Artículo
Architecture of an intelligent cybersecurity Framework based on Blockchain technology for IIoT
Arquitectura de un Framework de ciberseguridad inteligente basado en tecnología Blockchain para IIoT
Architecture of an intelligent cybersecurity Framework based on Blockchain technology for IIoT
Ingeniería y competitividad, vol. 24, no. 2, e22411761, 2022
Facultad de Ingeniería, Universidad del Valle
Received: 22 November 2021
Accepted: 15 February 2022
Abstract: For organizations today it is very important to have frameworks that can automate certain processes in a certain way that have additional costs for them, and it is that automation takes great importance when the processes are related to cybersecurity, since it is a critical issue that must be updated with the latest technological developments as new vulnerabilities are found over time. That is because, in this work an architecture of a cybersecurity framework based on emerging technologies is proposed that allows to automate the generation of rules and store the information of alerts generated by possible intrusions in a comprehensive way over time, all this making use of IoT devices that are securely connected and authenticated in a Blockchain that stores the entire list of rules and possible alerts generated by certain intrusions. In this way, the rules will be generated automatically by a Deep learning algorithm that is analyzing the traffic that the IoT device emits to the cloud making use of an intrusion detection systemIDS that is monitoring the traffic that passes through a certain network and saves it in a temporary on the device until it is sent to the cloud. Likewise, the architecture also proposes an application layer of which the users who can manage the IoT devices are part, as well as the configurations for their connection with the Blockchain and in the same way they can manage rules and monitoring of the traffic that is being receiving from the devices involved.
Keywords: Architecture, Blockchain, Deep learning, Frameworks, Internet of Things.
Resumen: Para las organizaciones hoy en día es muy importante contar con frameworks que puedan automatizar determinados procesos que repercuten en gastos adicionales para estas mismas y es que la automatización toma mucha importancia cuando los procesos están relacionados con la ciberseguridad, dado que es un tema crítico y que debe estar actualizado con las últimas novedades tecnológicas ya que con el pasar del tiempo van encontrando nuevas vulnerabilidades. Por lo anterior, en este trabajo se propone una arquitectura de un framework ciberseguridad basado en tecnologías emergentes que permita automatizar la generación de reglas y almacenar la información de alertas generadas por posibles intrusiones de forma íntegra a través del tiempo, todo esto haciendo uso de dispositivos IoT que se encuentran conectados y autenticados de forma segura en una Blockchain que almacena todo el listado de reglas y las posibles alertas generadas por determinadas intrusiones. De este modo las reglas serán generadas automáticamente por un algoritmo de Deep learning que se encuentra analizando el tráfico que el dispositivo IoT emite hasta la nube haciendo uso de un IDS que está monitoreando el tráfico que pasa por una determina red y lo guarda de forma temporal en el dispositivo hasta que este es enviado hasta la nube. Así mismo, también la arquitectura propone una capa de aplicación de la cual hacen parte los usuarios que podrán administrar los dispositivos IoT, así como también las configuraciones para su conexión con la Blockchain y de igual forma se podrán gestionar reglas y monitoreo del tráfico que se está recibiendo por parte de los dispositivos involucrados.
Palabras clave: Arquitectura, Blockchain, Deep Learning, Frameworks, Internet de las cosas.
1. Introduction
Currently there are different types of Framework that allow organizations to manage certain cybersecurity processes that are of great importance to their environment. Given that day-to-day organizations make use of new emerging technologies such as the IoT (Internet of Things), the need for tools that can help automate all those tasks that are in a way manual and that require a trained staff to be able to execute them, that is because, in recent years frameworks have had great popularity, since they allow users to concentrate on their business logic and not worry about tasks that a well configured tool can do perfectly 1. On the other hand, another latent vulnerability occurs in the transport of the data collected by IoT devices, which 98% of all traffic they generate is not encrypted, which exposes personal and confidential data on the network. Therefore, attackers who have already established command and control through phishing attacks can eavesdrop on unencrypted network traffic, collect personal or confidential information, and then exploit that data for profit from being on sites like the dark web 2. That is why Blockchain technology takes importance in the development of frameworks since it allows to guarantee the immutability of the information, ensuring that said stored information can be integrated. Likewise, Blockchain offers a decentralized architecture, preventing a single entity from having control over certain information. Consequently, this technology is suitable for a cybersecurity framework since it allows the integrity of the information and security in the transmission of data, guaranteeing its immutability; but in addition, it offers advantages such as improved communication between connected devices, since a consensus can be reached on the information that is stored.
