<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Cho GH. SH-BlockCC: A secure and efficient Internet of
things smart home architecture based on cloud computing and blockchain technology.
International Journal of Distributed Sensor Networks. April 2019.
doi:10.1177/1550147719844159
[9]. Exploring the Integration of Blockchain Technology and IoT in a Smart University
Application Architecture. (n.d.). Exploring the Integration of Blockchain Technology and
IoT in a Smart University Application Architecture</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">0065-2458</issn>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="hindawi-id">2567194</article-id>
      <article-id pub-id-type="doi">10.3390/s18082575</article-id>
      <title-group>
        <article-title>Next-Generation Advanced Security systems for Communities Using Integrated IoT and Blockchain Over Cloud Computing</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Aadam Quraishi</string-name>
          <email>aadamquraishi@yahoo.com</email>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maher Ali Rusho</string-name>
          <email>maher.rusho@colorado.edu</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Faisal Yousef Alghayadh</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>V. Mahalakshmi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mukesh Soni</string-name>
          <email>mukesh.research24@gmail.com</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mohammed Wasim Bhatt</string-name>
          <email>wasimmohammad71@gmail.com</email>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Blockchain, Internet of Things, Cloud Computing, Community Safety, Data encryption.</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Computer Science and Information Systems Department, College of Applied Sciences, AlMaarefa University</institution>
          ,
          <addr-line>Riyadh</addr-line>
          ,
          <country country="SA">Saudi Arabia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Computer Science, College of Engineering and computer science, Jazan University</institution>
          ,
          <addr-line>Jazan 45142</addr-line>
          ,
          <country country="SA">Saudi Arabia</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Department of Lockheed Martin Engineering Management, University of Colorado</institution>
          ,
          <addr-line>Boulder, Boulder, Colorado</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Dr. D. Y. Patil Vidyapeeth, Pune, Dr. D. Y. Patil School of Science &amp;amp; Technology</institution>
          ,
          <addr-line>Tathawade, Pune</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>M.D. Research, Intervention Treatment Institute</institution>
          ,
          <addr-line>Houston Texas</addr-line>
          ,
          <country country="US">USA</country>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>Model Institute of Engineering and Technology</institution>
          ,
          <addr-line>Jammu, J&amp;K</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <volume>115</volume>
      <issue>2</issue>
      <fpage>729</fpage>
      <lpage>734</lpage>
      <abstract>
        <p>According to human requirements, various structures are being constructed and require some protection from fire accidents, floods, earthquakes, any gas leaks, and any other concerns that may arise in the neighborhood. So far, their security goal is to propose a system integrated with blockchain and an IoT system. We structure the system in different steps in our proposal to process the alarm rung by IoT devices. This IoT gadget may be used in either a private or public setting. To do this, we must process the various settings for checking and responding to the devices. Data centers that interact between sender and recipient will verify blockchain data. Finally, we provide a security solution to avoid reply assaults, transmission interruptions, and data integrity. This entire system may work together to promote community safety and eliminate avoidable disputes.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        IoT is one of the best technologies that will integrate many components. IoT can gather data
from the existing parts; each member may unique IoT have the ability to transfer the data to
the cloud. Various incidents have happened in the system; using a standard IoT system was
to make attention to the incident. IoT systems ensure the safety of the network with the
different components connected to the system [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. IoT will include various techniques,
stepby-step processes and actions/reactions that concentrate on increasing safety by using IoT
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        IoT security refers method to be used by internet-connected devices. IoT is a very wast
technology; in our work, it becomes broader. IoT security is used to protect the private/ public
community. By using IoT technology, there is 30-35% growth in every field [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        IoT will collect data in real-time, which will be used to make a decision. It may be accurate/
predicted. The IoT can also understand the security strategies to protect the corresponding field
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        Blockchain technology is one of the easy to decentralize and distribute the record with digital
assistance without proper acceptance/approval; nobody can change the data from the records [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
A blockchain stores the data in the blocks of data chains. By using the appropriate acceptance/
approval by the admin/ digital program, data cannot be modified/deleted/transferred [6]. The
blockchain maintains the proper transparency between the admin and the public; The clarity will
increase the trust now blockchain is one of the prime technologies in safety part [7].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Methodology</title>
      <p>This research work proposes a methodology by integrating the IoT and blockchain technology
for community safety and security purpose. In proposed method have a different practice.
