scholarly journals Survey of distributed ledger technology integration challenges

Author(s):  
Maria Gorbunova ◽  
Aleksandr Ometov ◽  
Mikhail Komarov ◽  
Sergey Bezzateev

Introduction: Distributed ledger technology (DLT) is one of the most significant fields covering various aspects of modern ICT systems. Centralized systems of today can no longer guarantee the required level of availability and reliability, while broadly available distributed ones are still in the infancy. Purpose: Analysis of the applicability of DLT to various industries such as economics, energy, finance, logistics, and the Internet of Things. Results: The article outlines the main challenges of the DLT technology integration, such as the lack of a unified system for data storage, the need to ensure an appropriate level of data confidentiality, integration into the existing competency systems, the issues of а distributed system interaction with resource-constrained IoT devices, the lack of proper management tools for distributed systems, and network scalability. The main contribution of this paper is a systematic overview of the integration challenges followed by potential solutions and future perspectives.

Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4354
Author(s):  
Mohd Majid Akhtar ◽  
Danish Raza Rizvi ◽  
Mohd Abdul Ahad ◽  
Salil S. Kanhere ◽  
Mohammad Amjad ◽  
...  

A potential rise in interest in the Internet of Things in the upcoming years is expected in the fields of healthcare, supply chain, logistics, industries, smart cities, smart homes, cyber physical systems, etc. This paper discloses the fusion of the Internet of Things (IoT) with the so-called “distributed ledger technology” (DLT). IoT sensors like temperature sensors, motion sensors, GPS or connected devices convey the activity of the environment. Sensor information acquired by such IoT devices are then stored in a blockchain. Data on a blockchain remains immutable however its scalability still remains a challenging issue and thus represents a hindrance for its mass adoption in the IoT. Here a communication system based on IOTA and DLT is discussed with a systematic architecture for IoT devices and a future machine-to-machine (M2M) economy. The data communication between IoT devices is analyzed using multiple use cases such as sending DHT-11 sensor data to the IOTA tangle. The value communication is analyzed using a novel “micro-payment enabled over the top” (MP-OTT) streaming platform that is based on the “pay-as-you-go” and “consumption based” models to showcase IOTA value transactions. In this paper, we propose an enhancement to the classical “masked authenticated message” (MAM) communication protocol and two architectures called dual signature masked authenticated message (DSMAM) and index-based address value transaction (IBAVT). Further, we provided an empirical analysis and discussion of the proposed techniques. The implemented solution provides better address management with secured sharing and communication of IoT data, complete access control over the ownership of data and high scalability in terms of number of transactions that can be handled.


2020 ◽  
Vol 2 (1) ◽  
pp. 92
Author(s):  
Rahim Rahmani ◽  
Ramin Firouzi ◽  
Sachiko Lim ◽  
Mahbub Alam

The major challenges of operating data-intensive of Distributed Ledger Technology (DLT) are (1) to reach consensus on the main chain as a set of validators cast public votes to decide on which blocks to finalize and (2) scalability on how to increase the number of chains which will be running in parallel. In this paper, we introduce a new proximal algorithm that scales DLT in a large-scale Internet of Things (IoT) devices network. We discuss how the algorithm benefits the integrating DLT in IoT by using edge computing technology, taking the scalability and heterogeneous capability of IoT devices into consideration. IoT devices are clustered dynamically into groups based on proximity context information. A cluster head is used to bridge the IoT devices with the DLT network where a smart contract is deployed. In this way, the security of the IoT is improved and the scalability and latency are solved. We elaborate on our mechanism and discuss issues that should be considered and implemented when using the proposed algorithm, we even show how it behaves with varying parameters like latency or when clustering.


Author(s):  
Nikita Singh ◽  
Manu Vardhan

Blockchain-based distributed ledger technology (DLT) is transforming the existing operational models of economy, financial transactions and other government machineries so as to allow these to operate in a much more secure and decentralized manner. This research focuses on providing framework for decentralized and secure P2P infrastructure for handling e-stamp and property registration mechanism along with interface for verification of document originality. The proposed efficient consensus mechanism reduces the overhead of broadcasting a new block by more than 50% coupled with saving CPU computation power along with network bandwidth. To ensure that even people at remote locations with constrained resources are able to participate and harness these benefits, a cloud server architecture & web interface for verification of property registered deed is also proposed.


2021 ◽  
Vol 4 ◽  
pp. 45-69
Author(s):  
Houssein Hellani ◽  
Layth Sliman ◽  
Abed Ellatif Samhat ◽  
Ernesto Exposito

Modern IT technologies shaped the shift in economic models with many advantages on cost, optimization, and time to market. This economic shift has increased the need for transparency and traceability in supply chain platforms to achieve trust among partners. Distributed ledger technology (DLT) is proposed to enable supply chains systems with trust requirements. In this paper, we investigate the existing DLT-based supply chain projects to show their technical part and limitations and extract the tools and techniques used to avoid the DLT scalability issue. We then set the requirements for a typical DLT-based supply chain in this context. The analyses are based on the scalability metrics such as computing, data storage, and transaction fees that fit the typical supply chain system. This paper highlights the effects of Blockchain techniques on scalability and their incorporation in supply chains systems. It also presents other existing solutions that can be applied to the supply chain. The investigation shows the necessity of having such tools in supply chains and developing them to achieve an efficient and scalable system. The paper calls for further scalability enhancements throughout introducing new tools and/or reutilize the current ones. Doi: 10.28991/esj-2021-SP1-04 Full Text: PDF


IEEE Network ◽  
2020 ◽  
Vol 34 (1) ◽  
pp. 47-53 ◽  
Author(s):  
Pietro Danzi ◽  
Anders E. Kalor ◽  
Rene B. Sorensen ◽  
Alexander K. Hagelskjaer ◽  
Lam D. Nguyen ◽  
...  

Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1834
Author(s):  
Ikram Ullah ◽  
Gerard de Roode ◽  
Nirvana Meratnia ◽  
Paul Havinga

Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of existing security and trust mechanisms. Furthermore, the contemporaneous centralized technology is posing significant challenges viz scalability, transparency and efficiency to wide range of IoT applications such as smart logistics, where millions of IoT devices need to be connected simultaneously. Alternatively, IOTA is a distributed ledger technology that offers resilient security and trust mechanisms and a decentralized architecture to overcome IoT impediments. IOTA has already been implemented in many applications and has clearly demonstrated its significance in real-world applications. Like any other technology, IOTA unfortunately also encounters security vulnerabilities. The purpose of this study is to explore and highlight security vulnerabilities of IOTA and simultaneously demonstrate the value of threat modeling in evaluating security vulnerabilities of distributed ledger technology. IOTA vulnerabilities are scrutinized in terms of feasibility and impact and we have also presented prevention techniques where applicable. To identify IOTA vulnerabilities, we have examined existing literature and online blogs. Literature available on this topic is very limited so far. As far as we know IOTA has barely been addressed in the traditional journals, conferences and books. In total we have identified six vulnerabilities. We used Common Vulnerability Scoring System (CVSS v3.0) to further categorize these vulnerabilities on the basis of their feasibility and impact.


Sensors ◽  
2021 ◽  
Vol 21 (22) ◽  
pp. 7735
Author(s):  
Lucas Rodrigues ◽  
André Riker ◽  
Maria Ribeiro ◽  
Cristiano Both ◽  
Filipe Sousa ◽  
...  

This article presents an approach to autonomous flight planning of Unmanned Aerial Vehicles (UAVs)-Drones as data collectors to the Internet of Things (IoT). We have proposed a model for only one aircraft, as well as for multiple ones. A clustering technique that extends the scope of the number of IoT devices (e.g., sensors) visited by UAVs is also addressed. The flight plan generated from the model focuses on preventing breakdowns due to a lack of battery charge to maximize the number of nodes visited. In addition to the drone autonomous flight planning, a data storage limitation aspect is also considered. We have presented the energy consumption of drones based on the aerodynamic characteristics of the type of aircraft. Simulations show the algorithm’s behavior in generating routes, and the model is evaluated using a reliability metric.


2022 ◽  
pp. 1202-1221
Author(s):  
Görkem Giray

The internet of things (IoT) transforms the world in many ways. It combines many types of hardware and software with a variety of communication technologies to enable the development of innovative applications. A typical IoT system consists of IoT device, IoT gateway, IoT platform, and IoT application. Developing these elements and delivering an IoT system for fulfilling business requirements encompasses many activities to be executed and is not straightforward. To expedite these activities, some major vendors provide software development kits (SDK), integrated development environments (IDE), and utility tools for developing software to be executed on IoT devices/gateways. Moreover, these vendors utilize their cloud platforms to provide fundamental services, such as data storage, analytics, stream processing, for developing IoT systems. These vendors also developed IoT specific cloud-based services, such as connectivity and device management, to support IoT system development. This chapter presents an overview of tools and platforms provided by five major vendors.


Sensors ◽  
2020 ◽  
Vol 20 (12) ◽  
pp. 3358 ◽  
Author(s):  
Sergey Smetanin ◽  
Aleksandr Ometov ◽  
Mikhail Komarov ◽  
Pavel Masek ◽  
Yevgeni Koucheryavy

The present increase of attention toward blockchain-based systems is currently reaching a tipping point with the corporate focus shifting from exploring the technology potential to creating Distributed Ledger Technology (DLT)-based systems. In light of a significant number of already existing blockchain applications driven by the Internet of Things (IoT) evolution, the developers are still facing a lack of tools and instruments for appropriate and efficient performance evaluation and behavior observation of different blockchain architectures. This paper aims at providing a systematic review of current blockchain evaluation approaches and at identifying the corresponding utilization challenges and limitations. First, we outline the main metrics related to the blockchain evaluation. Second, we propose the blockchain modeling and analysis classification based on the critical literature review. Third, we extend the review with publicly accessible industrial tools. Next, we analyze the selected results for each of the proposed classes and outline the corresponding limitations. Finally, we identify current challenges of the blockchain analysis from the system evaluation perspective, as well as provide future perspectives.


Sign in / Sign up

Export Citation Format

Share Document