Abstract
The developments of Narrow Band Internet of Things have attracted much attention from both academia and industry nowadays. While Narrow Band Internet of Things is gradually designed for commercial applications, it also confronts with several security concerns such as identification and privacy. Blockchain technique is equipped with authentication, auditing, and accountability, and thus it can serve as a promising tool for providing secure data communication on the network. To enhance the security level and achieve reliable data authentication and accountability for Narrow Band Internet of Things system, in this article, we combine the merits of blockchain technique and propose a blockchain-based architecture for Narrow Band Internet of Things. The presented architecture consists of three layers which are sensing layer, transport layer, and transaction layer. We describe the interaction processes between each layer in detail and construct the algorithms which are used to conduct data authentication and blockchain generation. By evaluation, our scheme is demonstrated to obtain favorable performances in terms of privacy, authentication, accountability, and efficiency, which makes it an appropriate method to be applied for secure data communication in Narrow Band Internet of Things systems.
Introduction
Narrow Band Internet of Things (NB-IoT) is a new type of IoT which is constructed on cellular networks and can be directly deployed to Global System for Mobile Communications (GSM), Universal Mobile Telecommunications System (UMTS), and Long-term Evolution (LTE). 1 It reduces the cost of deployments, achieves smooth upgrade, supports short-time standby, and provides high connection efficiency among various facilities. Compared to traditional IoT system, the main advantages of NB-IoT can be summarized in four aspects:2–5
Due to above properties, NB-IoT can be applied to many vertical industries such as smart cities, remote meter reading systems, asset tracking, and smart agriculture. The typical application scenarios of NB-IoT are illustrated in Figure 1.

Typical application scenarios of NB-IoT.
While NB-IoT is gradually making for maturity, it also confronts with several security concerns such as authentication, privacy, and fault tolerance. For instance, NB-IoT system is facing with a variety of data sources, how to ensure the data accountability is an urgent problem to be tackled.
Blockchain is the supporting technology of Bitcoin, which was first proposed by Satoshi in 2008. The unparalleled advantage of blockchain lies in its novel design to construct a decentralized system over distributed networks. 6 The first application of blockchain technology is cryptocurrencies, where the key property is being able to securely update truth states in a peer-to-peer (P2P) network. Blockchain is a data structure which links different data blocks into a chain in chronological order and achieves unforgeability by utilizing cryptography techniques. The invention of blockchain tackles two major concerns in digital currencies: Byzantine generals’ problem and double spending. Byzantine generals’ problem can be described as how to transfer messages to generals located in distributed areas, without knowing who of them are traitors. Double spending problem arises from digital currencies, which results in same amount of money being spent more than one time. Before the invention of blockchain, the solution to double spending problem is introducing a trusted third party such as bank to record each transaction so that the same amount money can only be spent once.
Blockchain takes the advantages of “proof of work” and some other cryptographic techniques to tackle the above issues. 7 It establishes trust mechanism between distributed network nodes by utilizing pure mathematical theories and forms a trusted distributed system. The system is fully decentralized and can create transactions and record the detailed information of each transaction at the same time. Furthermore, blockchain adopts a unique incentive mechanism to attract miners to provide their computation resources and complete the billing task. Thus, the whole network will be operating robustly unless more than a half of the nodes break down. Due to these advantages, blockchain technique has been designed to provide data protection in several scenarios such as digital cryptocurrency, cloud computing, logistics management, and IoT. 8 Blockchain technique can also serve as a promising tool to enhance the security and robustness of NB-IoT system.
To enhance the security level and provide data authentication and accountability in NB-IoT, in this article, we propose a new NB-IoT architecture based on blockchain. The proposed architecture combines the merits of blockchain technique and NB-IoT characteristics, which not only realizes secure data collection but also achieves full-time accountability and auditing. Specifically, the following works are established.
To begin with, we analyze the potential security threats and propose a blockchain-based architecture for NB-IoT. The proposed architecture consists of sensing layer, transport layer, and transaction layer, and the function of each layer is introduced in detail.
Furthermore, we illustrate the interaction processes between each layer and construct the algorithms which are used in authentication as well as blockchain generation. We give the formulized definitions of each algorithm and construct a concrete scheme based on identity-based cryptography, which demonstrates our scheme is equipped with superior scalability and universality.
Finally, we evaluate our scheme in terms of privacy, authentication, accountability, and efficiency. The high security level and low calculation cost prove our scheme is appropriate to be applied for data communication in NB-IoT systems.
