Architecture of an intelligent cybersecurity Framework based on Blockchain technology for IIoT
Main Article Content
For organizations today it is very important to have frameworks that can automate certain processes in a certain way that have additional costs for them, and it is that automation takes great importance when the processes are related to cybersecurity, since it is a critical issue that must be updated with the latest technological developments as new vulnerabilities are found over time. That is because, in this work an architecture of a cybersecurity framework based on emerging technologies is proposed that allows to automate the generation of rules and store the information of alerts generated by possible intrusions in a comprehensive way over time, all this making use of IoT devices that are securely connected and authenticated in a Blockchain that stores the entire list of rules and possible alerts generated by certain intrusions. In this way, the rules will be generated automatically by a Deep learning algorithm that is analyzing the traffic that the IoT device emits to the cloud making use of an intrusion detection systemIDS that is monitoring the traffic that passes through a certain network and saves it in a temporary on the device until it is sent to the cloud. Likewise, the architecture also proposes an application layer of which the users who can manage the IoT devices are part, as well as the configurations for their connection with the Blockchain and in the same way they can manage rules and monitoring of the traffic that is being receiving from the devices involved.
(1) Minguez JJ. IDS colaborativo basado en Blockchain. Trbajo de Fin de Máster Universitario en Seguridad Informática. Logroño: Universidad Internacional de la Rioja, España; 2019.
(2) Palo alto networks. Kublai Khan, Blockchain & The Democratization of Identity. [Online].; 2020 [cited 2021 02 03. Available from: https://www.sailpoint.com/identity-library/wr-the-democratization-of-identity/.
(3) Balmaseda aranda F. Aseguramiento de dispositivos IoT con blockchain e infraestructura de clave publica. Trabajo de Fin de Master en Seguridad Informática. Logroño: Universidad Internacional de la Rioja, España; 2018.
(4) Kaspersky. ¿Qué es la ciberseguridad? [Online].; 2020 [cited 2021 02 03. Available from: https://latam.kaspersky.com/resource-center/definitions/what-is-cyber-security.
(5) Navarro BY. Blockchain y sus aplicaciones. [Online].; 2017 [cited 2020 02. Available from: http://jeuazarru.com/wp-content/uploads/2017/11/Blockchain.pdf.
(6) Enrique Javier Santiago JSA. RIESGOS DE CIBERSEGURIDAD EN LAS EMPRESAS. Tecnología y Desarrollo, Revista de ciencia, tecnología y medio ambiente. 2017; 15: p. 3-33.
(7) Sifre JP. IDS de red para detección de ataques sobre SSH y FTP. Máster Universitario en Ciberseguridad - Trabajos Fin de Máster. Alicante: Universidad de Alicante, España; 2020. Report No.: http://hdl.handle.net/10045/107579.
(8) Angie Valencia PP. Internet Industrial de las Cosas (IIOT): Nueva Forma de Fabricación. Popayán, Colombia: Fundación Universitaria de Popayán, Facultad de Ingeniería Industrial.
(9) García JI. Desarrollo de un sistema de trazabilidad en entornos IoT mediante Hyperledger. Trabajo fin de master. Madrid:, España; 2018. Report No.: http://hdl.handle.net/10486/685363.
(10) Chao Liang BS,SAAKAIMZSKNBI. Intrusion detection system for the internet of things based on blockchain and multi-agent systems. MDPI. 2020 Jul;(https://doi.org/10.3390/electronics9071120).
(11) Tian Hongliang XGJWCLHP. Research on distributed blockchain-based privacy-preserving and data security framework in IoT. IET Journals. 2020 Feb;(doi: 10.1049/iet-com.2019.0485).
(12) Pajooh HH, Rashid MA. A Security Framework for IoT Authentication and Authorization based on Blockchain Technology. Ieeexplore. 2019 Oct;(DOI: 10.1109/TrustCom/BigDataSE.2019.00043).
(13) Darshan Vishwasrao Medhane AKSMSHJW. Blockchain-enabled Distributed Security Framework for Next Generation IoT: An Edge-Cloud and Software Defined Network Integrated Approach. IeeeXplore. 2020 Feb;(DOI: 10.1109/JIOT.2020.2977196).
(14) Emilio Berrocal de Luna JEL. El proceso de investigación educativa II: Investigación-acción. Dialnet. 2017; 35-50.
(15) Ali h ANMOHMI. Secured Framework for IoT Using Blockchain. Ieeexplore. 2020 Dec;(DOI: 10.1109/ICICIS46948.2019.9014853).
(16) Osama Alkadi NMBTKKRC. A Deep Blockchain Framework-enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks. Ieeexplore. 2020 May;(DOI: 10.1109/JIOT.2020.2996590): p. 9463 - 9472.
(17) Soumyashree S. Panda USBKMDJDG. A Blockchain Based Decentralized Authentication. Ieeexplore. 2019 Dec;(DOI: 10.1109/ICCCNT45670.2019.8944637).
(18) Utkalika Satapathy BKMSSPSSDJ. A Secure Framework for Communication in Internet of Things Application using Hyperledger based Blockchain. Ieeexplore. 2019 Dec;(DOI: 10.1109/ICCCNT45670.2019.8944811).
(19) Gunasekaran Raja AGGAG. Intrusion Detector for Blockchain based IoT Networks. Ieeexplore. 2018 Dec;(DOI: 10.1109/ICoAC44903.2018.8939074).
(20) Shailendra Rathore BWKJHP. BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network. Journal of Network and Computer Applications. 2019 Oct; 143(https://doi.org/10.1016/j.jnca.2019.06.019): p. 167-177.
(21) Muhammad Asaad Cheema HKQCCML. Utilizing Blockchain for Distributed Machine Learning based Intrusion Detection in Internet of Things. Ieeexplore. 2020 Sep;(DOI: 10.1109/DCOSS49796.2020.00074).
(22) Bharat Bhushan CSPSAK. Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions. Wireless Networks - Springer Link. 2020; 27: p. 55–90.
(23) Na Shi Liang Tan CYCHJXYLHX. BacS: A blockchain-based access control scheme in distributed. Peer-to-Peer Networking and Applications volume -Springer Link. 2020; 14: p. 2585–2599.
(24) Deepa Pavithran KSJNAKAG. Towards building a blockchain framework for IoT. Cluster Computing -Springer Link. 2020;(23): p. 2089–2103.
- Cristian F. Bravo Mosquera, Manuel F. Silva Joaqui, Katerine Márceles Villalba, Siler Amador Donado, SINSEÑAS: Mobile application for learning and translation of colombian sign language , Ingeniería y Competitividad: Vol. 26 No. 1 (2024): Ingeniería y Competitividad
- Santiago Ordoñez Tumbo, Katerine Márceles Villalba, Siler Amador Donado, Validation of the Intelligence Technique in the detection of cyber attacks , Ingeniería y Competitividad: Vol. 26 No. 3 (2024): Ingeniería y Competitividad
- Gustavo Alejandro Jiménez-Lagos, Siler Amador-Donado, Katerine Márceles-Villalba, Evaluative study of an anonymous communication architecture for web browsing using SBC devices , Ingeniería y Competitividad: Vol. 24 No. 1 (2022): Ingenieria y Competitividad
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Authors grant the journal and Universidad del Valle the economic rights over accepted manuscripts, but may make any reuse they deem appropriate for professional, educational, academic or scientific reasons, in accordance with the terms of the license granted by the journal to all its articles.
Articles will be published under the Creative Commons 4.0 BY-NC-SA licence (Attribution-NonCommercial-ShareAlike).