You are on page 1of 22

LOYOLA – ICAM COLLEGE OF ENGINEERING AND TECHNOLOGY (LICET)

LOYOLA CAMPUS, NUNGAMBAKKAM , CHENNAI – 34


DEPARTMENT OF INFORMATION TECHNOLOGY

RIOT
Decentralized IoT Gateway Platform

Dr. Janani Fabian Ferno Shirley Christabel Joeshibha K


GUIDE 311119205014 311119205053 311119205023
ABSTRACT

The Internet of Things (IoT) has seen widespread adoption in recent years, connecting numerous devices to
the internet. However, current IoT networks are vulnerable to various security threats such as data breaches,
unauthorized access, and cyber-attacks. To address these security challenges, we propose the Riot Protocol - a
comprehensive solution for securing IoT networks. The Riot Protocol provides device authentication, data
encryption, smart contract-based token minting, data integrity, scalability, interoperability, crypto wallet
integration, IPFS data layer, and an end-to-end solution for IoT security. The protocol ensures the
confidentiality, integrity, and authenticity of the data exchanged between IoT devices. The Riot Protocol offers
an additional layer of security for the Internet of Things, protects sensitive information from unauthorized
access, ensures the integrity of sensor data, and can handle a large number of devices and users. The Riot
Protocol aims to provide a secure and reliable communication between IoT devices, offering a comprehensive
solution to the challenges of IoT security.
FIRST REVIEW SUGGESTIONS
● Consider a different base paper for research reference.
● Plan the platform architecture and review the auth flow
● Revise the ambiguous charts.
LITERATURE SURVEY
S.No Title, Method, Author Name & Month, Year Advantage(s) Disadvantage(s)

1 “Decentralized Lightweight Group Key Management The proposed approach Even though forward and backward
for Dynamic Access Control in IoT Environments” accommodates a scalable IoT secrecy is achieved, the main key
architecture, which mit- distribution center is still susceptible
Published in :IEEE TRANSACTIONS ON NETWORK AND SERVICE igates the single point of to attacks, thereby leaving a central
MANAGEMENT, VOL. 17, NO. 3, SEPTEMBER 2020 failure by reducing the load point of failure.
Authors :Maissa Dammak , Sidi-Mohammed Senouci , Mohamed caused by rekeying at the core
Ayoub Messous, Mohamed Houcine Elhdhili, &Christophe Gransart network. DLGKM-AC
Method: They introduce a novel Decentralized Lightweight Group Key guarantees secure group
Management architecture for Access Control in the IoT environment communication by preventing
(DLGKM-AC). Based on a hierarchical architecture, composed of one Key collusion attacks and ensuring
Distribution Center (KDC) and several Sub Key Distribution Centers backward/forward secrecy.
(SKDCs), the proposed scheme enhances the management of subscribers’
groups and alleviate the rekeying overhead on the KDC.

2 “Devify: decentralized internet of things software framework for a Provides flow-based A resource-constrained device has
peer-to-peer and interoperable IoT device” programming (FBP) runtime limited memory and computation
environment for writing IoT power that it can offer to accept and
application servers. handle too many View Client
Published in: ACM SIGBED Review, (Volume 15, Issue 2, March 2018) connections.
Authors : Chen, Jollen
Method: A new IoT software architecture framework, to address the peer-
to-peer IoT network and the interoperable IoT device development.
LITERATURE SURVEY
S.No Title, Method, Author Name & Month, Year Advantage(s) Disadvantage(s)

3 “Integrating Low-Power IoT devices to a Blockchain-Based Applicable for integrating Low- Dependent of their computing and
Infrastructure” power IoT end-devices do not storage capabilities, so it is
possess impossible to integrate a
Published in: EMSOFT’17 Companion, Seoul, Republic of Korea, 2017. enough horsepower to run a blockchain client to any IoT
Authors: Kazım Rıfat Özyılmaz and Arda Yurdakul software client for intensive device.
Method: An IoT gateway is configured as a blockchain node and an event- blockchain calculations.
based messaging mechanism for low-power IoT end-devices

