47

Security Issues in Blockchained IoT

an anonymous node’s real-world identity. Any information relating to

private data of the user can be identified by an attacker; an intruder may

attempt de-anonymization of users by linking a user’s PKs (Primary Keys)

and ties to separate data pieces with the same anonymous user for a period.

Modification Attack

The attacker must compromise the integrity of cloud storage to initiate

this attack. The attacker may then try to modify or delete stored infor­

mation for a certain user. This user can identify any improvements in the

storage data by matching the cloud hash with the local BC (Blockchain)

hash. When a user identifies a privacy infringement, he produces a transac­

tion implying two transactions: The user-signed transaction and the cloud

storage, which include the real method of the privacy and the user-signed

access transaction containing the database and the user-invalid hash of the

data. The transaction is then forwarded to many CHs (Cluster Heads) that

verify the initial transactions. In the event of incoherence of two hashes,

CH alerts the cloud storage nodes to malicious activities. However, when

subjected to this attack, the user cannot recover his data.

Dropping Attack

The adversary will monitor a CH or group of CHs to launch this attack.

The CHs managed by the attacker will delete all transactions and blocks

that have been issued. Nonetheless, an intrusion will be observed because

of the lack of transactions or resources from the network from any nodes

belonging to the constituent clusters.

Sybil Attack

A Sybil attack is a security vulnerability on an electronic infrastruc­

ture that aims to take over the network by the creation of several identi­

ties, nodes and machines. Attackers will deny the authentic nodes over the

network if appropriate false identities are generated and then fail to accept

or send blocks and obstruct other network users. Most Blockchains employ

different “algorithms of consensus” to better protect themselves against

Sybil attacks. These contain work proof, proof of stake and vicarious proof

of stake. Such algorithms of consensus do not eliminate attacks by Sybil,

but they render an effective attack by Sybil very impractical for an intruder.

3.4  APPLICATIONS OF BLOCKCHAINED IOT

There are numerous applications of Blockchain and IoT. The amalgamation of both

the technologies has come up with new possibilities. The following case studies can

be seen as the platforms where the amalgamated models can be used.

3.4.1  Case Study I: Smart Home Based on Blockchained IoT

A Blockchain-based smart home application is an example where this combined

technology can be seen. In IoT, security and privacy are the major concerns due to the

wide-ranging nature of IoT devices (Dorri et al., 2017). A large number of researchers