35
Blockchain-based Frameworks and Applications for Secure IoT Space Kosuke Kaneko Cybersecurity Center in Kyushu University Jan. 22, 2018

Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

Blockchain-based Frameworks and Applications

for Secure IoT Space

Kosuke KanekoCybersecurity Center in Kyushu University

Jan. 22, 2018

Page 2: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

1

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Contents

• Research Background and Purpose

• Research Progress

• Conclusion and Discussion

Page 3: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

2

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Our Position of This Research Group

SICORP (Strategic International Collaborative Research Program): International

Joint Research Laboratory, “Regarding Security in the Internet of Things Space”

WP1

WP2

WP3

WP4

WP5

WP6

Specification, Prototype

Weak Points

Education

Information and Engineering

Education Exchanging

Weak Points

Feed Back

Device

Application

Education

KnowledgeBaseaboutSecurity

Here

Page 4: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

3

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Our Research Group Members

Name Position

Kosuke Kaneko Associate Professor

Shota Johjima Master course student

Yuuki Nishida Master course student

Kazuya Nakayama Undergraduate student

Yusuke Tsutsumi Undergraduate student

Name Position

Subodh Sharma Assistant Professor

Ovia Seshadri Ph.D. course student

Japanese Members Indian Members

Page 5: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

4

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Our Mission

Frameworkhardware

module

software

module

networking

module

authentication

module

database

module

Framework

Applications

Page 6: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

5

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

The Subject of Our Research

Cloud

Gateway

IoT Device

Wide

Range

Page 7: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

6

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Future Visions of IoT Space

Cloud Computing Edge Computing Advanced Edge Computing

Edge

Server

Page 8: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

7

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

The Purpose of Our Security Framework

Secure data sharing among IoT devices by P2P communication.

Keywords: IoT security, P2P communication, Parallel computing

Page 9: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

8

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

What’s the problem?

Byzantine Generals’ Problem

• This is a problem supposed in a situation where

there are some nodes who can send a message

to another node each other for making a

consensus.

• If there are some malicious nodes or broken

nodes in the network, whether they can make a

correct consensus or not in the situation.

Challenging

Point

Page 10: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

9

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Advanced and Related Technology

Blockchain provides one of the solutions of Byzantine Generals‘ Problem.

Blockchain: The foundation technology running Bitcoin.

$10

$30

$300

$100

Page 11: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

10

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Mechanism of Blockchain Technology

Each node has the SAME database as the other nodes

$10

$30

Distributed

Database

Page 12: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

11

$10

$30

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Mechanism of Blockchain Technology

Transactions

The hash value of the previous block

The hash value of the previous block

Transactions

The hash value of the previous block

Page 13: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

12

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Mechanism of Blockchain Technology

Who is generate the newest block?

Page 14: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

13

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Mechanism of Blockchain Technology

Competition for generating

the newest block

This consensus algorithm

is called “Proof of Work”

Page 15: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

14

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Hypothesis

The mechanism of the Blockchain can apply to the IoT devices?

10

30

300

100

$10

$30

$300

$100 Apply?

Page 16: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

15

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Not so easy...

• Shortage of CPU power and memory size

• Difficulty of Real-time consensus

• Shortage of storage size

Need to develop the algorithm

to achieve a real-time consensus

with low CPU power, low memory size

and small storage size.

Page 17: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

16

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Contents

• Research Background and Purpose

• Research Progress

– Framework

• Hashgraph

• Our Own Algorithm

– Application

• IoT Services with Mixed Reality Device

• Swarm Robotics

• Conclusion and Discussion

Page 18: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

17

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 1: Hashgraph

• Hashgraph

– Leemon Baird, SWIRLDS.COM,

http://www.swirlds.com/downloads/SWIRLDS-TR-2016-01.pdf, 2016.

– Real-time consensus with low CPU power and low memory size

• Raspberry Pi 3

– Single board computer boarding on ARM processor

– CPU:ARM Cortex-A53/1.2GHz 4 core

– Memory:1G DDR2 SDRAM

SwirldsTechnicalReportSWIRLDS-TR-2016-02 7A B C D

=

Thiscontinuesforever,growingadirectedacyclicgraphupwardsforever.

