scholarly journals Using blockchain to build trusted LoRaWAN sharing server

2017 ◽  
Vol 1 (3) ◽  
pp. 270-280 ◽  
Author(s):  
Jun Lin ◽  
Zhiqi Shen ◽  
Chunyan Miao ◽  
Siyuan Liu

Purpose With the rapid growth of the Internet of Things (IoT) market and requirement, low power wide area (LPWA) technologies have become popular. In various LPWA technologies, Narrow Band IoT (NB-IoT) and long range (LoRa) are two main leading competitive technologies. Compared with NB-IoT networks, which are mainly built and managed by mobile network operators, LoRa wide area networks (LoRaWAN) are mainly operated by private companies or organizations, which suggests two issues: trust of the private network operators and lack of network coverage. This study aims to propose a conceptual architecture design of a blockchain built-in solution for LoRaWAN network servers to solve these two issues for LoRaWAN IoT solution. Design/methodology/approach The study proposed modeling, model analysis and architecture design. Findings The proposed solution uses the blockchain technology to build an open, trusted, decentralized and tamper-proof system, which provides the indisputable mechanism to verify that the data of a transaction has existed at a specific time in the network. Originality/value To the best of our knowledge, this is the first work that integrates blockchain technology and LoRaWAN IoT technology.

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Piera Centobelli ◽  
Roberto Cerchione ◽  
Pasquale Del Vecchio ◽  
Eugenio Oropallo ◽  
Giustina Secundo

PurposeThis paper aims to design, build and evaluate a blockchain platform in the accounting domain, taking an ecosystem perspective. To achieve this aim, the research provides evidence for developing a decentralised architecture rooted on blockchain technology, designing a proof of concept and modelling an accounting blockchain-based system.Design/methodology/approachMoving from the analysis of previous literature and leveraging on the design science approach, this paper provides a framework grounded on the main pillars of blockchain and accounting functions, identifying technical and non-technical issues that must be addressed embrace blockchain technology's full potential.FindingsWe propose and discuss a conceptual framework for a blockchain-based accounting context, moving from the identification of a typical accounting scenario. The framework is organised around three scalable levels: the first level is a technological infrastructure based on a distributed database with peer-to-peer storage; second, in the intermediate level, increasing control levels are assured through permissions and validation and third, in the higher level, the system provides the integration of business and security applications. The deployment of this system relies on a private network of nodes that validates transactions.Practical implicationsThe proposed conceptual framework about blockchain development in accounting allows closing the knowledge gap between blockchain developers and accounting experts by suggesting technological and strategic issues for practitioners.Originality/valueWe provide practical guidelines to design and adopt blockchain in the accounting domain.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Choi-Meng Leong ◽  
Kim-Lim Tan ◽  
Chin-Hong Puah ◽  
Shyh-Ming Chong

Purpose This study aims to investigate the intention of using mobile payment (m-payment) services in Sarawak, Malaysia. Design/methodology/approach A total of 194 online payment users were selected to respond to the structured questionnaire. The partial least squares-structural equation modelling (PLS-SEM) was used to analyse the data by assessing the measurement and model. Findings Perceived usefulness (PU) and perceived ease of use mediated the relationship between perceived compatibility (PC) and the intention to use the mobile payment for mobile network operators’ services. Research limitations/implications The analysis provides insights that PC is considered as a significant determinant for mobile payment of mobile network operators’ services. Practical implications The operators can consider factors such as PC in the design of their mobile applications and the potential to expand the m-payment services to others e-wallet such as Sarawak e-wallet. The model possesses medium prediction power, which suggests that other variables such as perceived security and personal innovativeness also can be used to predict the usage behaviour of mobile payment for the mobile network services. Originality/value The present study contributes to the m-payment users’ behaviour intention literature by investigating the mobile-based predictors of using m-payment technology in an emerging digital economy state in Sarawak, Malaysia. This study also extends the knowledge of technology acceptance model by introducing the mediation effect of PU and ease of use between the mobile-based predictors and m-payment intention.