4 “Blockchain-based Smart-IoT Trust Zone Measurement Architecture” Protects end-to-end privacy of There is no trust-level integrity
application result, which cannot measurement
Published in: International Conference On Omni-Layer Intelligent Systems allow others to inspect but the of each zone devices in order to
user by verifying the prove it to the outside community
(Coins), May 5–7, 2019, Crete, Greece applications
Authors : Ali, Jawad and Ali, Toqeer and Alsawy, Yazed and Khalid, Ahmad inside enclave is neither
Shahrafidz and Musa, Shahrulniza tampered nor interrupted by
Method: A behavior monitor in IoT Blockchain setup which can provide any node in BC.
trust-confidence to outside networks by extracting the activity of each device
and analyzing the behavior using deep auto-encoders.
LITERATURE SURVEY
S.No Title, Method, Author Name & Month, Year Advantage(s) Disadvantage(s)

5 “A Blockchain-Based Smart Network for IoT-Driven Smart Cities” Provides Mandating a more productive,
a high-efficiency, high- integrated, and heterogeneous solution
Published in: Proceedings of the 2nd International Electronics integrity solution for realising capable of addressing the
Communication Conference(2020) the broader full spectrum of services and IoT-
Authors: Nada Alasbali, Saaidal Razalli Azzuhri, and Rosli Salleh connected goals of smart city connected systems is more
Method: Utilises the decentralised consensus mechanism to ensure solutions. required since the domain-specific,
information security before transactions are conducted with proprietary information
potentially corruptible external nodes. systems are ineffective as a platform for
smart city information.

6 “Blockchain for IoT security and privacy: The case study of a smart Prevents two critical security BC-based framework introduces
home” attacks that are particularly a marginal increase in the transaction
relevant for processing delays as
smart homes- DDOS attack compared to existing smart home
Published in: IEEE International Conference on Pervasive Computing and Linking attack. gateway products. There is
and Communications Workshops (PerCom Workshops), 2017 also an additional one-time delay during
Authors : A. Dorri, S. S. Kanhere, R. Jurdak and P. Gauravaram initialization for generating and
Method: Through BC, each smart home is equipped with an always distributed shared keys.
online, high resource device, known as “miner” that is responsible for
handling all communication within and external to the home. Does not provide privacy when the user
needs to reveal his data to a service
provider.
LITERATURE SURVEY
S.No Title, Method, Author Name & Month, Year Advantage(s) Disadvantage(s)

7 “Proof-of-Stake Consensus Mechanisms for Future Blockchain Have faster transaction Firstly, since the block generation
Networks: Fundamentals, Applications and Opportunities” confirmation speed than consumes negligible resources,
that of the other consensus rational participants may try to create
Published in: IEEE Access, vol. 7, pp. 85727-85745, 2019 mechanisms. different blocks or forks, i.e., nothing-
Authors: C. T. Nguyen, D. T. Hoang, D. N. Nguyen, D. Niyato, H. T. at-stake attacks.
Nguyen and E. Dutkiewicz
Method: Performance analysis of the formation of stake pools and their Secondly, the adversary may try to
effects on the network stake distribution. bribe the leader, i.e.,
bribe attacks, to perform double-
spending attacks.

8 “Verifiable Secret Sharing Scheme Using Merkle Tree” Does not need complex It can’t prevent the adversaries from
algorithms and estimating the cheating other participants share,
Published in: International Symposium on Computer Engineering and number of cheaters in leading to leakage of secrets.
advance, and will not
Intelligent Communications (ISCEIC), 2020 increase the size of each
Authors : Y. -q. Fang, J. -b. Liao and L. -y. Lai share.
Method: An efficient share verification method based on Merkle tree in
which the root and authentication paths of a Merkle tree are used to verify
shares between the participants, so that they can reconstruct secrets correctly
after verifying and eliminating the fake shares.
LITERATURE SURVEY
S.No Title, Method, Author Name & Month, Year Advantage(s) Disadvantage(s)

9 “Token-Based Lightweight Authentication to Secure IoT Networks” Reduces the computation


overhead and save energy for It uses a symmetric key
Published in: 16th IEEE Annual Consumer Communications & Networking authenticating devices during exchange which can be
Conference (CCNC), 2019 the authentication session, by intercepted to encrypt and
Authors: M. Dammak, O. R. M. Boudia, M. A. Messous, S. M. Senouci and using only lightweight decrypt the message with the
C. Gransart computation operations such single key. Also the registration
Method: A new Token-Based Lightweight User Authentication (TBLUA) for as XOR and hash function. authority of the devices is still
IoT devices, which is based on token technique in order to vulnerable to a
enhance the robustness of authentication.

10 “A Survey on Zero-Knowledge Proof in Blockchain” This protocol does not need a The linear query to the input is
complicated public pointed to the proof so the
Published in: IEEE Network, vol. 35, no. 4, pp. 198-205, July/August 2021 key and its repeated verifier
implementation is not helpful owns limited access to the
Authors : X. Sun, F. R. Yu, P. Zhang, Z. Sun, W. Xie and X. Peng for the malicious user to input, and it realizes the
Method: A comprehensive survey on ZKP in the environment of blockchain with obtain additional useful standard concept of soundness.
the aim of highlighting security problems and challenges. information
LITERATURE SURVEY
S.No Title, Method, Author Name & Month, Year Advantage(s) Disadvantage(s)

11 “Security Of Cryptocurrency Using Hardware Wallet And QR Code” Protects from online It is very essential for all
threats cryptocurrencies trader to
Published in: 2019 International Conference on Innovative Computing (ICIC) and will make more understand the cold and hot
Authors: Khan, Abdul & Zahid, Amjad & Hussain, Muzammil & Riaz, Muhammad secure Bitcoin storage. wallets to make sure the safe and
Method: A cryptocurrency (Bitcoin) wallet for the android operating system, by secure funds transfer.
using the QR code-based android application and a secure private key
storage (Cold Wallet).

12 “A Survey on Blockchain-Based Internet Service Architecture: Requirements, Increases the fundamental Suffers from the
Challenges, Trends, and Future” baseline security and as lack of true scalability (which is
blockchain has excellent exhibited by the duration of
extensibility features such several minutes needed for one
Published in: IEEE Access 2019 as scriptable block confirmation)
Authors : Yang, Wenli & Aghasian, Erfan & Garg, Saurabh & Herbert, David & programmability, and
Disiuta, Leandro & Kang, Byeong it supports new types of
Method: A web of connected nodes which make up the network itself. These layered Internet services.
nodes communicate with each other to maintain, measure
and update the new entries in the database. All nodes work
together to guarantee they reach a consensus to provide the
network with in-built security.
LITERATURE SURVEY
S.No Title, Method, Author Name & Month, Year Advantage(s) Disadvantage(s)

13 “Security Of Cryptocurrency Using Hardware Wallet And QR Code” Protects from online It is very essential for all
threats cryptocurrencies trader to
Published in: 2019 International Conference on Innovative Computing (ICIC) and will make more understand the cold and hot
Authors: Khan, Abdul & Zahid, Amjad & Hussain, Muzammil & Riaz, Muhammad secure Bitcoin storage. wallets to make sure the safe and
Method: A cryptocurrency (Bitcoin) wallet for the android operating system, by secure funds transfer.
using the QR code-based android application and a secure private key
storage (Cold Wallet).

14 “A Survey on Blockchain-Based Internet Service Architecture: Requirements, Increases the fundamental Suffers from the
Challenges, Trends, and Future” baseline security and as lack of true scalability (which is
blockchain has excellent exhibited by the duration of
extensibility features such several minutes needed for one
Published in: IEEE Access 2019 as scriptable block confirmation)
Authors : Yang, Wenli & Aghasian, Erfan & Garg, Saurabh & Herbert, David & programmability, and
Disiuta, Leandro & Kang, Byeong it supports new types of
Method: A web of connected nodes which make up the network itself. These layered Internet services.
nodes communicate with each other to maintain, measure
and update the new entries in the database. All nodes work
together to guarantee they reach a consensus to provide the
network with in-built security.
Need Analysis

● IoT is facing identity, security, and interoperability problems. Current systems rely on a centralized
client-server model that will soon be unsatisfactory due to the rapid increase in the number of devices
connected to the Internet.

● Networks are highly prone to trojan devices that piggyback into the so-called smart devices and steal
sensitive data and hack into our lives. This is more cynical when it comes to industrial automation,
where high-volume sensor data can easily get into the wrong hands.