Figure 1 shows the methodology by integrating the IoT and blockchain technology for
community safety and security purpose for smart cities.</p>
      <p>Blockchain centers
Blockchain centers receive the information from IoT related devices and store/record the received
data in the different device nodes [8]. This recorded/stored data can monitor by the community
member who wants to verify the recorded/ stored data by the blockchain centers. They can view by
security guards.</p>
      <sec id="sec-2-1">
        <title>Community</title>
        <p>Community members may belong to residential, commercial and mixed according to the type of
community needed to install the IoT device and security guard.</p>
      </sec>
      <sec id="sec-2-2">
        <title>Occupants</title>
        <p>All the occupants living in the community have an option to install the IoT device in the
private domain because they need the safety of their belongings [9]. If they are installed IoT
devices, they should have mobile with the application. This application requires login through
the blockchain centers. Using their login, we monitor all private domains by IoT devices.</p>
      </sec>
      <sec id="sec-2-3">
        <title>Security guard</title>
        <p>The security guard will work under the admin. The security guard should mentor the committee at
all times. If any unknown or dangerous event occurs, the security guard should react immediately to
save the community or community members [10].</p>
      </sec>
      <sec id="sec-2-4">
        <title>Supervisor</title>
        <p>Supervisor appointed by community management. The Supervisor should manage all the security
guards. The Supervisor will give all types of permissions to the security guard to monitor
community safety [11].</p>
      </sec>
      <sec id="sec-2-5">
        <title>IoT Devices</title>
        <p>IoT devices are cameras and sensors.</p>
        <p>Cameras: Cameras take the images of the community. Cameras are fitted in the community, public
or private domains [12]. Cameras are installed in public and private realms but need to determine
how many cameras must be installed.</p>
      </sec>
      <sec id="sec-2-6">
        <title>Sensors:</title>
        <p>Sensors can find a dangerous moment like smoke detection, pathfinder, emergency button and other
devices to identify the hazardous moment [13].</p>
        <p>Log service:
Every camera recorded video is saved in a log server, and the server may use a physical component
or cloud-based server [14] . The log server needs to read all the recorders.</p>
        <sec id="sec-2-6-1">
          <title>2.1. Process flow of the proposed methodology</title>
          <p>Step1: Every community member needs to require the IoT device through proper technology.
Step2: The IoT device records/monitors every unsymmetric event and send the information to the security
guard and registered community members.</p>
          <p>Step 3: The security guard will check the received event information through the IoT based Surveillance
system.</p>
          <p>Step 4: After verification, the security guard will solve the problem/ received issue, update the log server,
and mark it as information in the blockchain centre.</p>
          <p>Step 5: If the IoT device is relevant to the private community, the alarm will ring/ information will pass to
the appropriate community member via the installed application.</p>
          <p>Step 6: The community member will verify the situation via the application and update the same event
information to the blockchain centers.</p>
          <p>Step 7: The community member will need a security guard to help them. He can have an option to choose.</p>
        </sec>
        <sec id="sec-2-6-2">
          <title>2.2. Installation of application</title>
          <p>In the particular installation of the application, In the device is major concerned with the
blockchain center to initiate the mutual communication to the community. All the community
members need to register their data with the application in online mode with the application.
The blockchain center will add the registered community member through his application with
a registered address and broad cast with the community as a hash-aundro-DSDV routing
scheme. The community area will connect with the blockchain center of a concerned security
guard. Before passing the information, an authentication process should verify the received/
sender information verified by the registered address [15]. The device/ system should match
the address respectively. Figure 2 below shows the algorithm for install the application.</p>
        </sec>
        <sec id="sec-2-6-3">
          <title>2.3. Authentication phase</title>
          <p>Figure 3 represents the step-by-step process for authentication for a registered community
member. This entire phase will work under the community to the blockchain. IoT devices are
interconnected in the whole system to exchange the data inside the design only [16]. For that
purpose, authentication is needed to exchange the data in the system for security purposes.
Every data/ message is assigned the ID and aundro address for that authentication [17]. This
information is verified by the blockchain centers and matched with the ID and address of the
registered community member. Then, only data will transfer authentically if any
data/information is needed from the community member [18]. Then also, the system will verify
the ID and address. If all are matched with the design, then data will exchange.
Device to the device authentication process, all blockchain centers broadcast all the aundro
addresses. The IoT devices pass the information to the blockchain center and the community
members to the advised information [19]. The IoT device follows a communication path, neat
by community members or processes/collects data through the blockchain centers.</p>
        </sec>
        <sec id="sec-2-6-4">
          <title>2.4. Alarm trigged phase</title>
          <p>The two different coding schemes will trigger the alarm. i.e., local and global versions applied
to hierarchical clustering.</p>
          <p>Encoding and decoding:
First, introduce the encoding and decoding with the local version applied to hierarchal
clustering. In this system, we should get the data structure by a searching agent [20]. Data
structure decoding in binary form, shown in the figure 4, we can find the location by the binary
encoded in the hierarchical tree shown in the figure 5.</p>
        </sec>
        <sec id="sec-2-6-5">
          <title>2.3. Notification Phase</title>
          <p>The figure 5 shows that the IoT blockchain platform structure contains many IoT device data
storing sets. Community members, linked with one to one around the blockchain centers to
provide a large amount of data by the community member, commands needed to perform some
operations like enquire data, storing the data in the storage through the blockchain centers.
Data can be stored in the blockchain's physical device or the cloud. The community member
anytime can access the data through the registered account [21]. Nowadays, embedded devices
or android devices directly work as the transfer application interface. Finally, the data is
directly communicated with the community member during the notification phase [22]. Figure
6 shows the IoT security guard system and Figure 7 shows the IoT Block chain platform.</p>
        </sec>
        <sec id="sec-2-6-6">
          <title>2.6. Response phase- Security guard with public domain IoT</title>
          <p>IoT security guard is a dynamic controller, and it should work with good policy, which will
protect the hazardous activities inside the community [23]. As per research work, IoT security
guards act as a mediator between IoT devices and society. A developed system in blockchain
centers; this center should be closed source, and it should not be cloud because it removes the
need to believe the cloud providers.</p>
          <p>IoT security guard verifies all events/actions inside the community; if any event/ action is
against the policies, the security guard should respond [24]. IoT security guards need some part
1. Code instructor unit 2. data collecting processing unit 3. security server unit
Code instructor unit, instruct code as per security policies to the security guard. Code
instructors always need updates like user instruction status and configuration settings.
The data collecting unit stores the information from the IoT devices/ collected data behavior
observed so far; the data collector should work as an interface between IoT devices [25]. The
data should be checked and responded to within a specified run time as per the community's
policy.</p>
          <p>The security guard services will provide two types of outputs. 1. Security guards should
instruct every predicted condition, according to that need to take some actions [26]. If that
action fails, then we need to pass the policy. 2. security guards work like an interface for
accepting the policy by promoting the run time.</p>
          <p>Data storage
Block chain</p>
          <p>center
IoT Server
Community</p>
          <p>IoT</p>
        </sec>
        <sec id="sec-2-6-7">
          <title>2.4. Check for history record phase</title>
          <p>The system having two history records i.e.: stored/ recorded videos developed by IoT devices
history records are stored by physical or cloud domain. Figure 8 shows the authentication to
watch the videos and records.
step 1: Community member need to request to view the stored/ recorded videos and recodes of
the private space through the security guard.
step 2: Security guard will wither requested data (i.e.: starting and ending date/ time and
domain of his request). Then forwarded blockchain center release the data to security again he
will check data.
step 3: Blockchain center will check the community member registered ID and address and
permitted to security guard to release the information to the community member.
step 4: Security guard will release the information to the community member.
step 5: If block chain center could not verify/ community member is not in records then
information should not permit to release.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Analysis- Security</title>
      <p>This work is essential because security analysis will present the attack. In this analysis, data
integrity non-reputational massage, unforgettable data, traceability of recorder,
main-in-themiddle attack, reply attach.</p>
      <sec id="sec-3-1">
        <title>3.1. Data Integrity</title>
        <p>Blockchain is one of the most influential technologies to protect data. Blockchain stored the data in
different boxes/storages. A chain connects these storages [27]. So due to this reason, hackers
cannot hack the blockchain system is problematic because it needs more time to crack the different
blocks/ storage and is also very costly.</p>
        <p>It is essential to feature in blockchain any activity cannot perform without the notice of the
security guard/admin. A very compact monitoring system is needed.</p>
        <p>It is challenging to secure the data from IoT devices because IoT devices directly connect and
transfer many data from the different connectors. But blockchain is supported is support the IoT
device in the security purpose. Hear blockchain work like a protector of IoT devices.
