Professional Documents
Culture Documents
Blockchain Security in Manets: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara
Blockchain Security in Manets: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara
Abstract—The security aspect of the IoT occupies a place of great in order to maintain a consistent and secure database among
importance especially after the evolution that has known this field all the components of this network.
lastly because it must take into account the transformations and the The remainder of the paper is organized as follows. Section
new applications .Blockchain is a new technology dedicated to the
data sharing. However, this does not work the same way in the II: IoT, Section III: Blockchain, Section IV: Related Work,
different systems with different operating principles. This article will Section V: Discussion and Section 6: Our proposition.
discuss network security using the Blockchain to facilitate the sending
of messages and information, enabling the use of new processes and II. I OT
enabling autonomous coordination of devices. To do this, we will
discuss proposed solutions to ensure a high level of security in these A. IoT Definition
networks in the work of other researchers. Finally, our article will First, Internet of Things (IoT) is considered as emerging
Open Science Index, Computer and Information Engineering Vol:13, No:10, 2019 waset.org/Publication/10010807
propose a method of security more adapted to our needs as a team concepts and technologies [5]. At the same time he tries to
working in the ad hoc networks, this method is based on the principle
of the Blockchain and that we named ”MPR Blockchain”.
transform certain concepts from which he can create new
possibilities, with adapted scenarios.
Keywords—Ad hoc networks, blockchain, MPR, security. The Internet of Things is defined as a gigantic entity
that has services and technologies that allow communication
I. I NTRODUCTION between its various components [6], the IoT contributes to the
optimization or the creation of new concepts whether for the
International Scholarly and Scientific Research & Innovation 13(10) 2019 546 ISNI:0000000091950263
World Academy of Science, Engineering and Technology
International Journal of Computer and Information Engineering
Vol:13, No:10, 2019
International Scholarly and Scientific Research & Innovation 13(10) 2019 547 ISNI:0000000091950263
World Academy of Science, Engineering and Technology
International Journal of Computer and Information Engineering
Vol:13, No:10, 2019
International Scholarly and Scientific Research & Innovation 13(10) 2019 548 ISNI:0000000091950263
World Academy of Science, Engineering and Technology
International Journal of Computer and Information Engineering
Vol:13, No:10, 2019
Open Science Index, Computer and Information Engineering Vol:13, No:10, 2019 waset.org/Publication/10010807
(N) which select relay points among them based on several VI. O UR P ROPOSITION
characteristics such as: energy level, stability of the node. take In a traditional Blockchain network, a MANETs network,
care of spreading control messages along the network in an the MPR plays the minor role. The MPR is elected by nodes
optimized way. (N) constituting its neighborhood and which are all equipped
Our team is working on improving the OLSR protocol with a blockchain security algorithm.At each of these nodes
in MANETs networks by proposing solutions to face the (N), values are assigned:
challenges of this type of network. Among the work done, • The previous hash: value referring to the previous node.
there are those who study the optimization of the MPRs • TX list: historical transactions broadcast on the network.
selection based on different criteria for example mobility • Nonce: takes place in each block as a solution to the
quantification [15] and reducing broadcast redundancy [16]. mathematical problem.
In order to ensure the continuity of the team work and
especially to ensure security for the network using the
improved OLSR protocols developed in our team, we propose
a method of security more adapted to our needs, this method
is based on the principle of the Blockchain.
International Scholarly and Scientific Research & Innovation 13(10) 2019 549 ISNI:0000000091950263
World Academy of Science, Engineering and Technology
International Journal of Computer and Information Engineering
Vol:13, No:10, 2019
VII. C ONCLUSION
In this article, we discussed the definition of IoT, its
architecture and infrastructure, and the security of IoT by
citing security criteria. We also shed light on the work
already done in the area of network security using blockchain
technology and then presented our proposal. Our next work
will deal with the implementation and simulation part of the
Blockchain solution in the MANETs and compare them with
the latest results obtained by the other members of the team
working on the security side.
R EFERENCES
[1] M. A. Khan and K. Salah, ”IoT security: Review, blockchain solutions,
and open challenges”. Future Gener. Comput. Syst., vol. 82, p. 395-411,
mai 2018.
[2] ”CONDENSE: A Reconfigurable Knowledge Acquisition
Architecture for Future 5G IoT ”. IEEE Journals Magazine .
https://ieeexplore.ieee.org/abstract/document/7508921/.
[3] Y. Liu, Y. Kuang, Y. Xiao, and G. Xu ”SDN-Based Data Transfer Security
for Internet of Things”. IEEE Internet Things J., vol. 5, no 1, p. 257-268,
fvr. 2018.
[4] M. Swan, ”Blockchain thinking: The brain as a dac (decentralized
autonomous organization)”, in Proceedings of the Texas Bitcoin
Conference, pp. 2729, 2015.
[5] H. Chourabi et al., ”Understanding Smart Cities: An Integrative
Framework ”, in 2012 45th Hawaii International Conference on System
Sciences, 2012, p. 2289-2297.
[6] T. Forsyth ”Community-based adaptation: a review of past and future
challenges ”. Wiley Interdiscip. Rev. Clim. Change, vol. 4, no 5, p.
439-446.
[7] H. Nguyen-Minh, ”Contribution to the Intelligent Transportation System:
security of Safety Applications in Vehicle Ad hoc Networks ”. p. 159.
International Scholarly and Scientific Research & Innovation 13(10) 2019 550 ISNI:0000000091950263