OTS Scheme Based Secure Architecture for Energy-Efficient IoT in Edge Infrastructure

2021-12-16 06:40SushilKumarSinghYiPanandJongHyukPark
Computers Materials&Continua 2021年3期

Sushil Kumar Singh,Yi Pan and Jong Hyuk Park,*

1Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul, 01811,South Korea

2Department of Computer Science, Georgia State University, Atlanta, GA,30302-5060, USA

Abstract: For the past few decades, the Internet of Things (IoT) has been one of the main pillars wielding significant impact on various advanced industrial applications, including smart energy, smart manufacturing, and others.These applications are related to industrial plants, automation, and e-healthcare fields.IoT applications have several issues related to developing, planning, and managing the system.Therefore,IoT is transforming into G-IoT(Green Internet of Things),which realizes energy efficiency.It provides high power efficiency, enhances communication and networking.Nonetheless, this paradigm did not resolve all smart applications’ challenges in edge infrastructure, such as communication bandwidth, centralization, security, and privacy.In this paper, we propose the OTS Scheme based Secure Architecture for Energy-Efficient IoT in Edge Infrastructure to resolve these challenges.An OTS-based Blockchain-enabled distributed network is used at the fog layer for security and privacy.We evaluated our proposed architecture’s performance quantitatively as well as security and privacy.We conducted a comparative analysis with existing studies with different measures, including computing cost time and communication cost.As a result of the evaluation, our proposed architecture showed better performance.

Keywords: Blockchain; energy-efficient IoT; ots scheme; edge infrastructure;security and privacy

1 Introduction

In today’s era,the rapid advancement of the Internet of Things(IoT)and Information Communication Technologies(ICT)is translating into intelligent services for daily human life in sustainable computing with smart applications, including advanced manufacturing, smart vehicles, and others [1].Billions of physical devices worldwide connected in different topological ways to the Internet are known as IoT.Technologies include Radio Frequency Identification (RFID), Network Information Card (NIC), Wireless Fidelity (Wi-Fi), and Access Points (APs).It provides a large number of intellectual services for edge infrastructure in smart city applications.These cities are entirely dependent on multiple communication perspective computing (Cloud, Fog, and Edge) wherein data are exchanged in heterogeneous mode, offering a distributing environment [2].It has the various advantages of technological advancements, such as manufacturing and distribution of IoT data according to different smart cities’ criteria.Still, it has multiple challenges, including big data, greenhouse gas emissions, consumption of non-renewable data,and others.The number of IoT devices is forecast to reach 41.6 billion, with 79.4ZB data expected to be generated by 2025,according to International Data Corporation’s(IDC) forecast report[3].

To address these challenges, energy-efficient IoT is utilized because IoT is transforming into G-IoT(Green Internet of Things) nowadays.It is the combination of IoT, G-Tech (Green Technology), G-Eco(Green Economy), and G-Net (Green Networking).With the adoption of G-Tech, sustainable designing,and manufacturing, smart factories increase productivity day by day [4].A user-friendly environment is developed in smart industries, based on R5factors such as Reduce (fuels, energy), Renew (electricity,wind and water power), Recycle (paper, plastic, battery cells), Responsibility, and Refuse (do not use unwanted things).Green economy means reducing the smart city’s risk through the green development of ecological economies.G-Net has a vital role in deploying IoT applications, minimizing operational costs and power consumption with decreased pollution and maximizing environmental conservation[5].

G-IoT also uses communication technologies such as Green Radio Frequency Identification(G-RFID),Green Wireless Sensor Network(GWSNs),Green Data Center(GDC),Green Base Stations(GBS),Green Machine-to-Machine(GM2M),and others[6].Routray et al.[7]discussed the five-layer G-IoT architecture:Physical layer,MAC layer,Radio link control layer,Packet data convergence layer,and No-access stratum layer.There are various advantages of G-IoT with regard to edge infrastructure in a smart city such as enhancing energy efficiency, reducing carbon emissions, decreasing resources and pollution, minimizing environmental degradation, and improving productivity.Still, there are many challenges in G-IoT, such as centralization, latency, networking, security, and privacy.IoT sensor devices are increasing continuously;various cyber-attacks such as optimal Green Hybrid attack, DDoS and Hacking attacks are also growing,harming Green IoT applications.Various next-generation industries (financial companies) have to invest 10% of their total ICT budget in addressing and preventing network and security threats for G-IoT [8].The comparison of the proposed layered architecture and the existing research is shown in Fig.1.

