ArticlePDF Available

Blockchain-SDN-Based Energy-Aware and Distributed Secure Architecture for IoT in Smart Cities

Authors:

Abstract and Figures

Insecure and portable devices in the smart city’s Internet of Things (IoT) network are increasing at an incredible rate. Various distributed and centralized platforms against cyber-attacks have been implemented in recent years, but these platforms are inefficient due to their constrained levels of storage, high energy consumption, the central point of failure, underutilized resources, high latency, etc. In addition, the current architecture confronts the problems of scalability, flexibility, complexity, monitoring, managing & collecting of IoT data and defend against cyber-threats. To address these issues, the authors present a distributed and decentralized Blockchain-Software Defined Networking (SDN) based energy-aware architecture for IoT in smart cities. Thus, SDN continuous observing, controlling, managing IoT devices activities and detect possible attacks in the network; Blockchain provides adequate security & privacy against cyber-attacks, reduces the central point of failure issues; Network Function Virtualization (NFV) are used to saving energy, load balancing, as well as increasing the lifetime of the entire network. Also, we introduce a Cluster Head Selection (CHS) algorithm to reduce the energy consumption in the presented model. Finally, we analyze the performance using various parameters (e.g., throughput, response time, gas consumption, communication overhead) and demonstrating the result that provides higher throughput, lower response time, lower gas consumption than existing works for smart cities.
Content may be subject to copyright.
IEEE INTERNET OF THINGS JOURNAL, VOL., NO., MARCH 2021 1
Blockchain-SDN based Energy-Aware and
Distributed Secure Architecture for IoTs in Smart
Cities
Md. Jahidul Islam, Anichur Rahman, Sumaiya Kabir, Md. Razaul Karim, Uzzal Kumar Acharjee, Mostofa Kamal
Nasir, Shahab S. Band, Mehdi Sookhak, and Shaoen Wu
Abstract—Insecure and portable devices in the smart city’s
Internet of Things (IoT) network are increasing at an incredi-
ble rate. Various distributed and centralized platforms against
cyber-attacks have been implemented in recent years, but these
platforms are inefficient due to their constrained levels of storage,
high energy consumption, the central point of failure, underuti-
lized resources, high latency, and etc. In addition, the current
architecture confronts the problems of scalability, flexibility,
complexity, monitoring, managing & collecting of IoT data, and
defend against cyber-threats. To address these issues, the authors
present a distributed and decentralized Blockchain-Software
Defined Networking (SDN) based energy-aware architecture for
IoT in smart cities. Thus, SDN continuous observing, controlling,
managing IoT devices activities and detect possible attacks in
the network; Blockchain provides adequate security & privacy
against cyber-attacks, reduces the central point of failure issues;
Network Function Virtualization (NFV) are used to saving energy,
load balancing, as well as increasing the lifetime of the entire
network. Also, we introduce a Cluster Head Selection (CHS) algo-
rithm to reduce the energy consumption in the presented model.
Finally, we analyze the performance using various parameters
(e.g. throughput, response time, gas consumption, communication
overhead) and demonstrating the result that provides higher
throughput, lower response time, lower gas consumption than
existing works for smart cities.
Index Terms—SDN, IoT, NFV, Blockchain, SDN Controller,
Cluster, OpenFlow, Security, Privacy, Smart city.
I. INTRODUCTION
The world is getting smarter over time because of modern
technologies. People can do myriad things that could not be
Md. Jahidul Islam and Sumaiya Kabir are with the Department of Computer
Science and Engineering, Green University of Bangladesh, Dhaka, Bangladesh
e-mail: jahidul.jnucse@gmail.com, sumaiya@cse.green.edu.bd.
Anichur Rahman is with the Department of Computer Science and En-
gineering, National Institute of Textile Engineering and Research (NITER),
Dhaka, Bangladesh. e-mail: anis.mbstu.cse@gmail.com.
Md. Razaul Karim, Mostofa Kamal Nasir are with the Department of
Computer Science and Engineering, Mawlana Bhashani Science and Tech-
nology University, Tangail, Bangladesh. e-mail: razaulce15004@gmail.com,
kamal@mbstu.ac.bd.
Uzzal Kumar Acharjee is with the Department of Computer Science
and Engineering, Jagannath University, Dhaka, Bangladesh. e-mail: ukachar-
jee@gmail.com.
Shahab S. Band is with the Institute of Research and Development,
Duy Tan University, Da Nang 550000, Vietnam and Future Technology
Research Center, College of Future, National Yunlin University of Science
and Technology, 123 University Road, Section 3, Douliou, Yunlin 64002,
Taiwan. e-mail: shamshirbandshahaboddin@duytan.edu.vn.
Mehdi Sookhak and Shaoen Wu are with School of Information Technol-
ogy, Illinois State University, Normal, IL, USA. e-mail: msookha@ilstu.edu,
swu1235@ilstu.edu.
Manuscript received - ; revised -
thought of before. To make our habitats more elegant, IoT is
lending so many contributions. Nowadays a countless number
of sensors from different categories are connected together to
move our lives forward. The IoT devices collect data from the
real-world and can send them to a processing system where the
data could be transferred into a valuable decision. The idea of
using RFID to recognize a sensor among the millions of nodes
is very impressive and effective in the field of IoT [1]. Some
studies show that the approximate amount of devices could be
75 billion by 2025 [2]. That’s why the risk of getting attacked
by online intruders became higher and it became very difficult
to manage such kind of gigantic information on time.
However, IoT devices accumulate informative data in a
scattered way as there is no system to arrange the collections
of data followed by any systematic as well as scientific
procedures. To decorate the huge amount of scattered data,
SDN is used with IoT applications with a central controller
to support the [3] network configuration and management.
It can control the behavior of the data dynamically and
change the operational procedures programmatically without
hampering the main physical architecture. When there are
some vulnerabilities, SDN can easily detect the anomalies
and can take some pre-steps to inhibit any kinds of attacks
primarily. Apart from these merits, SDN can perform their
operations with multiple centralized controllers [4].
Fig. 1. Blockchain Structure
IEEE INTERNET OF THINGS JOURNAL, VOL., NO., MARCH 2021 2
Although SDN is one of the emerging technologies which
comes with the advantages of managing a massive amount
of raw information and primary security, being centralized
system causes another major issue into the performance. If
any problem occurs in the center point of the controllers,
the whole system will be affected and destroyed [5], [6]. On
the other hand, DoS and DDoS attacks can cause multiple
controller failures [7]. To defeat the individual point of failure,
decentralized Blockchain technology comes into action. This
decentralized technology can be integrated with SDN based
IoT applications where hash values are used to chain the
blocks together, and each and every piece of the transaction is
permanently saved, as shown in Fig. 1. Security and privacy
could be enhanced by integrating this Blockchain technology.
A block of code known as Smart Contract (SC) is run to verify
and validate a transaction. Once a data transaction is validated,
the information is stored in a storage and the index of the
data with some other overheads is stored in the block, which
is added to the public ledger. The ledger is immutable and
impossible to change it by any intruder. Thus Blockchain can
prevent the attacks from trespassers and as the transactions
are handled by the SC programmatically, once the rules and
regulations are established, there is nothing to be worried about
the transaction process.
Furthermore, energy consumption is a critical issue while
there will be billions of smart devices are connected across
the area and such kind of architecture will be applied. The
power is required to transmit the information collected by the
IoT gateway. So it is also a piece of interest to take care
of the amount of energy. Clustering the devices into various
groups and selecting one of them to transfer the data to the
processing station as the cluster head can lead the action to
decrease the power consumption. There are many factors to
select the head and some researchers have already proposed
different algorithms to choose the Cluster Head (CH). Another
modern technique to virtualize the functionality is also very
feasible in these types of smart architectures. NFV provides
communication services by turning the practicalities of IoT
devices into a virtualization [8]. It is the application system
where the system is resilient if it gets any changes in the traffic
load and failures. To provide dependable communication in
networks, different technologies are fused. So it is reasonable
to be raised the complexity whenever these technologies will
be implemented. Several solutions have been presented by
many researchers. The solutions are not capable of fulfilling
the criteria, such as some of these solutions leave more security
but not perfect in terms of reliability. Some authors proposed
a Blockchain-based SDN application, but the architecture is
not asserted [9].
Motivating by the above premises, the author presents an
energy-optimized and Blockchain-SDN based secure architec-
ture. A CHS method has proposed that selects CH among
the clusters with the highest residual energy that balances
the energy among the IoT devices. Moreover, SDN con-
trollers dynamically managed IoT device’s operational activi-
ties that increase security & privacy. In addition, decentralized
Blockchain technology is used to reduce the malicious activ-
TABLE I
TERMINOLOGIES AND DESCRIPTION IN ALPHABETICALLY ORDER ED
Notations Definition
API Application Programming Interface
BC Blockchain
CH Cluster Head
CHS Cluster Head Selection
CSP Cloud Service Provider
DDoS Distributed Denial of Service
IoT Internet of Things
LEACH Low-Energy Adaptive Clustering Hierarchy
NFV Network Function Virtualization
NFVI Network Function Virtualization Infrastructure
PoW Proof of Work
QoS Quality of Service
RPC Remote Procedure Call
SC Smart Contact
SDN Software Defined Networking
SDK Software Development Kit
TCP Transmission Control Protocol
WSN Wireless Sensor Network
ities of the network also provides security & privacy in the
proposed network.
A. Contributions of the study
The contributions of this paper are as follows:
Design a distributed and decentralized architecture for
IoT the ecosystem which reduces the existing challenges
through the use of technologies Blockchain, SDN, and
NFV.
Implement the SDN network on the mininet-wifi emulator
and the Blockchain network using Ethereum technology
to detect and mitigate the cyber attack in the IoT net-
works.
Also, an CHS algorithm is proposed for energy-aware
where the highest residual energy is selected as a CH in
the cluster.
Evaluate the performance of the proposed model with
two existing works using various simulation parameters
that are carried out (e.g., throughput, response time, gas
consumption, and communication overhead). We also
take into account the attack scenarios (DDoS) for various
applications in the proposed model.
The rest of the research has been formed as follows: we have
studied and discussed the literature review in Section II. After
that, Section III presents a distributed architecture for IoT;
CHS procedure; Security mechanism flowchart. Moreover,
evaluation of results and analysis of the proposed model are
provided in Section IV. In sum, the author’s concluded the
paper in Section V.
II. LITERATURE OVERV IE W
Some researchers have addressed in recent years based
on emerging leading technology such as Blockchain, IoT,
NFV, and SDN technologies. In this section, we are going
to represent some literature’s overview of recent works:
IEEE INTERNET OF THINGS JOURNAL, VOL., NO., MARCH 2021 3
TABLE II
EXISTING WOR K ANALYS IS
Authors Key
Technologies
Architecture Application Issues
Address
Blockchain
Implementation
Platform
Sharma et al. [1] Blockchain,
SDN
Centralized,
Distributed
IoT
Ecosystem
Security &
Privacy
Ethereum Network
Rahman et al. [10] Blockchain,
SDN
Centralized,
Distributed
Smart City Security &
Privacy
Ethereum Network
Anich et al. [11] Blockchain,
SDN
Centralized,
Distributed
Smart City Security &
Privacy
Ethereum Network
Ghandour et al. [12] Blockchain Decentralized,
Distributed
Smart City Security &
Privacy
Hyperledger Fabric
Xu et al. [13] Blockchain,
Smart Contract
Decentralized,
Distributed
IoT Networks Security &
Privacy
-
Sharma et al. [14] SDN Centralized,
Distributed
Edge
Computing
Energy -
Sharma et al. [15] Blockchain,
SDN
Centralized,
Distributed
Smart City Security &
Privacy
Ethereum Network
Reyna et al. [16] Blockchain,
SDN
Decentralized,
Distributed
IoT Networks Security &
Privacy
Ethereum &
Hyperledger
Rahman et al. [17] Blockchain,
SDN
Centralized,
Distributed
IoT
Ecosystem
Security &
Privacy
Ethereum Network
Rahman et al. [18] Blockchain Decentralized IoT
Ecosystem
Security &
Privacy
Hyperledger Fabric
Sharma et al. [19] Blockchain,
SDN
Centralized,
Distributed
IoT Networks Security &
Privacy
Ethereum Network
Novo et al. [20] Blockchain Centralized,
Distributed
IoT Networks Scalability Ethereum Network
Gu et al. [21] Blockchain Decentralized,
Distributed
Cloud
Computing,
IoT Networks
Security &
Privacy
Ethereum &
Hyperledger
Sharma et al. [15] Blockchain Distributed Automotive
Industry &
Smart city
Security &
Privacy
Ethereum
A. IoT with Smart Cities
Stojkosk et al. [22] presented an IoT framework for a smart
home under the consideration of home energy management
and architectural challenges and solutions. They also empha-
sized on the data processing issues. They identified a holistic
and cloud-centric model integrated with different components
of IoT. The authors also analyzed the state of art IoT solutions
into their smart home system. They have:
- Analyzing the stream and next challenges for the IoT
based on results.
- Smart home defining for a holistic framework with key
characteristics and parameters
- A splendid explanation of a holistic framework based
smart home management model
In [23], the authors discussed the essential IoTs and in-
telligent structures for energetic building blocks. They also
set the direction for energy optimization and the next man-
agement systems for building propagation. Additionally, they
also dealt with some of the technical opportunities offered
and the professional disputes IoT faces in a smart building.
Mehmood et al. [24] introduced the IoT-enabled model for
categories of smart cities and networks, possible prospects,
and significant desires. Several wireless technologies such as
SIGFOX, 6LoWPAN, and IEEE 802.11p were also expended.
Furthermore, they highlighted some challenges and directions
for future smart technology research. In another research, Hui
et al. defined the significant necessities for making a smart
home management [25]. Authors remarked seven unique req-
uisite commendations for in-casing the extraordinary quality
of the intelligent home control efficiently.
B. Cluster Head Selection Approaches
Kumar et al. introduced clustering techniques, which ap-
portioned the extensive system into tiny clusters where every
cluster its cluster head (CHs) [26], [27]. Those CHs appro-
priated the method of period analysis various admittance for
fulfilling time grooves to each link. They also mentioned the
energy utilization of hops that aided the network to assist in
various times. Similarly, Angel et al. presented an Enhanced
Energy Efficient Clustering Algorithm (EEECA) for lessening
strength tuberculosis in plucking a Cluster Head (CHs) in
Mobile Wireless Sensor Networks [27], [28]. On the other
study, Al-Baz et al. addressed a special version of the LEACH
protocol named Node Ranked–LEACH, which validated the
Node Station (NS) algorithm based on system lifetime [29].
In addition, they also promised to succeed in the arbitrary
method choice as an algorithm, which in other LEACH
variants provides instant failure for different cluster heads.
Further, they have also approached varied parameters such as
throughput and performance packet ratio, reducing the packet
delay and the sensor’s energy expenditure. In a similar work,
Zhao et al. recommended [30] a transformed LEACH-based
cluster-head selection algorithm for WSNs. Additionally, they
illustrated different networking perspectives, such as network
IEEE INTERNET OF THINGS JOURNAL, VOL., NO., MARCH 2021 4
continuance, energy maintenance, and data volume during the
simulation phases.
C. IoT with SDN
Kalkan et al. considered the security of various SDN inven-
tions and based on security demands, and they suggested the
most appropriate security mechanism in [31]. The authors also
discoursed future challenges in the area of IoT environment
with a role-based comptroller for preserving security appointed
as Rol-Sec for SDN. Moreover, Bull et al. introduced an
SDN-based security scheme for the IoT network in [32]. The
authors also proposed architecture that unmistakably described
the discovery and impediment of the technique of flooding
assails for TCP and ICMP. Then, In [33], the authors refreshed
different aimed SDN architecture and security solutions for
IoT from 2012 to 2016. They analyzed and compared various
existing solutions on SDN based on the IoT. Another secure
IoT structure based on SDN has been depicted in [34].
Next, In [35], for secure Black SDN-IoT authors proposed a
distributed architecture for smart cities with the NFV concept.
To improve accessibility, protection, and privacy, they used
multiple distributed SDN controllers in their proposed archi-
tecture. Vandana et al. aimed at a security-based framework for
applying SDN to the IoT ecosystem. In addition, Mukherjee
et al. presented an SDN basis of disseminated IoT network
using NFV execution for smart cities in [3]. The authors also
implemented NFV into SDN-IoT architectural network to train
cost-efficient, reliable, and springy intelligent cities. Further-
more, they mentioned the cluster head selection procedure and
addressed the multiple controllers in the SDN environment.
Secure mechanics, introduced by Liu et al. [36] has proposed
for handling various assails. The authors proposed SDN for the
Middlebox arrangement and flow table capacity constraints .
Additionally, they also demonstrated the experimental results
of the suggested M-G model and improved the overall safety
and perceptive constancy in the IoT network.
D. IoT-SDN with Blockchain
Rahman et al. proposed “DistBlockSDN” architecture for
smart cities in [10]. Furthermore, they presented a cluster head
selection approach for collecting sensors data with low energy
dissipation. Besides, the authors evaluated the performances in
different parameters such as throughput and packet arrival rate
carefully using Blockchain technology. In another research,
Sharma et al. [19], through the use of Blockchain technology,
proposed an efficient cloud architecture to improve security.
However, the proposed model with distributed cloud infras-
tructure provides the computing infrastructures with secure,
minimal cost access. Furthermore, they evaluated their pro-
posal using some performance metrics. But, their performance
is not yet the absolute one. The implication of Blockchain
with cloud-based IoT is reviewed in [37]. After describing
the Blockchain method and classification, the authors dis-
cussed the need for Blockchain before implementation in IoT.
They analyzed when an organization should use Blockchain
in IoT applications and provided an optimized architecture
for IoT. After analyzing the IoT based applications security
TABLE III
EXISTING REC ENT WO RKS : IS SUE S & CHALLENGES
Articles Issues & Challenges
Yazdinejad et al.
(2020) [41] Digital Security
Resource Management
Energy Consumption
Singh et al.
(2020) [42] Digital Security
Scalability
Energy Consumption
Aujla et al.
(2020) [43] Storage
Centralized minor
Interoperability
Digital Security
Hameed et al.
(2020) [44] Scalability
Delay and Response Time
Load Balancing
Digital Security
Sharma et al.
(2020) [15] Transaction Speed & Cost
Legal Framework
Simplicity & Integrated Platform
Pradip et al.
(2019) [45] Co-integration with IoT platform
Virtual ecosystem
Dynamic expandability
Standardization
Rathore et al.
(2019) [46] Co-integration with IoT platform
Virtual ecosystem
Dynamic expandability
Standardization
issues, challenges, efficiency, and feasibility, the authors found
Blockchain as a solution in [38] and [39]. Moreover, Dorri et
al. analyzed the smart home’s functions and core components
based on Blockchain for IoT for security and privacy purposes
[40]. They used a local and private Blockchain that provides
IoT gadgets with secure access control and keeps a time-
ordered transaction history for each smart home tier.
III. PROP OS ED BLOCKCHAIN-SDN BASED DISTRIBUTED
ARCHITECTURE
Taking the above problem into consideration, the authors
propose a distributed Blockchain-SDN based architecture for
smart city, as shown in Fig. 2, we consider the emerging
technology such as IoT, SDN, and Blockchain to specify the
smart cities. The proposed model consists of several layers,
including the perception layer where the smart device provides
data for users. Then, the edge layer produces a report on
the data that is provided by the perception layer and also
processing data efficiently. Furthermore, the cloud layer is used
to store the desired data, also provide services securely by the
Cloud Service Providers (CSPs). Furthermore, the SDN and
Blockchain performances entirely depend on the performance
of every layer successfully.
IEEE INTERNET OF THINGS JOURNAL, VOL., NO., MARCH 2021 5
Fig. 2. Proposed Architecture for Smart Cities
However, we separate various steps for explaining our
proposed architecture. At first, we provide a energy efficient
cluster head selection algorithm to select a cluster head (CH)
with energy consumption in the perception layer environment,
as shown in Fig. 3. In the SDN environment, the SDN has
been organized into two convenience planes, such as the data
plane and the control plane. In addition, we also present the
SDN-IoT architecture for passing raw data through SDN-IoT
standard gateway protocol data layer. Besides, we use the
NFV that provides physical specification and decreases energy
consumption effectively. Also, it comprises load balancing,
conservation of energy and electronic network scale [35], [47].
Further, FloodLight is SDN controller that helps to forward
the filtering data to the control layer in the SDN environment
efficiently using OpenFlow based SDN routing protocol. In
addition, controllers ensure that all data is filtered by the data
layer of the SDN platform.
After that, we address Blockchain technology [48] with a
distributed ledger for accomplishing the transaction process
one block to another through the communication channel. This
process can be capable of providing security and privacy to the
proposed architecture more confidentially. Most importantly,
the block data is stored by the cloud layer conditionally. If
the data is valid, then the data is placed into data centers
accordingly, as depicted in Fig. 4. After completing the
Blockchain transaction, cloud data is going through the de-
sired applications, including the smart home, traffic, building,
hospital, payment system, and so on.
A. Energy Efficient Cluster Head Selection Method
IoT devices can forward data with the help of common SDN
gateways. Also, the dynamic SDN controller can filter the
IoT data. As the proposed architecture will provide security
Fig. 3. Clusters Head Selection Procedure
and confidentiality to the data that helps to transmit the data
to the cloud layer (security process is discussed in the later
section). But, it performs efficiently if the IoT devices can
be able to select energy-efficient cluster heads. In this part,
the authors have proposed an energy-efficient cluster head
selection algorithm in this section, which is shown in Fig.
3.
