Abstract
This paper addresses the issue of secure and trusted Internet of Things (IoT) networks by adopting the emerging blockchain technologies. This paper proposes a new hybrid blockchain technology to address the trusted IoT issues such as trustless communications and decentralized applications. Besides, we also present that the pseudonymous authentication technique can use a puzzle-solving computation to enable trustless communications for the IoT and provide the capabilities of near real-time transactions. In our previous work, we presented a decentralized software framework for the IoT by using a p2p network and the concept of the blockchain. In this paper, we outline the core components of the hybrid blockchain and delve deeper the algorithms of the hybrid consensus to provide the capabilities for our hybrid blockchain technology.
- Chord (peer-to-peer). https://en.wikipedia.org/wiki/Chord_(peer-to-peer).Google Scholar
- J. Aspnes, C. Jackson, and A. Krishnamurthy. Exposing computationally-challenged Byzantine impostors. Technical Report YALEU/DCS/TR-1332, Yale University Department of Computer Science, July 2005.Google Scholar
- M. Castro and B. Liskov. Practical byzantine fault tolerance. In Proceedings of the Third Symposium on Operating Systems Design and Implementation, OSDI '99, pages 173--186, Berkeley, CA, USA, 1999. USENIX Association. Google ScholarDigital Library
- J. Chen. Devify: Decentralized internet of things software framework for a peer-to-peer and interoperable iot device. Proceedings of the Workshop on Advances in IoT Architecture and Systems (AIoTAS2017), 2017.Google Scholar
- J. Chen. Flowchain: A distributed ledger designed for peer-to-peer iot networks and real-time data transactions. Proceedings of the 2nd International Workshop on Linked Data and Distributed Ledgers (LDDL2), 2017.Google Scholar
- S. Goldwasser and Y. Lindell. Secure multi-party computation without agreement. Journal of Cryptology, 18(3):247--287, 2005. Google ScholarDigital Library
- P. Jayachandran. The difference between public and private blockchain. https://www.ibm.com/blogs/blockchain/2017/05/the-difference-between-public-and-private-blockchain/.Google Scholar
- J. Katz, A. Miller, and E. Shi. Pseudonymous broadcast and secure computation from cryptographic puzzles. 2015.Google Scholar
- R. Kotla, L. Alvisi, M. Dahlin, A. Clement, and E. Wong. Zyzzyva: Speculative byzantine fault tolerance. SIGOPS Oper. Syst. Rev., 41(6):45--58, Oct. 2007. Google ScholarDigital Library
- D. Kraft. Difficulty control for blockchain-based consensus systems. Peer-to-Peer Networking and Applications, 9(2):397--413, 2015.Google ScholarCross Ref
- L. Lamport, R. Shostak, and M. Pease. The byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3):382--401, 1982. Google ScholarDigital Library
- S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/en/bitcoin-paper.Google Scholar
- D. Raggett. An introduction to the web of things framework. https://www.w3.org/2015/05/wot-framework.pdf.Google Scholar
- A. Ramachandran and M. Kantarcioglu, Dr. Using Blockchain and smart contracts for secure data provenance management. ArXiv e-prints, Sept. 2017.Google Scholar
- H. Watanabe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu, and J. Kishigami. Blockchain contract: Securing a blockchain applied to smart contracts. 2016 IEEE International Conference on Consumer Electronics (ICCE), 2016.Google ScholarCross Ref
- Wikipedia. Asset. https://en.wikipedia.org/wiki/Asset.Google Scholar
Index Terms
- Hybrid blockchain and pseudonymous authentication for secure and trusted IoT networks
Recommendations
Blockchain-Driven Hybrid Model for IoT Authentication
Internet of Things, Smart Spaces, and Next Generation Networks and SystemsAbstractThe Internet of Things has the potential to play a significant part in the ongoing Industrial Revolution. Machines, devices, and sensors are able to connect and communicate with each other via networks. These Internet of Things devices generate an ...
Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems
AbstractWith the rapid increase in the number of Internet of Things (IoT) devices in recent years, massive amounts of sensitive IoT data are being generated and transmitted over the Internet. Despite its growing adoption in various fields, IoT ...
Customized blockchain-based architecture for secure smart home for lightweight IoT
Highlights- A novel Blockchain-based solution for secure smart home systems, using a combined hyperledger fabric and hyperledger composer.
AbstractSafeguarding security and privacy remains a major challenge with regards to the Internet of Things (IoT) primarily due to the large scale and distribution of IoT networks. The information systems in Smart Homes are mainly based on ...
Comments