1 s2.0 S11u10016823011134 Main
1 s2.0 S11u10016823011134 Main
ORIGINAL ARTICLE
A R T I C L E I N F O A B S T R A C T
Keywords: To address challenges in digital evidence collection and responsibility determination for industrial safety
IIoT accidents involving industrial Internet of Things (IIoT) device nodes, this paper proposes a blockchain-based
Blockchain digital forensic scheme within the IIoT communication architecture. The scheme utilizes a decentralized
Digital forensic
blockchain storage mechanism to enable remote storage of digital forensic data. Additionally, it leverages smart
Electronic evidence
contract mechanisms to facilitate efficient retrieval and tracing of related evidence chains. To enhance data
Consensus algorithm
security of IIoT device nodes, a token mechanism is implemented for access control. Moreover, to meet real-time
evidence acquisition requirements in IIoT, an efficient batch consensus mechanism is proposed. Experimental
simulations demonstrate the superiority of the novel consensus algorithm compared to the traditional Delegated
Proof-of-Stake (DPOS) consensus in the proposed scheme for the IIoT environment. It meets speed requirements
for evidence collection, ensuring tamper-proof, non-repudiable, and permanent storage of digital forensic data.
Consequently, the application of blockchain technology for judicial access and evidence storage has made
significant contributions to digital forensics within the IIoT context.
1. Introduction software platforms [5] [6] [7]. Consequently, digital forensics practi-
tioners [8] must possess knowledge of and adapt to the characteristics
The advent of industrial Internet of Things (IIoT) has revolutionized of diverse systems to collect and analyze relevant digital evidence ef-
industrial environments by enabling the interconnectivity of devices, fectively. Real-time requirements pose another challenge in IIoT envi-
sensors, and systems. While IIoT brings numerous benefits, it also in- ronments. Data generated in IIoT systems often necessitates real-time
troduces challenges for digital forensics investigations [1]. One of the analysis and response [9]. As a result, minimizing system interference
primary challenges in IIoT environments is the massive volume of data during digital forensics investigations becomes critical to ensuring un-
generated [2]. The diverse range of sensors, devices, and systems pro- interrupted production and operations. Developing appropriate tech-
duce a vast amount of data, including production data, transmission niques and tools [10] [11] for real-time data forensics and analysis is
logs, and alarm information [3]. Effectively processing and analyzing essential. Security and privacy concerns also present significant chal-
such large-scale data require robust computational capabilities and spe- lenges in IIoT digital forensics. Accessing sensitive data and systems
during the forensic process may expose potential security threats and
cialized analysis tools. Another significant challenge is the diversity of
privacy risks. Consequently, appropriate security measures must be im-
data sources [4] within IIoT. Various devices and sensors from differ-
plemented to ensure data confidentiality and integrity while complying
ent manufacturers utilize different communication protocols and data
with relevant laws and regulations.
formats. Consequently, digital forensics investigators must handle and
parse a wide array of data sources while ensuring data integrity and
accuracy. In addition to data diversity, IIoT systems are characterized 1.1. Motivation
by their distributed and heterogeneous nature. They consist of physical
devices, sensors, controllers, and network equipment, often provided Currently, most evidence preservation systems rely on centralized
by different vendors and employing different operating systems and repositories comprised of third parties [12]. This inevitably leads to
* Corresponding author.
E-mail addresses: [email protected] (N. Xiao), [email protected] (Z. Wang), [email protected] (X. Sun), [email protected]
(J. Miao).
https://doi.org/10.1016/j.aej.2023.12.021
Received 29 October 2023; Received in revised form 30 November 2023; Accepted 11 December 2023
Available online 15 December 2023
1110-0168/© 2023 THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University. This is an open access article under the
CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
N. Xiao, Z. Wang, X. Sun et al. Alexandria Engineering Journal 86 (2024) 631–643
various issues. Centralized structures necessitate robust security re- simulation results and security analysis. Section 7 concludes the paper
quirements, as breaches into centralized storage nodes can cause se- with a summary.
rious problems like information leakage and data tampering. Similar
to current digital forensic methods, centralized structures are vulner- 2. Related work
able in terms of transparency and reliability, leading people to con-
stantly question the dependability of services. Additionally, the myriad With the widespread application of digital evidence and continued
IoT devices have different producers and service providers, so an inte- practice in the legal field, blockchain-based electronic evidence has
grated digital forensic framework is needed. This negatively impacts been applied and validated in various scenarios (Table 1). Firstly, in the
forensic investigation and system scalability. In contrast, distributed field of cloud computing, more and more enterprises and government
blockchain networks provide a transparent and reliable security envi- agencies have started to build or rent third-party cloud centers to deploy
ronment where data can be protected through large-scale computing their own production systems. In this environment, obtaining authen-
power [13]. Trusted timestamps can be promptly appended to newly tication of electronic data in the cloud becomes quite difficult, involv-
created blocks. Most importantly, dispersing the authority of the audi- ing not only cloud storage and virtual machines components, but also
tor helps avoid trust issues and demonstrates the integrity, accuracy, requiring cooperation between investigators, institutions and cloud ser-
and timeliness required for preservation. vice providers. Currently, through blockchain technology, researchers
Existing IIoT forensics scheme primarily focus on identifying evi- are studying the centralized acquisition framework, data sources and
dence and investigative procedures [14], while ignoring several unre- integrity protection of electronic evidence in cloud environments, and
solved critical challenges. First, there are no systematic guidelines for have achieved a series of results.