1) Cluster Head Selection:Cluster heads selection one of
the essential part of the proposed scheme. For increasing the
network’s lifetime, Cluster Heads (CHs) are evenly distributed
among the system. At the beginning of the algorithm, sort-
ing each node according to their energy values ((𝐸𝑁
𝑖)) and
choosing the highest energy node that is primarily considered
as a CH among the cluster and other nodes are considered as
the member of each cluster. After that, calculate the distance
IEEE INTERNET OF THINGS JOURNAL, VOL., NO., MARCH 2021 6
Fig. 4. Edge Enable Service Architecture
TABLE IV
NOTATIO NS OF T HE CHS METHOD
Notations Definition
𝑛𝑖Number of IoT devices
𝐶𝑖Clusters of the IoT devices
𝐸𝑟𝑒 𝑠
𝑖IoT devices residual energy
𝐸𝑡ℎ
𝑖Threshold value of energy
𝜁Cluster Head
𝐸𝑁
𝑖Sorted list o f nodes based on energy
DDistance between the nodes
BS Base Station
DBS Distance from the Base Station
NDBS Net Distance from the Base Station
𝐶𝐸𝑚 𝑎𝑥
𝑖Maximum energy of the clusters
from one to the other nodes using Euclidean Distance. Also,
computing the sum of the distance of all nodes from one
node. Then, calculating the distance of all nodes from the Base
Station (BS) and also calculates the net distance (NDBS) from
the base station to all nodes. Then, compute the residual energy
of the IoT devices based on the min(NDBS) and maximum
energy 𝐶𝐸𝑚 𝑎𝑥
𝑖respectively. In addition, 𝐸𝑟 𝑒𝑠
𝑖indicates the
residual energy, and 𝐸𝑡
𝑖represents the threshold energy, which
means that CH has considerably more energy to carry out its
operation. Further, before going to sleep, each node transmits
data to the CHS. Finally, data sent to the base stations after
collecting the data by the CHs through a standard SDN
gateway. Only can eligible CHs get permission for routing
into an efficient path.
IEEE INTERNET OF THINGS JOURNAL, VOL., NO., MARCH 2021 7
TABLE V
COMPARISON OF PROPOS ED ALGORITHM WITH EXISTING WO RKS
Authors IoT Nodes sorting
with energy values
Distributed Node
Density
Optimization Reliability Energy
Aware
Rahman et al. [10] X X × × × X
behera et al. [49] ×X×X× ×
Aslam et al. [50] ×X X X X X
Anich et al. [11] X X X ×X X
Farman et al. [51] ×X X ×X X
Kumar et al. [52] ×X X ×X X
Renugadevi et al. [53] ×X× × × X
Proposed X X X X X X
Algorithm 1: Proposed Energy Aware Cluster Head
Selection Algorithm
1Require:
𝑁𝑖:𝑁𝑢𝑚𝑏𝑒𝑟 𝑜 𝑓 𝐼𝑜𝑇 𝑑𝑒𝑣𝑖𝑐𝑒𝑠
𝐶𝑖:𝐶𝑙 𝑢𝑠𝑡𝑒𝑟𝑠 𝑜 𝑓 𝑡ℎ𝑒 𝐼 𝑜𝑇 𝑑𝑒𝑣𝑖 𝑐𝑒 𝑠
𝐸𝑟 𝑒𝑠
𝑖:𝐼𝑜𝑇 𝑑𝑒 𝑣𝑖𝑐𝑒𝑠 𝑟𝑒𝑠𝑖 𝑑𝑢𝑎𝑙 𝑒𝑛𝑒𝑟𝑔 𝑦
𝐸𝑡
𝑖:𝑇 ℎ𝑟 𝑒𝑠 ℎ𝑜𝑙 𝑑 𝑣𝑎 𝑙𝑢𝑒 𝑜 𝑓 𝑒 𝑛𝑒𝑟𝑔 𝑦
Ensure: 𝐶𝑙𝑢𝑠𝑡𝑒𝑟 𝐻𝑒𝑎𝑑 𝑠𝑒𝑙𝑒𝑐𝑡𝑖 𝑜𝑛 (𝜁)
𝐼𝑛𝑖𝑡𝑖𝑎𝑙𝑖𝑧𝑒 𝐶𝑙𝑢𝑠𝑡𝑒𝑟 𝐻 𝑒𝑎𝑑 𝜁 0
while (1)do
for 𝑖1to 𝑁1do
𝑚𝑖𝑛 =𝑖
for 𝑗𝑖+1to 𝑁do
if (𝐸𝑗< 𝐸𝑚𝑖 𝑛)then
𝑚𝑖𝑛 =𝑗
end
𝑠𝑤𝑎𝑝(𝐸𝑗, 𝐸𝑚𝑖 𝑛)
end
𝑆𝑜𝑟 𝑡𝑒𝑑 𝑙𝑖𝑠𝑡 𝑜 𝑓 𝐼 𝑜𝑇 𝑑𝑒𝑣𝑖 𝑐𝑒 𝑠 𝑒𝑛𝑒𝑟𝑔 𝑦 𝑣𝑎 𝑙𝑢 𝑒𝑠 (𝐸𝑁
𝑖)
end
return
𝑆𝑜𝑟 𝑡𝑒𝑑 𝐿𝑖 𝑠𝑡 𝑜 𝑓 𝑁 𝑜𝑑𝑒𝑠 𝐵𝑎𝑠𝑒𝑑 𝑜𝑛 𝐸 𝑛𝑒𝑟𝑔𝑦 (𝐸𝑁
𝑖)
for 𝑖1to 𝑁do
for 𝑗1to 𝑁do
𝑑𝑖 𝑗 𝐷(𝐸𝑁
𝑖)
𝐷𝑖𝐷𝑖+𝑑𝑖 𝑗
end
end
for 𝑖1to 𝑁do
𝐷𝐵𝑆𝑖𝐷(𝐵𝑆𝑖, 𝐶𝑖)
𝑁 𝐷 𝐵𝑆𝑖𝑁 𝐷 𝐵𝑆 𝑖+𝐷𝑖
end
for 𝑖1to 𝑁do
𝐸𝑟 𝑒𝑠
𝑖 [𝑚𝑖𝑛(𝑁 𝐷 𝐵 𝑆𝑖)&& (𝐶𝐸𝑚 𝑎𝑥
𝑖)]
𝐶𝑜 𝑚 𝑝𝑢𝑡 𝑒 𝑟 𝑒𝑠𝑖 𝑑𝑢 𝑎𝑙 𝑒 𝑛𝑒𝑟 𝑔𝑦 (𝐸𝑟 𝑒𝑠
𝑖)
if (𝐸𝑟 𝑒𝑠
𝑖E𝑡
𝑖)then
𝜁𝐸𝑟 𝑒𝑠
𝑖
end
end
return 𝐶𝑙𝑢𝑠𝑡 𝑒𝑟 𝐻 𝑒𝑎𝑑 (𝜁)
end
B. Enhancing security of the proposed architecture through
Blockchain and SDN
We have heterogeneous IoT devices that ability to exchange
information, execute transactions but need to be secure com-
munication. Therefore, a secure data transmission method
needs to be present, shown in Fig. 5. Blockchain and SDN
can provide secure data transmission in the overall networking
system. Where the SDN controller provides security and
network services to IoT devices. Since the IoT devices in the
perception layer reveal gigantic data, it is not very tough to
be under attack by the third party. Apart from this, the data
is unstructured, so what SDN does is rearrange the data in
meaningful ways and find out the destination of a particular
data. It can monitor the behaviour of the data as well as
the user who is requesting for a service. Thus SDN can
detect some anomalies and third party attacks in the network.
Also, discards the malicious packets from the SDN domain.
Moreover, enhancing the safety and decreasing the energy con-
sumption of the IoT devices. In addition, Blockchain provides
security, privacy, confidentiality, integrity, etc by storing the
identity of the IoT devices in an immutable public ledger.
The distributed and decentralized architecture of Blockchain
ensures the security of billions of IoT devices. Moreover, the
security mechanism is presented in the flowchart, as depicted
in Fig. 6. In flowchart, IoT devices request for SDN controller,
then devices are registered in the SDN controller, and an IP
address for each IoT device is allocated. Even, all IoT device
operational activities & transactions are monitored for security
purposes in the SDN controller. Furthermore, IoT devices are
blocked by the SDN controller if any malicious behavior is
found. Then, IoT devices IP addresses are registered in public
Blockchain networks to prevent them from registering in other
clusters.
C. The role of Network Function Virtualization (NFV) into
SDN-IoT System
Networking devices can offer users different types of ser-
vices. Every user always expects the networking devices to
provide secure data. The authors have presented SDN-IoT
architecture with NFV in this section from that expectation.
In architecture, Network Function Virtualization Infrastructure
(NFVI) provides the SDN-IoT infrastructure virtualization
facilities, as shown in Fig. 7. Also, an SDN has effectively
organized [54] as two distinct planes, such as a data plane
and control plane with SDN multiple controllers.
IEEE INTERNET OF THINGS JOURNAL, VOL., NO., MARCH 2021 8
Fig. 5. Secure Data Transmission through Blockchain and SDN Domain
Fig. 6. Security Mechanisms Flowchart
Besides, the data layer receives data from the clustering do-
mains; also, SDN-IoT standard gateway protocol can manage
the smart devices data efficiently. After that, the control layer
provides some SDN controllers such as security, application,
packet, key, intrusion, and crypto controller. The security
controller, which aims to perform all security issues for a
desirable model. Again, the packet controller provides the
networking packet management strategy into the network, and
Fig. 7. SDN-IoT on NFV Architecture [35].
other controllers perform their operation in a particular way for
the presented architecture. Finally, In the NFVI environment,
the control plane also conveys the different virtual services like
virtual storage, virtual networking as well as virtual computing
[3].
D. Distributed Blockchain Procedure for Smart City
IoT ecosystem supplies integrity, availability, confidentiality,
authentication, a non-repudiation & access control through
Blockchain Technology [55]. Also, Blockchain contains some
key components such as decentralization, transparency, au-
tonomy, immutable, anonymity, as well as the open-source
system. We have presented an SDN-IoT based model with
NFV using a distributed Blockchain approach. This distributed
Blockchain is utilizing the distributed multiple controllers.
Blockchain is a decentralized grouped ledger with no autho-
rization or no individual control the ledger. Every striving
leads or confirmed the ledger. Miners verify the latest activities
and so placing all of them inside the global ledger. Usually,
every 5 to 10 minutes a block is surely extricated—Miners
attempt to create a terrifying statistical perplexity based on
a cryptographic hash algorithm. The found solution is called
the Proof-of-Work (PoW). Appended to the arrangement is the
newly mined block. When creating the particular block by the
miners, it proceeds to add to the several BC. After adding a
block in the BC, it is stimulating to work in remodeling data
through the block chiefly because it requires turning all of the
subsequent blocks. As well as, any particular block which will
get matched to the BC, the part requires consensus in any the
vast preponderance nodes from the various networks.
IEEE INTERNET OF THINGS JOURNAL, VOL., NO., MARCH 2021 9
Fig. 8. Distributed Blockchain Approach for Smart Cities
TABLE VI
SIMULATION ENVIRONMENT
Parameters Name Values
General
Parameters
Packet Analyzer Wireshark
Cloud storage platform OpenStack
SDN
Parameters
No. of SDN Controllers 6
OpenFlow switches 5
Gateways 2
Types of SDN Controllers FloodLight, OpenDayLight
SDN Routing Protocol OpenFlow
Blockchain
Parameters
Blockchain platform Ethereum
Number of transactions Variable
Block size 4 bytes
Block header 80 bytes
Proof type Proof of Work (PoW)
Others
Parameters
Simulation Area 3000m X 3000m
Number of IoT devices 100
Simulation Times 350s
Data Rate 12 Mbps
Initial Energy Values of IoT devices 12-15 j
Initial Trust value 5 j
Node Transmit Packet Size 512-1024 bytes
After that, we have addressed the decentralized Ethereum
Blockchain network approach in a wide tremendous network-
ing systems, which is shown in Fig. 8. This architecture allows
the transmission of data from the IoT devices to the SDN
Gateways. Then, the information is stored in the database and
sent to the Smart city for further decision. But before making
any changes to the storage, the transaction are validated by the
Smart Contract following some mining procedures under the
Ethereum Blockchain Network system. Ethereum will store
the data into the cloud storage after the verification and stores
the indices by means of blocks. Through the REST or JSON
RPC following some other API and SDK which will help to
run the Smart Contracts to verify and validate the data request
information, Smart City will be able to interact with the cloud
storage.
E. Smart City on Cloud Application
Approachability, usability, data safety & security have been
provided by a smart city. These cities can be capable of uti-
lizing smart education, energy, health, farming, environment,
home, hospital, transport, and building, etc [10]. Our presented
model can be capable of controlling several smart pieces of
equipment like a smart door, window, light, fan, AC as well
as smart phone by using Blockchain with SDN-IoT gateway.
When any request of access is captured which is unauthorized,
it is inhibited by the Firewall. The information is preserved
into the cloud to make the data availability easier. Smart trans-
port decreases vehicle traffic collision. Furthermore, intelligent
fans, light can save the electricity and in the smart home,
including stylish door & window can protect our home from
intruder suitably. In a similar way, a smart city application
has been improved our lifestyle. Besides, IoT enabled devices
IEEE INTERNET OF THINGS JOURNAL, VOL., NO., MARCH 2021 10
Fig. 9. Cluster Head Ratio with Respect to the No. of Nodes Fig. 10. Power Consumption (mW) with Respect to the No. of Nodes
are the key components for a smart city model. Finally, the
main goal of a smart city on a cloud storage are fashionable
civilization, society, governance as well as smart technology
[56].
IV. EVALUATION RESULTS A ND ANALYS IS
A. Simulation Environment setup
To assess the efficiency of the proposed model simulation
parameters are shown in Table VI with their corresponding
values. Where author has used network emulator (Mininet
2.2.1) for topology setup. Among the general parameters,
Wireshark is used for the packet analyzer. In SDN platform,
there are 6 Floodlights SDN controllers and 5 OpenFlow based
switches are used through a couple of Gateways. Moreover,
Ethereum as a Blockchain platfrom with dynamic number of
transactions is used where block size is 4 bytes. Some other
parameters are also highlighted in the table including no. of
IoT devices, devices speed, data rate, packet sizes, energy &
trust values of IoT devices. Moreover, we have used Ubuntu
16.04 LTS(Linux) OS, Intel(R) Core(TM)-i5-10210U CPU @
160GHz-2.11GHz, 8.00GB RAM, 1TB ROM, and 512GB
SSD for getting the expected results.
B. Cluster Head Selection Algorithm Performance Analysis
1) Cluster Head Ratio (CHR): Fig. 9 shows the CHR with
respect to the no. of IoT nodes. It will be better if we select
fewer cluster heads from the cluster areas because of CHs have
more links. We have designed an algorithm that automatically
chooses the fewer cluster heads as well as considers the energy.
To evaluate the performances of the algorithm authors compare
the proposed algorithm with SUSTEC [57]. In the beginning,
when the no. of IoT nodes is 10, the proposed algorithm
and SUSTEC cluster head selection are almost similar. After
that, when the no. of nodes are reached at 25, the proposed
algorithm performed better than SUSTEC (selects fewer CHs
compared to the existing works). Furthermore, for 70 nodes
the SUSTEC selects fewer CHs (almost similar), but after
increasing with the no. of nodes (over 80 nodes) the proposed
algorithm performs better.
2) Power Consumption: Moreover, Fig. 10 shows the power
consumption (mW) with respect to the no. of nodes. It is
clearly notified that the proposed algorithm performs better
than the LEACH mobile [53] approach protocol. For less no. of
nodes (<3), proposed alg. performances are much better than
LEACH mobile protocol. It also provides a better result for
(20 to 25) nodes compared to the existing works like LEACH
mobile and LEACH protocols.
C. Overall Architecture Performance Analysis
1) Throughput: We have evaluated the throughput (i.e.,
network throughput relates to how many transaction requests
can be transmitted from origin to destination within a rea-
sonable period) of the proposed model, as shown in Fig. 11.
However, we have observed that the throughput starts from
100 transaction requests for each of the systems such as core,
“DistArch-SCNet” [58], and proposed model efficiently. When
the number of requests is 400, all model performances are
almost the same. Furthermore, when the number of transaction
requests is reached at 1200, the proposed architecture shows
much more throughput than the core model. For 2400 requests
proposed model shows higher throughput compared to the
existing model. In addition, with increasing the number of
requests, throughput also increases and the proposed system
much better performance than DistArch-SCNet and Core
model in the network.
2) Response Time: The time duration needed to get the very
first reply from the system is cited as response time. It is more
beneficial to have lower latent period comparing to the existing
scheme. The response time of the proposed model is presented
in Fig. 12 which also draws the superiority of this system
over the core model and DistArch-SCNet. At the beginning,
when the number of transactions is about 400, DistArch-SCNet
and proposed model take same period of time to respond, but
the core model starts to show higher response time from the
starting point. It’s clearly noticed that the core model needs
considerably more time to reply with the action of a request
with the increasing number of transactions. If the requests
IEEE INTERNET OF THINGS JOURNAL, VOL., NO., MARCH 2021 11
Fig. 11. Throughput with Respect to the Number of Transaction
Requests
Fig. 12. Response Time with Respect to the Number of Transaction
Requests
Fig. 13. Gas Consumption with Respect to the Time(ms) and Number of
Transactions
Fig. 14. Communication Overhead(%) Comparisons with Respect to
the No. of IoT Devices
are limited to 1200 approximately, the proposed model and
DistArch-SCNet show almost same performance, but if the
amount of requests raises over 1200, the proposed model
responds with a shorter time equating to the SCNet. With
increasing the transaction requests(Over 1600 requests) Core
model performance worst than other model where DistArch-
SCNet and proposed architecture performs around similarly in
the network.
3) Gas Consumption: Fig. 13 shows the no. of transactions
request with respect to the time(ms) and gas consumption.
Gas consumption is the price that must be paid for valid
transaction of the minor nodes. At the beginning of the small
no. of transactions, the gas consumption is not so high. After
that as the no. of transactions increases, the gas consumption
increases linearly with the time. However, the cost of the
transactions is necessary to illustrate in the proposed model.
The experimental result shows how the gas consumption varied
in terms of time(ms) when the no. of transaction changes.
4) Communication Overhead: We analyzed the communi-
cation overhead comparisons are shown in Fig. 14. For less
no. of nodes(10) core, proposed, and DistArch-SCNet model
communication overhead is almost similar. Moreover, for 30
nodes, both proposed model and DistArch-SCNet are still
perform identically. However, with increasing the number of
nodes, overhead is also progressing. Further, it is clearly shown
that proposed architecture better performance shows a linear
way compared to the DistArch-SCNet and core model. After
comparing the overhead communication comparisons effec-
tively in the presented system model based on the proposed
and DistArch-SCNet scheme, we clearly identified that our
proposed model shows better performances compare with the
DistArch-SCNet system.
5) CPU Utilization during DDoS Attack : Now, for analyz-
ing CPU utilization, we have applied the DDoS attacks in our
projected environment during various application are running
continuously.
We utilized a learning method for recording CPU utilization
IEEE INTERNET OF THINGS JOURNAL, VOL., NO., MARCH 2021 12
Fig. 15. CPU Utilization Scenario during DDoS Attack
TABLE VII
ATTACK COMPARISONS OF EXISTING WORK W ITH PR OPO SE D WORK
CPU Utilization (%)
15 Apps 21 Apps
Time
(s)
Sharma
et al.
[1]
Proposed Sharma
et al.
[1]
Proposed
0.3 0.2 0.1 0.2 0.3
0.6 0.5 0.2 0.8 0.3
0.9 1.2 0.4 2.7 1.1
1.2 16.7 13.1 24.8 20.2
1.5 10.3 8.2 27.6 24.1
1.8 11.8 10.3 15.5 12.1
2.1 7.1 6.2 13.7 11.3
2.4 1.9 0.2 3.1 1.2
2.7 1.5 0.2 2.1 1.2
3.0 0.8 0.1 0.7 0.1
during a DDoS attack. Fig. 15 shows average output of
the CPU utilization in different applications based on prop
scheme, when DDoS attacks are performed. This attack started
at 0.9s of the simulation, with increasing the time, the attack
rate also climbs up. In continuing the attack after a certain
period of time (1.5s), we have noticed that DistB-SDIoT
provides adequate protection against this attack efficiently
and the CPU can get back into the stable situation after a
fluctuation. The vulnerability of CPU utilization lasts for a
short period and depends on the number of applications opened
at that moment. Moreover, Table VII shows the average CPU
utilization for attack with the presence of 15 & 21 applications.
Finally, our presented system enhances the performances of
different application, safe from other numerous attacks as well.
V. CONCLUSION
Blockchain and SDN technologies are yet unfledged in
recent research, and it’s all services and performances that are
in the growing as yet. These fields have a lot of challenges,
risks, and threats. Moreover, a few numbers of researchers
have addressed these threats and try to overcome these chal-
lenges. To overcome these problems, the author presents
a Blockchain-SDN based distributed model for smart cities
with NFV. Also, the author introduces an energy-optimized
cluster head selection algorithm to select a cluster head in an
efficient procedure. Moreover, the SDN controller monitors
and manages the activities of the IoT devices; Blockchain are
used to detect & reduce the cyber-attacks in the IoT networks.
Finally, the experimental result shows that the proposed archi-
tecture performs better compared to the existing architecture
(Core and DistArch-SCNet) in terms of throughput, response
time, gas consumption, communication overhead, which no-
tably increases the throughput and reduces the response time,
overhead, and gas consumption. Though we have considered
various parameters nevertheless there are several limitations
still remain. The author does not consider the end to end
delay, network bandwidth, other network vulnerabilities, and
various passive & active attacks (including Flooding attack,
Sybil attack, MITM, and etc.). In the future, we intend to
develop an energy-efficient edge computing model with the
help of SDN, NFV and Blockchain technology taking such
ongoing problems into consideration.
REFERENCES
[1] P. K. Sharma, S. Singh, Y.-S. Jeong, and J. H. Park, “Distblocknet: A
distributed blockchains-based secure sdn architecture for iot networks,
IEEE Communications Magazine, vol. 55, no. 9, pp. 78–85, 2017.
[2] Internet of Things (IoT) connected devices installed base
worldwide from 2015 to 2025, November 2016. [On-
line]. Available: https://www.statista.com/statistics/471264/iot-number-
of-connected-devices-worldwide/
[3] B. K. Mukherjee, M. S. I. Pappu, M. J. Islam, and U. K. Acharjee,
“An SDN based Distributed IoT Network with NFV Implementation
for Smart Cities,” In progress: 2nd International Conference on Cyber
Security and Computer Science (ICONCS-2020), Springer, 2020.
[4] A. Rahman, M. J. Islam, Z. Rahman, M. M. Reza, A. Anwar, M. P.
Mahmud, M. K. Nasir, and R. M. Noor, “Distb-condo: Distributed
blockchain-based iot-sdn model for smart condominium,” IEEE Access,
vol. 8, pp. 209 594–209 609, 2020.
[5] A. Rahman, M. J. Islam, M. Saikat Islam Khan, S. Kabir, A. I. Pritom,
and M. Razaul Karim, “Block-sdotcloud: Enhancing security of cloud
storage through blockchain-based sdn in iot network,” in 2020 2nd
International Conference on Sustainable Technologies for Industry 4.0
(STI), 2020, pp. 1–6.
[6] M. J. Islam, A. Rahman, S. Kabir, A. Khatun, A. I. Pritom, and M. Za-
man, “Sdot-nfv: Enhancing a distributed sdn-iot architecture security
with nfv implementation for smart city, GUB Journal of Science and
Engineering, vol. 7, 2020.
[7] G. Yao, J. Bi, and L. Guo, “On the cascading failures of multi-controllers
in software defined networks,” in 2013 21st IEEE International Confer-
ence on Network Protocols (ICNP), pp. 1–2, Oct 2013.
[8] H. Ghafoor and I. Koo, An integrated cognitive radio network for
coastal smart cities,” Applied Sciences, vol. 9, no. 17, p. 3557, 2019.
[9] P. K. Sharma, S. Park, Singh, Y.-S. Jeong, and J. Hyuk Park, “Dist-
blocknet: A distributed blockchains-based secure sdn architecture for iot
networks,” Advances in network services chain, IEEE Communications
Magazine, September 2017.
[10] A. Rahman, M. J. Islam, F. A. Sunny, and M. K. Nasir, “Distblocksdn:
A distributed secure blockchain based sdn-iot architecture with nfv
implementation for smart cities,” in 2019 2nd International Conference
on Innovation in Engineering and Technology (ICIET), 2019, pp. 1–6.
[11] A. Rahman, M. K. Nasir, Z. Rahman, A. Mosavi, S. Shahab, and
B. Minaei-Bidgoli, “Distblockbuilding: A distributed blockchain-based
sdn-iot network for smart building management, IEEE Access, vol. 8,
pp. 140 008–140 018, 2020.
[12] A. G. Ghandour, M. Elhoseny, and A. E. Hassanien, “Blockchains for
smart cities: a survey,” in Security in Smart Cities: Models, Applications,
and Challenges. Springer, 2019, pp. 193–210.
IEEE INTERNET OF THINGS JOURNAL, VOL., NO., MARCH 2021 13
[13] Q. Xu, K. M. M. Aung, Y. Zhu, and K. L. Yong, “A blockchain-based
storage system for data analytics in the internet of things,” in New
Advances in the Internet of Things. Springer, 2018, pp. 119–138.
[14] P. K. Sharma, S. Rathore, Y.-S. Jeong, and J. H. Park, “Softedgenet:
Sdn based energy-efficient distributed network architecture for edge
computing,” IEEE Communications magazine, vol. 56, no. 12, pp. 104–
111, 2018.
[15] P. K. Sharma and J. H. Park, “Blockchain based hybrid network
architecture for the smart city, Future Generation Computer Systems,
vol. 86, pp. 650–655, 2018.
[16] A. Reyna, C. Martín, J. Chen, E. Soler, and M. Díaz, “On blockchain and
its integration with iot. challenges and opportunities,” Future generation
computer systems, vol. 88, pp. 173–190, 2018.
[17] A. Rahman, U. Sara, D. Kundu, S. Islam, M. J. Islam, M. Hasan,
Z. Rahman, and M. K. Nasir, “Distb-sdoindustry: Enhancing security in
industry 4.0 services based on distributed blockchain through software
defined networking-iot enabled architecture,” International Journal of
Advanced Computer Science and Applications, vol. 11, no. 9, 2020.
[Online]. Available: http://dx.doi.org/10.14569/IJACSA.2020.0110980
[18] B. Yu, J. Wright, S. Nepal, L. Zhu, J. Liu, and R. Ranjan, “Trust
chain: Establishing trust in the iot-based applications ecosystem using
blockchain,” IEEE Cloud Computing, vol. 5, no. 4, pp. 12–23, 2018.
[19] P. K. Sharma, M.-Y. Chen, and J. H. Park, “A software defined fog node
based distributed blockchain cloud architecture for iot,” IEEE Access,
vol. 6, pp. 115–124, 2017.
[20] O. Novo, “Blockchain meets iot: An architecture for scalable access
management in iot,” IEEE Internet of Things Journal, vol. 5, no. 2, pp.
1184–1195, 2018.
[21] Y. Gu, D. Hou, X. Wu, J. Tao, and Y. Zhang, “Decentralized transac-
tion mechanism based on smart contract in distributed data storage,”
Information, vol. 9, no. 11, p. 286, 2018.
[22] B. L. R. Stojkoska and K. V. Trivodaliev, A review of internet of
things for smart home: Challenges and solutions,” Journal of Cleaner
Production, vol. 140, pp. 1454–1464, 2017.
[23] D. Minoli, K. Sohraby, and B. Occhiogrosso, “Iot considerations, re-
quirements, and architectures for smart buildings—energy optimization
and next-generation building management systems, IEEE Internet of
Things Journal, vol. 4, no. 1, pp. 269–283, 2017.
[24] Y. Mehmood, F. Ahmad, I. Yaqoob, A. Adnane, M. Imran, and
S. Guizani, “Internet-of-things-based smart cities: Recent advances and
challenges,” IEEE Communications Magazine, vol. 55, no. 9, pp. 16–24,
2017.
[25] T. K. Hui, R. S. Sherratt, and D. D. Sánchez, “Major requirements
for building smart homes in smart cities based on internet of things
technologies,” Future Generation Computer Systems, vol. 76, pp. 358–
369, 2017.
[26] A. Kumar et al., “Energy efficient clustering algorithm for wireless
sensor network,” Ph.D. dissertation, Lovely Professional University,
2017.
[27] A. Rahman, M. J. Islam, A. Montieri, M. K. Nasir, M. M. Reza, S. S.
Band, A. Pescapè, M. Hasan, M. Sookhak, and A. Mosavi, “Smartblock-
sdn: An optimized blockchain-sdn framework for resource management
in iot,” IEEE Access, vol. 9, pp. 28361–28 376, 2021.
[28] K. J. C. Angel and E. G. D. P. Raj, “Eeeca: Enhanced energy efficient
clustering algorithm for mobile wireless sensor networks,” in 2017 World
Congress on Computing and Communication Technologies (WCCCT).
IEEE, 2017, pp. 267–270.
[29] A. Al-Baz and A. El-Sayed, “A new algorithm for cluster head selection
in leach protocol for wireless sensor networks,” International journal of
communication systems, vol. 31, no. 1, p. e3407, 2018.
[30] L. Zhao, S. Qu, and Y. Yi, A modified cluster-head selection algorithm
in wireless sensor networks based on leach,” EURASIP Journal on
Wireless Communications and Networking, vol. 2018, no. 1, p. 287,
2018.
[31] K. Kalkan and S. Zeadally, “Securing internet of things (iot) with
software defined networking (sdn),” IEEE Communications Magazine,
no. 99, pp. 1–7, 2017.
[32] P. Bull, R. Austin, E. Popov, M. Sharma, and R. Watson, “Flow based
security for iot devices using an sdn gateway,” in Future Internet of
Things and Cloud (FiCloud), 2016 IEEE 4th International Conference
on. IEEE, 2016, pp. 157–163.
[33] S. K. Tayyaba, M. A. Shah, O. A. Khan, and A. W. Ahmed, “Software
defined network (sdn) based internet of things (iot): A road ahead,” in
Proceedings of the International Conference on Future Networks and
Distributed Systems. ACM, 2017, p. 10.
[34] C. Vandana, “Security improvement in iot based on software defined
networking (sdn),” International Journal of Science, Engineering and
Technology Research (IJSETR), vol. 5, no. 1, pp. 2327–4662, 2016.
[35] M. J. Islam, M. Mahin, S. Roy, B. C. Debnath, and A. Khatun,
“Distblacknet: A distributed secure black sdn-iot architecture with nfv
implementation for smart cities,” in 2019 International Conference on
Electrical, Computer and Communication Engineering (ECCE). IEEE,
2019, pp. 1–6.
[36] Y. Liu, Y. Kuang, Y. Xiao, and G. Xu, “Sdn-based data transfer security
for internet of things,” IEEE Internet of Things Journal, vol. 5, no. 1,
pp. 257–268, 2017.
[37] T. M. FERNNDEZ-CARAMES and F.-L. PAULA, A review on the use
of blockchain for the internet of things,” Open Access Journal, vol. 86,
May 2018.
[38] I. P. C. Tselios and S. Kotsopoulos, “Enhancing sdn security for iot-
related deployments through blockchain,” Third International Workshop
on Security in NFV-SDN, December 2017.
[39] L. Siva Sankar, S. M., and M. Sethumadhavan, “Survey of consensus
protocols on blockchain applications,” International Conference on
Advanced Computing and Communication Systems, August 2017.
[40] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for
iot security and privacy: The case study of a smart home, 2ND IEEE
PERCOM Workshop On Security Privacy And Trust In The Internet of
Things, 2017.
[41] A. Yazdinejad, R. M. Parizi, A. Dehghantanha, Q. Zhang, and K.-K. R.
Choo, “An energy-efficient sdn controller architecture for iot networks
with blockchain-based security, IEEE Transactions on Services Com-
puting, vol. 13, no. 4, pp. 625–638, 2020.
[42] P. Singh, A. Nayyar, A. Kaur, and U. Ghosh, “Blockchain and fog based
architecture for internet of everything in smart cities, Future Internet,
vol. 12, no. 4, p. 61, 2020.
[43] G. S. Aujla, M. Singh, A. Bose, N. Kumar, G. Han, and R. Buyya,
“Blocksdn: Blockchain-as-a-service for software defined networking in
smart city applications,” IEEE Network, vol. 34, no. 2, pp. 83–91, 2020.
[44] S. Hameed, S. A. Shah, Q. S. Saeed, S. Siddiqui, I. Ali, A. Vedeshin,
and D. Draheim, “A scalable key and trust management solution for iot
sensors using sdn and blockchain technology, IEEE Sensors Journal,
2021.
[45] P. K. Sharma, N. Kumar, and J. H. Park, “Blockchain technology toward
green iot: opportunities and challenges,” IEEE Network, vol. 34, no. 4,
pp. 263–269, 2020.
[46] S. Rathore, B. W. Kwon, and J. H. Park, “Blockseciotnet: Blockchain-
based decentralized security architecture for iot network,” Journal of
Network and Computer Applications, vol. 143, pp. 167–177, 2019.
[47] Y. Li and M. Chen, “Software-defined network function virtualization:
A survey,” IEEE Access, vol. 3, pp. 2542–2553, 2015.
[48] M. Hasan, A. Rahman, and M. J. Islam, “Distb-cvs: A distributed secure
blockchain based online certificate verification system from bangladesh
perspective, in 2020 2nd International Conference on Advanced Infor-
mation and Communication Technology (ICAICT), 2020, pp. 460–465.
[49] T. M. Behera, S. K. Mohapatra, U. C. Samal, M. S. Khan, M. Danesh-
mand, and A. H. Gandomi, “Residual energy-based cluster-head selec-
tion in wsns for iot application,” IEEE Internet of Things Journal, vol. 6,
no. 3, pp. 5132–5139, 2019.
[50] S. Aslam, N. U. Hasan, J. W. Jang, and K.-G. Lee, “Optimized energy
harvesting, cluster-head selection and channel allocation for iots in smart
cities,” Sensors, vol. 16, no. 12, p. 2046, 2016.
[51] H. Farman, B. Jan, H. Javed, N. Ahmad, J. Iqbal, M. Arshad, and
S. Ali, “Multi-criteria based zone head selection in internet of things
based wireless sensor networks,” Future Generation Computer Systems,
vol. 87, pp. 364–371, 2018.
[52] J. S. Kumar and M. A. Zaveri, “Clustering approaches for pragmatic
two-layer iot architecture,” Wireless Communications and Mobile Com-
puting, vol. 2018, 2018.
[53] G. Renugadevi and M. Sumithra, “An analysis on leach-mobile protocol
for mobile wireless sensor networks,” International Journal of Computer
Applications, vol. 65, no. 21, 2013.
[54] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson,
J. Rexford, S. Shenker, and J. Turner, “Openflow: enabling innovation in
campus networks,” ACM SIGCOMM Computer Communication Review,
vol. 38, no. 2, pp. 69–74, 2008.
[55] S. Roy, M. Ashaduzzaman, M. Hassan, and A. R. Chowdhury,
“Blockchain for iot security and management: Current prospects, chal-
lenges and future directions,” in 2018 5th International Conference on
Networking, Systems and Security (NSysS). IEEE, 2018, pp. 1–9.
[56] H. Arasteh, V. Hosseinnezhad, V. Loia, A. Tommasetti, O. Troisi,
M. Shafie-Khah, and P. Siano, “Iot-based smart cities: a survey, in
IEEE INTERNET OF THINGS JOURNAL, VOL., NO., MARCH 2021 14
2016 IEEE 16th International Conference on Environment and Electrical
Engineering (EEEIC). IEEE, 2016, pp. 1–6.
[57] K. Kalkan, “Sutsec: Sdn utilized trust based secure clustering in iot,”
Computer Networks, vol. 178, p. 107328, 2020.
[58] P. K. Sharma, S. Rathore, and J. H. Park, “Distarch-scnet: blockchain-
based distributed architecture with li-fi communication for a scalable
smart city network,” IEEE Consumer Electronics Magazine, vol. 7, no. 4,
pp. 55–64, 2018.
Md. Jahidul Islam received the B.Sc. and M.Sc.
degrees in Computer Science and Engineering from
Jagannath University (Jnu), Dhaka, in 2015 and 2017
respectively. Currently, he is working as a Lec-
turer and Program Coordinator (Day) at Computer
Science and Engineering (CSE), Green University
of Bangladesh (GUB), Dhaka, Bangladesh since
May 2017 to present. He is a member of Com-
puting and Communication and Human-Computer
Interaction (HCI) research groups, CSE, GUB. His
research interests include Internet of Things (IoT),
Blockchain, Network Function Virtualization (NFV), Software Defined Net-
working (SDN), 5G, Industry 4.0, Machine Learning, HCI, and Wireless Mesh
Networking (WMN).
Anichur Rahman received the B.Sc. and M.Sc
degree in Computer Science and Engineering from
Mawlana Bhashani Science and Technology Uni-
versity (MBSTU), Tangail, Bangladesh in 2017 and
2020 respectively. Currently, he is working as a Lec-
turer at Computer Science and Engineering (CSE),
National Institute of Textile Engineering and Re-
search (NITER), Savar, Dhaka, Bangladesh since
January 2020 to present. His research interests in-
clude Internet of Things (IoT), Blockchain (BC),
Software Defined Networking (SDN), Image Pro-
cessing, Machine Learning, Vehicular Ad-Hoc Networking (VANET), 5G,
Industry 4.0 and Data Science.
Sumaiya Kabir received the B.Sc. and M.Sc.
degrees in Computer Science and Engineering
from Patuakhali Science and Technology University,
Barisal, and East West University, Dhaka, respec-
tively. Currently, he is working as an Assistant Pro-
fessor and Program Coordinator (Day) at Computer
Science and Engineering (CSE), Green University
of Bangladesh (GUB), Dhaka, Bangladesh since
May 2013 to present. His research interests include
Semantic Web, Web 3.0 Architecture, Ontology De-
signing, RDF Clustering Agent based web mining,
Building intelligence in web mining, Data Science.
Md Razaul Karim received the B.Sc. degree in
Computer Science and Engineering from Mawlana
Bhashani Science and Technology University (MB-
STU), Tangail, Bangladesh in 2020. The main inter-
ests of his research are Machine Learning, Computer
Vision, and Image Processing. He is also keen on
Blockchain.
Uzzal Kumar Acharjee obtained his Ph.D degree
in Applied Physics, Electronics & Communication
Engineering from University of Dhaka, Bangladesh
in 2014. He received the M.Sc. in Computer Science
from the University of Dhaka, Bangladesh, in the
year 2000. He is serving as Professor in the Depart-
ment of Computer Science and Engineering, Jagan-
nath University, Bangladesh. His research interests
include the area of Artificial Intelligence, Neural
Networks, Deep Learning, Data Mining etc.
Mostofa Kamal Nasir Professor of Computer Sci-
ence and Engineering of Mawlana Bhashani Science
and Technology University, Tangail, Bangladesh.
He has completed his PhD from University of
Malaya, Kuala Lumpur, Malaysia in the field of
Mobile Adhoc Technology in 2016. Before that
he has completed his BSc and MSc in Computer
Science and Engineering from Jahangirnagar Uni-
versity, Bangladesh. His current research interest
include VANET, IoT, SDN and WSN.
SHAHAB S. BAND received the M.Sc. degree in
artificial intelligence from Iran, and the Ph.D. degree
in computer science from the University of Malaya
(UM), Malaysia, in 2014. He was an Adjunct As-
sistant Professor with the Department of Computer
Science, Iran University of Science and Technology.
He also severed as a Senior Lecturer with UM,
Malaysia, and with Islamic Azad University, Iran.
He participated in many research programs within
the Center of Big Data Analysis, IUST and IAU.
He has been associated with young researchers and
elite club, since 2009. He supervised or co-supervised undergraduate and
postgraduate students (master’s and Ph.D.) by research and training. He has
also authored, or coauthored papers published in IF journals and attended to
high-rank A and B conferences. He is an Associate Editor, a Guest Editor,
and a Reviewer of high-quality journals and conferences. He is a professional
member of the ACM.
Mehdi Sookhak (M’12, SM’19) received the Ph.D.
degree in computer science, major in information
security, from the University of Malaya (UM), in
2015. He was an Active Researcher with the Center
of Mobile Cloud Computing Research (C4MCCR),
UM. From 2016 to 2017, he was with Carleton
University, Canada, as a Postdoctoral Fellow. He
is currently an Assistant Professor of cybersecurity
with Illinois State University, Normal, IL, USA. He
has authored more than 40 articles in high ranking
journals and conferences. He serves as an editor of
several ISI journals, such as vehicluar communications, IEEE Access, and
Electronics. He also served as a chair of several conferences, such as ICCE
2019-2020. His areas of interest include cloud and mobile cloud computing,
fog computing, vehicular cloud computing, the IoT and smart cities, compu-
tation outsourcing, access control, network security, wireless sensor & mobile
Ad Hoc network (architectures, protocols, security, and algorithms), big data
security and analytic, distributed systems, and cryptography and information
security.
IEEE INTERNET OF THINGS JOURNAL, VOL., NO., MARCH 2021 15
Shaoen Wu (M’14- SM’16)) received the Ph.D.
degree in computer science from Auburn University,
Auburn, AL, USA, in 2008. He is currently a State
Farm Endowed Chair Professor with Illinois State
University, Normal, IL, USA. He was an Asso-
ciate Professor of Computer Science at Ball State
University, an Assistant Professor with the School
of Computing, University of Southern Mississippi,
Hattiesburg, MS, USA, a Research Scientist with
ADTRAN Inc., Huntsville, AL, USA, and a Senior
Software Engineer with Bell Laboratories, Qingdao,
China. His current research interests include IoT, wireless and mobile network-
ing, and cyber security. Prof. Wu has served on the chairs and the committees
of various conferences, such as the IEEE INFOCOM, ICC, and GC, and an
Editor for several journals including IEEE Transaction on Multimedia, and
IEEE IoT Journal. He was a recipient of the Best Paper Award of the IEEE
GC 2019, IEEE ISCC 2008 and the ANSS 2011. He serves as the Vice Chair
for North America on IEEE MMTC 2020-2022.
... According to ARI, motorbikes make up 62 percent of all automobiles on the nation's roadways and are involved in 26 incidents for every 10,000 of them. According to Expertise, which emphasized the risky existence of motorbikes, the main factors contributing to bike accidents include difficulty maintaining balance, driver behavioral issues, a refusal to obey traffic laws, and a refusal to wear protective gear [4], [5]. However, a helmet is the main part of those gears that can save major losses and lives when an accident occurs by protecting a rider's sensitive part (Human Head). ...
... The security features in BIoT systems have led to their application in a wide range of application scenarios. Various studies [19][20][21][22][23][24][25][26][27][28][29] have explored how BIoT systems enable self-regulated automation and facilitate decentralized peer-to-peer (P2P) trading marketplaces in smart homes, smart cities, and smart energy grids. In the context of the Internet of Vehicles (IoV) and vehicle-to-vehicle (V2V) communication and coordination, numerous studies [30][31][32][33] have explored how BIoT offers trusted communications and data exchanges, therefore contributing to safer and more efficient vehicular networks. ...
Article
Full-text available
The decentralized nature of blockchain enables data traceability, transparency, and immutability as complementary security features to the existing Internet of Things (IoT) systems. These Blockchain-based IoT (BIoT) systems aim to mitigate security risks such as malicious control, data leakage, and dishonesty often found in traditional cloud-based, vendor-specific IoT networks. As we steadily advance into the era of situation-aware IoT, the use of machine learning (ML) techniques has become essential for synthesizing situations based on sensory contexts. However, the challenge to integrate learning-based situation awareness with BIoT systems restricts the full potential of such integration. This is primarily due to the conflicts between the deterministic nature of smart contracts and the non-deterministic nature of machine learning, as well as the high costs of conducting machine learning on blockchain. To address the challenge, we propose a framework named Situ-Oracle. With the framework, a computation oracle of the blockchain ecosystem is leveraged to provide situation analysis as a service, based on Recurrent Neural Network (RNN)-based learning models tailored for the Situ model, and specifically designed smart contracts are deployed as intermediary communication channels between the IoT devices and the computation oracle. We used smart homes as a case study to demonstrate the framework design. Subsequently, system-wide evaluations were conducted over a physically constructed BIoT system. The results indicate that the proposed framework achieves better situation analysis accuracy (above 95%) and improves gas consumption as well as network throughput and latency when compared to baseline systems (on-chain learning or off-chain model verification). Overall, the paper presents a promising approach for improving situation analysis for BIoT systems, with potential applications in various domains such as smart homes, healthcare, and industrial automation.
... However, the real-time applications of E-Land-Surface provide information-gathering facilities with the help of land IoT tools. It can be analyzed further by sending it to a cloud structure, where information can be accessed by malicious attackers or insiders [3]. For this reason, this procedure addresses an unsecure manner for record-keeping and management. ...
Article
Full-text available
Particularly in the context of smart cities, remote sensing data (RSD) has emerged as one of the hottest study topics in information and communication technology (ICT) today. The development of machine learning (ML) and artificial intelligence (AI) has made it possible to solve a number of issues, including automation, control access, optimization, monitoring, and management. Simultaneously, there are significant issues with the design and development of the process hierarchy, including inadequate training records, centralized architecture, data privacy protection, and overall resource consumption restrictions. The development of Distributed Ledger Technology (DLT), on the other hand, provides a decentralized infrastructure that allows systems to eliminate centralized data-sharing procedures of smart cities while transferring from network node to network node, and third-party access control solves machine learning issues. To process an ideal data delivery mechanism for the smart cities analytical model, the paper employs Partial Swam Optimization (POS) in conjunction with a secure blockchain distributed consortium network. This work makes three contributions. Firstly, it offers a safe transmission method that combines blockchain and machine learning to optimize the path for reliable data delivery across secure channels. Second, neighborhood encryption sequences are carried out using NuCypher proxy re-encryption-enabled value encryption, a public key cryptographic approach that avoids cypher conversion. Third, Artificial Neural Networks (ANNs) can solve the data deliverance classification problem in smart cities by optimizing record management and preservation.
... In a software-defined network that controls and manages IoT devices, blockchain has been integrated to provide security and privacy against cyber threats while preventing the sole point of breakdown in SDN, while network function virtualization has been operated to save energy and balance load in conjunction with cluster head selection to amplify the energy effectiveness further [97]. In a sustainable city, cryptography and authentication enabling blockchain are operated to secure communication, while network virtualization is used for efficient data storage using virtual machines, providing an energy efficient system where machine learning is operated to provide parking space to drivers having location and timing [98]. ...
Article
Full-text available
Energy Administration (EA) in networking involves improving energy efficiency by managing energy. The blockchain framework involves a chain of associated blocks that obviously protects the genuineness, upholds accountability, and upholds disguised-anonymity of its transactions/entries with the help of peer-to-peer consensus techniques and cryptographic mechanisms. Driven by the fact that existing surveys do not focus on the EA in the broad scope of networking, we review diverse blockchain-rooted EA solutions, where we recognize 7 roles of blockchain in EA and explore them in detail with regard to EA techniques, EA approaches, blockchain-linked factors, network-linked factors, and such. We assembled a first-stage sample of 80 document citations by appraising the articles for qualification criteria hunted from E-libraries operating a detailed and prolonged process. Considering the review, in blockchain-rooted EA, blockchain can facilitate storing and exchanging data in a trustworthy manner, operate energy-efficient consensus approaches, act as an energy manager, provide authentication and access control for EA, facilitate secure offloading for EA, and provide automated EA tasks operating smart contracts. Detailed exploration shows that from blockchain-rooted EA, 32.5% operate blockchain to store and exchange data for an EA task, 95% operate uniform blockchain, 30% operate PoW consensus, 82.5% operate fully decentralized EA, 57.5% operate cross-layer EA, and 10% operate in IoT networks. Finally, we debate the possibilities and barriers to the conception of blockchain-rooted EA and then present guidance to vanquish them.
... Otherwise, that will not work [3], [6]. Network security is crucial in any system run by smart contracts [7]. Traditional security measures, however, might not be enough to recognize and stop advanced cyber threats. ...
Article
Full-text available
Nowadays, the Internet has become one of the basic human needs of professionals. With the massive number of devices, reliability, and security will be crucial in the coming ages. Routers are common to provide us with the internet. These routers can be operated in different modes. Some routers use the Wifi Security Protocol (WPA) or WPA2, and the Wifi Alliance introduced WPA3 on 25 June 2018. There are a lot of papers regarding Smart Contract (SC)–based IDS as well as Machine Learning-based IDS. Very few discuss combining SC and ML-based IDS for different authentication processes. In this paper, we will discuss how combining SC and ML plays a vital role in authentication. Also, we play the role of embedded IDS system so that existing vulnerabilities of the WPA2 and WPA3 can be reduced to 99.62%.
... According to ARI, motorbikes make up 62 percent of all automobiles on the nation's roadways and are involved in 26 incidents for every 10,000 of them. According to Expertise, which emphasized the risky existence of motorbikes, the main factors contributing to bike accidents include difficulty maintaining balance, driver behavioral issues, a refusal to obey traffic laws, and a refusal to wear protective gear [4], [5]. However, a helmet is the main part of those gears that can save major losses and lives when an accident occurs by protecting a rider's sensitive part (Human Head). ...
Preprint
A motorbike is more commonly utilized than other types of vehicles due to its affordability. On the contrary, this is the riskiest vehicle because driving too quickly or when intoxicated can result in an accident. The number of daily traffic accidents, including bike accidents, in Bangladesh is increasing tremendously. Without a helmet, the impact of a high-speed collision on a motorcycle is exceedingly dangerous. A helmet may even save a life by reducing the effects of a collision. In many zones, bikers are required to wear helmets when riding their motorcycles, but they take the chance not to wear helmets. To prevent accidents, we have proposed a smart helmet system that will minimize the chances of accidents occurring. The system is divided into two sections: the mobile application, where the rider will monitor the current status of riding a motorcycle, and the helmet circuit, which is the core segment that takes input from the environment. The helmet circuit initially includes a NodeMCU, an alcohol detection sensor, a crash sensor, a motion sensor, etc. The automotive circuit includes a tachometer to measure the bike's speed, and the mobile application section shows the overall performance result to guide the biker. The helmet circuit sends the detected signal to the mobile application, where the biker can see the present status of system sensors, whether alcohol, motion, or overspeed are detected or not. The mobile application section sends a notification to the nearest police station, hospital, and default relative's mobile.
... Blockchain approaches. In [68], the author presented a distributed model for smart cities incorporating Blockchain, Software-Defined Networking (SDN), and Network Function Virtualization (NFV). A key contribution is an energy-optimized cluster head selection algorithm designed for efficient procedures. ...
Article
Full-text available
The eHealth sector has witnessed significant growth due to technological advancements, facilitating care delivery in patients' homes and moving away from traditional hospital settings. Blockchain and the Internet of Things (IoT) play pivotal roles in enhancing healthcare services, offering features such as remote patient monitoring, streamlined electronic medical record (EMR) management, drug traceability, and effective disease control, particularly during events like the COVID-19 pandemic. The growing utilization of IoT devices brings about security challenges, including concerns related to data integrity and device authentication. This paper proposes the integration of blockchain technology as a robust solution. Leveraging its decentralized and tamper-resistant features, blockchain establishes trust among diverse IoT devices, ensuring the integrity of IoT data. Additionally, smart contracts enhance device authentication, fortifying overall security by addressing vulnerabilities associated with centralization. Regarding the management of eHealth, this survey begins with an overview of the industry, highlighting IoT-related challenges in healthcare. It explores various IoT applications in eHealth and discusses how blockchain can effectively address obstacles in healthcare management through IoT. Notably, the paper provides insights into examining consensus algorithm parameters within blockchain systems, clarifying the methodology used to assess and optimize these critical components. The survey extends to a thorough review of existing research on integrating blockchain-based IoT in eHealth. Finally, it presents an overview of challenges and potential solutions for implementing blockchain-based IoT in the eHealth sector. This comprehensive survey aims to empower stakeholders by providing insights to enhance patient care in this dynamic and evolving field.
Preprint
Full-text available
Currently, Blockchain (BC), Artificial Intelligence (AI), and smart Industrial Internet of Things (IIoT) are not only leading promising technologies in the world, but also these technologies facilitate the current society to develop the standard of living and make it easier for users. However, these technologies have been applied in various domains for different purposes. Then, these are successfully assisted in developing the desired system, such as-smart cities, homes, manufacturers, education, and industries. Moreover, these technologies need to consider various issues-security, privacy, confidentiality, scalability, and application challenges in diverse fields. In this context, with the increasing demand for these issues solutions, the authors present a comprehensive survey on the AI approaches with BC in the smart IIoT. Firstly, we focus on state-of-the-art overviews regarding AI, BC, and smart IoT applications. Then, we provide the benefits of integrating these technologies and discuss the established methods, tools, and strategies efficiently. Most importantly, we highlight the various issues--security, stability, scalability, and confidentiality and guide the way of addressing strategy and methods. Furthermore, the individual and collaborative benefits of applications have been discussed. Lastly, we are extensively concerned about the open research challenges and potential future guidelines based on BC-based AI approaches in the intelligent IIoT system.
Article
Full-text available
Recently there has been a notable increase in interest in Internet of Things (IoT)-based smart cities from both business and academia. Smart cities can offer a range of smart apps, such as intelligent transportation, 4.0 industry, and intelligent banking, many others, to enhance the quality of life for inhabitants. Security is one of the main problems that smart cities face. Smart cities that use blockchain technology can offer higher levels of safety by storing transactions in an inviolable, safe, decentralized database. The cyberattacks happen increasingly frequently every day during transactions, it poses a security issue for smart cities. A novel attack detection and encryption model was created to overcome these issues and secure the data in private blockchain. After being gathered in raw form from a variety of IoT devices, the data had been processed using Savitzy Golay filter, min–max normalization, and missing values. Next, utilizing residual sum of squares, choose appropriate characteristics from the pre-processed data. The distributed network built on blockchain was given the chosen attributes. Trusted organizations were used to confirm the transaction, and their vital job was to validate the transaction. To validate the transaction, a modified Deep Neural Network (M-DNN) classifier was created. Once the transaction was successfully verified as normal, the information were secure in private blockchain using Elliptic Curve Integrated Encryption Scheme (ECIES); else the information was attack, the data was further move for attacks type detection process using hybrid LSTM-XGBoost classifier. The proposed model offer 96% for verification process, and 97% accuracy for attacks type detection process, also offer a low encryption time of 7.5 s. This indicates that the suggested approach performs better than alternative approaches that are presently in use. The suggested method’s result indicates that the transaction is carried out safely to create a secure atmosphere for smart cities.
