<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards a Secure Behavior Modeling for IoT Networks Using Blockchain</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Jawad Ali</string-name>
          <email>jawad.ali@s.unikl.edu.my</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Privacy IOT</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>, Ahmad Shara dz Khalid</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Malaysian Institute of Information Technology</institution>
          ,
          <addr-line>Universiti Kuala Lumpur</addr-line>
          ,
          <country country="MY">Malaysia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>UniKL Business School</institution>
          ,
          <addr-line>Universiti Kuala Lumpur</addr-line>
          ,
          <country country="MY">Malaysia</country>
        </aff>
      </contrib-group>
      <fpage>244</fpage>
      <lpage>258</lpage>
      <abstract>
        <p>In recent years, Internet of Things (IoT) occupies a vital aspect of our daily lives. IoT networks composed of smart-devices which communicate and exchange the information without the physical intervention of humans. Due to such proliferation and autonomous nature of IoT systems make the devices more vulnerable and prone to a severe kind of threats. In this paper, we propose a behavior, capturing and veri cation procedures in Blockchainsupported smart-IoT systems that can show the trust-level con dence to outside networks. We proposed our own custom Behavior Monitor and implement on a selected node that can extract the activity of each device and analyzes the behavior using deep machine learning strategy. Besides, we deploy Trusted Execution Technology (TEE) which can provide a secure execution environment (enclave) for sensitive application code and data on blockchain. Finally, in evaluation, we analyze various IoT devices data that is infected by Mirai attack. The evaluation results demonstrate the ability of our proposed method in terms of accuracy and time required for detection.</p>
      </abstract>
      <kwd-group>
        <kwd>Security</kwd>
        <kwd>Neural Network</kwd>
        <kwd>Blockchain</kwd>
        <kwd>Trust</kwd>
        <kwd>Behavior</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        diversity of things that outputs in a massive number of devices. Each device
(physical or virtual) connected to the system, should be traceable and the
generated information from the device can be retrievable by other users irrespective
of their locations [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Nevertheless, it is necessary that only authorized users
can be able to enter and make use of the system and its resources. Otherwise,
it may face several security concerns such as data modi cation, identity theft
and information leakage. Moreover, security and privacy problems remain a
demanding challenge in such a massive scale adoption of IoT systems because of the
following reasons: (1) Mostly the communications between these IoT devices are
wireless which make the system more susceptible to di erent attacks, i.e.
message tampering, eavesdropping and denial-of-service attacks like mirai attack [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]
etc. (2) Devices from di erent company-makers have resource constraints
limitation such as processing power, battery and memory capacity that do not allow
to deploy advanced security solutions.
      </p>
      <p>
        Numerous solutions concerning security and privacy in IoT have been
proposed that provide the mainstream security requirements i.e. Con dentiality,
Integrity, Authentication or simply CIA [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. However, due to heterogeneous
nature and resource-constrained devices, existing solutions cannot ful ll the
desired security requirements in the upcoming large-scale IoT system. Even though
some security based solutions are e cient and secure but are commonly based
on centralized mechanisms. For instance, PKI (Public Key Infrastructure) faces
with scalability issues in case of million nodes.
      </p>
      <p>
        When it comes to decentralization, Block-chain (BC) technology has acquired
an enormous attention in regard to tackling security, anonymity, traceability, and
centralization. Ethereum [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ] a public blockchain was introduced in 2014 that
run smart-contracts for BC users in order to write and execute application code
in a distributed way. Basically, Blockchain is a distributed ledger technology
where each operation such as create, read, update and delete, is recorded in the
form of a transaction. Any unauthorized user accessing data or any operations
on the previously processed data can, therefore, be detected. Furthermore, smart
contracts are used to apply some access control mechanisms on the stored data.
A number of researches have shown the integration of BC technology in di erent
IoT use-cases. [
        <xref ref-type="bibr" rid="ref10 ref12 ref14 ref15 ref19 ref31 ref32 ref7 ref8">15,32,10,8,31,19,12,7,14</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>Problem Statement and Contribution:</title>
      <p>
        As from various studies, it has been found that blockchain has become a
promising technology to meet future IoT security requirements [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Several Authors
[
        <xref ref-type="bibr" rid="ref15 ref16 ref17 ref18 ref30">16,15,30,18,17</xref>
        ] put e orts in decentralized security mechanisms for upcoming
large-scale IoT systems. But the limitation to all the approaches is that: there
is no device-level trust that can prove any particular zone to external entities in
case of supposing the communication to occur between di erent IoT networks.
The contribution of this paper is as follows:
1. Implement our own custom Behavior Monitor in IoT-Blockchain setup that
can store &amp; monitor IoT devices data and classify its behavior (normal or
malicious) to prevent attacks.
2. Applying a lter on sensor-level that can stabilize output from single/multiple
sensors to avoid faulty or malicious sensors in the network.
3. To implement Trusted Execution Environment (TEE)) on a local blockchain
of each IoT-Zone that ensure the integrity and con dentiality of sensitive
application code and data.
2
2.1
      </p>
      <sec id="sec-2-1">
        <title>Background</title>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Internet of Things (IoT)</title>
      <p>
        The Internet of Things is the interconnection of smart-devices, mechanical and
digital machines, objects and people that are capable of transferring data over
the network without any human intervention. On the broader scale, IoT
applications areas are smart-homes, smart-cities, smart-healthcare, etc. The major
components [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] in IoT ecosystem includes:
{ Smart-devices &amp; Sensors: The rst layer is the device connectivity layer of
IoT network, which constitutes di erent sensors like temperature sensor and
thermostat, humidity sensor and many more.
{ Connectivity: Devices in IoT are connected to low power wireless networks
like LoRAWAN, ZigBee and Wi etc.
{ Gateway: It acts as a middle layer between devices and manages the
bidirectional transmission between networks and protocol. One of the key
functions of a gateway is to translate di erent protocols and make them
interoperable.
{ Cloud: This component integrates billion of sensors, smart-devices gateways,
data storage and provides di erent predictive analytics.
{ Analytics: This is the process of converting the raw data (analog) of billion
of devices into useful insights which can be further used for detailed analysis.
2.2
      </p>
    </sec>
    <sec id="sec-4">
      <title>Blockchain - a decentralized technology</title>
      <p>
        Blockchain technology was initially introduced and brought in 2008 and used
by a remarkable known cryptocurrency, Bitcoin [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. It is a decentralized ledger
technology that builds on a peer-to-peer network. Each node in the BC network
holds an updated ledger copy that can hinder from a single point of failure. In
the past few years, the blockchain mostly based on cryptocurrencies such as [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] in order to avoid the double-spending problem. However, recently numerous
application areas have been explored where the blockchain can be set up to create
and maintain digital transaction records in a secure and distributed fashion.
      </p>
      <p>The ledger in BC is composed of blocks, and each block contains two parts.
The rst part represents the transaction (that need to be stored in a database),
which can be of any kind, such as patient record, network tra c log, goods
transaction, etc. The second part includes the header information such as hash
of a current transaction, hash of previous hash and timestamp. Thus, storage in
this way makes a sequenced block of linked chain as shown in Fig. 1. Furthermore,</p>
      <sec id="sec-4-1">
        <title>Hash</title>
        <p>Block-1</p>
        <p>Header
Transaction 1
Transaction 2
Transaction 3
Transaction 4
.
.</p>
        <p>.</p>
        <p>Transaction n</p>
      </sec>
      <sec id="sec-4-2">
        <title>Hash</title>
      </sec>
      <sec id="sec-4-3">
        <title>Hash</title>
        <p>Block-2</p>
        <p>Header
Transaction 1
Transaction 2
Transaction 3
Transaction 4
.
.</p>
        <p>.</p>
        <p>Transaction n</p>
        <p>Block-3 .....</p>
        <p>Header
Transaction 1
Transaction 2
Transaction 3
Transaction 4
.
.</p>
        <p>.</p>
        <p>Transaction n
if a new transaction comes, it will rst add to certain block. Secondly, miners
verify the block contain the transaction according to already de ned rules. After
the veri cation process, all miners perform a consensus strategy to validate the
transactions. Finally, upon successful validation the veri ed transaction is ready
to append in the BC ledger.
2.3</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Blockchain and IoT Systems</title>
      <p>
        IoT devices generate a massive volume of data, that must be appropriately stored
and analyzed for useful purposes. For each IoT operation (create, update, delete,
read), the data can be registered in the form of transactions in the BC-blocks.
Device identity information can be registered in a block such as manufacturer
information and live status where the device is in use. Smart-contracts are used to
enforce access control policies for IoT devices which means that any unauthorized
access to a device can be therefore identi ed. There is no need for a central
authority for storage, such as cloud, for IoT protection. Blockchain provides
data authenticity, data integrity, traceability and prevents from unauthorized
access. BC can also enable a secure channel of messaging between IoT devices.
Exchange of messages from one device to another device can be handled like
nancial transactions ow in crypto-currencies, e.g. Bitcoin [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
2.4
      </p>
    </sec>
    <sec id="sec-6">
      <title>Blockchain Security Solutions for IoT</title>
      <p>The decentralized and distributed nature of blockchain makes it a promising
security solution for IoT use-cases. IoT and blockchain integration enables a
higher and sound security level, which otherwise could not be accomplished by
any other technology or nearly impossible. Some of recent proposals in regards
to IoT security with blockchain are as follows:</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], authors proposed a blockchain-based solution for managing IoT
devices and con gurations using Ethereum. A unique key-pair (Public &amp; Private)
is assigned to each device in the network. The private key is kept inside the
device, while the public key is registered as a transaction in the blockchain. An
IoT device can then be reached and access through ethernet by its public key.
      </p>
      <p>Thus, it is concluded that the management and control of IoT devices through
blockchain is possible.</p>
      <p>
        A solution proposed in [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ], which make use of blockchain for secure rmware
updates in IoT devices where tra c directly to the network server is replaced
by local peers of the blockchain nodes. The manufacturer is supposed to store
the hashes of updated rmware on the blockchain that can be easily accessible
to all the IoT nodes.
      </p>
      <p>
        IoT devices using in medical and healthcare zone are also subjected to the
same security and privacy issues. For medical IoT system, it must be attack
resistant and reliable enough. User safety and privacy is very critical and must be
protected from any malfunction caused by a security incident or imprecise/faulty
device. The risk of device malfunction can overcome in blockchain by immutable
ledger technology. Nichol et al. [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] proposed the feasibility of BC in order to
provide reliability in medical IoT devices. Upon a device is manufactured and
installed, a hash of UID (unique identi er) along with the other relevant
information such as manufacturer information are stored in BC. Later, this data will
be updated with doctor-name, patient-history, and hospital information. The
doctors and patients can be automatically informed about the device status like
battery expiry, patient health irregularities.
2.5
      </p>
    </sec>
    <sec id="sec-7">
      <title>Blockchain &amp; Trusted Execution Environment (TEEs)</title>
      <p>
        Trusted Execution Environments (TEEs) [
        <xref ref-type="bibr" rid="ref3 ref4">4,3</xref>
        ] have been used to enhance
security and e ciency in the blockchain protocol. TEEs provide con dentiality and
integrity to the sensitive part of application code in a system, until and unless
the CPU is not compromised physically by an attacker. TEEs also support
remote attestation [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], that allows remote parties to verify the health of software
with genuine TEE.
      </p>
      <p>
        Intel provided TEEs functionality in Software Guard Extension (SGX) [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
SGX is a set of CPU instructions inside Intel's x86 processor design which can
allow creating an isolated environment for the execution of selected pieces of code
in protected areas called enclaves. These enclaves are designed to run software in
a trustworthy environment, even on a system (host) where the operating system
and memory are untrusted. There are three main functions of enclaves which
are isolation, sealing and attestation. A short description is as follows:
{ Isolation: Data and code inside the enclave memory are protected and cannot
be read or altered by any external process.
{ Sealing: Data supposed to send to host environment should be encrypted
and authenticated with a seal key.
{ Attestation: Remote parties are allowed to verify an application enclave
identity, credentials, and other data.
3
      </p>
      <sec id="sec-7-1">
        <title>Related Work</title>
        <p>Currently, several types of research have been proposed in the integration of
blockchain and IoT. Very few of them have shown interest to help IoT security
requirements. This section outlines some of the past researcher e orts that intend
to realize such integration, mainly for security needs.</p>
        <p>
          Raja et al.[
          <xref ref-type="bibr" rid="ref15">15</xref>
          ] demonstrate blockchain-based architecture for smart-home
setting. The architecture consists of three di erent blockchain networks: a
localBC (private), a share BC (private) and overlay BC (public). Although this
research solves the issue of identi cation, still it has some shortcomings such as
(1) For each operation, it happened to make at least eight communication links
that can ood the network quickly in case of high activity of IoT devices. (2)
Local BC's are centralized and not distributed which is opposite to the main
principle of BC - a decentralized technology.
        </p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ], authors study existing proposed models of access control systems
and argue that these systems are not e ective in the upcoming large-scale IoT.
In order to avoid centralized mechanisms, this proposed research implements
capability and access control as a component in a blockchain environment. The
other components are data management protocol, messaging service and data
storage system. The messaging service deals with the exchange of access control
message between two parties with de ned roles. The messaging service, then
sends a request to the data storage system, where it is stored in the form block.
Finally, the receiving party fetches the message from the BC block using the
messaging service. Moreover, they de ned four roles, i.e. data owner, data source,
requester and endorser.
        </p>
        <p>
          A mechanism named as chainanchor proposed in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] based on the
authorization of IoT devices in the cloud network. It helps device-owner being
rewarded upon selling their device data to a service provider and ensure a
privacypreserving communication between owner and service-provider. But this
approach is not suitable in most IoT use-cases, because the main scope of this
research is full anonymity and IoT devices sometimes need device identi cation.
        </p>
        <p>
          Patrick et al. [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] propose a decentralized authentication scheme for IoT
devices. In this approach they declare virtual zones like healthcare zone,
smartschool zone, smart-school zone for robust identi cation of smart-devices. Each
zone has a group master who is responsible to create a groupID and communicate
with blockchain. Each device or follower in a zone gets a ticket signed by their
respective zone master. When a device or follower wants to initiate a transaction,
an association request signed by private-key is sent to their respective zone
master. Upon receiving the request, BC veri es its integrity with the public key of
follower. Afterwards, the follower ticket is veri ed using the master public key. If
the ticket found valid, BC stores the association of followerID with their groupID
for further correspondence, otherwise discarded. However, the limitation of this
approach is that no mechanism can provide trust-level con dence in each zone
to prove it to the outside community.
        </p>
        <p>
          To summarize, the majority of all these current proposals follow the same
security schemes provided by existing BC technologies, i.e. Bitcoin [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ], Ethereum
[
          <xref ref-type="bibr" rid="ref33">33</xref>
          ] etc. However, there is no awareness towards device level trust that means
to know the status of running IoT device, whether it is normal or malicious.