acquiring evidence from complex IIoT systems and securing it from tam- Rane S et al. [16] proposed a secure logging service assisted by
pering. Second, current techniques cannot fully protect the integrity of blockchain to securely store and process different log types and solve
evidence, ensure confidentiality and anonymity, or track provenance. the problem of collusion between multiple stakeholders in cloud acqui-
Third, single points of failure in storage media continue to prevent the sition investigations.
efficient acquisition of evidence and the conclusive verification of in- Pourvahab M et al. [17] used SDN and blockchain to propose a dig-
tegrity during investigations. In summary, existing research does not ital acquisition architecture to reliably collect and store evidence from
provide solutions for systematic evidence collection protocols, robust IaaS cloud environments.
preservation of integrity and provenance, or the elimination of reliabil- Duy P et al. [18] proposed a blockchain-based method to improve
ity issues in storage media. This leaves significant knowledge gaps in the security of log management used for network acquisition in SDN,
the development of robust IIoT forensic frameworks. through fine-grained access control to protect the important role of log
To address these gaps in collecting and protecting electronic ev- files in appropriate storage in digital acquisition and cloud security.
idence, blockchain technology can complement existing efforts as a The above studies reflect that the application of blockchain tech-
decentralized distributed ledger system. Blockchain offers resilience for nology in cloud environments has undoubtedly greatly enhanced the
electronic data through its principles of environmental security, re- capability to collect and securely store electronic evidence in distributed
dundancy, record-keeping and proportional evidence preservation. Its cloud computing environments, and the field of electronic evidence in
chain-like structure ensures block dependency, detecting and alerting cloud computing has developed well. Secondly, in the field of Internet
any data tampering. Additionally, blockchain guarantees evidence in- of Things (IoT), IoT technology is widely used in various fields of so-
tegrity, prevents tampering, and enhances robustness. As a distributed ciety, such as smart home, intelligent transportation, wearable medical
shared database, blockchain’s decentralization, tamper-resistance and devices and energy. These fields are characterized by diverse IoT de-
traceability enable IIoT evidence access [15]. However, blockchain’s vices that can generate and collect various data for extensive analysis
inherent transparency challenges data privacy. Current research nar- and record the real-time status of systems. This reliable and complete
rowly focuses on blockchain evidence storage without reasonable access data can serve as electronic evidence to resolve disputes and combat cy-
control or privacy considerations. Existing works also still have single bercrime, so a reliable electronic evidence management mechanism is
points of trust, which cannot robustly guarantee evidence authentic- needed in the IoT environment. Considering that blockchain can ensure
ity, integrity, privacy and traceability throughout the lifecycle. To ad- the confidentiality and integrity of data, applying blockchain technol-
dress these limitations and satisfy real-world demands, we propose a ogy to solve challenges in IoT evidence acquisition has attracted aca-
blockchain-based forensic scheme for IIoT evidence. demic attention, with some research proposing new ideas for combining
blockchain with electronic data authentication in IoT environments.
1.2. Research contributions Le D et al. [19] proposed automatic recording of electronic evidence
oversight chains through blockchain smart contracts to mitigate IoT se-
The contribution of this paper is manifold. curity issues during network attacks.
Kumar G et al. [20] addressed the heterogeneity of IoT and lack
1. We identify and discuss the problems and limitations of performing of transparency in evidence handling by using regulatory and evidence
digital forensics in the IIoT environment. chains to process all stakeholders in investigations and provide solutions
2. We propose a novel forensic investigation framework for IIoT us- for cross-border legalization of evidence.
ing decentralized blockchain technology. This includes models for Malamas V et al. [21] proposed an authorization framework sup-
collecting digital evidence and storing it in a tamper-evident, trust- ported by blockchain to manage medical IoT (IoMT) devices and health-
worthy way. care stakeholders. The framework can provide fine-grained access to
3. We provide security analysis of our proposed scheme, compare it patient health data and provide audit tracing of provenance through in-
to related works, simulate and test the model to demonstrate proof tegrity and source assurances by retaining all logs in the custody chain.
of concept, and discuss future research directions in this area. Rekha G et al. [22] studied collecting data extracted as evidence
from various IoT devices of different data formats, such as Raspberry
1.3. Paper outline Pi, and recording it in a public digital ledger to enable precise check-
ing of evidence provenance and ensure traceability and auditability. In
The remainder of the paper is organized as follows: Section 2 re- addition, with the continuous rise in market share of new energy vehi-
views related work. Section 3 introduces relevant models and algo- cles and their increasing intelligence and promotion of smart roads,
rithms. Section 4 describes the digital forensic scheme in detail. Sec- blockchain has been fully applied in relevant links of electronic ev-
tion 5 discusses the three key implementation stages. Section 6 presents idence authentication in vehicle networks facing traffic accidents or
632
N. Xiao, Z. Wang, X. Sun et al. Alexandria Engineering Journal 86 (2024) 631–643
Table 1
Summary of recent surveys on blockchain.
Rane S et al. [16] Cloud No Proposed a secure logging service assisted by blockchain for different log types,
addressing collusion in cloud investigations.
Pourvahab M et al. [17] Cloud No Used SDN and blockchain to propose a digital acquisition architecture for IaaS
cloud environments.
Duy P et al. [18] Cloud No Proposed a blockchain-based method for secure log management in network
acquisition and cloud security.
Le D et al. [19] IoT No Proposed automatic recording of electronic evidence oversight chains through
blockchain smart contracts for IoT security.