Author(s):  
Balboul Younes ◽  
Fattah Mohammed ◽  
Mazer Saïd ◽  
Moulhime El Bekkali

The launch of the new mobile network technology has paved the way for advanced and more productive industrial applications based on high-speed and low latency services offered by 5G. One of the key success points of the 5G network is the available diversity of cell deployment modes and the flexibility in radio resources allocation based on user’s needs. The concept of Pico cells will become the future of 5G as they increase the capacity and improve the network coverage at a low deployment cost. In addition, the short-range wireless transmission of this type of cells uses little energy and will allow dense applications for the internet of things. In this contribution, we present the advantages of using Pico cells and the characteristics of this type of cells in 5G networks. Then, we will do a simulation study of the interferences impact in uplink transmission in the case of PICO cells densified deployment. Finally, we will propose a solution for interference avoidance between pico cells that also allows flexible management of bands allocated to the users in uplink according to user’s density and bandwidth demand.


Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6220
Author(s):  
Cosmina Corches ◽  
Mihai Daraban ◽  
Liviu Miclea

Through the latest technological and conceptual developments, the centralized cloud-computing approach has moved to structures such as edge, fog, and the Internet of Things (IoT), approaching end users. As mobile network operators (MNOs) implement the new 5G standards, enterprise computing function shifts to the edge. In parallel to interconnection topics, there is the issue of global impact over the environment. The idea is to develop IoT devices to eliminate the greenhouse effect of current applications. Radio-frequency identification (RFID) is the technology that has this potential, and it can be used in applications ranging from identifying a person to granting access in a building. Past studies have focused on how to improve RFID communication or to achieve maximal throughput. However, for many applications, system latency and availability are critical aspects. This paper examines, through stochastic Petri nets (SPNs), the availability, dependability, and latency of an object-identification system that uses RFID tags. Through the performed analysis, the optimal balance between latency and throughput was identified. Analyzing multiple communication scenarios revealed the availability of such a system when deployed at the edge layer.


Info ◽  
2016 ◽  
Vol 18 (4) ◽  
pp. 1-11
Author(s):  
Rob Nicholls

Purpose The purpose of this paper is to analyse some of the spectrum management policy implications of an evolving set of wireless technologies. Specially, deployment of heterogeneous networks (HetNets) as part of the rollout of long-term evolution networks and their expected use as the heart of next-generation services raises the question as to whether such networks should lead to any spectrum management policy changes. Design/methodology/approach The paper describes the use and variety of HetNets when using licensed and unlicensed or commons spectrum. Findings The paper demonstrates that there is little need to change current spectrum licensing regimes to deal with these networks in a licensed spectrum. However, it also shows that the deployment of HetNets other than WiFi in an unlicensed spectrum creates an information asymmetry, which means that spectrum regulators will find assessment of spectrum demand more difficult. The paper also highlights the problem facing spectrum regulators when there is a potential for interference to unlicensed services which are widely deployed but have no right to protection from interference. Practical implications Spectrum regulators will need to understand the extent to which an unlicensed spectrum is being used by mobile network operators to deliver wireless broadband services. This understanding is needed to be able to address potential interference with other services using an unlicensed spectrum and to be able to forecast spectrum demand. Originality/value The development of technologies that are designed to be used by existing mobile network operators for the delivery of wireless broadband services using an unlicensed spectrum creates novel regulatory challenges. This paper reviews some of these.


2020 ◽  
Vol 4 (3) ◽  
pp. 283-293
Author(s):  
Jun Lin ◽  
Wen Long ◽  
Anting Zhang ◽  
Yueting Chai

Purpose The blockchain technology provides a way to record transactions that is designed to be highly secure, transparent, trustable, traceable, auditable and tamper-proof. And, the internet of things (IoT) technology provides the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction, which is able to link computing devices and digitized machines, things, objects, animals and people that are provided with digital unique identifiers (UIDs). This paper aims to explore the combined application of blockchain and IoT-based technologies, especially on the intellectual property protection area. Design/methodology/approach In this paper, the authors propose a high-level architecture design of blockchain and IoT-based intellectual property protection system, which can help to process three types of intellectual property: (1) patents, copyrights, trademarks etc.; (2) industrial design, trade dress, craft works, trade secrets etc.; and (3) plant variety rights, geographical indications, etc. Findings Using blockchain peer-to-peer network and IoT devices, the proposed method can help people to establish a trusted, self-organized, open and ecological intellectual property protection system. Originality/value To the best of the authors’ knowledge, this is the first work that applied blockchain and IoT technologies on traditional intellectual property protection and trade ecosystem.


