Babble, a peer-to-peer network plugin using the hashgraph consensus algorithm, to share the state estimation and control data through transactions recorded in a hashgraph. A key claim of the hashgraph documentation, which is unsubstantiated without a proper academic analysis, is that the algorithm is asynchronous Byzantine fault tolerance (ABFT). Also, while the Hyperledger Fabric implementation supports thousands of transactions per second, the hashgraph algorithm documentation claims orders of magnitude more. Our experiment seeks to measure the hashgraph transaction speed and determine its suitability for improving the resilience of wide area control of the smart grid. The previous resilience research of the Anomaly Detection of Cyber Physical Systems (ADCPS) team includes research into inadvertent cyber and physical failures as well as malicious attacks. We conclude with some speculations concerning the potential impact of fast, fair, and secure sharing of data across a network of blockchains potentially interfaced using hashgraph distributed ledger technology (DLT).","PeriodicalId":193703,"journal":{"name":"Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128487660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EngraveChain","authors":"L. Shekhtman, Erez Waisbard","doi":"10.1145/3362744.3363346","DOIUrl":"https://doi.org/10.1145/3362744.3363346","url":null,"abstract":"A reliable log system is a prerequisite for security applications. One of the first actions a hacker takes upon penetrating a system is altering the log files. Maintaining redundant copies in a distributed manner in a Byzantine setting has always been a challenging task, however it has recently become simpler given recent advances in blockchain technologies. In this work, we present a tamper-resistant log system through the use of a blockchain. We leverage the immutable write action and distributed storage provided by the blockchain and add an additional encryption layer to develop a secure log system. We assess the security and privacy aspects of our solution. Finally, we implement our system over Hyperledger Fabric and demonstrate the system's value for several use cases.","PeriodicalId":193703,"journal":{"name":"Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor","volume":"21 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116234597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aditya Shyam Bazari, Akash Aggarwal, Waqar Asif, M. Lestas, M. Rajarajan
{"title":"Node Criticality Assessment in a Blockchain Network","authors":"Aditya Shyam Bazari, Akash Aggarwal, Waqar Asif, M. Lestas, M. Rajarajan","doi":"10.1145/3362744.3363343","DOIUrl":"https://doi.org/10.1145/3362744.3363343","url":null,"abstract":"Blockchain systems are being rapidly integrated in various technologies, with limited work on the effect of the underlying network topology on the blockchain performance. In this work, we investigate the significance of each network node on the overall blockchain performance. This is assessed by selecting critical nodes according to different criticality metrics, and investigating, using simulations, the degradation in performance incurred upon removing these nodes. The most critical nodes are the ones that incur the greatest degradation in performance. The considered performance metrics are the blockchain size and the packet drop rate. Criticality metrics such as Betweennes Centrality, Closeness Centrality and Degree Centrality are compared. It is found that the Sign Change Spectral Partitioning approach, enhanced with Blockchain Specific traffic flow information, is able to identify critical nodes better in the sense that higher degradation in performance is reported upon their removal.","PeriodicalId":193703,"journal":{"name":"Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122615029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conceptualizing Blockchain based Energy Market for Self Sustainable Community","authors":"A. NidhinMahesh, N. Shibu, S. Balamurugan","doi":"10.1145/3362744.3363345","DOIUrl":"https://doi.org/10.1145/3362744.3363345","url":null,"abstract":"With a spectacular boom in blockchain technologies at various verticals and with the increase in renewable energy penetration, these could solve one of the major issues in Power Systems - Energy Demand Management by the utilities. Blockchain being a distributed architecture, it could fit into the deregulated energy market to enable energy trading in a self sustainable energy community and manage the power demands among the community members. As proof of concept, the blockchain technology is introduced in a smart community where consumers take part in energy trading among themselves as well as with the utility. In this paper, three use cases for P2P energy trading in a private blockchain network is discussed. The blockchain architecture is developed using the Hyperledger framework and the smart contracts are defined in the chaincode. The performance of the blockchain network on resource constrained IoT system based on Raspberry Pi is also evaluated.","PeriodicalId":193703,"journal":{"name":"Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134089817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diego Stucchi, Ruggero Susella, P. Fragneto, B. Rossi
{"title":"Secure and Effective Implementation of an IOTA Light Node using STM32","authors":"Diego Stucchi, Ruggero Susella, P. Fragneto, B. Rossi","doi":"10.1145/3362744.3363344","DOIUrl":"https://doi.org/10.1145/3362744.3363344","url":null,"abstract":"A major challenge in networked sensor systems and other IoT environments is addressing security. Vulnerabilities in those systems arise from poor physical security, unauthenticated devices, insecure firmware updates, insecure communication, and data corruption. In recent times Distributed Ledger Technologies (DLTs), of which Blockchain is an instance, have been identified as a possible solution to some of these issues. The blokchain model genetically ensures decentralized security and privacy, and therefore could provide IoT systems with a trusted infrastructure for securely logging data or exchanging tokens without the necessity, and costs, of central servers. Blockchain is no panacea, either. IoT devices that get connected to a blockchain network must still be secured, in particular they must protect the confidentiality of the keys. This requires the embedded microcontroller to execute only authenticated firmware, with protections against software attacks, such as buffer overflows, and resistance against side-channel attacks. In addition, as confirmed from the scarcity of implementations reported in the literature, it is still not clear whether blockchain protocols can be implemented efficiently on resource-constrained IoT devices. In this work, also supported by a Demo, we show an example of secure IoT device that enables the functionalities of IOTA, a DLT specifically designed for the use in the IoT. In particular, we present a Light Node based on STM32 that implements all the cryptographic functions, IOTA specific operations and communication functions required to successfully publish transactions in the IOTA distributed ledger. Our implementations on microcontrollers (ARM Cortex-M) performs up to 22 times faster in terms of cycles and up to 4 times faster in absolute time with respect to the state-of-the-art implementation on a Raspberry PI 3B. Our Light Node also ensures protection of the stored private data and guarantees secure firmware update thanks to a suitable configuration of some security features provided by STM32 microcontrollers.","PeriodicalId":193703,"journal":{"name":"Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129322957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor","authors":"","doi":"10.1145/3362744","DOIUrl":"https://doi.org/10.1145/3362744","url":null,"abstract":"","PeriodicalId":193703,"journal":{"name":"Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132004445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}