        </p>
        <p>Untrusted Part</p>
        <p>IoT Behavior Monitor
Composer (Smart Contract)</p>
        <p>Hyper-Ledger Fabric
Consensus Algorithm</p>
        <p>Validator
Dataset</p>
        <p>Ledger</p>
        <p>Trusted Function</p>
        <p>Call ();</p>
        <p>Return ();</p>
        <p>Trusted Part (Enclave)</p>
        <p>Key-Storage</p>
        <p>Encryption
..</p>
        <p>
          Hashing ();
(IoT Transactions)
The main goal of the proposed framework (cf. Fig. 4) is to add and implement
a security module for behavior monitoring of various IoT-zones in a blockchain
setup. As discussed in [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ], authors declare zones for di erent use-cases of IoT.
However, they do not consider the devices itself in case of compromised behavior.
Furthermore, there is no mechanism that can show the trust-Level con dence of
each zone when an external entity needs to know before establishing a
connection. In this research, we enhance the said scheme and add a behavior monitor
on each zone. A separate local-BC is con gured on each zone that is used to
store the activity of each zone and provides the trust-level con dence to outside
entities.
        </p>
        <p>All kinds of communications between devices are considered as transactions
and must be passed through the blockchain for validation. For example, if node
A needs to send a message to node B, then A must rst send the message to
blockchain. If BC validates and authenticates the message from A, then B is
nally allowed to read the message.
In the rst phase of deployment, one device from each zone is designated as a
Main or Master node, which can be considered as a certi cation authority (CA).
Any node can be declared as a master, but in this case, we assigned to the node
that is more resource capable and powerful. All the other nodes in each zone
are known as follower. Every Master node creates a groupID and send a signed
ticket to each follower for identi cation. For the rst transaction of any follower,
Hardware Model</p>
        <p>Wireless Communication
(WebSocket)</p>
        <p>Raspberry Pi 3</p>
        <p>(Master)
Raspberry pi-0
(Follower)</p>
        <p>Raspberry pi-0
(Follower)</p>
        <p>Raspberry pi-0</p>
        <p>(Follower)
Serial or I2C</p>
        <p>Communication
Sensor</p>
        <p>Sensor</p>
        <p>Sensor</p>
        <p>Sensor</p>
        <p>Sensor
it must require authentication. After that, an association of the follower and
master are stored in the BC for future correspondence.</p>
        <p>Hardware Model of IoT The hardware architecture we use in our proposed
framework for prototyping consists of multiple raspberry pi's. The main/master
node is con gured on raspberry pi-3 for the sake of more resources. Followers
or clients node work on raspberry pi-0 with a direct connection to sensors and
other digital devices. Wi is used for communication between master nodes,
and follower communicates to their sensors using serial or I2C communication
protocol as shown in Fig. 3.</p>
        <p>Every device is assigned by a key pair that consists of a public and private
key. The private key is stored in follower (pi-0), while the corresponding public
key is stored in their respective master node (pi-3). The connection between the
follower and master node is established through WebSocket. Upon a connection
request from follower to master, the follower must be required to send a digital
signature. Afterwards, master node should validate the digital signature in the
blockchain before a secure WebSocket authorization.</p>
        <p>Improving Sensor Level Data Accuracy In order to improve sensor level
security, the data acquisition procedure will use Kalman lter to make a data
model based on single/multiple sensor readings and covariance. For example, the
position of a drone can be estimated in 3-axis based on GPS, but GPS alone
cannot guarantee accurate altitude. Similarly, a Barometer data can drift based
on di erent weather conditions at the same altitude. Radar or Lidar will
output the altitude value from the ground, but if an obstacle supposed to happen</p>
        <p>Smart-Home Zone</p>
        <p>Behavior Monitor
IoT Nodes
Data</p>
        <p>Node M
(Master)</p>
        <p>Machine
Learning</p>
        <p>Hashes
Node B</p>
        <p>Node A
Node D</p>
        <p>Node E
Node C</p>
        <p>Data Classification</p>
        <p>Normal
Malicious</p>
        <p>TEE-Enabled
Local-BC-Ledger</p>
        <p>Policy
T(A.D1)
T(A.D2)
T(B.D1)
T(C.D1)</p>
        <p>...</p>
        <p>T(C.D2)
T(D.D1)</p>
        <p>SmartHealthcare</p>
        <p>Zone
Smart-Grid</p>
        <p>Zone
Public
BlockChain</p>
        <p>Smart-School</p>
        <p>Zone
between the ground and radar the readings might become inaccurate. To avoid
such discrepancies, Kalman lter uses data from all the 3 sensors GPS,
barometer and radar/lidar, to predict the correct value (3D location) based on the
covariance. This way, if a faulty or malicious sensor found, the Kalman lter will
automatically lter out the data from that sensor.
4.2</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>Con guring Local Blockchain</title>
      <p>
        A local private blockchain is deployed on a master node (Raspberry pi-3) of
each zone and populated with the hashes of transactions generated from
smartdevices. Hyperledger Fabric [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] a permissioned-BC is implemented as a local BC,
we discussed the work ow of fabric with IoT in our previous research [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. For
prototype implementation, we use the dataset [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] of IoT tra c that has been
collected from various sensor communication. For each communication between
nodes or smart-devices, a transaction is created and stored in the local BC. Note
that in the majority of the current BC technologies, actual data of IoT devices
are not stored in the BC due to overheads (i.e. processing &amp; network).