Kumar G et al. [20]. IoT No Addressed IoT heterogeneity and evidence transparency using regulatory and
evidence chains for cross-border legalization.
Malamas V et al. [21]. IoMT Yes Proposed a blockchain-supported authorization framework for managing
medical IoT devices and healthcare stakeholders.
Rekha G et al. [22] IoT Yes Studied the collection of data from various IoT devices for evidence, recording
it in a public digital ledger for traceability and auditability in vehicle networks
and smart roads.
Hossain M et al. [14] IoV No Proposed a digital evidence framework called TrustIoV for IoV systems, focusing
on secure evidence collection and storage.
Our study IIoT Yes Emphasized the use of blockchain technology for digital evidence
authentication and storage across various industries and fields, contributing
significantly to IIoT-era reliable electronic evidence systems.
public safety incidents on roads that were previously difficult to trace nodes storing the actual data and non-leaf nodes containing hash values
back, which could provide detailed and accurate data as electronic of the leaf data to reduce capacity for synchronization and backup. The
evidence to help government agencies for investigation, analysis and Merkle root is obtained by hashing the block body data. Any block value
accountability of accidents. change affects the entire blockchain. Additionally, each block’s times-
Hossain M et al. [14] proposed a digital evidence framework called tamp ensures transaction data immutability and traceability within the
TrustIoV for IoV systems, which provides mechanisms for collecting and blockchain. A block undergoes three stages - transaction distribution,
storing trusted evidence from distributed infrastructures, maintaining validation, and synchronization - from generation to successful chain
the security of evidence provenance to ensure integrity of stored ev- incorporation, with the consensus algorithm being key. Traditional al-
idence, and allowing investigators to verify evidence integrity during gorithms like Proof of Work (PoW), Proof of Stake (PoS), and DPoS have
investigations. inefficient miner node competition. Both transaction propagation and
In summary, choosing blockchain technology as a solution for digital validation require full network broadcasting. For networks with sub-
evidence authentication and storage has been vigorously used in various stantial nodes, this consumes significant bandwidth and fails to meet
industries and fields such as cloud computing, IoT, vehicle networks, IIoT transaction timeliness requirements.
judicial, smart city, playing an important role. Blockchain proves to
be an important and meaningful technical approach for establishing 3.3. DPoS(Delegated Proof of Stake)
reliable electronic evidence systems in many fields. However, in the
domain of digital forensics in IIoT, challenges arise due to the diversity The DPoS algorithm has advantages like efficiency, decentraliza-
of devices and platforms, massive data volumes, and concerns regarding tion, and scalability, but it also has drawbacks: oligopoly and repre-
real-time processing, security, and privacy. Presently, there is a lack sentative node responsibility. Oligopoly occurs because voting power
of sufficiently mature research in this area. The novel IIoT electronic is delegated to limited representative nodes, enabling control over the
forensics framework proposed in this paper effectively fills this gap, network. Representative nodes’ actions impact transaction confirma-
addressing the difficulties of evidence collection and preservation in tions and network security. The concentration of power among a small
IIoT to a significant extent. number of representative nodes can lead to concerns about central-
ization and potential manipulation. The decision-making authority of
3. Preliminaries these nodes can potentially be influenced or exploited, compromising
the fairness and integrity of the blockchain network. Additionally, the
3.1. IIoT infrastructure responsibility placed on representative nodes to validate transactions
and maintain the network’s security can be burdensome. If a represen-
The IIoT takes various basic industrial equipment as its fundamental tative node fails to fulfill its duties effectively, it can have detrimental
components. It uses sensor technologies to collect raw data, and wireless effects on the network’s performance and reliability. To address these
or wired communication techniques to achieve information dissemina- challenges, it is crucial to have mechanisms in place to ensure a fair
tion and communication between devices, gateways, and data centers. and diverse representation of nodes within the DPoS consensus model.
As shown in Fig. 1, a typical IIoT structure consists of three main types This can involve implementing measures to prevent collusion among
of nodes: Industrial Device Node, Gateway Unit (GU) and Cloud Plat- representative nodes and promoting transparency in the election and
form. decision-making processes.
Blockchain is a specific data structure that chronologically chains to- Digital forensics [25] pertains to the scientific procedure of identify-
gether data blocks to form a tamper-proof decentralized ledger through ing, preserving, collecting, and presenting digital evidence in a manner
cryptographic means [23]. Each blockchain data block consists of a that meets the requirements for legal admissibility in a court of law.
header and body. The header records metadata like the current ver- Any information stored or extracted from digital media can poten-
sion number, previous block address, target hash value, and Merkle tially serve as digital evidence during a forensic investigation [26]. In
root [24]. The body contains structured data as a Merkle tree, with leaf contrast to traditional digital forensic scenarios where examiners can
633
N. Xiao, Z. Wang, X. Sun et al. Alexandria Engineering Journal 86 (2024) 631–643
634
N. Xiao, Z. Wang, X. Sun et al. Alexandria Engineering Journal 86 (2024) 631–643
4.2. Improved DPoS consensus algorithm Fig. 4 showcases the block storage structure, as defined in our
scheme, where transaction information is stored utilizing key-value
The original Delegated Proof of Stake (DPoS) algorithm typically pairs. The key is created by combining the path from the root node
considers 21 blocks as a cycle, with 21 block producers selected through to the leaf node, while the key values on the path represent the up-
a voting process. It requires 100% producer participation, ensuring load time of the evidence, the 𝐼𝐷 number of the 𝐺𝑈 , and the 𝐼𝐷
every consensus node is aware of a transaction within 1.5 seconds, sub- number of the industrial device node, respectively. The data is orga-
sequently taking turns to produce the block. However, as transaction nized by “hour” as the unit, and data uploaded within the same hour
confirmation information can only be sent when a node has the turn to is grouped into a path, which is then further divided into branches by
produce a block, this results in extended transaction confirmation times, “minute” as the unit. Within the time-formed branch, the data is clas-
slowing down the overall consensus speed. This makes it unsuitable for sified and summarized according to the gateway and the 𝐼𝐷 code of
real-time evidence storage in the IIoT era. The newly proposed fast con- the industrial device node, based on the regional hierarchy. This orga-
sensus algorithm comprises various entities, including Industrial device nized integration of data enables quick location of the corresponding
nodes, Gateway nodes, Regulatory Agencies, Insurance Company, and path and improves query efficiency. Additionally, the value field stores
Judicial Department. In this system, both the gateway nodes and the the status data of the industrial device node.