Thisisagraph connectedbycryptographichashes,soitiscalledahashgraph.

Eacheventcontainsthehashesoftheeventsbelowitandisdigitallysignedbyitscreator.Sotheentiregraphofhashesiscryptographicallysecure.Itcanalwaysgrow,buttheolderpartsareimmutable,asstrongasthecryptographichashandsignaturesystemused.

Page 19: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

18

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 1: Hashgraph

Hashgraph Nodes

Synchronization Node

Synchronization

Process

Page 20: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

19

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 1: Hashgraph

An result of 10 times trial. Each trial was looped until 1,000 messages

were passed each other.

0

1

2

3

4

5

6

7

1 2 3 4 5 6 7 8 9 10

Average of CPU Usage

480

500

520

540

560

580

600

1 2 3 4 5 6 7 8 9 10

Elapsed Time of Each Traial

Page 21: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

20

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Application 1: IoT Services with Mixed Reality Device

https://news.microsoft.com/ja-jp/videos/mixed-reality-hololens/

Page 22: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

21

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Hashgraph Nodes

Synchronization Node

Camera

Images

Application 1: IoT Services with Mixed Reality Device

Page 23: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

22

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 2: Our Own Algorithm

Our own unique algorithm for the consensus algorithm of Blockchain system

Page 24: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

23

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 2: Our Own Algorithm

Proof of work: the consensus algorithm of Blockchain

Competition for generating

the newest block

This consensus

algorithm is called

“Proof of Work”

Page 25: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

24

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 2: Our Own Algorithm

Competition for generating

the newest blockNonce:

0Hash 0000x52uf...

Nonce:

4578Hash 000089x1a...

Nonce:

23456Hash 00780bb7c...

Page 26: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

25

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 2: Our Own Algorithm

• SHOCK CLAIM: Bitcoin is DESTROYING the planet and uses as much energy as

DENMARK

– Daily Express, Dec. 5, 2017

– https://www.express.co.uk/news/science/888535/bitcoin-environment-destroying-planet-fossil-fuels-

energy-electricity-Denmark-US-2020

• The computing power of the bitcoin network is already 100,000 times

larger than the world’s 500 fastest supercomputers.

• The bitcoin computer network currently uses as much electricity as

the country of Denmark.

Page 27: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

26

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 2: Our Own Algorithm

Motivation: more effective computation for the competition in stead of the

hash value search.

Competition for generating

the newest blockMachine

Learning

Reinforcement

Learning

Deep Learning

Page 28: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

27

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Framework 2: Our Own Algorithm

Implemented a example framework: optimization problem by using Genetic Algorithm

The node who generates

the most excellent genes

obtains the reward and

generates the newest block

Page 29: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

28

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Application 2: Swarm Robotics

A kind of robot who takes a group behavior by several

autonomous robots. They become smarter by sharing each

experience into the robotics network.

Page 30: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

29

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Application 2: Swarm Robotics

Swarm robot system of sharing the parameters of reinforcement learning

into the robotics network by using Blockchain.

Reinforced

No Learning

No Learning

No Learning

Page 31: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

30

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Application 2: Swarm Robotics

• Experiment

– Path finding

– Ethereum

– Simulation

Start

Goal

Page 32: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

31

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Application 2: Swarm Robotics

The result of the path finding of the node who didn’t learn.

Trials

Steps

Page 33: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

32

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Contents

• Research Background and Purpose

• Research Progress

• Conclusion and Discussion

Page 34: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

33

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Conclusion and Discussion

• Our research group have developed IoT security frameworks and IoT

applications.

• The next step is to improve the framework and develop more IoT

applications using the framework.

Hashgraph Nodes

Synchronization Node

Camera

Images

Page 35: Blockchain-based Frameworks and Applications for Secure ...cs.kyushu-u.ac.jp/sicorp/wp-content/uploads/sites/4/2018/02/The-6th...The 6th International Workshop on Cyber Security -

34

The 6th International Workshop on Cyber Security - Secure IoT Space Workshop - @JR City Hakata, Fukuoka, Japan, Jan. 22, 2018

Thank you very much for your attention!

Q&A