The rest of this paper is organized as follows: Conceptualizations is presented in second section, Related works in third section, Methodology in fourth section, Results and Discussion in fifth section. Finally, some concluding remarks are presented in sixth section.
2. Conceptualizations
In order to give clarity in this section, certain concepts that are important to give context to the issue raised are addressed.
3. Related Works
Next, the related works that are taken as a reference for the development of this research are presented:
1) Securing IoT Devices with Blockchain and Public Key Infrastructure: In this article 8 a PKI (Public Key Infrastructure) environment is established to authenticate IoT devices in a secure way using the Ethereum Blockchain; In addition, a risk analysis is carried out to identify the improvements obtained in terms of security and for this a risk-based audit methodology is established that allows evaluating the prototypes presented to measure the improvements obtained in terms of security. By virtue of the above, it is important to mention that IoT devices present problems in terms of their default configuration, leaving them vulnerable, with this they seek to improve their authentication system through the implementation and deployment of a public key infrastructure distributed under the technology Blockchain.
2) Collaborative IDS based on Blockchain: This article 9 shows the development of a Blockchain from scratch oriented to operate with IDS. In addition, it teaches the technologies used and the structure of the project. In the same way, the link to the source code of the Blockchain network created is shared.
The previous research work highlights the way in which a Blockchain network is developed from scratch, thought and designed to be integrated with the IDS SNORT, for the work that was developed it was important to take into account these types of considerations, since it allows a detailed understanding of the operation of a Blockchain network at the implementation level and how to make an integration between an IDS and a Blockchain.
3) Development of a traceability system in IoT environments using Hyperledger: The project 10 addresses the development of a proof of concept (Proof of Concept -PoC-) to implement Hyperledger-Fabric (HF) in IoT. The objective is the collection of events through sensors located on a Raspberry Pi 3 (RPi) and the inclusion of incidents in the HF BC (Blockchain). Likewise, all the information collected can be consumed in real time through a web system. This article has some interesting qualities such as the development of a Blockchain using Hyperledger technology and its integration with IoT, this is of great importance for this project, because this tool allows to build very complete Blockchains that adapt perfectly to the Blockchain that was implemented.
4) Intrusion detection system for the internet of things based on blockchain and multi-agent systems: This investigation 11 focuses on the design, implementation and testing of an intrusion detection system that uses a hybrid location strategy based on a multi-agent system, Blockchain and deep learning algorithms. The system consists of the following modules: data collection, data management, analysis and response. It uses an NSL-KDD data set from the National Security Laboratory. This research contributes to the present project the implementation of the intrusion detection system and its integration with deep learning algorithms, since it allows the operation and integration of these two technologies to be understood in a more explicit way, which is of utmost importance. for the development of the proposed framework.
5) A security framework for IoT authentication and authorization based on blockchain technology: On 12 This work makes use of blockchain technology to solve IoT security problems using 5G network. For this, a multilayer network model for IoT based on blockchain is proposed, this proposal addresses many of the problems associated with the deployment of blockchain technology by dividing the IoT network into a decentralized multilayer system. Genetic algorithms for evolutionary computation and particle swarm optimization are used; likewise, communication and authentication between the nodes of the network is carried out through blockchain, avoiding the existence of a central authority. This is why hyperledger is used to verify the proposed system.
6) Blockchain-enabled Distributed Security Framework for Next Generation IoT- An Edge-Cloud and Software Defined Network Integrated Approach: OnThis document 13 proposes a blockchain-enabled distributed security framework that uses an edge cloud and a software-defined network (SDN). Detection of security attacks is achieved at the cloud layer, and consequently, security attacks are reduced at the edge layer of the IoT network. The Software Defined Network (SDN) Enabled Gateway provides dynamic network traffic and flow management, which aids in the recognition of security attacks by determining rogue network traffic flows and decreases security attacks by obstruction of doubtful flows. The results obtained show that, the contribution of this article is focused on its implementation in the cloud, since the authors take advantage of that technology to integrate in such a way that the blockchain network uses the edge of the cloud to function, it is interesting, because this type of novel implementations turn out to be of very useful for the proposed framework.
4. Methodology
In order to establish the different technologies that make up the cybersecurity framework in IIoT, the action research methodology is used 14, which consists of uniting theory with practice in such a way that the researcher can draw correctconclusions about the practices carried out. For this reason, on this occasion the development of this work was carried out from three phases:
Phase 1: Compilation and analysis of studies that propose cybersecurity frameworks related to emerging technologies.
Initially, a systematic review of the literature was carried out on the technologies that are involved in the framework that was built, this review involved searching databases related to computer science that allowed obtaining articles that addressed the issue raised. In total, 201 articles were obtained that were filtered, identifying how many of these articles were repeated and which were considered more relevant according to their title, abstract and keywords. Taking into account this initial filter, the list of articles was reduced to 67, considering as primary articles those that contain information on related technologies that are important for the construction of the framework.
The construction of a framework involves many technologies that must be taken into account for the systematic review, therefore, starting from the list of primary articles, each one was classified taking into account the technology of which we wanted to investigate in detail. Consequently, as can be seen in Table 1, applying the classification by technology, 22 articles were obtained that propose a certain framework and the rest are technologies that are involved in its construction.
Since usually not all articles mention a specific tool, framework or platform, the list of articles is reduced, because the objective is to obtain a list of articles that mention a tool to later perform a classification and thus get a top. For example: in the case of Blockchain technology, the list of articles was reduced to 14 as can be seen in Table 2.
Phase 2: Determine and select the technologies to be used for the development of the proposed framework.
Through this phase, a selection was made of the technologies that were used for the construction of the framework and for this the first thing that was done was to create the selection criteria that are very useful when making a selection, since it allows a weighting of certain technology based on the characteristics, which were proposed according to the needs of the implementation; therefore, in Table 2 it is possible to observe the characteristics proposed for the selection of Blockchain technology, as shown, each characteristic can have certain qualitative values, but as it was necessary to obtain a final weighting to have a notion of which is the technology that could best be adapted to the needs raised.
In Table 2, you can see the essential characteristics for the selection of Blockchain technology taking into account the needs of the framework, which in this case these requirements are more focused on a specific Blockchain technology being able to integrate or operate with IoT devices. Therefore, such technology must offer security, confidentiality of transactions; as well as the consumption of resources and the bandwidth is not so high.
Now, in Table 2 only the criteria for the selection of Blockchain technology were considered; therefore, each technology had selection criteria as can be seen in Table 3, the structure of these criteria was the same and what changed were the characteristics that were specified according to the technology and needs.
Table 4, shows the criteria that were taken as a reference to make the selection of an IDS, which is necessary for the construction of the proposed framework, so in this case one of the characteristics that were considered were the modes of operation, customization of rules and the consumption of resources that is of vital importance in this case, since said software will be running on an IoT device, so low resource consumption was the main objective when making the selection of the IDS suitable for the framework.
In accordance with the aforementioned, for each technology certain selection criteria were formed that allowed obtaining a top of the technologies that best adapted to the proposed project, which is why each qualitative value that had a certain characteristic must have had a value quantitative since later, when the weighting was carried out, it would be the one that has the most utility.
Phase 3: Prepare architecture taking into account the technologies proposed for its construction.
This phase consisted of assembling all the pieces that will make up the framework, that is, taking each of the proposed technologies and carrying out a thorough investigation of the operation of each one of them, but in a more technical way, since this allows to visualize in a way how it would be integrated with the entire ecosystem that the framework will have and thus be able to define which will be the appropriate place for each of these technologies.
5. Results and Discussion
A. Framework architecture
In Figure 1, you can see the final design of the architecture for the proposed framework, in this case a three-layer architecture was chosen where each layer contains a set of technologies and in turn a certain responsibility.
In this sense, it is important to highlight that each of the layers communicates, in order to transmit certain information that is necessary for the functioning of the framework.