Regulatory Agencies serve as fully nodes participating in the consensus The block retrieval uses the Bloom Filter algorithm, which com-
process. presses transaction data through hash functions and stores them as
The process is shown in Fig. 3: a total of 21 gateway unit (GU) points in a vector. Block retrieval can utilize the Bloom Filter algorithm
nodes were selected by voting from various local security regulatory for the following reasons:
departments to participate in block generation, with one gateway node
as the main node and the remaining 20 GU nodes responsible for block • Space efficiency: Bloom Filter only stores the hash values of blocks,
packaging. not the blocks themselves, which significantly reduces space re-
After recording three blocks, 𝐺𝑈𝑗 sends a consensus request to the quirements for large blockchains.
main node 𝐺𝑈𝑗 . The main node broadcasts a request message for au- • Improved efficiency: Bloom Filter allows for a fast initial check to
thentication preparation to the other 19 𝐺𝑈 s upon receiving the con- determine if a block exists, avoiding the need to search the entire
635
N. Xiao, Z. Wang, X. Sun et al. Alexandria Engineering Journal 86 (2024) 631–643
Table 3
Symbols and their meanings.
Symbols Meanings
stage for industrial device nodes includes both online and offline reg-
istration. Table 3 provides an explanation of the symbols used in the
scheme.
blockchain for each check. This greatly improves the efficiency of 5.1.1. Offline registration
block retrieval. When the industrial device nodes are first installed or inspected pe-
• Error tolerance: Though Bloom Filter has a probability of error, riodically, the Security Regulatory Department inspects the state of the
they cannot mistakenly report a non-existent block as existing. This industrial device nodes and sets a shared key 𝑥𝑖 ∈ 𝐙∗𝑞 according to the
level of error is acceptable for block retrieval. identity information 𝐼𝑁𝐷𝑖 ∈ {0, 1}∗ (such as device serial number) and
industrial device node information 𝐼𝑁𝑀𝑖 (such as MAC address) pro-
When a new block is generated, its hash is calculated and mapped vided by the node/sensor, and establishes the association:
to multiple positions in the Bloom Filter using different hash functions. (⊕ represents XOR operation)
The corresponding bits are then set to 1. Similarly, when retrieving a
( )
block, its multiple hashes are also calculated and mapped to the Bloom 𝑅𝑖 = 𝐻1 𝐼𝑁𝑃𝑖 ⊕ 𝑥𝑖 (1)
Filter. If all the bits are 1, it is likely that the block exists. However, if
any of the bits are 0, it can be confirmed that the block does not exist. It Calculate the global unique identifier:
should be noted that for blocks reported as existing by the Bloom Filter, ( )
𝐼𝑀𝑖 = 𝐻1 𝐼𝑁𝐷𝑖 ‖ ‖
‖𝑥𝑖 ‖ 𝑇 𝑆reg ∈ 𝐺1 (2)
a full match in the blockchain is still required to confirm the result.
This approach presents a tradeoff between space and time. The initial and form the industrial device node 𝐼𝐷𝑖 according to the gateway area
quick check using the Bloom Filter is followed by a complete match for and device serial number.
accuracy. This significantly reduces the complexity of block{retrieval. } Prior to deployment, the gateway units are purchased and ini-
For instance, as illustrated in (Fig.) 5, let the set 𝑋 (= )𝑥0 , 𝑥1 be tialized by the Security Regulatory Department in a unified man-
mapped by the hash function as 𝐻 𝑥0 = (2, 3, 7) and 𝐻 𝑥1 = (4, 7, 9). ner. The Security Regulatory Department generates an integer 𝑒 that
Then, the elements at positions 2, 3, 4, 7, and 9 in the ( )vector B are set satisfies gcd(𝜙(𝑛), 𝑒) = 1 according to the RSA public key cryptosys-
to 1. When checking if element 𝑦0 exists, since 𝐻 𝑦0 = (1, 4, 7) and tem for the gateway,
{ } and generates the public and private key pair
the first position is 0, it indicates that 𝑦0 is not in the set 𝑋 . 𝑃R {𝑒, 𝑛}, 𝑆R {𝑑, 𝑛} , where 𝑑 = 𝑒−1 ( mod𝜙(𝑛)). And 𝐼𝐷r is assigned as
the unique identifier of the gateway. Stores the shared key 𝑘 between
5. Implementation the Security Regulatory Department and the gateway. The gateway ran-
domly selects an integer 𝑟r ∈ 𝐙∗𝑞 and broadcasts the parameters 𝑟r 𝑃R .
