Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 3/2023

10-05-2023

Blockchain-based cloud-edge clock calibration in IoT

Authors: Kai Fan, Zeyu Shi, Yicen Yang, Liyang Bai, Yintang Yang, Kan Yang, Hui Li

Published in: Peer-to-Peer Networking and Applications | Issue 3/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The explosive growth of the IoT continues to change the way people live, followed by a plethora of IoT-based scenarios resources and applications, such as smart homes, smart grids, and smart transportation. In these scenarios, many IoT nodes form a complex the distributed system through the network, and these devices must have synchronized clocks to work together to complete distributed tasks. However, considering the limited processing ability of IoT devices, it is hard to calibrate their clocks directly through external trusted time sources. This paper proposes a scheme for IoT clock calibration under rational assumptions. The scheme introduces the IoT cloud server as an internal time source and provides calibration service for edge devices through communication links. In order to preserve and trace the service behavior to punish dishonest participants, the scheme combines blockchain technology for transaction verification and distributed storage. To ensure that the cloud server can always fulfill the protocol correctly, the scheme applies game theory to analyze the different benefits of the participants in the system based on different policies. Meanwhile, we design a new reward and punishment mechanism to motivate rational players to maximize their utility. In addition, the results of the scheme’s Bayesian game analysis show that there is a Nash equilibrium in the system.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference Mani SK, Durairajan R, Barford P, Sommers J (2018) An architecture for IoT clock synchronization. In: Proceedings of the 8th International Conference on the Internet of Things. pp 1–8 Mani SK, Durairajan R, Barford P, Sommers J (2018) An architecture for IoT clock synchronization. In: Proceedings of the 8th International Conference on the Internet of Things. pp 1–8
5.
go back to reference Berkley J (2015) The promise of the blockchain the trust machine. The Economist 31 Berkley J (2015) The promise of the blockchain the trust machine. The Economist 31
6.
go back to reference Manshaei MH, Zhu Q, Alpcan T, Bacşar T, Hubaux J-P (2013) Game theory meets network security and privacy. ACM Computing Surveys (CSUR) 45(3):1–39CrossRefMATH Manshaei MH, Zhu Q, Alpcan T, Bacşar T, Hubaux J-P (2013) Game theory meets network security and privacy. ACM Computing Surveys (CSUR) 45(3):1–39CrossRefMATH
7.
go back to reference Myerson RB (1997) Game theory: Analysis of conflict. Harvard University Press, ??? Myerson RB (1997) Game theory: Analysis of conflict. Harvard University Press, ???
8.
go back to reference Liang X, Xiao Y (2012) Game theory for network security. IEEE Commun Surv Tutorials 15(1):472–486CrossRef Liang X, Xiao Y (2012) Game theory for network security. IEEE Commun Surv Tutorials 15(1):472–486CrossRef
9.
go back to reference Roy S, Ellis C, Shiva S, Dasgupta D, Shandilya V, Wu Q (2010) A survey of game theory as applied to network security. In: 2010 43rd Hawaii International Conference on System Sciences, pp. 1–10. IEEE Roy S, Ellis C, Shiva S, Dasgupta D, Shandilya V, Wu Q (2010) A survey of game theory as applied to network security. In: 2010 43rd Hawaii International Conference on System Sciences, pp. 1–10. IEEE
13.
go back to reference Eidson JC, Fischer M, White J (2002) IEEE-1588 standard for a precision clock synchronization protocol for networked measurement and control systems. In: Proceedings of the 34th Annual Precise Time and Time Interval Systems and Applications Meeting. pp 243–254 Eidson JC, Fischer M, White J (2002) IEEE-1588 standard for a precision clock synchronization protocol for networked measurement and control systems. In: Proceedings of the 34th Annual Precise Time and Time Interval Systems and Applications Meeting. pp 243–254
14.
go back to reference Malhotra A, Cohen IE, Brakke E, Goldberg S (2015) Attacking the network time protocol. Cryptology ePrint Archive Malhotra A, Cohen IE, Brakke E, Goldberg S (2015) Attacking the network time protocol. Cryptology ePrint Archive
16.
go back to reference Annessi R, Fabini J, Iglesias F, Zseby T (2018) Encryption is futile: Delay attacks on high-precision clock synchronization. CoRR abs/1811.08569. arXiv:1811.08569 Annessi R, Fabini J, Iglesias F, Zseby T (2018) Encryption is futile: Delay attacks on high-precision clock synchronization. CoRR abs/1811.08569. arXiv:​1811.​08569
18.
go back to reference Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151(2014):1–32 Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151(2014):1–32
19.
go back to reference Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference. pp 1–15 Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D, Ferris C, Laventman G, Manevich Y et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference. pp 1–15
Metadata
Title
Blockchain-based cloud-edge clock calibration in IoT
Authors
Kai Fan
Zeyu Shi
Yicen Yang
Liyang Bai
Yintang Yang
Kan Yang
Hui Li
Publication date
10-05-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 3/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01475-z

Other articles of this Issue 3/2023

Peer-to-Peer Networking and Applications 3/2023 Go to the issue

Premium Partner