scholarly journals Efficient Byzantine Consensus Mechanism Based on Reputation in IoT Blockchain

2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xu Yuan ◽  
Fang Luo ◽  
Muhammad Zeeshan Haider ◽  
Zhikui Chen ◽  
Yucheng Li

Blockchain technology has advanced rapidly in recent years and is now widely used in a variety of fields. Blockchain appears to be one of the best solutions for managing massive heterogeneous devices while achieving advanced data security and data reputation, particularly in the field of large-scale IoT (Internet of Things) networks. Despite the numerous advantages, there are still challenges while deploying IoT applications on blockchain systems due to the limited storage, power, and computing capability of IoT devices, and some of these problems are caused by the consensus algorithm, which plays a significant role in blockchain systems by ensuring overall system reliability and robustness. Nonetheless, most existing consensus algorithms are prone to poor node reliability, low transaction per second (TPS) rates, and scalability issues. Aiming at some critical problems in the existing consensus algorithms, this paper proposes the Efficient Byzantine Reputation-based Consensus (EBRC) mechanism to resolve the issues raised above. In comparison to traditional algorithms, we reinvented ways to evaluate node reliability and robustness and manage active nodes. Our experiments show that the EBRC algorithm has lower consensus delay, higher throughput, improved security, and lower verification costs. It offers new reference ideas for solving the Internet of Things+blockchain+Internet court construction problem.

2015 ◽  
Vol 2015 ◽  
pp. 1-16 ◽  
Author(s):  
Floris Van den Abeele ◽  
Jeroen Hoebeke ◽  
Ingrid Moerman ◽  
Piet Demeester

As the Internet of Things continues to expand in the coming years, the need for services that span multiple IoT application domains will continue to increase in order to realize the efficiency gains promised by the IoT. Today, however, service developers looking to add value on top of existing IoT systems are faced with very heterogeneous devices and systems. These systems implement a wide variety of network connectivity options, protocols (proprietary or standards-based), and communication methods all of which are unknown to a service developer that is new to the IoT. Even within one IoT standard, a device typically has multiple options for communicating with others. In order to alleviate service developers from these concerns, this paper presents a cloud-based platform for integrating heterogeneous constrained IoT devices and communication models into services. Our evaluation shows that the impact of our approach on the operation of constrained devices is minimal while providing a tangible benefit in service integration of low-resource IoT devices. A proof of concept demonstrates the latter by means of a control and management dashboard for constrained devices that was implemented on top of the presented platform. The results of our work enable service developers to more easily implement and deploy services that span a wide variety of IoT application domains.


Author(s):  
Aleksandar Tošić ◽  
Jernej Vičič ◽  
Michael David Burnard ◽  
Michael Mrissa

The Internet of Things (IoT) is experiencing widespread adoption across industry sectors ranging from supply chain management to smart cities, buildings, and health monitoring. However, most software architectures for IoT deployment rely on centralized cloud computing infrastructures to provide storage and computing power, as cloud providers have high economic incentives to organize their infrastructure into clusters. Despite these incentives, there has been a recent shift from centralized to decentralized architecture that harnesses the potential of edge devices, reduces network latency, and lowers infrastructure cost to support IoT applications. This shift has resulted in new edge computing architectures, but many still rely on centralized solutions for managing applications. A truly decentralized approach would offer interesting properties required for IoT use cases. To address these concerns, we introduce a decentralized architecture tailored for large scale deployments of peer-to-peer IoT sensor networks and capable of run-time application migration. The solution combines a blockchain consensus algorithm and verifiable random functions to ensure scalability, fault tolerance, transparency, and no single point of failure. We build on our previously presented theoretical simulations with many protocol improvements and an implementation tested in a use case related to monitoring a Slovenian cultural heritage building located in Bled, Slovenia.