Figure 1: Comparison of proposed layered architecture to existing research

To resolve G-IoT’s issues, we can deploy the new advanced, high-demand technology, called Blockchain.As a widely used technology for security purposes in the advanced applications of smart cities nowadays [9], it supports essential properties like digital integrity, distributed ledger, and decentralization for secure advanced city infrastructures [10,11].Thus, it offers the opportunity for radically changing and improving data security in many use cases by enabling trusted architecture.Blockchain is the collection of blocks,each of which is linked to the previous block with a hash pointer.Each block has transaction data, timestamp, last hash value, and own hash value.To verify and validate transactions, miner nodes provide security and privacy for data in a smart city edge environment [12].To provide more secure infrastructure in IoT applications, Shu et al.[13] proposed a digital signature scheme-based hash function.They prevent key exchange with the elliptic curve discrete logarithmic algorithm (ECDLA) and subsequently create a hash function, proving reliability in IoT applications.Based on this scheme, it supports authentication, non-repudiation, and integrity.Still, this scheme has a drawback: the key and signature sizes are too large here, so they cannot be used in space-critical applications in a smart city[14-17].

The OTS scheme has a substantial role in determining the size of keys and signature.Second,the hashbased signature scheme cannot be utilized in blockchain technology.Thus,we introduced four layer-based secure architecture, which uses the OTS scheme-based Blockchain at the fog layer and provides more security in a smart city.OTS means one-time signature, and it is part of cryptography.The main purpose of the OTS is to provide more security and privacy.Nowadays, the latest methodology uses a green environment such as energy-efficient infrastructure in smart city applications [18-21].Thus, energyefficient, secure architecture in edge infrastructure is proposed with the fusion of the OTS scheme and Blockchain technology.

This paper addresses the issues of security and privacy,centralization,and communication bandwidth by using the proposed OTS scheme-based secure architecture for Energy-Efficient IoT in Edge Infrastructure.

Research contribution: The following are the main contributions of this paper:

●Propose OTS Scheme-based Secure Architecture for Energy-Efficient IoT in Edge Infrastructure.

●OTS-based Blockchain provides more security in a distributed manner with key generation,signature generation,and signature verification for Edge Infrastructure in smart city applications.

●Evaluate the performance of the proposed architecture in terms of computing and communication costs for advanced applications.

●We compare our proposed work with the existing research studies quantitatively and in terms of security and privacy by performing comparative analysis.

The rest of this paper is organized as follows:Section 2 discusses the seminal contributions for Green IoT in advanced smart city applications; in Section 3, we propose the OTS Scheme-based Secure Architecture for Energy-Efficient IoT in Edge Infrastructure; we assess the computing and communication cost through quantitative analysis in Section 4 to evaluate the performance of the proposed architecture in terms of security and privacy and perform comparative analysis; finally, Section 5 presents the conclusions of our paper.

2 Related Work

In this section, we discuss the seminal contribution of the existing research studies with regard to Energy-Efficient, IoT-related sustainable smart cities applications and address centralization,communication bandwidth, security, privacy, and other challenges.The basic and essential purpose of Edge Infrastructure in smart city applications is to provide a reliable, trustworthy environment for the smart city with the help of advanced technologies, services, rules,and regulations.

2.1 Seminal Contribution

For the deployment of greenery in IoT infrastructure,Kim et al.[22]proposed an empirical model of the Blockchain of Things(BoT)to overcome the security vulnerability of existing IoT devices such as airplanes,automobiles, and CCTV in the sensor multiplatform by the radix of the blockchain core algorithm and multiple-agreement algorithm.Nonetheless, it has some issues with regard to IoT networks such as authentication of IoT devices collected by the IoT gateway through LAN.Kaur et al.[23] designed Green IoT architecture for reducing the energy utilization of IoT smart city applications.It is based on a cloud system that is used for decreasing hardware consumption, but the security vulnerability issue is not resolved.Yang et al.[24] introduced an AI-enabled cloud data center for a green cloud and studied about timing control and refrigeration engine intelligently.It realized low consumption of energy and high efficiency intelligently for IoT applications, but it has some limitations such as AI-enabled networking like edge computing,caching, and offloading for a greener environment.

