Inicio  /  Applied Sciences  /  Vol: 11 Par: 6 (2021)  /  Artículo
ARTÍCULO
TITULO

A Traceable and Authenticated IoTs Trigger Event of Private Security Record Based on Blockchain

Chin-Ling Chen    
Zi-Yi Lim    
Hsien-Chou Liao and Yong-Yuan Deng    

Resumen

Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of Things (IoTs) device in the client?s house and connect it with the IoT main controller; then, the IoT main controller connects to the security control center (SCC). Once there is an event triggered (e.g., a break-in or fire incident) by the IoTs device, the controller sends a message to the SCC. The SCC allocates a security guard (SG) to the incident scene immediately. After the task is accomplished, the SG sends a message to the SCC. All of these record the messages and events chained in the blockchain center. The proposed scheme makes security event records have the following characteristics: authenticated, traceable, and integral. The proposed scheme is proved by a security analysis with mutual authentication, traceability, integrity, and non-repudiation. The known attacks (e.g., man-in-the-middle attack, replay attack, forgery attack) are avoided by message encryption and a signing mechanism. Threat models in the communication phase can also be avoided. Finally, computation cost, communication performance, and comparison with related works are also discussed to prove its applicability. We also provide an arbitration mechanism, so that the proposed scheme can reduce disputes between private security companies and the client.

 Artículos similares

       
 
Dimitrios Kaklis, Ioannis Kontopoulos, Iraklis Varlamis, Ioannis Z. Emiris and Takis Varelas    
Trajectory data holds pivotal importance in the shipping industry and transcend their significance in various domains, including transportation, health care, tourism, surveillance, and security. In the maritime domain, improved predictions for estimated ... ver más

 
Huang Zhang, Ting Huang, Fangguo Zhang, Baodian Wei and Yusong Du    
A bilinear map whose domain and target sets are identical is called a self-bilinear map. Original self-bilinear maps are defined over cyclic groups. Since the map itself reveals information about the underlying cyclic group, the Decisional Diffie?Hellman... ver más
Revista: Information

 
Lun-Min Shih, Huan-Liang Tsai and Cheng-Yu Tsai    
This paper presents an original wireless DYU Air Box of an environment-monitoring IoT (EMIoT) system on a campus to offer information on environmental conditions through the public ThingSpeak IoT platform for stakeholders including all the students and e... ver más
Revista: Applied Sciences

 
Zengyu Cai, Chunchen Tan, Jianwei Zhang, Liang Zhu and Yuan Feng    
As network technology continues to develop, the popularity of various intelligent terminals has accelerated, leading to a rapid growth in the scale of wireless network traffic. This growth has resulted in significant pressure on resource consumption and ... ver más
Revista: Applied Sciences

 
Omar Abdulkhaleq Aldabash and Mehmet Fatih Akay    
An IDS (Intrusion Detection System) is essential for network security experts, as it allows one to identify and respond to abnormal traffic present in a network. An IDS can be utilized for evaluating the various types of malicious attacks. Hence, detecti... ver más
Revista: Applied Sciences