B. Framework functional diagram
To have a clearer idea of how the framework works, it is necessary to understand in a general way what would be the flow that it would have when making use of all the technologies involved, for this in Figure 2, you can see a functional diagram through which it is detailed the general operation, this flow consists of firstly having an IoT device (a Raspberry Pi card) that is monitoring the traffic of a certain network using an IDS, said traffic is temporarily stored in the device and then sent to a database that is hosted in the cloud. This database in turn is the entry point of a Deep learning algorithm (which is also hosted in the cloud).
This brings with it a great advantage since all the devices that are connected to the Blockchain and in turn duly authenticated and identified in it, will be able to receive this new rule that was automatically generated by the algorithm, that is to say that all the devices will maintain a synchrony in the list of rules that the IDS uses to issue alerts about possible threats.
On the other hand, the Blockchain will also be able to store certain information that is important to maintain immutable traceability over time, such as: the alerts that are generated when a certain IDS rule is activated since some type of intrusion and this is important, since it would give way to subsequently obtaining reports of the number of intrusions detected during a certain period, guaranteeing that the information stored is truthful and that it has not been manipulated.
6. Conclusions
In the currently, it is necessary to incorporate technologies that are capable of providing people and organizations with greater security against their confidential data, that is why incorporating technologies such as Blockchain in cybersecurity frameworks for IIoT turns out to be a great alternative since it guarantees the integrity of the information emitted by the devices; in addition, depending on the participation and approach that is given to this technology, it helps to maintain communication between all the nodes of the network, guaranteeing a consensus between them.
One of the main difficulties that can be found when implementing this type of architecture is to choose the Blockchain technology that best suits, since currently there are different types that may seem the most appropriate at first, but when you go to an implementation where it has to be investigated in depth in a technical way, it may turn out that the selected Blockchain ends up not being so appropriate and this can happen due to different factors, perhaps due to integration with other technologies, payment for transactions, confidentiality of information, etc.
For this reason, it is recommended that when selecting a technology a certain top be taken into account, since if the one chosen for having the best score turns out not to be so adequate, you can continue with the second best scored and so on until find the one that best suits the needs of the tool you want to implement.
Another difficulty that exists is the resources of the IoT devices, since these are limited and when working with Blockchain one could think of deploying a certain node in each device, but the reality is that this can overload the device and to avoid that inconvenience it is better to keep the Blockchain in an external place, such as: a cluster distributed in the cloud or it would also be excellent to deploy each node in different clouds, because in the end what is sought with Blockchain is to have a decentralized network, That is why in this case, for the development of the work, it was chosen to maintain the Blockchain in a cluster distributed in the cloud
7. Acknowledgment
Thanks to the University of Cauca, especially to its GTI research group and to the Computer Science I+D research group of the Colegio Mayor of Cauca University Institution, for the support provided for the development of the project
8. References
Minguez JJ. IDS colaborativo basado en Blockchain. Trabajo de Fin de Máster Universitario en Seguridad Informática. Logroño: Universidad Internacional de la Rioja, España; 2019.
Kublai Khan, Blockchain & The Democratization of Identity. 2020 [cited 2021 02-03]. Available from: https://www.sailpoint.com/identity-library/wr-the-democratization-of-identity/.
Balmaseda-Aranda F. Aseguramiento de dispositivos IoT con blockchain e infraestructura de clave pública. Trabajo de Fin de Master en Seguridad Informática. Logroño: Universidad Internacional de la Rioja, España; 2018.
Kaspersky. ¿Qué es la ciberseguridad? 2020 [cited 2021 02 03]. Available from: https://latam.kaspersky.com/resource-center/definitions/what-is-cyber-security.
Navarro BY. Blockchain y sus aplicaciones. 2017 [cited 2020 02. Available from: http://jeuazarru.com/wp-content/uploads/2017/11/Blockchain.pdf.
Chinchilla EJS, Sánchez-Allende J. Riesgos de ciberseguridad en las empresas. Tecnología y Desarrollo. 2017;15:3-33.
Sifre JP. IDS de red para detección de ataques sobre SSH y FTP. Máster Universitario en Ciberseguridad. Trabajos Fin de Máster. Alicante: Universidad de Alicante, España; 2020. Available from: http://hdl.handle.net/10045/107579.