2021 ◽  
Vol 12 (2) ◽  
pp. 157-163
Author(s):  
Ukoette Jeremiah Ekah ◽  
Chibuzo Emeruwa

The increase in the number of mobile subscribers, coupled with the increase in mobile services is enough reason to monitor the QoS of mobile network operators frequently. This work looks into the QoS of network operators in Calabar, Nigeria, taking into consideration some KPIs ((CSSR, DCR, CST, HOSR, and network quality and network coverage). Analysis of data obtained after a benchmarking drive test shows that Globacom network was within NCC performance threshold for all network KPIs monitored. Also, MTN network performed poorly in HOSR but met the minimum benchmark in other network KPIs. Airtel network failed in the required DCR benchmark but was within the minimum benchmark for other KPIs while 9mobile failed in CSSR and DCR performance threshold but met the performance threshold for other KPIs. This result will be useful to the regulatory body, NCC, those in academic, RF engineers, network subscribers and especially, the network operators which we expect, will optimize their networks immediately.


2019 ◽  
Vol 40 (1) ◽  
pp. 48-52 ◽  
Author(s):  
Peter Buell Hirsch

Purpose This viewpoint is intended to examine the issue of the monetization of personal data and the risks to companies that fail to understand this trend. Design/methodology/approach This paper reviews the recent literature on the use and abuse of personal data to identify relevant trends and issues. Findings It is likely, whether through blockchain technology or some other means, that individual consumers will be able to monetize their data. Research limitations/implications As a review of secondary sources rather than original sources, the findings are anecdotal and not comprehensive. Practical implications In the rapidly changing environment of data privacy and security, one should anticipate that the findings may become outdated by sudden events such as a new global data privacy breach. Social implications Ownership of personal data and its use or abuse is one of the single most important social issues in today’s world, with profound implications for civil society. Originality/value While there have been numerous studies cataloguing attempts to create monetization platforms for consumer data, there are not many studies on the reputational risks for companies in handling data from the Internet of Things.


2021 ◽  
Vol 11 (3) ◽  
pp. 1255
Author(s):  
Iago Sestrem Ochôa ◽  
Valderi Reis Quietinho Leithardt ◽  
Leonardo Calbusch ◽  
Juan Francisco De Paz Santana ◽  
Wemerson Delcio Parreira ◽  
...  

Since the early 2000s, life in cities has changed significantly due to the Internet of Things (IoT). This concept enables developers to integrate different devices collecting, storing, and processing a large amount of data, enabling new services to improve various professional and personal activities. However, privacy issues arise with a large amount of data generated, and solutions based on blockchain technology and smart contract have been developed to address these issues. Nevertheless, several issues must still be taken into account when developing blockchain architectures aimed at the IoT scenario because security flaws still exist in smart contracts, mainly due to the lack of ease when building the code. This article presents a blockchain storage architecture focused on license plate recognition (LPR) systems for smart cities focusing on privacy, performance, and security. The proposed architecture relies on the Ethereum platform. Each smart contract matches the privacy preferences of a license plate to be anonymized through public encryption. The storage of data captured by the LPR system can only be done if the smart contract enables it. However, in the case of motivation foreseen by the legislation, a competent user can change the smart contract and enable the storage of the data captured by the LPR system. Experimental results show that the performance of the proposed architecture is satisfactory, regarding the scalability of the built private network. Furthermore, tests on our smart contract using security and structure analysis tools on the developed script demonstrate that our solution is fraud-proof. The results obtained in all experiments bring evidence that our architecture is feasible to be used in real scenarios.


Sign in / Sign up

Export Citation Format

Share Document