This article presents the first-ever blockchain which can simultaneously handle device and data security, which is important for the emerging Internet-of-Everything (IoE). This article presents a unique concept of blockchain that integrates hardware security primitives called Physical Unclonable Functions (PUFs) to solve scalability, latency, and energy requirement challenges and is called PUFchain. Data management and security (and privacy) of data, devices, and individuals, are some of the issues in the IoE architectures that need to be resolved. Integrating the blockchain into the IoE environment can help solve these issues and helps in the aspects of data storage and security. This article introduces a new blockchain architecture called PUFchain and introduces a new consensus algorithm called "Proof of PUF-Enabled Authentication" (PoP) for deployment in PUFchain. The proposed PoP is the PUF integration into our previously proposed Proof-of-Authentication (PoAh) consensus algorithm and can be called "Hardware-Assisted Proof-of-Authentication (HA-PoAh)". However, PUF integration is possible in the existing and new consensus algorithms. PoP utilizes PUFs which are responsible for generating a unique key that cannot be cloned and hence provide the highest level of security. A PUF uses the nanoelectronic manufacturing variations that are introduced during the fabrication of an integrated circuit to generate the keys. Hence, once generated from a PUF module, the keys cannot be cloned or generated from any other module. PUFchain uses a PUF and Hashing module which performs the necessary cryptographic functions. Hence the mining process is offloaded to the hardware module which reduces the processing times. PoP is approximately 1,000× faster than the well-established Proof-of-Work (PoW) and 5× faster than Proof-of-Authentication (PoAh). The transaction time reduction compared to PoAh is 79.15%. An optimized ultra low power design of the PUF and hashing module also provides a significant decrease of power consumption.
The overwhelming acceptance and growing need for Internet of Things (IoT) products in each aspect of everyday living is creating a promising prospect for the involvement of humans, data, and procedures. The vast areas create opportunities from home to industry to make an automated lifecycle. Human life is involved in enormous applications such as intelligent transportation, intelligent healthcare, smart grid, smart city, etc. A thriving surface is created that can affect society, the economy, the environment, politics, and health through diverse security threats. Generally, IoT devices are susceptible to security breaches, and the development of industrial systems could pose devastating security vulnerabilities. To build a reliable security shield, the challenges encountered must be embraced. Therefore, this survey paper is primarily aimed to assist researchers by classifying attacks/vulnerabilities based on objects. The method of attacks and relevant countermeasures are provided for each kind of attack in this work. Case studies of the most important applications of the IoT are highlighted concerning security solutions. The survey of security solutions is not limited to traditional secret key-based cryptographic solutions, moreover physical unclonable functions (PUF)-based solutions and blockchain are illustrated. The pros and cons of each security solution are also discussed here. Furthermore, challenges and recommendations are presented in this work.
The industrial development of the last few decades has prompted an increase in the number of vehicles by multiple folds. With the increased number of vehicles on the road, safety has become one of the primary concerns. Inter vehicular communication, specially Vehicle to Everything (V2X) communication can address these pressing issues including autonomous traffic systems and autonomous driving. The reliability and effectiveness of V2X communication greatly depends on communication architecture and the associated wireless technology. Addressing this challenge, a device-to-device (D2D)-based reliable, robust, and energy-efficient V2X communication architecture is proposed with LoRa wireless technology. The proposed system takes a D2D communication approach to reduce the latency by offering direct vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication, rather than routing the data via the LoRa WAN server. Additionally, the proposed architecture offers modularity and compact design, making it ideal for legacy systems without requiring any additional hardware. Testing and analysis suggest the proposed system can communicate reliably with roadside infrastructures and other vehicles at speeds ranging from 15–50 km per hour (kmph). The data packet consists of 12 bytes of metadata and 28 bytes of payload. At 15 kmph, a vehicle sends one data packet every 25.9 m, and at 50 kmph, it sends the same data packet every 53.34 m with reliable transitions.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.