Angie Valencia PP. Internet Industrial de las Cosas (IIOT): Nueva Forma de Fabricación. Popayán, Colombia: Fundación Universitaria de Popayán, Facultad de Ingeniería Industrial.
García JI. Desarrollo de un sistema de trazabilidad en entornos IoT mediante Hyperledger. Trabajo fin de master. Madrid, España; 2018. Available from: http://hdl.handle.net/10486/685363.
Liang C, Shanmugam B, Azam S, Karim A, Islam A, Zamani M, et al. Intrusion detection system for the internet of things based on blockchain and multi-agent systems. Electronics. 2020;9(7):1120. Doi: 10.3390/electronics9071120.
Tian H, Ge X, Wang J, Li C, Pan H. Research on distributed blockchain-based privacy-preserving and data security framework in IoT. IET Journals. 2020;14(13). Doi: 10.1049/iet-com.2019.0485.
Rashid MA, Pajooh HH. A Security Framework for IoT Authentication and Authorization Based on Blockchain Technology. In: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). 2019. p. 264-71. Doi: 10.1109/TrustCom/BigDataSE.2019.00043.
Medhane DV, Sangaiah AK, Hossain MS, Muhammad G, Wang J. Blockchain-enabled Distributed Security Framework for Next Generation IoT: An Edge-Cloud and Software Defined Network Integrated Approach. IeeeXplore. 2020;7(7):6143-6149. Doi: 10.1109/JIOT.2020.2977196.
de Luna EM López JE. El proceso de investigación educativa II: Investigación-acción. Dialnet. 2017:35-50.
Ahmed AH, Omar NM, Ibrahim HM. Secured Framework for IoT Using Blockchain. In: 2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS). 2019. p. 270-7. Doi: 10.1109/ICICIS46948.2019.9014853.
Alkadi O, Moustafa N, Turnbull B, Choo KK. A Deep Blockchain Framework-enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks. Ieeexplore. 2021;8(12):9463-9472. Doi: 10.1109/JIOT.2020.2996590.
Panda SS, Satapathy U, Mohanta BK, Jena D, Gountia D. A Blockchain Based Decentralized Authentication Framework for Resource Constrained IOT devices. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). 2019. p. 1-6. Doi: 10.1109/ICCCNT45670.2019.8944637.
Satapathy U, Mohanta BK, Panda SS, Sobhanayak S, Jena D. A Secure Framework for Communication in Internet of Things Application using Hyperledger based Blockchain. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT). 2019. p. 1-7. Doi: 10.1109/ICCCNT45670.2019.8944811.
Raja G, Ganapathisubramaniyan A, Anand G, Gowshika. Intrusion Detector for Blockchain based IoT Networks. In: 2018 Tenth International Conference on Advanced Computing (ICoAC). 2018. p. 328-32. Doi: 10.1109/ICoAC44903.2018.8939074.
Rathore S, Wook Kwon B, Park JH. BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network. Journal of Network and Computer Applications. 2019;143:167-77. Doi: 10.1016/j.jnca.2019.06.019
Cheema MA, Khaliq Qureshi H, Chrysostomou C, Lestas M. Utilizing Blockchain for Distributed Machine Learning based Intrusion Detection in Internet of Things. In: 2020 16th International Conference on Distributed Computing in Sensor Systems (DCOSS). 2020. p. 429-35. Doi: 10.1109/DCOSS49796.2020.00074.
Bhushan B, Sahoo C, Sinha P, Khamparia A. Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions. Wireless Networks. Springer Link. 2020;27:55-90. Doi: 10.1007/s11276-020-02445-6.
Shi N, Tan L, Yang C. He C, Xu J, Lu Y, Xu H. BacS: A blockchain-based access control scheme in distributed. Peer-to-Peer Networking and Applications volume. Springer Link. 2021;14:2585-2599. Doi: 10.1007/s12083-020-00930-5.
Pavithran D, Shaalan K, Al-Karaki JN, Gawanmeh A. Towards building a blockchain framework for IoT. Cluster Computing. Springer Link. 2020;23:2089-2103. Doi: 10.1007/s10586-020-03059-5.
Notas: