scholarly journals Hierarchical Multi-Blockchain Architecture for Scalable Internet of Things Environment

Electronics ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 1050 ◽  
Author(s):  
Yustus Eko Oktian ◽  
Sang-Gon Lee ◽  
Hoon Jae Lee

Many researchers challenge the possibility of using blockchain and smart contracts to disrupt the Internet of Things (IoT) architecture because of their security and decentralization guarantees. However, the state-of-the-art blockchain architecture is not scalable enough to satisfy the requirements of massive data traffics in the IoT environment. The main reason for this issue is one needs to choose the consensus trade-off between either coping with a high throughput or a high number of nodes. Consequently, this issue prevents the applicability of blockchain for IoT use cases. In this paper, we propose a scalable two-tiered hierarchical blockchain architecture for IoT. The first tier is a Core Engine, which is based on a Practical Byzantine Fault Tolerance (PBFT) consensus to cope with a high throughput, that supervises the underlying subordinate engines (sub-engines) as its second tier. This second tier comprises of the Payment, Compute, and Storage Engine, respectively. We can deploy multiple instances of these sub-engines as many as we need and as local as possible near to the IoT domains, where IoT devices reside, to cope with a high number of nodes. Furthermore, to further extend the scalability of the proposed architecture, we also provide additional scalability features on the Core Engine such as request aggregation, request prioritization, as well as sub-engine parallelism. We implement all of our engines and expose them to IoT applications through the Engine APIs. With these APIs, developers can build and run IoT applications in our architecture. Our evaluation results show that our proposed features on the Core Engine can indeed enhance the overall performance of our architecture. Moreover, based on our proof-of-concept IoT car rental application, we also show that the interoperability between sub-engines through the Core Engine is possible, even when the particular sub-engine is under sub-engine parallelism.

Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6441 ◽  
Author(s):  
Salam Hamdan ◽  
Moussa Ayyash ◽  
Sufyan Almajali

The rapid growth of the Internet of Things (IoT) applications and their interference with our daily life tasks have led to a large number of IoT devices and enormous sizes of IoT-generated data. The resources of IoT devices are limited; therefore, the processing and storing IoT data in these devices are inefficient. Traditional cloud-computing resources are used to partially handle some of the IoT resource-limitation issues; however, using the resources in cloud centers leads to other issues, such as latency in time-critical IoT applications. Therefore, edge-cloud-computing technology has recently evolved. This technology allows for data processing and storage at the edge of the network. This paper studies, in-depth, edge-computing architectures for IoT (ECAs-IoT), and then classifies them according to different factors such as data placement, orchestration services, security, and big data. Besides, the paper studies each architecture in depth and compares them according to various features. Additionally, ECAs-IoT is mapped according to two existing IoT layered models, which helps in identifying the capabilities, features, and gaps of every architecture. Moreover, the paper presents the most important limitations of existing ECAs-IoT and recommends solutions to them. Furthermore, this survey details the IoT applications in the edge-computing domain. Lastly, the paper recommends four different scenarios for using ECAs-IoT by IoT applications.


Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


Author(s):  
Saravanan K ◽  
P. Srinivasan

Cloud IoT has evolved from the convergence of Cloud computing with Internet of Things (IoT). The networked devices in the IoT world grow exponentially in the distributed computing paradigm and thus require the power of the Cloud to access and share computing and storage for these devices. Cloud offers scalable on-demand services to the IoT devices for effective communication and knowledge sharing. It alleviates the computational load of IoT, which makes the devices smarter. This chapter explores the different IoT services offered by the Cloud as well as application domains that are benefited by the Cloud IoT. The challenges on offloading the IoT computation into the Cloud are also discussed.


2016 ◽  
Vol 2016 (DPC) ◽  
pp. 002111-002130 ◽  
Author(s):  
Bruce C Kim ◽  
Saikat Mondal

This paper describes the design of a Through Silicon Via based high density 3D inductors for Internet of Things (IoT) applications. We present some possible challenges for TSV-based inductors in IoT applications. The current trend towards Internet of Things (IOT), System in Package (SiP) and Package-on-Package (PoP) requires meeting the power requirements of heterogeneous technologies while maintaining minimum package size. 3-D chip stacking has emerged as one of the potential solutions due to its high density integration in a 3D power electronics packaging regime. As an integral part of many power electronics applications, TSV-based inductors are becoming a popular choice because of their high inductance density due to the reduced on-chip footprint compared to conventional planar inductors. Depending on the requirement, values of these inductors could range from a few nanohenries to hundreds of microhenries. Small inductors with a high quality factor are mainly used for RF filter applications, whereas large inductors are used in power electronics packaging. For high inductance it is necessary to use ferromagnetic materials. A conventional ferromagnetic metal core like nickel could offer high permeability, which can help to boost the inductance. However, the magnetic field lines within a metal core induce eddy current which can have multiple adverse effect in power electronics packaging. For example, it has long been known that the current can increase the resistance in transformer winding [1]. Eddy current can also heat up the core of the inductor which makes the heat sink process in 3D packaging even more challenging. One way to decrease the eddy current, is to pattern and laminate the core block into multiple segments orthogonal to the direction of the magnetic field line [2]. Another method is to increase the resistivity of the core material so that the eddy current is limited to a very small magnitude [3].


2018 ◽  
Vol 2018 ◽  
pp. 1-9 ◽  
Author(s):  
Yunru Zhang ◽  
Debiao He ◽  
Kim-Kwang Raymond Choo

Internet of Things (IoT) and cloud computing are increasingly integrated, in the sense that data collected from IoT devices (generally with limited computational and storage resources) are being sent to the cloud for processing, etc., in order to inform decision making and facilitate other operational and business activities. However, the cloud may not be a fully trusted entity, like leaking user data or compromising user privacy. Thus, we propose a privacy-preserving and user-controlled data sharing architecture with fine-grained access control, based on the blockchain model and attribute-based cryptosystem. Also, the consensus algorithm in our system is the Byzantine fault tolerance mechanism, rather than Proof of Work.


2019 ◽  
Vol 2019 ◽  
pp. 1-19 ◽  
Author(s):  
Zeeshan Ali Khan ◽  
Peter Herrmann

Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms on the nodes, making IoT applications quite vulnerable to different types of attacks. This holds particularly for intrusion detection systems (IDS) that are usually too resource-heavy to be handled by small IoT devices. Thus, many IoT systems are not sufficiently protected against typical network attacks like Denial-of-Service (DoS) and routing attacks. On the other side, IDSs have already been successfully used in adjacent network types like Mobile Ad hoc Networks (MANET), Wireless Sensor Networks (WSN), and Cyber-Physical Systems (CPS) which, in part, face limitations similar to those of IoT applications. Moreover, there is research work ongoing that promises IDSs that may better fit to the limitations of IoT devices. In this article, we will give an overview about IDSs suited for IoT networks. Besides looking on approaches developed particularly for IoT, we introduce also work for the three similar network types mentioned above and discuss if they are also suitable for IoT systems. In addition, we present some suggestions for future research work that could be useful to make IoT networks more secure.


Author(s):  
Mamata Rath ◽  
Bibudhendu Pati

Adoption of Internet of Things (IoT) and Cloud of Things (CoT) in the current developing technology era are expected to be more and more invasive, making them important mechanism of the future Internet-based communication systems. Cloud of Things and Internet of Things (IoT) are two emerging as well as diversified advanced domains that are diversified in current technological scenario. Paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a large number of application scenarios. Due to the adoption of the Cloud and IoT paradigm a number of applications are gaining important technical attention. In the future, it is going to be more complicated a setup to handle security in technology. Information till now will severely get changed and it will be very tough to keep up with varying technology. Organisations will have to repeatedly switch over to new skill-based technology with respect to higher expenditure. Latest tools, methods and enough expertise are highly essential to control threats and vulnerability to computing systems. Keeping in view the integration of Cloud computing and IoT in the new domain of Cloud of things, the said article provides an up-to-date eminence of Cloud-based IoT applications and Cloud of Things with a focus on their security and application-oriented challenges. These challenges are then synthesized in detail to present a technical survey on various issues related to IoT security, concerns, adopted mechanisms and their positive security assurance using Cloud of Things.


Electronics ◽  
2020 ◽  
Vol 9 (11) ◽  
pp. 1925
Author(s):  
Soe Ye Yint Tun ◽  
Samaneh Madanian ◽  
Dave Parry

The elderly population is increasing globally, putting more pressure on aged care and public health systems. To address this issue and help increase the independence of older people, different digital technologies, including the Internet of things (IoT), can play an important role. Although there has been an increase in the number of studies in this field, most of them concentrate on IoT applications in elderly care from a technology perspective, with very little contribution from the clinical side. Therefore, this paper aims to investigate and identify the available IoT applications and their clinical utility for common diseases in elderly people. The results of this study could be useful for information technology professionals in developing and understanding the clinical requirements for IoT applications in healthcare for older people. Clinicians will also be informed about the clinical possibilities of using IoT devices in this area. Based on our findings, future research should focus on enhancing the clinical utility of current IoT applications in different settings and on developing new applications to support practitioners and older people.


Sensors ◽  
2020 ◽  
Vol 20 (23) ◽  
pp. 6846
Author(s):  
Ngoc-Thanh Dinh ◽  
Young-Han Kim

Existing caching mechanisms considers content objects individually without considering the semantic correlation among content objects. We argue that this approach can be inefficient in Internet of Things due to the highly redundant nature of IoT device deployments and the data accuracy tolerance of IoT applications. In many IoT applications, an approximate answer is acceptable. Therefore, a cache of an information object having a high semantic correlation with the requested information object can be used instead of a cache of the exact requested information object. In this case, caching both of the information objects can be inefficient and redundant. This paper proposes a caching retrieval scheme which considers the semantic information correlation of information objects of nodes for cache retrieval. We illustrate the benefits of considering the semantic information correlation in caching by studying IoT data caching at the edge. Our experiments and analysis show that semantic correlated caching can significantly improve the efficiency, cache hit, and reduce the resource consumption of IoT devices.


2018 ◽  
Vol 38 (1) ◽  
pp. 121-129 ◽  
Author(s):  
Pablo Antonio Pico Valencia ◽  
Juan A. Holgado-Terriza ◽  
Deiver Herrera-Sánchez ◽  
José Luis Sampietro

Recently, the scientific community has demonstrated a special interest in the process related to the integration of the agent-oriented technology with Internet of Things (IoT) platforms. Then, it arises a novel approach named Internet of Agents (IoA) as an alternative to add an intelligence and autonomy component for IoT devices and networks. This paper presents an analysis of the main benefits derived from the use of the IoA approach, based on a practical point of view regarding the necessities that humans demand in their daily life and work, which can be solved by IoT networks modeled as IoA infrastructures. It has been presented 24 study cases of the IoA approach at different domains ––smart industry, smart city and smart health wellbeing–– in order to define the scope of these proposals in terms of intelligence and autonomy in contrast to their corresponding generic IoT applications.


Sign in / Sign up

Export Citation Format

Share Document