Related works
Blockchain-based IoT systems
Many researchers have designed blockchain-aided IoT systems in order to improve the performance of traditional IoT architecture. Rahulamathavan et al. combined the merits of attribute-based encryption (ABE)9–11 and blockchain to improve the privacy of IoT systems. 12 They also proved that the calculation cost is acceptable on IoT terminal devices. Caro et al. 13 developed a blockchain-based IoT system for agri-food supply management, which was capable of providing traceability throughout the overall process of logistics. They also conducted their simulation on some IoT devices to highlight the pros and cons of their scheme in terms of time delay, network usage, and so on. Huh et al. 14 pointed out the limitations in current IoT platform and then proposed a new scheme to achieve flexible management on IoT devices. They adopted Ethereum infrastructure to provide key management and smart contract to prevent the attack from malicious users. Aimed to improve the privacy-preserving level in IoT system, Kravitz and Cooper 15 established a concrete cryptographic mechanism based on blockchain. Equipped with confidentially and authentication, their scheme was suitable to be applied for information protection in IoT system. Li 16 introduced the characteristics of IoT and blockchain, and then put forward the solutions to tackle the security concerns in IoT. It also demonstrated how blockchain-based IoT can be applied to several vertical industries such as intelligent traffic system and wisdom tourism. Kataoka et al. 17 designed an architecture which combines the function of software-defined networking (SDN) and blockchain and established trust mechanism on IoT devices. They also evaluated the computation cost of mining blocks, time consumption for the trust delivery, and the difficulty of generating a new block. Bocek et al. 18 applied blockchain-based IoT to medical delivery industry and their scheme was equipped with the function of recording real-time temperature during the whole lifespan during logistic processes. Ellul and Pace 19 first introduced a split-virtual machine named “AlkylVM,” and then implemented this virtual machine in IoT and blockchain systems. Their scheme innovatively established connections between blockchain and those resource-constrained IoT devices. Tapas et al. 20 developed an authentication and proxy calculation model for IoT based on blockchain technology and cloud computing. Specifically, their scheme had been simulated on Ethereum platform and the results showed that the proposed scheme reduced the calculation burden on IoT terminals which provides secure access control at the same time. Awasthi et al. 21 presented a lightweight architecture to achieve blockchain-based IoT security protection. Their experimental results showed that the architecture was decentralized and open which supported anybody to join the validation system and contribute to the blockchain. Ouaddah et al. 22 put forward a new method to achieve fine-grained access control over IoT devices based on blockchain technique. They achieved secure authentication by leveraging token-based cryptography. Urien 23 investigated the computation cost of cryptographic algorithms in blockchain and implemented them on real IoT devices. The proposed scheme was equipped with excellent portability and general applicability. Miraz and Ali 24 illustrated the typical application of blockchain and demonstrated how blockchain could be utilized to enhance the overall security of blockchain. Danzi et al. 25 studied the synchronization mechanism in IoT and analyzed the traffic between blockchain network and the IoT devices. Their research indicated that the uplink traffic of blockchain protocols required the allocation of considerable downlink resources. Odiete et al. 26 innovatively developed a decentralized platform which leveraged blockchain technology to achieve efficient data retrieval in IoT.
Security concerns in NB-IoT
The security requirements of NB-IoT resemble the security demands of traditional IoT; however, differences still remain with respect to sensing layer, transport layer, and transaction layer.
Sensing layer
Sensing layer lies on the bottom of NB-IoT system and provides services for the upper layers in the architecture. The main security threats in sensing layer arise from both active attack and passive attack. In passive attack, attackers do not make any manipulation of the original information, but only eavesdrop and analyze these messages. Since the transmission media of NB-IoT relies on open wireless networks, attackers can acquire the terminal information of NB-IoT nodes by eavesdropping data link and conduct follow-up invasions. Unlike passive attack, active attack includes integrity destruction, forgery, and data tempering and the damage brought by active attack is far greater than passive attack in NB-IoT. For example, in the typical NB-IoT application scenario “intelligent electric meter,” if an attacker captures a terminal electric meter, then he can forge any indicator of the node and the benefit of user will be harmed.
The above attack method can be prevented by some cryptographic techniques such as data encryption and integrity verification. Theoretically, the maximum battery life of a NB-IoT node is 10 years and the throughput of sensing module remains at a low rate. Consequently, cryptographic algorithms with low calculation cost such as block cipher should be deployed in the sensing layer due to the constrained computation resources.