Another problem with increasing innovative houses/communities. If we expand the smart homes/
community, we must also develop the blockchain algorithm. Due to this reason, data will protect
safely. Table 1 below shows the summery of the attack on the smart things that have effected/
protected by something.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Unforgeable data and Traceability:</title>
        <p>In the developed system, hyper edger fabric-based blockchain technology is used, so it is stored in
the blockchain center. In every step blockchain system is connected and updated from time to time
[28]. When an IoT device is transferring or receiving data, the IoT device is triggered.</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Man-in-the-middle attack:</title>
        <p>In this developed system, a description for every command/communication/message defines every
attack. Every message or communication/command is encrypted by the public key. After receiving
the answer, the receiver can decode it by the private key to describe the communication.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion</title>
      <p>This research is directly linked to the issues of safety in the community. To resolve the safety
issue, developed a security system by integrating the blockchain and IoT devices. In our
fundamental research, we create an architecture and flow of the work in multiple phases.
In this research, all the community members install the app with a blockchain system for
feature communication. This communication will adequately transfer to the alarm for the ring
as well, as the respective community member and relative community member can report
through the log server record, and the community will notice the unsafe situations. During the
entire communication process, all the updates will transfer/received by the community with
the security.</p>
      <p>This work is divided into many phases for managing personal and public IoT devices. Any
community member can check these history records from their installed application as the
security guard and admin permitted. In all the cases, the developed system can raise the
community members' security from the third-party/hackers. The blockchain center will
identify the hazardous activity if hackers try to hack the blockchain.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]. Atlam, Hany &amp; Alenezi, Ahmed &amp; Alassafi, Madini &amp; Wills,
          <string-name>
            <surname>Gary.</surname>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Blockchain with Internet of Things: Benefits, Challenges</article-title>
          and
          <string-name>
            <given-names>Future</given-names>
            <surname>Directions</surname>
          </string-name>
          .
          <source>International Journal of Intelligent Systems and Applications</source>
          .
          <volume>10</volume>
          . 10.5815/ijisa.
          <year>2018</year>
          .
          <volume>06</volume>
          .05.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>.</given-names>
            <surname>Alkhateeb</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ;
            <surname>Catal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            ;
            <surname>Kar</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          ;
          <article-title>Mishra, A. Hybrid Blockchain Platforms for the Internet of Things (IoT): A Systematic Literature Review</article-title>
          .
          <source>Sensors</source>
          <year>2022</year>
          ,
          <volume>22</volume>
          ,
          <fpage>1304</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]. Elva Leka and Besnik Selimi, “
          <article-title>Development and Evaluation of Blockchain based Secure Application for Verification and</article-title>
          Validation of Academic Certificates”,
          <source>Annals of Emerging Technologies in Computing (AETiC)</source>
          ,
          <string-name>
            <surname>Print</surname>
            <given-names>ISSN</given-names>
          </string-name>
          :
          <fpage>2516</fpage>
          -
          <lpage>0281</lpage>
          ,
          <string-name>
            <surname>Online</surname>
            <given-names>ISSN</given-names>
          </string-name>
          :
          <fpage>2516</fpage>
          -
          <lpage>029X</lpage>
          , pp.
          <fpage>22</fpage>
          -
          <lpage>36</lpage>
          , Vol.
          <volume>5</volume>
          , No.
          <volume>2</volume>
          ,
          <issue>1st</issue>
          <year>April 2021</year>
          ,
          <article-title>Published by International A ssociation of Educators and Researchers, (IAER)</article-title>
          ,
          <source>DOI: 10</source>
          .33166/AETiC.
          <year>2021</year>
          .
          <volume>02</volume>
          .003, Available: http://aetic.theiaer.org/archive/v5/v5n2/p3.html
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]. Ana Reyna, Cristian Martín, Jaime Chen, Enrique Soler, Manuel Díaz,
          <article-title>On blockchain and its integration with IoT. Challenges and opportunities</article-title>
          ,
          <source>Future Generation Computer Systems</source>
          , Volume
          <volume>88</volume>
          ,
          <year>2018</year>
          , Pages
          <fpage>173</fpage>
          -
          <lpage>190</lpage>
          , ISSN 0167-739X, https://doi.org/10.1016/j.future.
          <year>2018</year>
          .
          <volume>05</volume>
          .046.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]. rnab Banerjee,
          <article-title>Chapter Nine - Blockchain with IOT: Applications and use cases for a new</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>