2021 ◽  
Author(s):  
Mehdia Ajana El Khaddar

The Internet of Things (IoT), along with its wider variants including numerous technologies, things, and people: the Internet of Everything (IoE) and the Internet of Nano Things (IoNT), are considered as part of the Internet of the future and ubiquitous computing allowing the communication among billions of smart devices and objects, and have recently drawn a very significant research attention. In these approaches, there are varieties of heterogeneous devices empowered by new capabilities and interacting with each other to achieve specific applications in different domains. A middleware layer is therefore required to abstract the physical layer details of the smart IoT devices and ease the complex and challenging task of developing multiple backend applications. In this chapter, an overview of IoT technologies, architecture, and main applications is given first and then followed by a comprehensive survey on the most recently used and proposed middleware solutions designed for IoT networks. In addition, open issues in IoT middleware design and future works in the field of middleware development are highlighted.


Author(s):  
Rajalakshmi Krishnamurthi ◽  
Tuhina Shree

Blockchain is the world's most trusted service. It serves as a ledger that allows transaction to take place in a decentralized manner. There are so many applications based on blockchain technology, including those covering numerous fields like financial services, non-financial services, internet of things (IoT), and so on. Blockchain combines a distributed database and decentralized ledger without the need of verification by central authority. This chapter surveys the different consensus algorithms, blockchain challenges, and their scope. There are still many challenges of this technology, such as scalability and security problems, waiting to be overcome. The consensus algorithms of blockchain are proof of work (POW), proof of stake (POS), ripple protocol consensus algorithm (RPCA), delegated proof of stake (dPOS), stellar consensus protocol (SCP), and proof of importance (POI). This chapter discusses the core concept of blockchain and some mining techniques, consensus problems, and consensus algorithms and comparison algorithms on the basis of performance.


Author(s):  
Ambika N.

The internet of things is the technology that aims to provide a common platform to the devices of varying capabilities to communicate. Industrial internet of things (IIoT) systems can perform better using these devices in combination with SDN network and blockchain technology. The suggestion uses random space learning (RSL) comprising three stages. The random subspace learning strategy is a troupe learning procedure called attributes bagging. It improves forecast and order errands as it utilizes group development of base classifiers rather than a solitary classifier, and it takes arbitrary subsets of properties rather than the whole arrangement of attributes. The system uses the blockchain methodology to secure the system. SDN networks aim to better the transmission of data in industrial IoT devices. Misrouting and forged attacks are some of the common attacks in these systems. The proposal provides better reliability than the previous contribution by 2.7%.


Electronics ◽  
2019 ◽  
Vol 8 (7) ◽  
pp. 752 ◽  
Author(s):  
Ye-Jin Choi ◽  
Hee-Jung Kang ◽  
Il-Gu Lee

The Internet of things (IoT) technology, which is currently considered the new growth engine of the fourth industrial revolution, affects our daily life and has been applied to various industrial fields. Studies on overcoming the limitations of scalability and stability in a centralized IoT operating environment by employing distributed blockchain technology have been actively conducted. However, the nature of IoT that ensures connectivity with multiple objects at any time and any place increases security threats. Further, it extends the influence of the cyber world into the physical domain, resulting in serious damage to human life and property. Therefore, we aim to study a method to increase the security of IoT devices and effectively extend them simultaneously. To this end, we analyze the authentication methods and limitations of traditional IoT devices and examine cases for improving IoT environments by using blockchain technology. Accordingly, we propose a framework that allows IoT devices to be securely connected and extended to other devices by automatically evaluating security using blockchain technology and the whitelist. The method proposed in this paper restricts the extension of devices vulnerable to security risks by imposing penalties and allows only devices with high security to be securely and quickly authenticated and extended without user intervention. In this study, we applied the proposed method to IoT network simulation environments and observed that the number of devices vulnerable to security was reduced by 48.5% compared with traditional IoT environments.