Unlink traditional IoT, the network structure of NB-IoT is clear and explicit. The nodes in sensing layer can communicate with BS directly thus avoiding the potential threat during the process of network construction. Furthermore, the identification between NB-IoT nodes and BS should be bidirectional to prevent the security threats brought by supposititious BS.
Transport layer
Transport layer in NB-IoT serves as a repeater which is responsible for gathering and transmitting information from sensing layer to upper layer. The main security threats in this layer come from the massive accesses from NB-IoT terminal nodes and the open network environment. Normally, a NB-IoT sector can support approximately 100,000 access requests from terminal nodes; thus, how to manage these massive and real-time requests, especially deploying efficient access control management and identification thereby avoiding malicious nodes’ illegal injection, is an urgent issue.
Furthermore, the communication of transport layer totally relies on wireless channel, which has inherent characteristics such as vulnerability and instability. Attackers can send interfering signal to influence the normal communication between nodes and BS. Moreover, since the amount of NB-IoT nodes in a sector is very large, attackers can conduct distributed denial-of-service (DDoS) attack thereby affecting the total performance of communication networks.
To eliminate the above security concerns, several security policies such as end-to-end authentication, key exchange protocols should be established in order to provide confidentiality and integrity for legal messages to be transferred. At present, there are several generic protocols in computer networks such as Secure Sockets Layer (SSL) and Authentication and Key Agreement (AKA); however, how to optimize these protocols so as to deploy them to computation resource-constrained scenarios is a problem to be solved. However, it is essential to introduce intrusion detect mechanism to prevent the illegal accesses from malicious NB-IoT nodes.
Transaction layer
The core target of transaction layer is to store, analyze, and manage the massive data transferred from sublayer and lend support for those data originated applications. Compared to traditional IoT architecture, the volume of data in transaction layer in NB-IoT will increase sharply and thus the main security concerns arise from the following aspects:
Architecture and algorithms
The proposed architecture
The architecture of our scheme is illustrated in Figure 2. The core of our architecture is to realize private preserving data transmission along with accountable data provenance by combing the merits of NB-IoT and blockchain. It has three layers: sensing layer, transport layer, and transaction layer. The sensing layer contains NB-IoT nodes. In our model, we assume that the data collected by NB-IoT nodes are confidential and kept as ciphertexts during transmission. In the transport layer, we assume that each BS has its own public key and private key.

Architecture of blockchain-based NB-IoT systems.
Algorithms
Before presenting our algorithms, some notations are defined in Table 1.
Notations and meanings.
Registration
In this phase, a global unique identifier
Authentication
When a NB-IoT node enters a location covered by a BS at the first time, it generates a signature
Transmission
When the authentication is successful, the NB-IoT nodes can transfer data to the BS. Note that in some scenarios, the data to be transmitted is sensitive so that it should be encrypted by the symmetric key
Foundation block generation
Since NB-IoT nodes will enter the area of different BSs, the data transmission from node to BS is continuous like flows. When the first time of data transmission from a NB-IoT node is confirmed by a BS, it will generate the foundation block for this data flow. The structure of the block is illustrated in Table 2, and all the elements will be calculated after conducting decryption in equation (5)
Block structure of NB-IoT.
Blockchain generation
After the foundation block generation is completed, the BS will keep generating new blocks to record the data transmission information from the NB-IoT node. The process is illustrated in Figure 3 and described as follows:
If the NB-IoT node is still in the area covered by the same BS, the process of block generation resembles the steps in foundation block generation.
If the NB-IoT node moves into the area covered by a new BS, then the two BS need to negotiate before data transmission.
First, the authentication between NB-IoT node and BS is conducted as described in equations (1) and (2)
Then, the new BS checks the blockchain of the NB-IoT node and confirms the BS ID of the previous BS recorded in the latest block; without loss of generality, denote BS1 and BS2 to be the former BS and new station, respectively. As long as BS2 confirms that the latest block was generated by BS1, BS2 calculates as follows

Blockchain generation process.
BS2 sends
Data acquisition
When the application wants to acquire some data from the transport layer, it can conduct data retrieval over the blockchain and obtain the necessary information. Then, it simply recovers the ciphertexts to plaintexts utilizing the symmetric private key
Implement
In this section, we will implement our scheme in identity-based cryptography and construct the concrete algorithms defined in the previous section.