      </p>
      <p>
        In each zone, a single device having more computational power than others,
acts as a master or main node. Likewise in our model, we use raspberry
pi3 which is computationally and energy-e cient act as a master/main node.
Once the number of transactions reaches a pre-de ne blocksize, the master node
creates a new block and append it to local BC. Afterwards, we realize Intel
SGX [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] as a root-of-trust on top of BC to ensure that the execution of sensitive
code and applications are in trusted mode. As shown in Fig. 2, the TEE-enabled
application is composed of a trusted and untrusted part. For sensitive operations
like encryption and hashing, a trusted-function is called. The function returns,
and the data inside the trusted part (enclave) remains in trusted memory and
is not accessible to external entities. Moreover, implementing SGX technology
on blockchain allows the proposed scheme to:
{ Protect the applications running on BC and data protection that cannot be
accessed by the execution host.
{ Make sure that the application/data on BC is expected and correct.
{ Protect end-to-end privacy of application result, which cannot allow others
to inspect but the user.
{ Provide a BC-based validation by verifying the applications inside enclave
is neither tampered nor interrupted by any node in BC.
{ Make sure the application and execution results are valid, and not tampered
or fabricated by any malicious node.
4.3
      </p>
    </sec>
    <sec id="sec-9">
      <title>Behavior Monitor</title>
      <p>The main goal of this research is to integrate our custom behavior monitor that
can classify the behavior of every device and compute a level-of-trust on each
zone. As mentioned earlier, all the nodes (followers) in a speci c zone do their
operations (read, write) via the master/main node. The scheme in Fig. 4 depicts
our proposed approach with all the entities in detail. Data or transactions from
nodes is considered as a behavior of that particular node. The master node is
a device that centrally processes all the incoming and outgoing transactions to
and from a zone.</p>
      <p>Whenever a data is received by the master node from the follower node, the
master node stores the data in the behavior monitor and appends the
corresponding hash to the ledger in blockchain. A sequence-ID (SEQ-ID) is assigned
to each transaction while storing in behavior monitor, and a Hash-ID (H-ID)
is attached to the corresponding hash in BC, for reference. Finally, a machine
learning strategy is used to actively monitor the incoming data and classify them
as normal or malicious.</p>
      <p>
        For analysis and detection of behavior, we rely on deep Auto-encoders (AE)
[
        <xref ref-type="bibr" rid="ref20 ref27">20,27</xref>
        ] for IoT devices, which is trained from statistical correlation features
extracted from benign data. The process of behavior detection and monitoring
consists of the following stages. (1) Data collection (2) Feature extraction (3)
Training model (4) Continuous Behavior Monitoring.
      </p>
      <p>
        Data Collection At this point, we refer to the dataset [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] that has been
collected from various sensors in the IoT network. In real-time, to ensure that the
training data is clean and not malicious, normal tra c from IoT devices are
collected immediately after its joining to the IoT network.
      </p>
      <p>Feature Extraction Whenever data from IoT devices arrives, a behavioral
snapshot of the protocols and host related to data are stored in our behavior
monitor. The snapshot contains di erent parameters, i.e. source IP, destination</p>
      <p>IP, MAC-address and port number, etc. We use the same set of features
mentioned in the dataset for real-time detection of malicious activities in IoT devices.
For example, when a compromised node in a zone spoof an IP, then the features
aggregated from the source-IP, destination-IP and MAC-Address will
immediately mark as malicious because of unseen activity from the respective spoofs
IP.</p>
      <p>Training Model As our baseline model for behavior detection, we use deep
auto-encoders that can build and maintain a learning model on each zone of
IoT use-cases. An auto-encoder is a type of arti cial neural network (ANN),
which is trained to re-structure the data after some compression. The
compression ensures that the model would be able to learn meaningful concepts and the
correlation between di erent sets of features. For training purposes, we use two
sets of data which consists of only benign (normal) data. The rst dataset is
a training dataset (TDS ) which is used to train the auto-encoder by declaring
input parameters such as learning rate (lrn, size of gradient descent step), and
epochs (number of iterations through TDS ). The second dataset OptDS
(Optimization Dataset) is used to optimize the above hyper-parameters (lrn &amp; epochs)
iteratively until the mean square error (M SE) function between the input and
output stop decreasing. This stopping prevents over tting in TDS and help out
better detection results with future data. Later on, (OptDS ) is used to identify
normal and malicious activities and false positive rate (FPR).</p>
      <p>After the model training and optimization is completed, the threshold value
(thv) is set by which an instance of data is considered malicious. Empirically, it
is calculated by the sum of the sample mean along with the standard deviation
of M SE on OptDS (see Equation 1).</p>
      <p>thv = M SEOptDS + s(M SEOptDS )
(1)
AE</p>
      <p>IsoForest</p>
      <p>SVM</p>
      <p>LOF
Fig. 5. Detection Accuracy comparison with other Algorithms</p>
      <p>0.8
te 0.6
a
R
y
c
rau 0.4
c
c
A
0.2
0</p>
      <p>True Postive
False Postive
)
s
d
n
o
c
e
s
(
e
m
i
T
n
o
i
t
c
e
t
e
D
6
4
2
0
SVM
LOF
IsolationForest
AutoEncoder
1.5</p>
      <p>2
DeviceID
Continuous Behavior Monitoring Finally, the model is applied to
continuously observe the data and to label each instance as normal or malicious.