The implementation of the digital evidence preservation scheme can The Security Regulatory Department stores the 𝐼𝐷𝑖 − 𝐼𝑀𝑖 and 𝐼𝐷r − 𝑘
be divided into three stages: identity registration, real-time storage of mapping data. The Security Regulatory Department is a trusted full
evidence data, and evidence data retrieval. The identity registration node in the blockchain, responsible for registering and authenticating
636
N. Xiao, Z. Wang, X. Sun et al. Alexandria Engineering Journal 86 (2024) 631–643
Table 4 Table 5
Structure of Token. Evidence data structures.
the identity information of judicial departments and insurance com- the industrial device node accepts the broadcast data from GU, gener-
pany. The judicial Department and insurance company register their ates a random integer 𝑟r ∈ 𝐙∗𝑞 , and calculates the session 𝑘𝑒𝑦.
device information with the Security Regulatory Department, the Secu-
rity Regulatory Department initializes the parameters in the
b)( The industrial device node ) sends a handshake request 𝑟𝑒𝑞1 ∶
{ same
} way, 𝐸PR Token, 𝑟𝑖 𝑃 , 𝑁1 , 𝑆𝑖𝑔𝑛𝑆𝑇 𝑜𝑘𝑒𝑛 , the industrial device node generates
assigns them an 𝐼𝐷𝑥 and public and private key pair 𝑃𝑥 , 𝑆𝑥 , and the signature 𝑆𝑖𝑔𝑛𝑆𝑇 𝑜𝑘𝑛 with the private key; The request message is
stores the 𝐼𝐷𝑥 − 𝑃𝑥 mapping data. encrypted and sent with 𝐺𝑈 ’s public key 𝑃R . ( ))
(
c) 𝐺𝑈 → 𝑠𝑒𝑛𝑠𝑜𝑟: res1 ∶ 𝐸key Success, SignSR 𝑁1 .
5.1.2. Online registration
① Verify the identity of the industrial device node: decrypt the mes-
The networking process when the industrial device node is in oper-
sage 𝑟𝑒𝑞1 SR mod 𝑛 with the private key and verify the signature:
ation:
( )𝑃Token ( )
{ } 𝑆𝑖𝑔𝑛𝑆𝑇 𝑜𝑘𝑒𝑛 mod 𝑛 = 𝑇 𝑜𝑘𝑒𝑛 ‖ ‖
‖𝑁1 ‖ 𝑟𝑖 𝑃 (4)
1. Generate the public and private key pair 𝑃Token , 𝑆Token by itself
using the RSA algorithm. is correct, invoke the smart contract, locate the key-value branch corre-
2. According to the temporary public key, generate the temporary sponding to Token in the blockchain, that is, recognize the legitimacy
identity credential Token, whose structure is shown in Table 4. of the identity of the industrial device node, and at the same time ob-
3. When entering the coverage of the gateway, receive the infor- tain the value: industrial device node 𝐼𝐷𝑖 . If no branch is found, this
mation 𝐺𝑈 periodically
{ } broadcasts and send the message 𝑚0 = message is discarded.
𝐴𝑖 , 𝑇 𝑆𝑖 , 𝑃pub to it. Where 𝐴𝑖 represents the result of encrypting ② Respond to the handshake request: GU generates the session key:
{ }
‖ ‖ ( ( ))
the information 𝐼𝐷𝑖 ‖𝑃pub ‖ 𝐼𝑀𝑖 ‖ Token ‖𝑇 𝑆𝑖
‖ ‖ 𝑆𝑒𝑠𝑠𝑖𝑜𝑛𝑘𝑒𝑦2 = 𝐻1 𝑔 𝑟r 𝑆r , 𝑟𝑖 𝑃 (5)
4. 𝐺𝑈 receives 𝑚0 , first verifies whether the timestamp ||𝑇 − 𝑇 𝑆𝑖 || < ( )
Δ𝑇 is valid, if it is valid, decrypts 𝐴𝑖 with 𝑆R to obtain 𝐼𝐷𝑖 and The signature SignSR 𝑁1 of the selected random number 𝑁1 , the au-
𝑃pub , and verify whether the parameters 𝑃pub matches the plaintext thentication result Success is encrypted with the session key as the
in 𝑚0 . After ensuring the validity and integrity of the informa- message:
tion, it requests identity authentication of the industrial device ( ( ))
node from{the Security Regulatory Department: 𝑟𝑒𝑠1 = 𝐸𝑘𝑒𝑦 𝑆𝑢𝑐𝑐𝑒𝑠𝑠, SignSR 𝑁1 (6)
} ( generate) the mes-
sage 𝑚1 = 𝐶, MAC, 𝑇 𝑆r , 𝑃R . Where 𝐶 = 𝐸𝑘 𝐼𝑀𝑖 ‖𝐼𝐷𝑖 , 𝑘 is the then sent 𝑟𝑒𝑠1 to the industrial device node.
shared key between 𝐺𝑈 and the Security Regulatory Department.
| |
5. The Security Regulatory Department checks whether |𝑇 − 𝑇 𝑆reg | < • Evidence Storage
| |
Δ𝑇 is true, and uses the verification code 𝑀𝐴𝐶 to verify the in-
tegrity of the message, decrypts the message with the shared key a) Industrial device node authorization: The industrial device node re-
to obtain 𝐼𝑀𝑖 and 𝐼𝐷𝑖 , and verify the legitimacy of the identity of ceives the GU handshake response, decrypts with the session key to
( )𝑃
the industrial device node; Finally, the legitimacy of the identity of obtain Success, verifies the SignSR 𝑅 mod 𝑛 = 𝑁1 ′ , confirm 𝑁1 = 𝑁1 ′ ,
the industrial device node is notified to 𝐺𝑈 . obtaining the temporary public and private key use rights.