Author(s):  
Rajalakshmi Krishnamurthi ◽  
Tuhina Shree

Blockchain is the world's most trusted service. It serves as a ledger that allows transaction to take place in a decentralized manner. There are so many applications based on blockchain technology, including those covering numerous fields like financial services, non-financial services, internet of things (IoT), and so on. Blockchain combines a distributed database and decentralized ledger without the need of verification by central authority. This chapter surveys the different consensus algorithms, blockchain challenges, and their scope. There are still many challenges of this technology, such as scalability and security problems, waiting to be overcome. The consensus algorithms of blockchain are proof of work (POW), proof of stake (POS), ripple protocol consensus algorithm (RPCA), delegated proof of stake (dPOS), stellar consensus protocol (SCP), and proof of importance (POI). This chapter discusses the core concept of blockchain and some mining techniques, consensus problems, and consensus algorithms and comparison algorithms on the basis of performance.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 274 ◽  
Author(s):  
Ms U. Harita ◽  
K V.DayaSagar

The Internet of Things (IoT) introduces an inventive and perceptive of a future Internet where users, computing systems, and everyday items owning sensing and actuating abilities cooperate with unique comfort and financial advantages. Many heterogeneous devices get connected and contribute to the IoT and are known as things.Internet of Things (IoT) enables these things to correspond, compute and make decisions on the network. In such a heterogeneous environment, every user of IoT will have a unique purpose to be served in the form of communication and computation. There is a threat that a malicious user can demolish the security and privacy of the network. Hence any application in the environment of IoT is prone to various attacks and threats. At this point, security becomes a high priority in IoT. To ensure security, care must be taken to guarantee confidentiality, authenticity, data integrity and non-repudiation. In this paperaddress various conventional techniques for providing security of IoT devices and present analysis of existing solutions for IoT. Firstly, as security will be a fundamental allowing thing of most IoT applications, mechanisms must also be designed to defend communications enabled by such technologies. Later, we identify some suitable security algorithms.


Author(s):  
I.O. Sushyn ◽  
D.A. Minochkin

The article considers the method of increasing the security of Internet of Things technologies. Users fear the consequences of Internet security violations. Therefore, digital security must be designed from zero and at all points of the system so vulnerabilities do not jeopardize the whole system in a certain part. The risk must be reduced throughout the life cycle, especially in view of its scaling and geographical expansion. The Internet of Things consists of a large number of inexpensive devices. IoT devices usually have limited memory and battery power, which gives very limited computing and communication capabilities. The use of encryption/decryption algorithms should not require large resources, and the frequency range is limited. It is also a large-scale network that supports mass connections. Network transmission protocols must include many new features, such as multi-transient routing, shared relay, dynamic access, and other to meet this demand. It is extremely difficult to manage and distribute private keys with this network setup. A variety of usage scenarios require different QoS and security levels. Nowadays IoT plays an important role in many scenarios and has great potential for further dissemination. There is a need to increase the efficiency of a particular enterprise, processes, so the number of interactive things that create smart areas (houses, offices, warehouses, cities) is growing. The implementation of this areas reaches a variety of technologies, which vulnerable from the found attacks over time, leading to significant losses, as data and time. There are many suggestions that address target issue after finding a vulnerability, but this may not be effective enough. Therefore, it was proposed to create a method that can solve a set of problems simultaneously by combining PKI secure authentication and honeypots. It will not only detect new vulnerabilities and attacks faster, but also waste attackers' resources (all captured attacks will be identified and attacker profiles created).


Electronics ◽  
2021 ◽  
Vol 10 (14) ◽  
pp. 1730
Author(s):  
Seungnam Han ◽  
Yonggu Lee ◽  
Jinho Choi ◽  
Euiseok Hwang

In this paper, we propose a lightweight physical layer aided authentication and key agreement (PL-AKA) protocol in the Internet of Things (IoT). The conventional evolved packet system AKA (EPS-AKA) used in long-term evolution (LTE) systems may suffer from congestion in core networks by the large signaling overhead as the number of IoT devices increases. Thus, in order to alleviate the overhead, we consider cross-layer authentication by integrating physical layer approaches to cryptography-based schemes. To demonstrate the feasibility of the PL-AKA, universal software radio peripheral (USRP) based tests are conducted as well as numerical simulations. The proposed scheme shows a significant reduction in the signaling overhead, compared to the conventional EPS-AKA in both the simulation and experiment. Therefore, the proposed lightweight PL-AKA has the potential for practical and efficient implementation of large-scale IoT networks.


Sign in / Sign up

Export Citation Format

Share Document