Consequently, an alert against abnormal behavior can be issued to indicate the IoT
device is malicious. Afterwards, for each IoT zone, the behavior monitor
calculates a trust-level measurement and a threshold must be de ned for every
use-case. Whenever a user or node from outside needs to accessed data from any
speci c zone, our model is capable of disclosing the health of zone before
establishing a connection. This way a trusted environment can be built and informed
the user about the state of any particular zone before actual communication.
5</p>
      <sec id="sec-9-1">
        <title>Experimental Analysis</title>
        <p>
          In our experiments, we use a real-time large dataset available in [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], for realizing
the framework. The dataset contains both benign and malicious (attacked) data.
The data we choose from the dataset belongs to three di erent devices which are
Ecobee-thermostat, Webcam, and Security-camera. For training and
optimization, we use tensor ow and keras libraries in python language. An auto-encoder
makes an input layer whose dimension is the same as the number of features in
the dataset, i.e. 115.
        </p>
        <p>After training, we apply a famous DDOS attack known as (mirai ) to
calculate the detection time and accuracy of our model in comparison with other
algorithms commonly used for anomaly detection. The same benign dataset is
used to train three other algorithms: SVM (support vector machine), Isolation
forest and LOF (Local Outlier Factor ). Our method shows 99% results in terms
of TPR (True Positive Rate) and fewer FPR (False Positive Rate). Furthermore,
as evident in Fig. 5 SVM and LOF have almost similar TPR values and found
much better than the isolation forest.</p>
        <p>
          Next, we evaluate the average detection time for each algorithm as depicted
in Fig. 6. The detection time of all the three devices in our case is lower than
the others. The deep auto-encoders outer-perform on all the selected devices in
terms of False-positive, True-positive and detection time. This is because of the
ability in auto-encoders to learn approximate complex functions and non-linear
structure mapping [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ]. Moreover, as shown in Fig. 6, our technique required
much less time than the other algorithms which is approximately 175 230ms
(milliseconds) to detect the attacks. This means that the launch attack could
be detected or alerted in less than a second and thus considers as a substantial
reduction in a typical time required for DDOS attacks [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
6
        </p>
      </sec>
      <sec id="sec-9-2">
        <title>Conclusions and Future Work</title>
        <p>In this research, we analyze device level trust in IoT-Blockchain Infrastructure.
A smart-home setting is used as a use-case for realizing the proposed idea. For
prototype implementation a Local Blockchain on each zone is deployed on a
master (raspberry pi-3) node that can store every tra c coming from their follower
(Raspberry pi-0)) in the form of transactions. Behavior Monitor is de ned and
con gured on the Main/Master node of each zone, which is capable of capturing
and analyzing the runtime activity of IoT devices. We apply a deep learning
strategy (auto-encoders) for realization on the behavior monitor to classify the
device and make a level-of-trust. Furthermore, we incorporate Trusted Execution
technology (TEE) as a root-of-trust over the blockchain to provide security for
sensitive code and applications. Finally, the proposed framework could meet the
current security problems in IoT-Blockchain environment. And the evaluation
of our study shows its ability to mitigate the mainstream security requirements
and resilience to attacks.</p>
        <p>This research work is our rst step towards classi cation of devices in
IoTBlockchain framework by means of deep learning. Our future plan is to
investigate a comparative study of other machine learning approaches for better results
in terms of performances and accuracy. Another goal would be to realize the
framework in other use-cases of IoT domain and analyze the outcomes. Finally,
in the near future we will provide a full implementation on various IoT devices
datasets along with full veri cation mechanism of zones in a trusted way and
make the source online to the research community.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Gartner</given-names>
            <surname>Says</surname>
          </string-name>
          <article-title>By 2020, More Than Half of Major New Business Processes and Systems Will Incorporate Some Element of the Internet of Things</article-title>
          .
          <source>Technical report</source>
          , Gartner, Inc,
          <year>2017</year>
          . urlhttps://www.gartner.com/newsroom/id/3185623 (
          <year>2017</year>
          ), [Online; accessed 08-April-2017]
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. Mirai attack. urlhttps://www.corero.com/resources/ddos-attack
          <article-title>-types/miraibotnet-ddos-attack</article-title>
          .