6. After 𝐺𝑈 receives the authentication pass message from the Secu- b) Industrial device node evidence upload: req2 ∶ 𝐸key (V,
rity Regulatory Department, it will map the Token of the industrial SignSToken (𝑁1 )), the evidence data structures defined as shown in Ta-
device node, 𝐼𝐷𝑖 , 𝐼𝑀𝑖 into the blockchain, and the nodes/sensor ble 5, including data upload time, access GUID, industrial device node
will obtain the use right of the temporary public and private keys. SensorID, current status data, and signature field. The signature of the
random number 𝑁1 is encrypted and sent to GU.
The industrial device node uses this temporary public and private key to c) GU receives encrypted evidence: The session key decrypts to ob-
replace the long-term identity identifier 𝐼𝑀𝑖 to achieve the anonymous tain plain text 𝑉 , verifies the correctness of the signature and random
storage of the industrial device node this time, and at the same time, number 𝑁1 , triggers the Save Evidence Algorithm 1 of the smart con-
within the valid period of the Token timestamp, it does not need to tract, establishes a blockchain key-value pair key (Time, GUID, indus-
register the anonymous identity again when communicating across 𝐺𝑈 . trial device node ID) and Value (digital evidence), stores the mapping
relationship between industrial device nodes and evidence. GU signs
5.2. Real-time evidence collection
this mapping broadcast to the entire network.
The industrial device node sends the device state information
• Evidence Upload
recorded during the device’s operation process to 𝐺𝑈 . While verify-
ing the identity of the industrial device node, 𝐺𝑈 generates a session
The participating GU maps the relationship by validating signatures
key so that the industrial device node does not need to undergo fre-
and records it in a block, and uses the new consensus algorithm that we
quent identity authentication when storing evidence to the same 𝐺𝑈 ,
proposed to quickly reach consensus on the full block, joining the end
allowing real-time evidence collection. The industrial device node en-
of the blockchain.
crypts the uploaded evidence using this session key; then 𝐺𝑈 uses the
smart contract to store the evidence. The specific process is shown in
Fig. 6. 5.3. Retrieve and access evidence
637
N. Xiao, Z. Wang, X. Sun et al. Alexandria Engineering Journal 86 (2024) 631–643
Algorithm 1 Save Evidence. The security regulatory Department retrieve 𝐼𝐷𝑥 − 𝑃𝑥 from the lo-
Input: GUID, DeviceID, evidences cal database to verify the legitimacy of the querying party’s identity.
Output: f ∶ GUID → 𝑒𝑣𝑖𝑑𝑒𝑛𝑐𝑒𝑠; g ∶ DeviceID → 𝑒𝑣𝑖𝑑𝑒𝑛𝑐𝑒𝑠 {Mapping relationship with
Using its own public key 𝑃𝑡 , combined with a random number 𝑁 , they
encrypted evidence}
1: Verifies the signature and 𝑁1 calculate the token key:
2: while correct do
3: New stack; ( )𝑁
𝐾 ∗ = 𝑃𝑡 mod 𝑞 (9)
4: if GUID and DeviceID are both valid then
5: Stack push GUID, DeviceID, evidences ; Based on the token key, they generate the search token:
6: GU broadcast;
7: Return success; (
8: else 𝑀 = 𝐸𝑆𝑡 𝐼𝐷𝑡 ‖ ∗‖
‖𝐾 ‖ 𝑇 𝑆reg ), (10)
9: Return fail;
10: end if where 𝑇 𝑆reg is the token registration timestamp used to limit the query
11: end while time; 𝐼𝐷𝑡 is the regulatory authority’s identity identifier. Finally, en-
crypt the generated token message 𝑟𝑒𝑠 and transmit it to the querying
token to activate the query smart contract, which performs blockchain party.
data retrieval. The specific process is shown in Fig. 7.
5.3.1. Apply to the security regulatory department for evidence retrieval 5.3.3. Access evidences
As the querying node is a light node, it first uses the Bloom Filter The querying party decrypts 𝑟𝑒𝑠 using its private key, verifies the
algorithm to query the block headers stored in this node, judge the correctness of the signature 𝑆𝑖𝑔𝑛𝑆𝑡 , and then extracts the token 𝑀 and
existence of the evidence according to the hash mapping, and if it exists, key 𝐾 ∗ . After obtaining the token 𝑀 , the querying party activates the
then apply for query permission from the full node, with the following smart contract, and with 𝐼𝐷 of industrial device node, fault time 𝑇0 ,
application message: time range to be searched 𝑇ran as parameters, calls the evidence col-
( ) lection Algorithm 2 Search Evidence to find the evidence data of the
𝑟𝑒𝑞 = 𝐸𝑝𝑡 𝑃𝑥 , 𝐼𝐷𝑥 , Sign𝑆𝑥 (7) industrial device node in the corresponding block.