● A single protocol that ensures device authentication, authorization and manages the data layer is a much
needed technology of the hour.
BULL DIAGRAM

Environmental Sensing & Industrial Acts on Connected Devices


monitoring (Eg. Smart City, Smart (Publishers), Users
Hotel, Smart Office, Industry 4.0, etc) (Subscribers), Servers, etc

RIOT
PLATFORM

The platform provides security to connected devices groups, data traffic,


connection and authentication of devices and it corresponding users and a
secure data storage solution.
OCTOPUS DIAGRAM

Blockchain,
Smart
Contract

Users CF2
Groups CF1 Key
PF1
Distribution
PF5 CF4 Broker
RIOT
CF3
PLATFORM
Sensed
Data
PF2
PF4
PF3 IPFS
CF5

Device
Groups
DATA FLOW DIAGRAM
DATA FLOW DIAGRAM
DATA FLOW DIAGRAM
SYSTEM
ARCHITECTURE
Domain
Multi-Layered Security in Internet of Things using Blockchain
1. Connected Devices and IoT
2. Smart Contracts in Public Blockchains
3. Decentralized Storage
4. Security

Applications of Domain
1. Connected Devices and IoT - Warehouse infrastructure, Inventory management, Smart Homes, etc
2. Smart Contracts in Public Blockchains - Consensus based verifications, DAOs, dApps, DeFi
3. Decentralized Storage - Scalable storage solutions, IPFS, Filecoin, Peer to peer storage.
4. Security - Home Security, Industry Safety enablements
Modules of the project
● Key Distribution Module
● Blockchain Smart Contract
● Device firmware module
● IPFS data encryption module
● Device Registration Module
Hardware and Software Requirements

Polygon: A scaling solution to enable faster transactions on ethereum as a Layer 2.


Node Provider: A JSON RPC enabled node to read / write transactions to the blockchain. Eg. Infura, Moralis
Smart Contract: Solidity is the language to use to program the smart contract with verification methods.
IoT environment: A tangible IoT network with boards like ESP8266 and appropriate sensors to simulate.
Front End dApp: A front end application framework like React JS and web3.js for the decentralized app.
Storage: A decentralized storage solution like IPFS / Swarm to store off-chain data
REFERENCES
● Lodovica Marchesi, Michele Marchesi, Roberto Tonelli, Maria Ilaria Lunesu. 2022. A blockchain architecture for industrial applications.
Blockchain: Research and Applications 3 (2022). https://doi.org/10.1016/j.bcra.2022.100088

● Jawad Ali, Toqeer Ali &, Yazed Alsaawy, Ahmad Shahrafidz Khalid and Shahrulniza Musa. 2019. Blockchain-based Smart-IoT Trust Zone
Measurement Architecture. INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (COINS), May 5–7, 2019,
Crete, Greece. ACM, NewYork, NY, USA, 6 pages. https://doi.org/10.1145/3312614.3312646

● Jollen Chen. 2017. Devify: Decentralized Internet of Things Software Frame-work for a Peer-to-Peer and Interoperable IoT Device. In
Proceedings of Advances in IoT Architecture and Systems, Toronto, Canada, June 2017 (AIo-TAS’17), 6 pages.

● Kazım Rıfat Özyılmaz and Arda Yurdakul. 2017. Work-in-Progress: Integrating Low-Power IoT devices to a Blockchain-Based Infrastructure. In
Proceedings of EMSOFT’ 17 Companion, Seoul, Republic of Korea, October 15–20, 2017, 2 pages.
https://doi.org/10.1145/3125503.3125628

● Nada Alasbali, Saaidal Razalli Azzuhri, Rosli Salleh. 2020. A Blockchain-Based Smart Network for IoT-Driven Smart Cities. IECC 2020, July 8-
10, 2020, Singapore. https://doi.org/10.1145/3409934.3409957

● Ali Dorri; Salil S. Kanhere; Raja Jurdak; Praveen Gauravaram. 2017. Design and Development of Blockchain-Based Decentralized IoT Platform.
IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). 13-17 March 2017.

● S. Nakamoto. Bitcoin: a peer-to-peer electronic cash system https://bitcoin.org/bitcoin.pdf (2008), Accessed 23rd Dec 2021 Google Scholar.

● CONG T. NGUYEN, DINH THAI HOANG, DIEP N. NGUYEN, YNH TUONG NGUYEN, AND ERYK DUTKIEWICZ. Proof-of-Stake
Consensus Mechanisms for Future Blockchain Networks: Fundamentals, Applications and Opportunities. June 2019 .
DOI:10.1109/ACCESS.2019.2925010

You might also like