scholarly journals A Zero-Proof Knowledge Based on NFC for Data Authentication/Protection using Blockchain for Mobile Edge Computing

2020 ◽  
Vol 8 (6) ◽  
pp. 2547-2552

Mobile edge computing is a recent trend to complement the Internet of Things (IoT) ecosystem in the computing sector. IoT is the internet connected communications related to physical devices and everyday objects. The emergence of intelligent living spaces has been due to the rapid development of IoT technologies. Blockchain is one such technology that expands the list of information also referred to like records that are saved as blocks in the Blockchain which are connected using cryptographic algorithms. Within a Blockchain IoT environment, when data or device authentication information is stored in a Blockchain, authentication information can be displayed when verifying Block chain’s transactions, which are also referred to as proof of work. A principle of Zero-knowledge proof (ZKF) is implemented in this paper which is a way of proving that knowledge is known without exposing any data to the user. The proposed model uses a Mobile application where users can prove without revealing users' passwords. Blockchain stores client information that can prevent data from being manipulated. The results of applying the ZKF theory for data security are shown through a web application and NFC.

2016 ◽  
Vol 5 (4) ◽  
pp. 84-91 ◽  
Author(s):  
Dario Sabella ◽  
Alessandro Vaillant ◽  
Pekka Kuure ◽  
Uwe Rauschenbach ◽  
Fabio Giust

2020 ◽  
Vol 2 (1) ◽  
pp. 1-12 ◽  
Author(s):  
Dr. Bhalaji N.

The technological improvement at a rapid pace in the information and the communication fields has made the internet of things inevitable in our day today activities and takes a significant role in the every part of our regular schedule. The seamless communication through the internet of things is made possible, by connecting the tangible things around resulting in the numerous of advantages such as timely information delivery, servicing and monitoring. The inbuilt benefits of the IOT has made it more prominent among a wide range of application resulting in a huge data flow, though the congestion in the dataflow are managed using the cloud computing and the alternative sources such as the edge computing , the security of the data that are used are still under research. To manage the huge data flow and have secure data utilization in the internet of things, the paper has put forth the mobile edge computing integrated with the data duplication process taking into consideration the power utilization and the response time. The proposed method is simulated using the Network Simulator-2 and results obtained shows that the duplication process provides an enhancement in the bandwidth utilization along with the cut down in the power consumption and the response time.


Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2042 ◽  
Author(s):  
Yiming Jiang ◽  
Chenxu Wang ◽  
Yawei Wang ◽  
Lang Gao

With the rapid development of the internet of things (IoT), traditional industries are setting off a massive wave of digitization. In the era of the Internet of Everything, millions of devices and links in IoT pose more significant challenges to data management. Most existing solutions employ centralized systems to control IoT devices, which brings about the privacy and security issues in IoT data management. Recently, blockchain has attracted much attention in the field of IoT due to its decentralization, traceability, and non-tamperability. However, it is non-trivial to apply the current blockchain techniques to IoT due to the lack of scalability and high resource costs. Different blockchain platforms have their particular advantages in the scenario of IoT data management. In this paper, we propose a cross-chain framework to integrate multiple blockchains for efficient and secure IoT data management. Our solution builds an interactive decentralized access model which employs a consortium blockchain as the control station. Other blockchain platforms customized for specific IoT scenarios run as the backbone of all IoT devices. It is equivalent to opening the off-chain channels on the consortium blockchain. Our model merges transactions in these channels for confirmation based on the notary mechanism. Finally, we implement a prototype of the proposed model based on hyperledge Fabric and IOTA Tangle. We evaluate the performance of our method through extensive experiments. The results demonstrate the effectiveness and efficiency of our framework.


Author(s):  
Dr. Wang Haoxiang

The Internet of things is the basic paradigm with the cluster of techniques that ensure innovations in the service rendered in various applications. It aims to develop a seamless connection between the tangible objects around and the information network in turn to provide a well-structured servicing to its users. Though the IOT service seems to be promising, the risks still prevail in the form of privacy and the security in user acceptance in utilizing the internet of things services, and its application. This makes the trust management very important for the internet of things. So the paper puts forth the distributed block chain involved trust system to manage the conveyance infrastructures of the internet of things paradigm. The evaluation of the proposed model evinces the enhanced security provided for the nodes of the IOT as well as its information exchange.


Sign in / Sign up

Export Citation Format

Share Document