          <source>html</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>ARM</given-names>
            <surname>Trust</surname>
          </string-name>
          <article-title>Zone</article-title>
          . urlhttps://www.arm.com/ products/security-on-arm/trustzone. (
          <year>2018</year>
          ), [Online; accessed 25-Dec-2018]
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Intel</surname>
            <given-names>SGX</given-names>
          </string-name>
          . urlhttps://software.intel.com/en-us/sgx (
          <year>2018</year>
          ), [Online; accessed 25- Dec-2018]
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>UCI</given-names>
            <surname>Machine</surname>
          </string-name>
          <article-title>Learning Repository</article-title>
          . urlhttps://archive.ics.uci.edu/ml/machinelearning-databases/00442/ (
          <year>2018</year>
          ), [Online; accessed 03-Nov-2018]
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>IOT</given-names>
            <surname>Components</surname>
          </string-name>
          . urlhttps://www.rfpage.
          <article-title>com/what-are-the-major-componentsof-internet-of-things/ (</article-title>
          <year>2019</year>
          ), [Online; accessed 02-April-2019]
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Adnan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eiad</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Decentralizing Privacy Implementation at Cloud Storage Using Blockchain-Based Hybrid Algorithm pp</article-title>
          .
          <volume>1</volume>
          {
          <fpage>13</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Ali</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ali</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Musa</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zahrani</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure</article-title>
          .
          <source>International Journal of Advanced Computer Science and Applications</source>
          <volume>9</volume>
          (
          <issue>10</issue>
          ),
          <volume>584</volume>
          {
          <fpage>591</fpage>
          (
          <year>2018</year>
          ). https://doi.org/10.14569/IJACSA.
          <year>2018</year>
          .
          <volume>091070</volume>
          , http://thesai.org/Publications/ViewPaper?Volume=
          <volume>9</volume>
          {&amp;}Issue=
          <volume>10</volume>
          {&amp;}Code= ijacsa{&amp;}SerialNo=
          <fpage>70</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Androulaki</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barger</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bortnikov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cachin</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Christidis</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Caro</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Enyeart</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ferris</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laventman</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Manevich</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Muralidharan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Murthy</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nguyen</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sethi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sorniotti</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stathakopoulou</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vukolic</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cocco</surname>
            ,
            <given-names>S.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yellick</surname>
          </string-name>
          , J.:
          <article-title>Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains (</article-title>
          <year>2018</year>
          ). https://doi.org/10.1145/3190508.3190538, http://arxiv.org/abs/
          <year>1801</year>
          . 10228{%}0Ahttp://dx.doi.org/10.1145/3190508.3190538
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Banafa</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Iot and blockchain convergence: Bene ts and challenges</article-title>
          .
          <source>IEEE Internet of Things</source>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Blenn</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , Ghiette, V.,
          <string-name>
            <surname>Doerr</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Quantifying the spectrum of denial-of-service attacks through internet backscatter</article-title>
          .
          <source>In: Proceedings of the 12th International Conference on Availability, Reliability and Security</source>
          . p.
          <fpage>21</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Bocek</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rodrigues</surname>
            ,
            <given-names>B.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Strasser</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stiller</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Blockchains everywhere - a use-case of blockchains in the pharma supply-chain. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) pp</article-title>
          .
          <volume>772</volume>
          {
          <issue>777</issue>
          (
          <year>2017</year>
          ). https://doi.org/10.23919/INM.
          <year>2017</year>
          .
          <volume>7987376</volume>
          , http://ieeexplore.ieee. org/document/7987376/
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Christidis</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Devetsikiotis</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Blockchains and Smart Contracts for the Internet of Things</article-title>
          .
          <source>IEEE Access 4</source>
          ,
          <issue>2292</issue>
          {
          <fpage>2303</fpage>
          (
          <year>2016</year>
          ). https://doi.org/10.1109/ACCESS.
          <year>2016</year>
          .2566339
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Darwish</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ya</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Almasri</surname>
            ,
            <given-names>A.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zuhairi</surname>
            ,
            <given-names>M.F.</given-names>
          </string-name>
          :
          <source>Privacy and Security of Cloud Computing : A Comprehensive Review of Techniques and Challenges</source>
          <volume>7</volume>
          ,
          <issue>239</issue>
          {
          <fpage>246</fpage>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Dorri</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kanhere</surname>
            ,
            <given-names>S.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jurdak</surname>
          </string-name>
          , R.:
          <article-title>Towards an optimized blockchain for iot</article-title>
          .
          <source>In: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation</source>
          . pp.
          <volume>173</volume>
          {
          <fpage>178</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Hammi</surname>
            ,
            <given-names>M.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hammi</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bellot</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Serhrouchni</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Bubbles of Trust : a decentralized Blockchain-based authentication system for</article-title>
          .
          <source>Computers &amp; Security (July)</source>
          (
          <year>2018</year>
          ). https://doi.org/10.1016/j.cose.
          <year>2018</year>
          .
          <volume>06</volume>
          .004, https://doi.org/10.1016/j. cose.
          <year>2018</year>
          .
          <volume>06</volume>
          .004
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Hammi</surname>
            ,
            <given-names>M.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Livolant</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bellot</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Serhrouchni</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Minet</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>A lightweight mutual authentication protocol for the iot</article-title>
          .
          <source>In: International Conference on Mobile and Wireless Technology</source>
          . pp.
          <volume>3</volume>
          {
          <fpage>12</fpage>
          . Springer (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Hardjono</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          :
          <article-title>Cloud-based commissioning of constrained devices using permissioned blockchains</article-title>
          .
