Building smart services for smart cities has become a major focus in modern technological advancements. Mobile scanners play a crucial role in capturing and processing data from various sources. Smart city applications emphasize the need for secure data sharing across heterogeneous devices. However, certain actions taken during data sharing can pose risks to security, privacy, and data integrity. The reliance on a centralized repository has been a major factor in past securitybreaches. Therefore, ensuringsecureauthenticationand the protectionof sensitivedata is crucial formodern applications. Blockchainisawidelyadoptedtechnologythatensuresdataintegrityandsecurity.Thispaperintroducesanovelblockchainbasedframework,SecPrivPreserve,designedtoenhancethesecurityandintegrityofdatageneratedbymobilescanners.Theproposedframeworksecuresdatathroughmultiplephases,includinginitialization,registration,dataprotection,authentication,accesscontrol,validation,datasharing,andsecuredownloads.Tostrengthensecurity,SecPrivPreserveintegratesvariousmechanismssuchasencryption,hashing,andauthenticationtechniquesthatenhanceconfidentiality,privacy,andintegrity.Unliketraditional approachesthat rely on one-time passwords(OTP) for authenticationand data sharing,this frameworkemploys QR codesforsecureaccessand datasharingkeystofurtherenhancesecurity.SincetheSecPrivPreserveframeworkisbuiltonapermissionedblockchain,itinherentlybenefitsfromtamper-proofrecordsandnon-repudiation.Moreover, for data protection techniquesto enhance cryptographicsecurity.
Introduction
The global push toward smart technologies aims to improve people’s lives, with the Internet of Things (IoT) playing a key role by connecting physical devices and enabling data transfer across sectors like healthcare, manufacturing, finance, traffic, and energy. IoT’s compactness and low power consumption drive its rapid growth, with an expected market value of $1.4 trillion by 2027. Smart city initiatives, such as China’s 220+ projects, use IoT and associated technologies to manage urban operations and improve citizens' quality of life by creating instrumented, interconnected, and intelligent urban environments.
However, IoT devices face security and privacy challenges due to inconsistent protocols, limited computing power, and centralized data repositories, making smart cities vulnerable to cyberattacks like data fabrication, denial-of-service, and data poisoning. Existing security measures often fall short because of IoT’s heterogeneity and resource constraints. Simple cryptographic frameworks tailored to IoT’s needs are necessary to secure data during storage, transmission, and sharing while complying with regulatory policies.
To address these issues, blockchain technology emerges as a promising solution by providing decentralized, tamper-proof data management. Blockchain-based frameworks can improve privacy and security in smart city applications, overcoming limitations of centralized cloud systems. Smart contracts automate trust and workflows, further enhancing security and efficiency.
The document also reviews recent studies on blockchain applications in Industry 4.0 and IIoT environments, emphasizing blockchain’s potential to secure industrial IoT through access control and trusted data management.
The proposed project, SecPrivPreserve, is a blockchain-based framework designed to enhance security, privacy, and data integrity in IoT-based smart cities. It includes modules for user registration, membership service providers, authority management, smart contracts, and clients, facilitating secure data sharing and access through encryption, OTPs, hashing, and QR code techniques.
Conclusion
In this paper, Blockchain secures and anonymizes IoT and its applications. Smart city challenges include user security, privacy, bandwidth, anonymity, and scalability. Therefore, this study proposes a blockchain-based SecPrivPreserve system. The presented framework ensures the privacy and safety of the user’s data throughout processing. In the Hyperledger Fabric blockchain, information is summarized, and specific features of business transmission are systematized based on the model. Initialization, registration, data protection, authentication, data access control, validation, data sharing and download comprise in SecPrivPreserve framework.Security features include passwords, OTP, encryption, hashing, digital signature, Chebyshev polynomials, and interpolation. Cutting-edge experiments demonstratedthatSecPrivPreserveoutperformedstate-of-the-artsystemsinresponsiveness,processingtime, encryption quality, and detection rate. However, the experimentation was carried out through Fabric SDK, and the obtainedresultsshowthattheproposedframeworkreducescomputationaltimeandresponsiveness
References
[1] C.Vanmathi, R. Mangayarkarasi,and R.J. Subalakshmi, ‘‘Real timeweather monitoringusing Internetof Things,’’ inProc.Int.Conf.Emerg. TrendsInf. Technol.Eng.(ic-ETITE),Feb.2020,pp.1–6.
[2] B.BryantandH.Saiedian,‘‘KeychallengesinsecurityofIoTdevicesandsecuringthemwiththeblockchain technology,’’ Secur. Privacy, vol. 5, no. 5, p. e251, Sep. 2022.
[3] F.Al-Turjman,H.Zahmatkesh,andR.Shahroze,‘‘Anoverviewofsecurityandprivacyinsmartcities’IoT communications,’’ Trans.Emerg. Telecommun. Technol., vol.33,no.3,p.e3677,Mar.2022.
[4] TheEditorsofEncyclopaedia.(Dec.9,2023).UnitedNationsPopulationFund.EncyclopediaBritannica. Accessed: Jun. 6, 2023.
[5] V. Moustaka,Z. Theodosiou,A. Vakali, and A. Kounoudes,‘‘Smartcitiesatrisk!Privacyandsecurityborderlines fromsocialnetworkingincities,’’ inProc.Companion TheWebConf.WebConf.,2018,pp.905–910.
[6] I.Makhdoom,M.Abolhasan,J.Lipman,R.P.Liu,andW.Ni,‘‘AnatomyofthreatstotheInternetofThings,’’ IEEECommun.SurveysTuts.,vol.21,no.2,pp.1636–1675,2nd Quart.,2019.
[7] K.Zhang,J.Ni,K.Yang,X.Liang,J.Ren,andX.S.Shen,‘‘Securityandprivacyinsmartcityapplications: Challengesandsolutions,’’ IEEE Commun.Mag. ,vol.55,no.1, pp.122–129,Jan.2017.
[8] S. Chaudharyand P. K. Mishra,‘‘DDoS attacksin industrialIoT: A survey,’’Comput.Netw., vol. 236,Nov.2023, Art. no. 110015.
[9] L.Cui, G. Xie, Y. Qu,L.Gao,and Y. Yang,‘‘Security and privacy in smart cities: Challenges and opportunities,’’ IEEE Access, vol. 6, pp. 46134–46145, 2018.
[10] Z.XihuaandD. S.B. Goyal,‘‘SecurityandprivacychallengesusingIoTblockchaintechnologyina smartcity: Criticalanalysis,’’ Int.J.Electr. Electron.Res.,vol.10,no.2,pp.190–195,Jun.2022.
[11] P. M.RaoandB. D.Deebak,‘‘Securityandprivacyissuesinsmartcities/industries:Technologies,applications, andchallenges,’’ J.AmbientIntel l.Humanized Comput.,vol.14,no.1,pp.1–37,Feb.2022.
[12] M. Ramaiah,V. Chandrasekaran,V. Ravi,and N.Kumar,‘‘An intrusiondetectionsystem usingoptimizeddeep neuralnetworkarchitecture,’’ Trans.Emerg. Telecommun.Technol.,vol.32,no.4,p.e4221, Apr.2021.