The algorithm steps are as follows:
In this equation, 𝑆𝑖𝑔𝑛𝑆𝑥 refers to the signature of information 𝑃𝑥
and 𝐼𝐷𝑥 by the security regulatory Department. The application mes-
Step1 Judge the validity of the token. The security regulatory depart-
sage 𝑟𝑒𝑞 is encrypted using the public key 𝑃𝑡 of the security regulatory
departments. ments decrypt the token 𝑀 𝑃 𝑡 mod 𝑛, get the data 𝐼𝐷𝑡 ‖𝐾 ∗ ‖ 𝑇 𝑆reg ,
the existence of 𝐼𝐷𝑡 indicates that the query party has obtained
5.3.2. Security regulatory department issue the search token permission.
Step2 Judge the timeliness of the token. If 𝑇 − 𝑇 𝑆reg > Δ𝑇 , the token
( )
𝑟𝑒𝑠 = 𝐸𝑃 𝑥 𝑀, 𝐾 ∗ , Sign𝑆𝑡 (𝑀) (8) has expired and has no right to query, otherwise perform Step3.
638
N. Xiao, Z. Wang, X. Sun et al. Alexandria Engineering Journal 86 (2024) 631–643
639
N. Xiao, Z. Wang, X. Sun et al. Alexandria Engineering Journal 86 (2024) 631–643
640
N. Xiao, Z. Wang, X. Sun et al. Alexandria Engineering Journal 86 (2024) 631–643
641
N. Xiao, Z. Wang, X. Sun et al. Alexandria Engineering Journal 86 (2024) 631–643
Table 8
Performance Comparison with Related Work.
Author Consensus Mechanism Blockchain Platform Hardware Dependency Energy Efficiency Consuming Time
Table 9
More Comparison With Related Work.
642
N. Xiao, Z. Wang, X. Sun et al. Alexandria Engineering Journal 86 (2024) 631–643
Declaration of competing interest [18] Phan The Duy, Hien Do Hoang, DoThi Thu Hien, Nguyen Ba Khanh, Van-Hau
Pham, Sdnlog-foren: ensuring the integrity and tamper resistance of log files for
sdn forensics using blockchain, in: 2019 6th NAFOSTED Conference on Information
No potential conflict of interest was reported by the authors.
and Computer Science (NICS), 2019, pp. 416–421.
[19] Duc-Phong Le, Huasong Meng, Le Su, Sze Ling Yeo, Vrizlynn Thing, Biff: a
References blockchain-based iot forensics framework with identity privacy, in: TENCON 2018 -
2018 IEEE Region 10 Conference, 2018, pp. 2372–2377.
[1] Venkata Venugopal Rao Gudlur Saigopal, Valliappan Raju, Iiot digital forensics and [20] Gulshan Kumar, Rahul Saha, Chhagan Lal, Mauro Conti, Internet-of-Forensic (IoF):
major security issues, in: 2020 International Conference on Computational Intelli- a blockchain based digital forensics framework for IoT applications, Future Gener.
gence (ICCI), 2020, pp. 233–236. Comput. Syst. 120 (2021-07) 13–25.
[2] Md Abdur Rahman, M. Shamim Hossain, Ahmad J. Showail, Nabil A. Alrajeh, [21] Vaggelis Malamas, Thomas Dasaklis, Panayiotis Kotzanikolaou, Mike Burmester,
Ahmed Ghoneim, Ai-enabled iiot for live smart city event monitoring, IEEE Int. Sokratis Katsikas, A forensics-by-design management framework for medical devices
Things J. 10 (4) (2023) 2872–2880. based on blockchain, in: 2019 IEEE World Congress on Services (SERVICES), volume
[3] Junfeng Miao, Zhaoshun Wang, Zeqing Wu, Xin Ning, Prayag Tiwari, A blockchain- 2642-939X, 2019, pp. 35–40.
enabled privacy-preserving authentication management protocol for Internet of [22] G. Rekha, B. Uma Maheswari, Raspberry pi forensic investigation and evidence
Medical Things, Expert Syst. Appl. 237 (2024-03) 121329. preservation using blockchain, in: 2021 International Conference on Forensics, An-
[4] Tiantong Wu, Guillaume Jourjon, Kanchana Thilakarathna, Phee Lep Yeoh, alytics, Big Data, Security (FABS), vol. 1, 2021, pp. 1–5.
Mapchain-d: a distributed blockchain for iiot data storage and communications, [23] Wanqin Cao, Yunhui Huang, Dezheng Li, Feng Yang, Xiaofeng Jiang, Jian Yang, A
IEEE Trans. Ind. Inform. 19 (9) (2023) 9766–9776. blockchain based link-flooding attack detection scheme, in: 2021 IEEE 4th Advanced
[5] Shunyuan Sun, Jingyuan Yu, An indoor location algorithm for heterogeneous de- Information Management, Communicates, Electronic and Automation Control Con-
vices and environmental changes, J. Jilin Univ. Sci. Ed. 61 (4) (2023). ference (IMCEC), volume 4, 2021, pp. 1665–1669.
[6] Hui Wang, Chengyu Bi, Zihao Shen, Peiqian Liu, Two-stage location privacy protec- [24] Jianbin Gao, Kwame Opuni-Boachie Obour Agyekum, Emmanuel Boateng Sifah,
tion method for mobile crowd sensing, J. Jilin Univ. Sci. Ed. 61 (5) (2023). Kingsley Nketia Acheampong, Qi Xia, Xiaojiang Du, Mohsen Guizani, Hu Xia, A
[7] Pengcheng Zhang, Xiaohan Yu, Xiao Bai, Chen Wang, Jin Zheng, Xin Ning, Joint dis- blockchain-sdn-enabled internet of vehicles environment for fog computing and 5g
criminative representation learning for end-to-end person search, Pattern Recognit. networks, IEEE Int. Things J. 7 (5) (2020) 4278–4291.
