IoTShare: A Blockchain-Enabled IoT Resource Sharing On-Demand Protocol for Smart City Situation-Awareness Applications

被引:28
作者
Hamdaoui, Bechir [1 ]
Alkalbani, Mohamed [2 ]
Rayes, Ammar [3 ]
Zorba, Nizar [4 ]
机构
[1] Oregon State Univ, Dept Elect & Comp Engn, Corvallis, OR 97331 USA
[2] Amazon Web Serv, Bellevue, WA USA
[3] Cisco Syst, Customer Experience Technol Off, San Jose, CA 95134 USA
[4] Qatar Univ, Dept Elect Engn, Doha, Qatar
基金
美国国家科学基金会;
关键词
Blockchain; Protocols; Urban areas; Cloud computing; Internet of Things; Resource management; Monitoring; Blockchains; Internet-of-Things (IoT) networks; smart cities;
D O I
10.1109/JIOT.2020.3004441
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a blockchain-based, distributed protocol for enabling the deployment of Internet-of-Things (IoT) networks on-demand on top of IoT devices. Specifically, the proposed protocol leverages blockchain technology to: 1) enable distributed and secure authentication, registration, and management of participatory IoT devices; 2) provide fast discovery of IoT resources and scalable and secure instantiation of IoT networks-on-demand; and 3) manage payment operations and ensure reliable fund transfers among the network entities. The proposed protocol relies on a peer-to-peer network communication infrastructure to allow communications among the IoT devices in a distributed manner and uses a self-recovery/self-healing mechanism to ensure robustness against device failure and maliciousness. The protocol also introduces and uses a reputation system to monitor registered devices to keep track of their service delivery quality so that their service delivery reputations could be leveraged for future device selection and mapping. We implemented and evaluated the proposed protocol intensively using simulations and showed that it scales well with network parameters, is resilient to faulty devices, and is robust to 51% attack.
引用
收藏
页码:10548 / 10561
页数:14
相关论文
共 26 条
[11]   A Survey on Long-Range Attacks for Proof of Stake Protocols [J].
Deirmentzoglou, Evangelos ;
Papakyriakopoulos, Georgios ;
Patsakis, Constantinos .
IEEE ACCESS, 2019, 7 :28712-28725
[12]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[13]   Unleashing the Power of Participatory IoT with Blockchains for Increased Safety and Situation Awareness of Smart Cities [J].
Hamdaoui, Bechir ;
Alkalbani, Mohamed ;
Znati, Taieb ;
Rayes, Ammar .
IEEE NETWORK, 2020, 34 (02) :202-209
[14]   Compressed Wideband Spectrum Sensing: Concept, Challenges, and Enablers [J].
Hamdaoui, Bechir ;
Khalfi, Bassem ;
Guizani, Mohsen .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (04) :136-141
[15]  
Hamdaoui B, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P120
[16]  
Huh S, 2017, INT CONF ADV COMMUN, P464, DOI 10.23919/ICACT.2017.7890132
[17]  
Karame G., 2012, Proceedings of the 2012 ACM conference on Computer and communications security, P906, DOI DOI 10.1145/2382196.2382292
[18]   Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol [J].
Kiayias, Aggelos ;
Russell, Alexander ;
David, Bernardo ;
Oliynykov, Roman .
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 :357-388
[19]   Blockchain and the Internet of Things in the Industrial Sector [J].
Laplante, Phillip A. ;
Amaba, Ben .
IT PROFESSIONAL, 2018, 20 (03) :15-18
[20]  
Nakamoto S., 2008, BITCOIN PEER TO PEER