Sukjaimuk et al.[25]proposed a congestion control mechanism to mitigate the congestion rates of the network for Green IoT Sensing devices.It reduced sensor efficiency consumption and increased network performance for Green, Efficient, Information-Centric, Networking-based Green IoT Sensor.Overall network efficiency for various topological structures is a major issue, which is not covered by this research.For the improvement of quality of experience (QoE) in the content-centric computing system for IoT users, He et al.[26] proposed QoE models as well as a sub-optimal dynamic approach to evaluate the qualities of IoT users and networks based on green resource allocation with deep reinforcement learning.They did not address the continuous increase of IoT devices and network, security, and privacy issues, aiming only aims at the enhancement of the quality of experience.

Patil et al.[27] provided a lightweight blockchain-based secure framework for smart greenhouse farming to provide security and privacy.The private immutable ledger in blockchain optimized energy consumption and secured communication with each other.Singh et al.[28] presented Blockchain and Fog-based secure architecture for the Internet of Everything (IoE) in smart cities.This architecture maintained properties such as sensitive data encryption, authentication, and reduced latency and energy.Shaikh et al.[29] provided various G-IoT approaches with communications services and others.They also addressed various challenges for G-IoT, such as large data, energy efficiency, latency, scalability,security, and privacy.Linde et al.[30] constructed a secure signature scheme to integrate hash-based onetime signature scheme and blockchain technology and compared it with the traditional system.Nonetheless, it has stateful properties and requires storage, and backup for advanced application requirements leaves a lot to be desired.

2.2 Needs Addressed by the Proposed Architecture

For effective and secure environments in smart applications,the proposed architecture considered five security threats for Energy-Efficient IoT in a smart city for Edge Infrastructure:

●Mismatched security policy:An attacker can access the IoTand control entities easily via a less secure environment because of the various security protocols used in different layers in the system.

●DoS attack:An attacker launches a DoS attack on physical services to exhaust the available network resources for other devices in the G-IoT infrastructure.With the DoS attack,an attacker can launch an attack easily on a virtualized platform system.

●Impersonation attacks: An attacker can pose as a physical platform to allocate unavailable IoT resources.Moreover,an attacker can masquerade as a G-IoT controller to steal network resources.

●Hypervisor attacks: An attacker can achieve attacks with respect to the hypervisor to jeopardize the virtualization of IoT device resources in the Green IoT infrastructure.These attacks cause softwarebased errors in the hypervisor.

●Side-channel attacks:An attacker can easily access one IoT device and attack the set of IoT devices sharing the same primary hardware resources.

Based on the analysis of research studies,this study focused on the five-layer architecture for Green IoT in smart city applications with energy efficiency,latency,and other issues.Note,however,that such existing methodologies have various limitations, such as networking, centralization, communication bandwidth,security, and privacy.Thus, we provided four layers based on secure architecture with OTS-based Blockchain used at the fog layer.

3 Proposed OTS Scheme Based Secure Architecture for Energy-Efficient IoT

The previous research proposed a Green environment for the smart city with IoT-oriented infrastructure.Nonetheless, it has various considerations such as communication bandwidth, security, and privacy for advanced applications of a smart city.Therefore, we present the OTS scheme-based secure architecture for energy-efficient IoT in the smart city for edge infrastructure to address issues, including security,privacy, and communication and computing cost.The OTS scheme has three functions: Generate Keys,Generate Signature, and Signature Verification.This scheme is utilized in the Blockchain for creating the Blocks’ hash values.With the integration of the OTS scheme and Blockchain, the proposed architecture offers more security and privacy for Energy-Efficient IoT applications in Edge Infrastructure.

3.1 Design Overview of the Proposed Architecture

The design overview of the proposed architecture for Energy-Efficient IoT in Edge Infrastructure is shown in Fig.2.It has four layers: (1) Connection layer; (2) Edge layer; (3) Fog layer; and (4) Cloud layer.The connection layer is used as a physical layer as well as for monitoring of IoT device for smart applications, including smart manufacturing, and many more.It also provides filtered data and connection between IoT.This data is forwarded to the edge layer with 5G connectivity.Access and Core Network provide such connectivity with the help of user plane and control plane functions (UPF, CPF).Many responsibilities, including network functionality, Quality of Services (QoS), controllability, and stability of the applications, are provided by the user plane and control plane.Various base stations and switches are available at the edge layer, which is utilized for providing a multi-interface network with smart applications.It is also used for providing the best route and communicating with the fog layer.We deployed multi-interface smart applications (SA1, SA2, SA3….) and established a communication relationship between IoT devices and advanced applications.

Figure 2: Design overview of the proposed architecture for energy-efficient IoT in edge infrastructure

In the Fog layer, we used the OTS scheme-based Blockchain for security and privacy purposes.Blockchain technology is known to be used for secure IoT-oriented infrastructure.By employing the blockchain, an untrusted individual manufacturer can link together with an associate in a peer-to-peer network and transfer data in a verifiable manner without the aid of a trusted intermediary.For enhanced security, however, we are using the OTS scheme-based blockchain at the fog layer, and we have developed distributed networks between various fog nodes.By leveraging the OTS scheme and Blockchain technology, we provide more security and privacy and incur low computing and communication cost for Energy Efficient-IoT in Edge Infrastructure for a smart city.On the cloud layer,data analysis, production analysis, and decision-making functions are provided in a decentralized manner with the help of the data center.Blockchain is responsible for the scalability and analysis of data.The cloud layer consists of large-capacity storage space, and high-performance servers equipped with processing capabilities.It also automatically provides various application services for smart cities,including smart industries such as management, configuration,distribution,and decision support.

3.2 Methodological Flow of Proposed Architecture with OTS Scheme-Based Distributed Blockchain

This subsection provides the methodological flow of the proposed architecture with the OTS schemeenabled distributed blockchain network.It is categorized into three parts: data acquisition, data conversion, and OTS scheme-based blockchain-enabled distributed network.The first part, data acquisition is conveyed at the connection layer, and data conversion is realized at the edge layer, with the OTS scheme and blockchain concept employed at the fog layer of the proposed architecture.It has various advantages, including distributed and decentralized secure transactions between manufacturer,transparency, decentralization, trustworthy environment, and others.The OTS scheme offers more security and privacy with blockchain networks.The methodological flow of the proposed architecture with the OTS scheme-based distributed blockchain is shown in Fig.3.

Figure 3: Methodological flow of proposed architecture with OTS scheme-based distributed blockchain

Data Acquisition:Data acquisition is the essential and primary task of the proposed architecture.Used at the first layer, called the connection layer of Energy-Efficient IoT, it gathers the raw industrial data from various IoT devices, including flow meter, smartwatch, smart vehicles, and healthcare assets according to advanced applications such as smart manufacturing, smart vehicles, and smart grid.Improved sustainability, economic development, enterprise resource planning, and manufacturing execution are the functions of the smart city realized by IoT devices.In the proposed architecture, a different type of IoT device connects to multiple smart applications (SA1, SA2, SA3,…).These applications collect IoT data such as the speed of vehicles, temperature, disease parameters, manufacturing details, pressure, network data rate, and others.The automatic collection of data from IoT devices is a function provided by IoT technology.These data then communicate with the edge layer where various base station switches and gateways are available, offering receiver/transmitter services for the communication.

The data conversion function is also used in this layer.It provides useful information from raw data with the help of Data_In,Data_Flow,and Status_Reply functions,which offer the needed information for smart applications.The data conversion is also part of Green-IoT.For 5G connectivity,we are using access and core network controller between layers of the proposed architecture.It is categorized into two parts:(1)UPF(user plane function) and (2) CPF (control plane function).UPF performs various tasks such as traffic reporting and data forwarding in the network in a 5G environment.CPF also has some services like session management, policy control, mobility management, network selection, and authentication server.At present, information is communicated to the upper layer, called the fog layer.In this layer, we utilize an OTS scheme based blockchain-enabled distributed network.A list of abbreviations with all descriptions is provided in Tab.1.

Table 1: List of abbreviations

OTS Scheme Based Blockchain-Enabled Distribution Network:In this subsection,we show the OTS scheme-based blockchain-enabled distribution network.As a distributed ledger system that promotes decentralization, transparency, and digital integrity, blockchain technology follows the rules and regulations of the OTS scheme such as key generation, signature generation, and signature verification and provides a distributed network.Thus, it is called the OTS scheme based Blockchain.It is mainly used for security purposes in smart city applications for Edge Infrastructure.In the blockchain,digital assets are distributed rather than copied or transferred.These assets are decentralized,maintaining the property of distributed networks in the Blockchain.Fig.3 shows the blockchain functionality with the OTS scheme,where various blocks,named A to Z are connected to each other as a series of information transactions.If A wants to send the information to B, then A must follow the condition that A will use its own private key to sign the hash of transaction 1 and B’s public key.Similarly, B, C, D, …, Z maintain this property.If it is OK, then add a block in the blockchain network, and the transaction is executed easily; otherwise,identify the malicious data and stop the transaction in the network.

The OTS scheme has three parts: (1) Generate keys Gk(Private Gprand Public Gpub); (2) Generate Signature Gs; and (3) Signature Verification Sv.Hash-based signature has the drawback of generating large keys and signature, so this cannot be used in the blockchain technology.Therefore, we are proposing an OTS scheme-based blockchain.In this scheme, we utilized a bunch of information instead of large-size information.The proposed scheme uses 4-bit long bunches of information for the Blockchain network.Eqs.(1)and(2)are used for calculating the size of keys and signature,respectively.

If key Size =256 bits, then Signature Size=512 bits,which is smaller than the Hash-based signature scheme.The signature size is 512 bits long so security parameter M= 512.

A scheme is defined as a triple algorithm(Gk,Gs,Sv)for Information m(which is often defined as the output range of the hash function),which is offered in the Blockchain network in a smart city.

Gk=generates a key pair (Gpr,Gpub)given security parameter M;

M= Parameters: size of private key,public key,signature elements, and others.

Gs (Gpr,m)=creates signature ∂on m using secret key Gpr.

Sv(Gpub,∂,m)= returns 1 if ∂is a valid signature on message m for public key Gpub.

For all (Gpr, Gpub) ←Gkand all information m, every signature ∂←Gs (Gpr,m) can be verified with Sv(Gpub, ∂, m) = 1.The generation of keys, generate signature, and signature verification are discussed below.

Algorithm 1: Generate Keys Gk (Private Gpr and Public Gpub)

(continued).6: end for 7: Gpub =[]; /* Public Key Initialization 8: for x0→15 9: do 10: Z ←Gpr [x ],Zf ←Z [0:127], Zt ←Z 128:255[ ]; /*Divide private keys into four parts.11: Zu ←Z 256:383[ ], Zy ←Z 384:511[ ]12: for y0→128 13: do 14: Zf ←SHA256 (Zf ), Zt ←SHA256 (Zt ), Zu ←SHA256 (Zu ), Zy ←SHA256 (Zy )15: end for Gpub.merge Zf, Zt, Zu and Zb)(16: end for

Generate Keys Gk (Private Gpr and Public Gpub):Every block has four types of information in the blockchain networks: previous has value, own hash value, timestamp, and data.The hash value is dependent on private and public keys.Private keys are the collection of 16 values (24), each of which is 512 bits long[18].

We can apply a hash chain to generate a private key value (gprk).During signature verification in Blockchain, private key values are not disclosed, so it is secure.The calculation of public keys (Gpub) is dependent on the value of private key Gpr.For the computation of public keys, we divide private key values gprkinto four parts for Blockchain[18].

Algorithm 2:Generate signature Gs

(continued).29: do Zy ←SHA256(Zy);30: endfor 31: ∂i.merge(Zf,Zt,Zu, Zy);32: endfor

Generate Signature Gs:The signer has a huge responsibility; it follows some steps and generates a signature for the Blockchain network.For this purpose, the hash of the information (h) is first computed,and we used the SHA-512 hash function with Eq.(8) (h has a total of 128 hexadecimal symbols).

hhdis dependent on string_index_list(16 different strings).It is denoted by L with Eq.(9).

Then, the signer (Miner Node) calculates the summation of the digits (Summation_string_index) in every string_index with Eq.(10)[18]:

Finally, with the help of Summation_string_index, the signer produces signature ∂according to information (m), which is collected by the edge node of the proposed architecture.The signer (Miner Node) then computes the hash of every private key value(Gpr).It is equal to Summation_string_index.

How they spluttered and flamed, to be sure! Now everyone can see, they thought, that we are the grandest! How we sparkle! What a light- But here they were burnt out

With Eq.(11),the signer will generate the final hash outputs with individual signature.It is denoted by V and is the combination of two forward private sign FGprand two backward private sign BRpr[18].

Example:

We have a hash of information h with hexadecimal symbols according to Eq.(8).

H = 678abc1234808de3457f490....0................0................0................0................9f123........(128_hd)index 12 23 78 91 98 119 stringindexi 12 23 78 91 98 119

Signature Verification SV:The next step of the OTS scheme is signature verification (SV) in the Blockchain network for a smart city.Sv(Gpub,∂, m) returns the value of 1 if ∂is a valid signature on message m for public key Gpub.For this verification, the verifier (Miner Node) computes the Summation_string_index values according to the same step above (Generate signature Gs).The verifier(Miner Node) verifies the signature by more than 50% and generates verification key (Vk) with the help of signature, a combination of two forward signatures (F∂), and two backward signatures (B∂).Eq.(12)shows the signature verification process.Finally, the verifier compares his/her own verification key with the signer public key.If it is equal to 1, the signature is accepted[18].

Algorithm 3: Signature verification Sv

The OTS scheme-based blockchain architecture provided decentralization,security,and privacy.After signature verification, we can say that it offers a secure environment for smart city applications because it utilizes blokchain ledger in the fog layer.The security and privacy of the proposed architecture and experimental evaluation are discussed in the next section.

4 Experiment and Performance Evaluation

This section presents the experimental and performance evaluation of the proposed Architecture for Energy-Efficient IoT in Edge Infrastructure.It has three subsections: Quantitative analysis, Security and privacy analysis, and Comparative analysis with existing research.

4.1 Quantitative Analysis

In this subsection, we evaluate the effective performance of the proposed architecture and algorithms with simulation such as computing cost, and communication cost.Permissioned blockchain Hyperledger fabric (Version 1.2), docker container (2.0.5), Ubuntu Linux (14.04.6 LTS) with virtual CPU were employed for the simulation setup.For the Hyperledger Fabric blockchain, 4-40 GB internal memory was the minimum requirement.Node.js v8.9.1 (6.8.0 version) was installed for checking the performance of various node tests.The computing and communication costs of the proposed architecture are evaluated in this section.

Table 2: Comparison of security and privacy analysis with existing research

Computing Cost:The evaluation of computing cost is dependent on the total bits exchanged with a registered user and on signature verification in Blockchain networks.The average time required for hash code is 0.32 msec, the signature generation time is 21.82 msec, the signature verification time is 38.92 msec, and the asymmetric encryption/decryption time taken is 22.72 msec as shown in [34].It has three phases, including Generate keys Gk, Generates signature Gs,Signature Verification SVfor the calculation of overall computing cost.

●Generate signature:One hash code operation,one asymmetric encryption/decryption,and signature generation are utilized for this phase with Algorithm 2.Thus,(0.32+22.72+21.82)=44.86 msec as the total computing time used for this phase.

●Signature Verification: One hash code operation, one asymmetric encryption/decryption, and signature certification is employed in this phase.Thus, (0.32 + 22.72 + 38.92) = 61.96 msec as the total computing time cost for this phase.Finally, we calculate the overall computing time for blockchain networks according to all algorithms as (23.04+44.86 +61.96)= 129.86 msec.

At this point, a performance analysis of the proposed architecture is conducted when the number of transactions increases.Thus, the computing time for signing and verifying the signature linearly varies according to the no.of transactions as a reference as shown in Fig.4a.

Figure 4: (a): Computing cost time analysis concerning No.of transactions (b): Communication cost analysis concerning no.of transactions

Communication Cost:Let user identity be 32 bits, SHA hash output be 256 bits, random nonce be 16 bits, timestamp be 16 bits, and encryption/decryption identification be 32 bits long, with checksum values of 256 bits.It is described in [34] as well.The communication cost also follows the Generate keys Gk,Generate signature Gs,Verify Signature SVphases.

●Generate keys:The total communication cost for this phase is(32+4+256+16+16+32)=356 bits as required.User identity,registration,SHA hash output,random nonce,timestamp,and encryption/decryption identification functions are used.

●Generate signature: For this phase, the total communication cost is (32 + 4 + 256 + 16 + 16 +32) = 356 bits, which is utilized.User identity, registration, SHA hash output, random nonce,timestamp,and encryption/decryption identification functions are provided.

●Signature Verification:The total communication cost for this phase is(32+4+256+16+16+32+256)= 612 bits,which is required in signature verification.

Thus,the overall communication cost of the proposed architecture is(356+356+612)=1324 bits.It is better to compare with existing studies according to the number of transactions,as shown in Fig.4b.

4.2 Security and Privacy Analysis

This subsection analyzes security and privacy with various parameters, including confidentiality, data integrity, user anonymity, decentralization, security against malicious attack, and man-in-the-middle attack for Edge Infrastructure.As already discussed in Section 3, the OTS scheme based blockchain is deployed at the fog layer of the proposed architecture for security and privacy purposes.Tab.2 shows the security and privacy analysis vs.existing studies.

Confidentiality: The proposed architecture satisfies the property of confidentiality because the blockchain is the collection of blocks, each of which connects to the previous blocks by a hash function.Any user wishing to transfer the information from one node to another, first encrypts the data with public and private keys (Algorithm 1), and plain text is converted into the ciphertext; the user then generates a signature (Algorithm 2) and finally verifies the signature (Algorithm 3) and matches the A’s private key and signature.Finally, add the block in the blockchain network.The receiver user decrypts data through signature verification in the advanced applications for a smart city.

Data Integrity: Actually, we know that the data integrity of the information follows the three steps of creation, transmission, and storage.Note, however, that alteration of data follows the steps of insertion,deletion, and substitution.Digital signature or signature verification deviates from the property of the alteration of data in the network [35].We are using a signature verification algorithm (Algorithm 3) to check for the modification of data in the proposed algorithm.Blockchain networks already support the data integrity of information in the blockchain network, but the OTS scheme provides more security to communicate the information with the Blockchain network.

User Anonymity: Through the use of the proposed architecture, the property of user anonymity is supported.Efficient, secure communication of user information among various financial applications and is difficult, hiking up the cost of malicious user authentication functionality.Any user of a smart enterprise or a company wishing to communicate the information to another user first completes the registration process in the blockchain network by generating private and public keys (Algorithm 1).When signature verification is done, including the addition of block in the blockchain network, the receiver will get the information with the help of the proposed architecture.

Decentralization: The proposed architecture supports decentralization because it uses the concept of Blockchain.The Blockchain network already enhances the three properties of data integrity,decentralization, and transparency.Algorithms 1, 2, and 3 provide more security and privacy with a decentralized, secure distributed blockchain network.

Security against malicious users:We are utilizing the distributed network in Blockchain with an OTS scheme that follows the protocols of key generation,signature generation,and signature verification.It is like the registration and verification steps for use of the Blockchain network by a new user.When any malicious user wants to access this network, it will not follow the aforesaid steps and forgery is computationally impossible[36].Therefore,the proposed architecture can be said to provide security against a malicious user.

Security against Man-in the Middle attack:The proposed architecture provides security against the manin-the-middle attack because it maintains the secure exchange of the public key and generation of secure public and private keys with Algorithm 1, finally verifying the signature by minor nodes in the Blockchain network.Therefore,the proposed architecture can be said to offer security and privacy against the aforesaid attack for advanced smart applications.

According to the security and privacy analysis, we are providing a secure environment in smart applications in edge infrastructure with the use of the proposed architecture.This architecture satisfies the properties, including confidentiality, data integrity, user anonymity, decentralization, security against malicious attack,and man-in-the-middle attack for energy-efficient IoT in edge infrastructure for a smart city.

4.3 Comparative Analysis with Existing Research

This subsection discusses various existing research and compares them with the proposed architecture using some parameters, such as key technology, security architecture/framework, approach, and key consideration.Tab.3 shows the comparative analysis with existing research.The proposed research provides more security and privacy with energy efficiency for Energy-Efficient IoT in Edge Infrastructure for a smart city through OTS scheme-based blockchain at the fog layer.It uses a distributed network and enhances the three properties,including data integrity,decentralization,and transparency.It also incurs less computing resource cost and realizes scalability and centralization in advanced applications in a smart city.

Table 3: Comparison with existing research studies

5 Conclusion

We proposed OTS scheme-based secure architecture for Energy-Efficient IoT in Edge Infrastructure for smart city applications.Blockchain technology is known to provide security and privacy with a distributed network.Nonetheless, we used the OTS scheme for providing more security and privacy in terms of confidentiality, user anonymity, data integrity, and others.Three algorithms, Generation Keys, Generate Signature, and Signature verification used to provide such security in sustainable smart city advanced applications, including smart manufacturing, smart industries, smart healthcare, and more.The comparison with existing researches also demonstrated security and privacy, key technologies, key considerations, and others.We evaluated the performance of the proposed architecture as the computing and communication costs for the network.Finally, we compared it quantitatively, including security, and privacy, and performed comparative analysis with existing research studies as various traditional parameters.The performance result of the proposed architecture is better than the other approaches providing more security and privacy.

Funding Statement:This study was supported by the Advanced Research Project funded by SeoulTech(Seoul National University of Science and Technology).

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.