Article
Full-text available
The transformative potential of blockchain technology in the renewable energy sector is increasingly gaining recognition for its capacity to enhance energy efficiency, enable decentralized trading, and ensure transaction transparency. However, despite its growing importance, there exists a significant knowledge gap in the holistic understanding of its integration and impact within this sector. Addressing this gap, the current study employs a pioneering approach, marking it as the first comprehensive bibliometric analysis in this field. We have systematically examined 390 journal articles from the Web of Science database, covering the period from 2017 through the end of February 2024, to map the current landscape and thematic trajectories of blockchain technology in renewable energy. The findings highlight several critical thematic areas, including blockchain's integration with smart grids, its role in electric vehicle integration, and its application in sustainable urban energy systems. These themes not only illustrate the diverse applications of blockchain but also its substantial potential to revolutionize energy systems. This study not only fills a crucial gap in existing literature but also sets a precedent for future interdisciplinary research in this domain, bridging theoretical insights with practical applications to fully harness the potential of blockchain in the renewable energy sector.
Conference Paper
Full-text available
Wireless sensor networks (WSNs) are becoming popular in real world applications. Due to the features of the resource-constrained and battery-aware sensors; in WSNs energy utilization has found to be a major interesting subject of research. WSNs compose battery-powered nodes which are connected with the base station to for certain action or task. As sensor nodes are battery-powered i.e. will become dead after the consumption of the battery which is also called lifetime of WSNs. So using the energy in well-organized way may result in prolonging the lifetime of the WSNs. Sensor nodes possess a negative characteristic of limited energy which pulls back the network from exploiting its peak capabilities. Hence, it is necessary to gather and transfer the information in an optimized way which reduces the energy dissipation.
Conference Paper
Full-text available
Software Defined Networking (SDN) and Blockchain (BC) are the most recent research trends in emerging technology. These technologies have currently been used in the IoT networking environment for various purposes, such as protection, stability, scalability, confidentiality, and so on. Such techniques can be used in this regard to effectively provide security, privacy, and confidentiality to cloud storage. In this paper, the authors proposed Block-SDoTCloud architecture to significantly enhance security within the cloud storage network. In order to give the cloud storage environment the requisite facilities, two leading technologies, i.e., SDN and Blockchain were applied. The centralized SDN controller provided the proposed model with tremendous reliability, versatility, and load balancing in one side while on the other hand, a distributed Blockchain created a deep trust between the transaction levels resulting into effective protection for the presented scheme. The efficiency of the proposed architecture is justified through close observation of simulation with a careful selection of relevant parameters.
Article
Full-text available
Billions of IoT devices and smart objects are already in operation today and even more are expected to be on the network over time. These IoT devices will generate enormous amounts of data that cannot be allowed to transmit on the network without end-to-end encryption or any trust and security mechanism. Currently, we have certificate authorities that certify the identity of a network device by binding its identity with its public key. However, these certificate authorities are centralized in structure and will not be able to individually certify billions of IoT devices entirely. In this paper, we propose that in an SDN-based IoT network, the identities, i.e., public keys and trust indices of IoT devices, can be stored on a blockchain to ensure immutability and tamper-resistance. The paper presents a novel scalable solution for key and trust management of IoT devices in IoT networks, with a successful proof-of-concept that proves the scalability of the proposed solution. The combination of an IoT network along with blockchain technology and software-defined networking (SDN) is effectively demonstrated through simulation that is able to store the public keys of IoT devices on the blockchain and route the network traffic efficiently through SDN. The performance of the proposed solution is evaluated in terms of throughput and access time delay. The results illustrate that access delay and throughput were not affected linearly or exponentially and the proposed solution shows no significant degradation in the performance with the increase in the number of IoT nodes and packets.
Article
Full-text available
Software-Defined Networking (SDN) and Blockchain are leading technologies used worldwide to establish safe network communication as well as build secure network infrastructures. They provide a robust and reliable platform to address threats and face challenges such as security, privacy, flexibility, scalability, and confidentiality. Driven by these assumptions, this paper presents an optimized energy-efficient and secure Blockchain-based software-defined IoT framework for smart networks. Indeed, SDN and Blockchain technologies have proven to be able to suitably manage resource utilization and to develop secure network communication across the IoT ecosystem. However, there is a lack of research works that present a comprehensive definition of such a framework that can meet the requirements of the IoT ecosystem (i.e. efficient energy utilization and reduced end-to-end delay). Therefore, in this research, we present a layered hierarchical architecture for the deployment of a distributed yet efficient Blockchain-enabled SDN-IoT framework that ensures efficient cluster-head selection and secure network communication via the identification and isolation of rouge switches. Besides, the Blockchain-enabled flow-rules record keeps track of the rules enforced in the switches and maintains the consistency within the controller cluster. Finally, we assess the performance of the proposed framework in a simulation environment and show that it can achieve optimized energy-utilization, end-to-end delay, and throughput compared to considered baselines, thus being able to achieve efficiency and security in the smart network.
Article
Full-text available
Software-Defined Networking (SDN) and Blockchain are leading technologies used worldwide to establish safe network communication as well as build secure network infrastructures. They provide a robust and reliable platform to address threats and face challenges such as security, privacy, flexibility, scalability, and confidentiality. Driven by these assumptions, this paper presents an optimized energy-efficient and secure Blockchain-based software-defined IoT framework for smart networks. Indeed, SDN and Blockchain technologies have proven to be able to suitably manage resource utilization and to develop secure network communication across the IoT ecosystem. However, there is a lack of research works that present a comprehensive definition of such a framework that can meet the requirements of the IoT ecosystem (i.e. efficient energy utilization and reduced end-to-end delay). Therefore, in this research, we present a layered hierarchical architecture for the deployment of a distributed yet efficient Blockchain-enabled SDN-IoT framework that ensures efficient cluster-head selection and secure network communication via the identification and isolation of rouge switches. Besides, the Blockchain-enabled flow-rules record keeps track of the rules enforced in the switches and maintains the consistency within the controller cluster. Finally, we assess the performance of the proposed framework in a simulation environment and show that it can achieve optimized energy-utilization, end-to-end delay, and throughput compared to considered baselines, thus being able to achieve efficiency and security in the smart network.
Conference Paper
Full-text available
During the academic career, students achieve numerous academic credentials. These educational credentials are offered by the student while applying for a job or scholarship. Therefore, the goal of this paper is to propose a theoretical blockchain-based certificate verification system on the cloud that can offer a potential solution for academic certificate issuing and verification where cryptocurrencies are banned. By this regarding in this research, we address the Blockchain (BC) technology for solving these problems. This BC can be capable of providing immutability and publicly verifiable transactions. Moreover, these properties of BC are used to generate the digital academic credential, which is anti-counterfeited can be verified easily in a little time. In addition, the proposed “DistB-CVS” showed that cryptocurrencies banned country could leverage the BC technology. It satisfies all the requirements necessary for a modern academic certificate verification system. Furthermore, it tries to close the holes and difficulties in the existing systems to verify academic certificate authenticity.
Conference Paper
Full-text available
Blockchain, Software Defined Networking (SDN) and the Internet of Things (IoT) are the leading emerging technology all over the world. Blockchain is the main contributor to Bitcoin which aims to ignore the third party among the proceedings. On the contrary, the aims of the IoT network is connected with a massive number of objects over the internet. For smart cities, a distributed secure Blockchain-based SDNIoT architecture has been proposed in this research paper with Network Function Virtualization (NFV) implementation. We have also revolved around the blockchain network which is a highly secured technology that provides good results in network performances, adaptability, privacy, security, accessibility, versatility, confidentiality, and efficiency. Moreover, we have presented a cluster head selection algorithm which aim is to select the desired head of the clusters. In addition, an approach has been also developed that is more efficient for generating a cluster head utilizing SDN-IoT. SDN-IoT with the NFV conception bring in benefits to the associated areas in terms of energy preservation and load equilibrating. In the projected architecture, the Blockchain network allows more prominent security of each network layer relative to the schematic network.
Article
Full-text available
Condominium network refers to intra-organization networks, where smart buildings or apartments are connected and share resources over the network. Secured communication platform or channel has been highlighted as a key requirement for a reliable condominium which can be ensured by the utilization of the advanced techniques and platforms like Software-Defined Network (SDN), Network Function Virtualization (NFV) and Blockchain (BC). These technologies provide a robust, and secured platform to meet all kinds of challenges, such as safety, confidentiality, flexibility, efficiency, and availability. This work suggests a distributed, scalable IoT-SDN with Blockchain-based NFV framework for a smart condominium (DistB-Condo) that can act as an efficient secured platform for a small community. Moreover, the Blockchain-based IoT-SDN with NFV framework provides the combined benefits of leading technologies. It also presents an optimized Cluster Head Selection (CHS) algorithm for selecting a Cluster Head (CH) among the clusters that efficiently saves energy. Besides, a decentralized and secured Blockchain approach has been introduced that allows more prominent security and privacy to the desired condominium network. Our proposed approach has also the ability to detect attacks in an IoT environment. Eventually, this article evaluates the performance of the proposed architecture using different parameters (e.g., throughput, packet arrival rate, and response time). The proposed approach outperforms the existing OF-Based SDN. DistB-Condo has better throughput on average, and the bandwidth (Mbps) much higher than the OF-Based SDN approach in the presence of attacks. Also, the proposed model has an average response time of 5% less than the core model.
Article
Full-text available
The concept of Industry 4.0 is a newly emerging focus of research throughout the world. However, it has lots of challenges to control data, and it can be addressed various technologies like Internet of Things (IoT), Big Data, Artificial Intelligence (AI), Software Defined Networking (SDN), and Blockchain (BC) for managing data securely. Further, the complexity of sensors, appliances, sensor networks connecting to the internet and the model of Industry 4.0 has created the challenge of designing systems, infrastructure and smart applications capable of continuously analyzing the data produced. Regarding these, the authors present a distributed Blockchain-based security to industry 4.0 applications with SDN-IoT enabled environment. Where the Blockchain can be capable of leading the robust, privacy and confidentiality to our desire system. In addition, the SDN-IoT incorporates the different services of industry 4.0 with more security as well as flexibility. Furthermore, the authors offer an excellent combination among the technologies like IoT, SDN and Blockchain to improve the security and privacy of Industry 4.0 services properly. Finally , the authors evaluate performance and security in a variety of ways in the presented architecture.