Registration
Let
The system public parameters are {
Let
Bilinearity
For
Non-degeneracy
There exists
Computability
There is an efficient algorithm to compute
The asymmetric key pair of NB-IoT node
Authentication
When a NB-IoT node enters a location covered by a BS at the first time, it generates a signature
The signature can be denoted by
Obviously, it is valid signature since
The BS records the
Randomly picks
The ciphertext can by denoted by
Obviously, the decryption is valid since
Transmission
When the process of key negotiation is completed, the data transmission shall be conducted. For message or message For message
Foundation block generation
The BS after decrypting the elements in Table 2 can be calculated, respectively, and the foundation block will be generated as shown in Table 3
Foundation block.
Blockchain generation
Without loss of generality, denote BS1 and BS2 to be the former BS and new station, respectively. The authentication between NB-IoT node and BS2 is conducted as described in equation (9)
Then, BS2 checks the blockchain of the NB-IoT node and confirms the BS1 is the previous BS that generates the blockchain, and the BS2 sends its signature to BS1. The verification process follows the same step described in equations (9) and (10). As long as BS1 confirms the identity of BS2, BS1 calculates as follows
BS2 sends
Data acquisition
Since we have defined the symmetric encryption algorithm, the user only needs to conduct a simple decryption to recover the plaintext from
Discussions
Data privacy
In some privacy-preserving scenarios such as personal health record (PHR) and military management system, data are very sensitive and should be confidential during transmission process. Furthermore, the BS is usually considered to be semi-trusted, which means it will follow users’ instructions to implement the previous defined algorithms, but may also collude with some malicious attackers to try to capture some valuable information from the data to be transferred.
In our scheme, the original message is encrypted double times before sending and is always transferred as ciphertexts during transmission. First, data are encrypted by a primary symmetric key shared only by the NB-IoT node and its applications so that even the BS cannot obtain any sensitive information about the plaintext. What’s more, the secondary symmetric key is used to provide confidentiality in the wireless communication channels to prevent the illegal access from malicious nodes.
Data authentication and accountability
Our scheme achieves data authentication and accountability by adopting public key mechanism and blockchain technique. At the first stage, the identity authentication is based on public key cryptography and is bidirectional so that malicious NB-IoT nodes and fake BSs are not capable of conducting data communications with legal devices. Besides, the blockchain will record the information and conditions of each NB-IoT node during its whole lifetime, and data accountability can be realized when data exception happens. Take the typical application scenario “smart logistics” for instance, considering the fact that logistics may contain some precious belongings such as emergency medicine and jewelries, it is of great significance to monitor the real-time status (temperature, pressure, humidity, etc.) of these logits. In our model, the data of these status will be recorded in the blockchain and can be traced during the whole process of logistics management. When data exception (such as temperature and pressure exceeding the critical value) occurs, the user can exactly pinpoint the time and location of these events by reading the message and timestamp in the blockchain, thus paving way for future auditing and accountability.
Efficiency analysis
Unlike traditional blockchain-based applications such as Bitcoin, the computation resource in NB-IoT is limited and it is important to reduce the calculation consumption to extend the lifespan of the terminal nodes. In our scheme, we achieve this target by introducing a new authentication mechanism between BS and NB-IoT nodes. It is reported that calculation based on asymmetric cryptography will occupy more computation consumption than that of symmetric cryptography, and consequently, we improve the efficiency of algorithms by eliminating the amount of asymmetric key operations to a large extent. During the process of authentication, the NB-IoT node only needs to do three times of asymmetric key operations at the beginning of entering the area covered by a BS. Afterwards, a symmetric key
Conclusion
To enhance the security level and achieve reliable data authentication and accountability for NB-IoT system, in this article, we first put forward a blockchain-based architecture for NB-IoT and introduce the function of each layer in detail, and then we describe the interaction processes between each layer and give the formulized definitions of our algorithms. Finally, we evaluate our scheme from the prospective of privacy, authentication, accountability, and efficiency. The high security level and low calculation cost demonstrate our scheme is appropriate to be applied for data communication in NB-IoT systems.
Footnotes
Handling Editor: Ximeng Liu
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This research was supported by the National Natural Science Foundation of China (nos 61672299 and 61802200) and the Natural Science Foundation of Jiangsu Province (no. BK20180745).
