DOI QR코드

DOI QR Code

사물인터넷을 위한 블록체인 네트워킹에 대한 연구

A Study on Blockchain Networking for Internet of Things

  • 이일구 (성신여자대학교 융합보안공학과)
  • Lee, Il-Gu (Department of Convergence Security Engineering, Sungshin University)
  • 투고 : 2018.07.04
  • 심사 : 2018.08.20
  • 발행 : 2018.08.28

초록

신뢰하기 어려운 인터넷 환경에서 신뢰를 확보하기 위해 블록체인 기술을 사물인터넷 (IoT Internet of Things)에 적용한 '블록체인 기반 IoT'에 대한 기대감이 높다. 그러나 현재의 블록체인 기반의 IoT 기술은 확장성과 보안성 측면에서 실생활에 응용하기에 한계가 있는 것으로 보인다. 본 논문에서는 최근 각광받는 사물인터넷 디지털 비즈니스를 실현시키기 위한 블록체인 네트워킹 기술의 확장성과 보안성 난제를 고찰하고 정책과 샤딩, 오프체인, 비식별화, P2P 암호화폐 교환 등의 기술적 해결 방안 도입을 제안한다. 후속 연구에서는 본 연구 결과를 바탕으로 보안성과 확장성을 보장하는 사물인터넷 블록체인 플랫폼을 구현하고 기존의 블록체인 플랫폼과 비교할 계획이다.

High expectations are posed on the blockchain-based internet of things (IoT), in which IoT and blockchain technology is combined to obtain trust in the Internet, where trust appears impossible to obtain. However, applications of current blockchain-based IoT technology to real-world scenarios appears to be significantly more difficult owing to limitations regarding scalability and security. In this paper, the difficulties to implement blockchain networking technologies for IoT and digital businesses are investigated and practical solutions such as sharding, off-chain, de-idetification and P2P crypto-currency exchange are explored. In further work, a blockchain platform for IoTs which provides scalability and security will be implemented according to this research results, and compared with conventional blockchain platforms.

키워드

참고문헌

  1. Y. Yuan & F. Y. Wang. (2016). Towards blockchain-based intelligent transportation systems. In Intelligent Transportation Systems (ITSC), 2016 IEEE19th International Conference on, 2663-2668.
  2. J. Sun, J. Yan & K. Z. Zhang. (2016). Blockchain-based sharing services: What blockchain technology can contribute to smart cities. Financial Innovation, 2(1), 26.
  3. A. Dorri, S. S. Kangere, R. Jurdak & P. Gauravarm. (2017). Blockchain for IoT security and Privacy: The case study of a smart home. In Pervasive Computing and Communications Workshop, 2017 IEEE International Conference on, 618-623.
  4. S. Lee & D. Lee. (2016). Actual Cases for Smart Fusion Industry based on Internet of Things. Journal of the Korea Convergence Society, 7(2), 1-6. https://doi.org/10.15207/JKCS.2016.7.2.001
  5. P. Treleaven, R. G. Brown & D. Yang. (2017). Blockchain Technology in Finance. Computer, 50(9), 14-17. https://doi.org/10.1109/MC.2017.3571047
  6. H. Mun. (2018). Biometric information and OTP based on Authentication Mechanism using Blockchain. Journal of Convergence for Information Technology, 8(3), 85-90. https://doi.org/10.22156/CS4SMB.2018.8.3.085
  7. K. M. Khan, J. Arshad & M. M. Khan. (2018). Secure Digital Voting System Based on Blockchain Technology. International Journal of Electronic Government Research (IJEGR), 14(1), 53-62. https://doi.org/10.4018/IJEGR.2018010103
  8. H. M. Kim & M. Laskowski. (2018). Toward an ontology-driven blockchain design for supply-chain provenance. Intelligent Systems in Accounting, Finance and Management, 25(1), 18-27. https://doi.org/10.1002/isaf.1424
  9. K. Fan, S. Wang, Y. Ren, H. Li & Y. Yang. (2018). MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain. Journal of Medical Systems, 42(8), 136. https://doi.org/10.1007/s10916-018-0993-7
  10. J. Gao, K. O. Asamoah, E. B. Sifah, A. Smahi, Q. Xia, H. Xia & G. Dong. (2018). GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid. IEEE Access, 6, 9917-9925. https://doi.org/10.1109/ACCESS.2018.2806303
  11. Symantec internet security threat report. Technical report, Symantec Corporation. url: https://www.symantec.com/content/dam/symantec/docs /reports/istr-23-2018-en.pdf (last access: 2018.06.30.)
  12. N. Kshetri. (2017). Can Blockchain Strengthen the Internet of Things?. IT Professional, 19(4), 68-72. https://doi.org/10.1109/MITP.2017.3051335
  13. S. Hong & S. Park. (2017). The Research on Blockchain-based Secure IoT Authentication. Journal of the Korea Convergence Society, 8(11), 57-62. https://doi.org/10.15207/JKCS.2017.8.11.057
  14. T. B. Lee & M. Fischetti. (2001). Weaving the Web: The Original Design and Ultimate Destiny of the World Wide Web by Its Inventor, DIANE Publishing Company.
  15. Satoshi Nakamoto, Bitcoin: A peer-to-peer electronic cash system, url: http://www.bitcoin.org (last access: 2018.06.30.)
  16. M. Castro & B. Liskov. (2002). Practical Byzantine fault tolerance and proactive recovery. ACM Transaction on Computer Systems (TOCS), 20(4), 398-461. https://doi.org/10.1145/571637.571640
  17. A. Back. (2002). Hashcash - a denial of service counter-measure. url: http://hashcash.org/papers/hashcash.pdf (last access: 2018.06.30.).
  18. S. Underwood. (2016). Blockchain beyond bitcoin. Communications of the ACM, 59(11), 15-17.
  19. X. Feng & Y. Zhao. (2017). Digital forensics challenges to big data in the cloud. 2017 IEEE International Conference on Internet of Things, 858-862.
  20. M. Wundram, F. C. Freiling & C. Moch. (2013). Anti-forensics: the next step in digital forensics tool testing. 2013 Seventh IEEE International Conference on IT Security Incident Management and IT Forensics (IMF), 83-97.
  21. D. Miller. (2018). Blockchain and the Internet of Things in the Industrial Sector. IT Professional, 20(3), 15-18.
  22. BBC News, url: https://www.bbc.com/news/technology-42237162 (last access: 2018.06.30.).
  23. W. Li, A. Sforzin, S. Fedorov & G. O. Karame. (2017). Towards scalable and private industrial blockchains. In Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, 9-14.
  24. L. Luu, V. Narayanan, C. Zheng, K. Baweja, S. Gilbert & P. Saxena. (2016). A secure sharding protocol for open blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 17-30.
  25. M. Divya & N. B. Biradar. (2018). IOTA-Next Generation Block chain. International Journal of Engineering And Computer Science, 7(4), 23823-23826.
  26. S. Shin, G. Chae & T. Lee. (2015). An Investigation Study to Reduce Security Threat in the Internet of Things Environment, Journal of Convergence for Information Technology, 5(4), 31-36. https://doi.org/10.22156/CS4SMB.2015.5.4.031
  27. G. Zyskind & O. Nathan. (2015). Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE security and Privacy Workshop (SPW), 180-184.