Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

Post on 06-Aug-2020

0 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

Transcript

Blockchain-based Frameworks and Applications

for Secure IoT Space

Kosuke KanekoCybersecurity Center in Kyushu University

Jan. 22, 2018

1

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Contents

• Research Background and Purpose

• Research Progress

• Conclusion and Discussion

2

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Our Position of This Research Group

SICORP (Strategic International Collaborative Research Program): International

Joint Research Laboratory, “Regarding Security in the Internet of Things Space”

WP1

WP2

WP3

WP4

WP5

WP6

Specification, Prototype

Weak Points

Education

Information and Engineering

Education Exchanging

Weak Points

Feed Back

Device

Application

Education

KnowledgeBaseaboutSecurity

Here

3

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Our Research Group Members

Name Position

Kosuke Kaneko Associate Professor

Shota Johjima Master course student

Yuuki Nishida Master course student

Kazuya Nakayama Undergraduate student

Yusuke Tsutsumi Undergraduate student

Name Position

Subodh Sharma Assistant Professor

Ovia Seshadri Ph.D. course student

Japanese Members Indian Members

4

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Our Mission

Frameworkhardware

module

software

module

networking

module

authentication

module

database

module

Framework

Applications

5

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

The Subject of Our Research

Cloud

Gateway

IoT Device

Wide

Range

6

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Future Visions of IoT Space

Cloud Computing Edge Computing Advanced Edge Computing

Edge

Server

7

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

The Purpose of Our Security Framework

Secure data sharing among IoT devices by P2P communication.

Keywords: IoT security, P2P communication, Parallel computing

8

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

What’s the problem?

Byzantine Generals’ Problem

• This is a problem supposed in a situation where

there are some nodes who can send a message

to another node each other for making a

consensus.

• If there are some malicious nodes or broken

nodes in the network, whether they can make a

correct consensus or not in the situation.

Challenging

Point

9

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Advanced and Related Technology

Blockchain provides one of the solutions of Byzantine Generals‘ Problem.

Blockchain: The foundation technology running Bitcoin.

$10

$30

$300

$100

10

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Mechanism of Blockchain Technology

Each node has the SAME database as the other nodes

$10

$30

Distributed

Database

11

$10

$30

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Mechanism of Blockchain Technology

Transactions

The hash value of the previous block

The hash value of the previous block

Transactions

The hash value of the previous block

12

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Mechanism of Blockchain Technology

Who is generate the newest block?

13

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Mechanism of Blockchain Technology

Competition for generating

the newest block

This consensus algorithm

is called “Proof of Work”

14

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Hypothesis

The mechanism of the Blockchain can apply to the IoT devices?

10

30

300

100

$10

$30

$300

$100 Apply?

15

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Not so easy...

• Shortage of CPU power and memory size

• Difficulty of Real-time consensus

• Shortage of storage size

Need to develop the algorithm

to achieve a real-time consensus

with low CPU power, low memory size

and small storage size.

16

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Contents

• Research Background and Purpose

• Research Progress

– Framework

• Hashgraph

• Our Own Algorithm

– Application

• IoT Services with Mixed Reality Device

• Swarm Robotics

• Conclusion and Discussion

17

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 1: Hashgraph

• Hashgraph

– Leemon Baird, SWIRLDS.COM,

http://www.swirlds.com/downloads/SWIRLDS-TR-2016-01.pdf, 2016.

– Real-time consensus with low CPU power and low memory size

• Raspberry Pi 3

– Single board computer boarding on ARM processor

– CPU:ARM Cortex-A53/1.2GHz 4 core

– Memory:1G DDR2 SDRAM

SwirldsTechnicalReportSWIRLDS-TR-2016-02 7A B C D

=

Thiscontinuesforever,growingadirectedacyclicgraphupwardsforever.

Thisisagraph connectedbycryptographichashes,soitiscalledahashgraph.

Eacheventcontainsthehashesoftheeventsbelowitandisdigitallysignedbyitscreator.Sotheentiregraphofhashesiscryptographicallysecure.Itcanalwaysgrow,buttheolderpartsareimmutable,asstrongasthecryptographichashandsignaturesystemused.

18

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 1: Hashgraph

Hashgraph Nodes

Synchronization Node

Synchronization

Process

19

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 1: Hashgraph

An result of 10 times trial. Each trial was looped until 1,000 messages

were passed each other.

0

1

2

3

4

5

6

7

1 2 3 4 5 6 7 8 9 10

Average of CPU Usage

480

500

520

540

560

580

600

1 2 3 4 5 6 7 8 9 10

Elapsed Time of Each Traial

20

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Application 1: IoT Services with Mixed Reality Device

https://news.microsoft.com/ja-jp/videos/mixed-reality-hololens/

21

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Hashgraph Nodes

Synchronization Node

Camera

Images

Application 1: IoT Services with Mixed Reality Device

22

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 2: Our Own Algorithm

Our own unique algorithm for the consensus algorithm of Blockchain system

23

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 2: Our Own Algorithm

Proof of work: the consensus algorithm of Blockchain

Competition for generating

the newest block

This consensus

algorithm is called

“Proof of Work”

24

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 2: Our Own Algorithm

Competition for generating

the newest blockNonce:

0Hash 0000x52uf...

Nonce:

4578Hash 000089x1a...

Nonce:

23456Hash 00780bb7c...

25

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 2: Our Own Algorithm

• SHOCK CLAIM: Bitcoin is DESTROYING the planet and uses as much energy as

DENMARK

– Daily Express, Dec. 5, 2017

– https://www.express.co.uk/news/science/888535/bitcoin-environment-destroying-planet-fossil-fuels-

energy-electricity-Denmark-US-2020

• The computing power of the bitcoin network is already 100,000 times

larger than the world’s 500 fastest supercomputers.

• The bitcoin computer network currently uses as much electricity as

the country of Denmark.

26

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 2: Our Own Algorithm

Motivation: more effective computation for the competition in stead of the

hash value search.

Competition for generating

the newest blockMachine

Learning

Reinforcement

Learning

Deep Learning

27

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 2: Our Own Algorithm

Implemented a example framework: optimization problem by using Genetic Algorithm

The node who generates

the most excellent genes

obtains the reward and

generates the newest block

28

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Application 2: Swarm Robotics

A kind of robot who takes a group behavior by several

autonomous robots. They become smarter by sharing each

experience into the robotics network.

29

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Application 2: Swarm Robotics

Swarm robot system of sharing the parameters of reinforcement learning

into the robotics network by using Blockchain.

Reinforced

No Learning

No Learning

No Learning

30

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Application 2: Swarm Robotics

• Experiment

– Path finding

– Ethereum

– Simulation

Start

Goal

31

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Application 2: Swarm Robotics

The result of the path finding of the node who didn’t learn.

Trials

Steps

32

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Contents

• Research Background and Purpose

• Research Progress

• Conclusion and Discussion

33

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Conclusion and Discussion

• Our research group have developed IoT security frameworks and IoT

applications.

• The next step is to improve the framework and develop more IoT

applications using the framework.

Hashgraph Nodes

Synchronization Node

Camera

Images

34

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Thank you very much for your attention!

Q&A

top related