          <source>In: Proceedings of the 2nd ACM International Workshop on IoT Privacy</source>
          , Trust, and Security. pp.
          <volume>29</volume>
          {
          <fpage>36</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Hashemi</surname>
            ,
            <given-names>S.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Faghri</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rausch</surname>
          </string-name>
          , P.,
          <string-name>
            <surname>Campbell</surname>
            ,
            <given-names>R.H.</given-names>
          </string-name>
          :
          <article-title>World of empowered iot users</article-title>
          .
          <source>In: Internet-of-Things Design and Implementation (IoTDI)</source>
          ,
          <year>2016</year>
          IEEE First International Conference on. pp.
          <volume>13</volume>
          {
          <fpage>24</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Hinton</surname>
            ,
            <given-names>G.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salakhutdinov</surname>
            ,
            <given-names>R.R.</given-names>
          </string-name>
          :
          <article-title>Reducing the dimensionality of data with neural networks</article-title>
          .
          <source>science</source>
          <volume>313</volume>
          (
          <issue>5786</issue>
          ),
          <volume>504</volume>
          {
          <fpage>507</fpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Huh</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cho</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Managing iot devices using blockchain platform</article-title>
          .
          <source>In: Advanced Communication Technology (ICACT)</source>
          ,
          <year>2017</year>
          19th International Conference on. pp.
          <volume>464</volume>
          {
          <fpage>467</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Johnson</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Scarlata</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rozas</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brickell</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mckeen</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Intel R software guard extensions: Epid provisioning and attestation services</article-title>
          .
          <source>White Paper</source>
          <volume>1</volume>
          ,
          <issue>1</issue>
          {
          <fpage>10</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Komninos</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Philippou</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pitsillides</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Survey in smart grid and smart home security: Issues, challenges and countermeasures</article-title>
          .
          <source>IEEE Communications Surveys &amp; Tutorials</source>
          <volume>16</volume>
          (
          <issue>4</issue>
          ),
          <year>1933</year>
          {
          <year>1954</year>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>J.H.</given-names>
          </string-name>
          :
          <article-title>Blockchain-based secure rmware update for embedded devices in an internet of things environment</article-title>
          .
          <source>The Journal of Supercomputing</source>
          <volume>73</volume>
          (
          <issue>3</issue>
          ),
          <volume>1152</volume>
          {
          <fpage>1167</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ma</surname>
          </string-name>
          , R.,
          <string-name>
            <surname>Jiao</surname>
            ,
            <given-names>R.:</given-names>
          </string-name>
          <article-title>A hybrid malicious code detection method based on deep learning</article-title>
          .
          <source>methods 9</source>
          (
          <issue>5</issue>
          ) (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Nakamoto</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Bitcoin: A Peer-to-Peer Electronic Cash System</article-title>
          . Www.Bitcoin.Org p.
          <volume>9</volume>
          (
          <year>2008</year>
          ). https://doi.org/10.1007/s10838-008-9062-0, https://bitcoin.org/ bitcoin.pdf
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Nauman</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tanveer</surname>
            ,
            <given-names>T.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Syed</surname>
            ,
            <given-names>T.A.</given-names>
          </string-name>
          :
          <article-title>Deep neural architectures for large scale android malware analysis</article-title>
          .
          <source>Cluster</source>
          Computing pp.
          <volume>1</volume>
          {
          <issue>20</issue>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Nichol</surname>
            ,
            <given-names>P.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brandt</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>Co-creation of trust for healthcare: The cryptocitizen framework for interoperability with blockchain</article-title>
          .
          <source>Research Proposal. ResearchGate</source>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Ouaddah</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abou</surname>
            <given-names>Elkalam</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Ait</surname>
          </string-name>
          <string-name>
            <surname>Ouahman</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          :
          <article-title>Fairaccess: a new blockchainbased access control framework for the internet of things</article-title>
          .
          <source>Security and Communication Networks</source>
          <volume>9</volume>
          (
          <issue>18</issue>
          ),
          <volume>5943</volume>
          {
          <fpage>5964</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Ouaddah</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Elkalam</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ouahman</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          :
          <article-title>Towards a novel privacy-preserving access control model based on blockchain technology in iot</article-title>
          .
          <source>In: Europe and MENA Cooperation Advances in Information and Communication Technologies</source>
          , pp.
          <volume>523</volume>
          {
          <fpage>533</fpage>
          . Springer (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Roulin</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dorri</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>On the Activity Privacy of Blockchain for IoT</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Walker</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dubey</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Laszka</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schmidt</surname>
            ,
            <given-names>D.C.</given-names>
          </string-name>
          :
          <article-title>Platibart: a platform for transactive iot blockchain applications with repeatable testing</article-title>
          .
          <source>In: Proceedings of the 4th Workshop on Middleware and Applications for the Internet of Things</source>
          . pp.
          <volume>17</volume>
          {
          <fpage>22</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Wood</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Ethereum: A secure decentralised generalised transaction ledger</article-title>
          .
          <source>Ethereum project yellow paper 151</source>
          , 1{
          <fpage>32</fpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>