Countering Active Attacks on RAFT-based IoT Blockchain Networks

04/02/2022
by   Hasan Mujtaba Buttar, et al.
0

This paper considers an Internet of Thing (IoT) blockchain network consisting of a leader node and various follower nodes which together implement the RAFT consensus protocol to verify a blockchain transaction, as requested by a blockchain client. Further, two kinds of active attacks, i.e., jamming and impersonation, are considered on the IoT blockchain network due to the presence of multiple active malicious nodes in the close vicinity. When the IoT network is under the jamming attack, we utilize the stochastic geometry tool to derive the closed-form expressions for the coverage probabilities for both uplink and downlink IoT transmissions. On the other hand, when the IoT network is under the impersonation attack, we propose a novel method that enables a receive IoT node to exploit the pathloss of a transmit IoT node as its fingerprint to implement a binary hypothesis test for transmit node identification. To this end, we also provide the closed-form expressions for the probabilities of false alarm, missed detection and miss-classification. Finally, we present detailed simulation results that indicate the following: i) the coverage probability improves as the jammers' locations move away from the IoT network, ii) the three error probabilities decrease as a function of the link quality.

READ FULL TEXT

page 1

page 2

research
04/30/2019

BlockLoc: Secure Localization in the Internet-of-Things using Blockchain

Several IoT applications are tightly dependent on the locations of the d...
research
05/31/2018

Impersonation Detection in AWGN-limited Underwater Acoustic Sensor Networks

This work addresses the problem of impersonation detection in an underwa...
research
02/10/2022

Coverage Probability and Spectral Efficiency Analysis of Multi-Gateway Downlink LoRa Networks

The system-level performance of multi-gateway downlink long-range (LoRa)...
research
02/12/2020

On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack

This paper investigates the impact of authentication on effective capaci...
research
02/18/2021

Latency Modeling of Hyperledger Fabric for Blockchain-enabled IoT Networks

Hyperledger Fabric (HLF), one of the most popular private blockchain pla...
research
02/08/2022

Instantaneous and limiting behavior of an n-node blockchain under cyber attacks from a single hacker

We investigate the instantaneous and limiting behavior of an n-node bloc...
research
05/31/2019

Performance Analysis of Clustered LoRa Networks

In this paper, we investigate the uplink transmission performance of low...

Please sign up or login with your details

Forgot password? Click here to reset