147 (2024) 110053. [25] Claudio Agostino Ardagna, Rasool Asal, Ernesto Damiani, Nabil El Ioini, Claus Pahl,
[8] Kim Strandberg, Nasser Nowdehi, Tomas Olovsson, A systematic literature review Trustworthy IoT: an evidence collection approach based on smart contracts, in: 2019
on automotive digital forensics: challenges, technical solutions and data collection, IEEE International Conference on Services Computing (SCC), IEEE, 2019, pp. 46–50.
IEEE Trans. Intell. Veh. 8 (2) (2023) 1350–1367. [26] Auqib Hamid Lone, Roohie Naaz Mir, Forensic-chain: blockchain based digital foren-
[9] Sri Harsha Mekala, Zubair Baig, Adnan Anwar, Industrial internet of things (iiot): sics chain of custody with PoC in Hyperledger Composer, Digit. Investig. 28 (2019)
testbed and datasets for cybersecurity and digital forensics, in: 2022 Interna- 44–55.
tional Conference on Smart Generation Computing, Communication and Networking [27] Xiaojin Ma, Huahu Xu, Honghao Gao, Minjie Bian, Walayat Hussain, Real-time vir-
(SMART GENCON), 2022, pp. 1–10. tual machine scheduling in industry iot network: a reinforcement learning method,
[10] Enhao Ning, Changshuo Wang, Huang Zhang, Xin Ning, Prayag Tiwari, Occluded IEEE Trans. Ind. Inform. 19 (2) (2023) 2129–2139.
person re-identification with deep learning: a survey and perspectives, Expert Syst. [28] Qingyang Zhang, Jing Wu, Hong Zhong, Debiao He, Jie Cui, Efficient anonymous au-
Appl. 239 (2024) 122419. thentication based on physically unclonable function in industrial internet of things,
[11] Songsong Tian, Lusi Li, Weijun Li, Hang Ran, Xin Ning, Prayag Tiwari, A survey on IEEE Trans. Inf. Forensics Secur. 18 (2023) 233–247.
few-shot class-incremental learning, Neural Netw. 169 (2024) 307–324. [29] Danny Dolev, Andrew Yao, On the security of public key protocols, IEEE Trans. Inf.
[12] Jung Hyun Ryu, Pradip Kumar Sharma, Jeong Hoon Jo, Jong Hyuk Park, A Theory 29 (2) (1983) 198–208.
blockchain-based decentralized efficient investigation framework for IoT digital [30] Geetanjali Rathee, Farhan Ahmad, Naveen Jaglan, Charalambos Konstantinou, A
forensics, J. Supercomput. 75 (8) (2019) 4372–4387. secure and trusted mechanism for industrial IoT network using blockchain, IEEE
[13] Thomas K. Dasaklis, Fran Casino, Constantinos Patsakis, Sok: Blockchain Solutions Trans. Ind. Inform. 19 (2) (2023) 1894–1902.
for Forensics, 2020. [31] Meng Shen, Huisen Liu, Liehuang Zhu, Ke Xu, Hongbo Yu, Xiaojiang Du, Mohsen
[14] Mahmud Hossain, Ragib Hasan, Shams Zawoad, Probe-IoT: a public digital ledger Guizani, Blockchain-assisted secure device authentication for cross-domain indus-
based forensic investigation framework for IoT, in: IEEE INFOCOM 2018 - IEEE trial IoT, IEEE J. Sel. Areas Commun. 38 (5) (2020) 942–954.
Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2018, [32] Yan Cao, Feng Jia, Gunasekaran Manogaran, Efficient traceability systems of steel
pp. 1–2. products using blockchain-based Industrial Internet of Things, IEEE Trans. Ind. In-
[15] Yunjia Zhang, Jian Wang, Xudong He, Jiqiang Liu, Blockchain-based access control form. 16 (9) (2020) 6004–6012.
mechanism in electronic evidence, in: Ke Xu, Jianming Zhu, Xianhua Song, Zeguang [33] Wei Hu, Huanhao Li, A blockchain-based secure transaction model for distributed
Lu (Eds.), Blockchain Technology and Application, vol. 1305, Springer, Singapore, energy in Industrial Internet of Things, Alex. Eng. J. 60 (1) (2021) 491–500.
2021, pp. 17–33. [34] Sen He, Wei Ren, Tianqing Zhu, Kim-Kwang Raymond Choo, BoSMoS: a blockchain-
[16] Sagar Rane, Arati Dixit Blockslaas, Blockchain assisted secure logging-as-a-service based status monitoring system for defending against unauthorized software updat-
for cloud forensics, in: Sukumar Nandi, Devesh Jinwala, Virendra Singh, Vijay ing in industrial Internet of things, IEEE Int. Things J. 7 (2) (2020) 948–959.
Laxmi, Manoj Singh Gaur, Parvez Faruki (Eds.), Security and Privacy, Springer Sin- [35] M. Junaid Gul, Barathi Subramanian, Anand Paul, Jeonghong Kim, Blockchain for
gapore, Singapore, 2019, pp. 77–88. public health care in smart society, Microprocess. Microsyst. 80 (2021) 103524.
[17] Mehran Pourvahab, Gholamhossein Ekbatanifard, Digital forensics architecture for
evidence collection and provenance preservation in IaaS cloud environment using
SDN and blockchain technology, IEEE Access 7 (2019) 153349–153364.
643