Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
Blockchain-based Frameworks and Applications
for Secure IoT Space
Kosuke KanekoCybersecurity Center in Kyushu University
Jan. 22, 2018
1
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Contents
• Research Background and Purpose
• Research Progress
• Conclusion and Discussion
2
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Our Position of This Research Group
SICORP (Strategic International Collaborative Research Program): International
Joint Research Laboratory, “Regarding Security in the Internet of Things Space”
WP1
WP2
WP3
WP4
WP5
WP6
Specification, Prototype
Weak Points
Education
Information and Engineering
Education Exchanging
Weak Points
Feed Back
Device
Application
Education
KnowledgeBaseaboutSecurity
Here
3
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Our Research Group Members
Name Position
Kosuke Kaneko Associate Professor
Shota Johjima Master course student
Yuuki Nishida Master course student
Kazuya Nakayama Undergraduate student
Yusuke Tsutsumi Undergraduate student
Name Position
Subodh Sharma Assistant Professor
Ovia Seshadri Ph.D. course student
Japanese Members Indian Members
4
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Our Mission
Frameworkhardware
module
software
module
networking
module
authentication
module
database
module
Framework
Applications
5
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
The Subject of Our Research
Cloud
Gateway
IoT Device
Wide
Range
6
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Future Visions of IoT Space
Cloud Computing Edge Computing Advanced Edge Computing
Edge
Server
7
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
The Purpose of Our Security Framework
Secure data sharing among IoT devices by P2P communication.
Keywords: IoT security, P2P communication, Parallel computing
8
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
What’s the problem?
Byzantine Generals’ Problem
• This is a problem supposed in a situation where
there are some nodes who can send a message
to another node each other for making a
consensus.
• If there are some malicious nodes or broken
nodes in the network, whether they can make a
correct consensus or not in the situation.
Challenging
Point
9
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Advanced and Related Technology
Blockchain provides one of the solutions of Byzantine Generals‘ Problem.
Blockchain: The foundation technology running Bitcoin.
$10
$30
$300
$100
10
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Mechanism of Blockchain Technology
Each node has the SAME database as the other nodes
$10
$30
Distributed
Database
11
$10
$30
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Mechanism of Blockchain Technology
Transactions
The hash value of the previous block
The hash value of the previous block
Transactions
The hash value of the previous block
12
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Mechanism of Blockchain Technology
Who is generate the newest block?
13
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Mechanism of Blockchain Technology
Competition for generating
the newest block
This consensus algorithm
is called “Proof of Work”
14
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Hypothesis
The mechanism of the Blockchain can apply to the IoT devices?
10
30
300
100
$10
$30
$300
$100 Apply?
15
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Not so easy...
• Shortage of CPU power and memory size
• Difficulty of Real-time consensus
• Shortage of storage size
Need to develop the algorithm
to achieve a real-time consensus
with low CPU power, low memory size
and small storage size.
16
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Contents
• Research Background and Purpose
• Research Progress
– Framework
• Hashgraph
• Our Own Algorithm
– Application
• IoT Services with Mixed Reality Device
• Swarm Robotics
• Conclusion and Discussion
17
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Framework 1: Hashgraph
• Hashgraph
– Leemon Baird, SWIRLDS.COM,
http://www.swirlds.com/downloads/SWIRLDS-TR-2016-01.pdf, 2016.
– Real-time consensus with low CPU power and low memory size
• Raspberry Pi 3
– Single board computer boarding on ARM processor
– CPU:ARM Cortex-A53/1.2GHz 4 core
– Memory:1G DDR2 SDRAM
SwirldsTechnicalReportSWIRLDS-TR-2016-02 7A B C D
=
Thiscontinuesforever,growingadirectedacyclicgraphupwardsforever.
Thisisagraph connectedbycryptographichashes,soitiscalledahashgraph.
Eacheventcontainsthehashesoftheeventsbelowitandisdigitallysignedbyitscreator.Sotheentiregraphofhashesiscryptographicallysecure.Itcanalwaysgrow,buttheolderpartsareimmutable,asstrongasthecryptographichashandsignaturesystemused.
18
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Framework 1: Hashgraph
Hashgraph Nodes
Synchronization Node
Synchronization
Process
19
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Framework 1: Hashgraph
An result of 10 times trial. Each trial was looped until 1,000 messages
were passed each other.
0
1
2
3
4
5
6
7
1 2 3 4 5 6 7 8 9 10
Average of CPU Usage
480
500
520
540
560
580
600
1 2 3 4 5 6 7 8 9 10
Elapsed Time of Each Traial
20
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Application 1: IoT Services with Mixed Reality Device
https://news.microsoft.com/ja-jp/videos/mixed-reality-hololens/
21
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Hashgraph Nodes
Synchronization Node
Camera
Images
Application 1: IoT Services with Mixed Reality Device
22
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Framework 2: Our Own Algorithm
Our own unique algorithm for the consensus algorithm of Blockchain system
23
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Framework 2: Our Own Algorithm
Proof of work: the consensus algorithm of Blockchain
Competition for generating
the newest block
This consensus
algorithm is called
“Proof of Work”
24
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Framework 2: Our Own Algorithm
Competition for generating
the newest blockNonce:
0Hash 0000x52uf...
Nonce:
4578Hash 000089x1a...
Nonce:
23456Hash 00780bb7c...
25
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Framework 2: Our Own Algorithm
• SHOCK CLAIM: Bitcoin is DESTROYING the planet and uses as much energy as
DENMARK
– Daily Express, Dec. 5, 2017
– https://www.express.co.uk/news/science/888535/bitcoin-environment-destroying-planet-fossil-fuels-
energy-electricity-Denmark-US-2020
• The computing power of the bitcoin network is already 100,000 times
larger than the world’s 500 fastest supercomputers.
• The bitcoin computer network currently uses as much electricity as
the country of Denmark.
26
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Framework 2: Our Own Algorithm
Motivation: more effective computation for the competition in stead of the
hash value search.
Competition for generating
the newest blockMachine
Learning
Reinforcement
Learning
Deep Learning
27
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Framework 2: Our Own Algorithm
Implemented a example framework: optimization problem by using Genetic Algorithm
The node who generates
the most excellent genes
obtains the reward and
generates the newest block
28
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Application 2: Swarm Robotics
A kind of robot who takes a group behavior by several
autonomous robots. They become smarter by sharing each
experience into the robotics network.
29
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Application 2: Swarm Robotics
Swarm robot system of sharing the parameters of reinforcement learning
into the robotics network by using Blockchain.
Reinforced
No Learning
No Learning
No Learning
30
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Application 2: Swarm Robotics
• Experiment
– Path finding
– Ethereum
– Simulation
Start
Goal
31
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Application 2: Swarm Robotics
The result of the path finding of the node who didn’t learn.
Trials
Steps
32
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Contents
• Research Background and Purpose
• Research Progress
• Conclusion and Discussion
33
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Conclusion and Discussion
• Our research group have developed IoT security frameworks and IoT
applications.
• The next step is to improve the framework and develop more IoT
applications using the framework.
Hashgraph Nodes
Synchronization Node
Camera
Images
34
The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018
Thank you very much for your attention!
Q&A