skip to main content
research-article

Hybrid blockchain and pseudonymous authentication for secure and trusted IoT networks

Published:13 November 2018Publication History
Skip Abstract Section

Abstract

This paper addresses the issue of secure and trusted Internet of Things (IoT) networks by adopting the emerging blockchain technologies. This paper proposes a new hybrid blockchain technology to address the trusted IoT issues such as trustless communications and decentralized applications. Besides, we also present that the pseudonymous authentication technique can use a puzzle-solving computation to enable trustless communications for the IoT and provide the capabilities of near real-time transactions. In our previous work, we presented a decentralized software framework for the IoT by using a p2p network and the concept of the blockchain. In this paper, we outline the core components of the hybrid blockchain and delve deeper the algorithms of the hybrid consensus to provide the capabilities for our hybrid blockchain technology.

References

  1. Chord (peer-to-peer). https://en.wikipedia.org/wiki/Chord_(peer-to-peer).Google ScholarGoogle Scholar
  2. J. Aspnes, C. Jackson, and A. Krishnamurthy. Exposing computationally-challenged Byzantine impostors. Technical Report YALEU/DCS/TR-1332, Yale University Department of Computer Science, July 2005.Google ScholarGoogle Scholar
  3. M. Castro and B. Liskov. Practical byzantine fault tolerance. In Proceedings of the Third Symposium on Operating Systems Design and Implementation, OSDI '99, pages 173--186, Berkeley, CA, USA, 1999. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Chen. Devify: Decentralized internet of things software framework for a peer-to-peer and interoperable iot device. Proceedings of the Workshop on Advances in IoT Architecture and Systems (AIoTAS2017), 2017.Google ScholarGoogle Scholar
  5. J. Chen. Flowchain: A distributed ledger designed for peer-to-peer iot networks and real-time data transactions. Proceedings of the 2nd International Workshop on Linked Data and Distributed Ledgers (LDDL2), 2017.Google ScholarGoogle Scholar
  6. S. Goldwasser and Y. Lindell. Secure multi-party computation without agreement. Journal of Cryptology, 18(3):247--287, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. Jayachandran. The difference between public and private blockchain. https://www.ibm.com/blogs/blockchain/2017/05/the-difference-between-public-and-private-blockchain/.Google ScholarGoogle Scholar
  8. J. Katz, A. Miller, and E. Shi. Pseudonymous broadcast and secure computation from cryptographic puzzles. 2015.Google ScholarGoogle Scholar
  9. R. Kotla, L. Alvisi, M. Dahlin, A. Clement, and E. Wong. Zyzzyva: Speculative byzantine fault tolerance. SIGOPS Oper. Syst. Rev., 41(6):45--58, Oct. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Kraft. Difficulty control for blockchain-based consensus systems. Peer-to-Peer Networking and Applications, 9(2):397--413, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  11. L. Lamport, R. Shostak, and M. Pease. The byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3):382--401, 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/en/bitcoin-paper.Google ScholarGoogle Scholar
  13. D. Raggett. An introduction to the web of things framework. https://www.w3.org/2015/05/wot-framework.pdf.Google ScholarGoogle Scholar
  14. A. Ramachandran and M. Kantarcioglu, Dr. Using Blockchain and smart contracts for secure data provenance management. ArXiv e-prints, Sept. 2017.Google ScholarGoogle Scholar
  15. H. Watanabe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu, and J. Kishigami. Blockchain contract: Securing a blockchain applied to smart contracts. 2016 IEEE International Conference on Consumer Electronics (ICCE), 2016.Google ScholarGoogle ScholarCross RefCross Ref
  16. Wikipedia. Asset. https://en.wikipedia.org/wiki/Asset.Google ScholarGoogle Scholar

Index Terms

  1. Hybrid blockchain and pseudonymous authentication for secure and trusted IoT networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader