Preserving Edge Knowledge Sharing Among IoT Services: A Blockchain-Based Approach

被引:38
作者
Li, Gaolei [1 ,2 ,3 ]
Dong, Mianxiong [3 ]
Yang, Laurence T. [4 ]
Ota, Kaoru [3 ]
Wu, Jun [2 ,5 ]
Li, Jianhua [2 ,5 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[2] Shanghai Key Lab Integrated Adm Technol Informat, Shanghai 200240, Peoples R China
[3] Muroran Inst Technol, Muroran, Hokkaido 0508585, Japan
[4] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
[5] Shanghai Jiao Tong Univ, Sch Cyber Secur, Shanghai 200240, Peoples R China
来源
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE | 2020年 / 4卷 / 05期
基金
中国国家自然科学基金;
关键词
Edge computational intelligence; Internet of Things (IoT); blockchain; knowledge sharing; proof of popularity (PoP); INDUSTRIAL INTERNET; BIG DATA; SECURE; PRIVACY; NETWORKS; FEATURES; THINGS;
D O I
10.1109/TETCI.2019.2952587
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Edge computational intelligence, integrating artificial intelligence (AI) and edge computing into Internet of Things (IoT), will generate many scattered knowledge. To enable auditable and delay-sensitive IoT services, these knowledge will be shared among decentralized intelligent network edges (DINEs), end users, and supervisors frequently. Blockchain has a promising ability to provide a traceable, privacy-preserving and tamper-resistant ledger for sharing edge knowledge. However, due to the complicated environments of network edges, knowledge sharing among DINEs still faces many challenges. Firstly, the resource limitation and mobility of DINEs impede the applicability of existing consensus tricks (e.g., Poof of Work, Proof of Stake, and Paxos) of blockchain. Secondly, the adversaries may eavesdrop the content of edge knowledge or entice the blockchain to forks using some attacking models (like man-in-the-middle attack, denial of services, etc.). In this article, an user-centric blockchain (UCB) framework is proposed for preserving edge knowledge sharing in IoT. Significant superiorities of UCB benefit from the proof of popularity (PoP) consensus mechanism, which is more energy-efficient and fast. Security analysis and experiments based on Raspberry Pi 3 Model B demonstrate its feasibility with low block generating delay and complexity.
引用
收藏
页码:653 / 665
页数:13
相关论文
共 45 条
[1]   Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams [J].
Aitzhan, Nurzhan Zhumabekuly ;
Svetinovic, Davor .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) :840-852
[2]   Distributed Intelligence - Trends in the Management of Complex Systems [J].
Calo, Seraphin B. ;
Verma, Dinesh C. ;
Bertino, Elisa .
PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, :1-7
[3]   Secure group communication schemes for dynamic heterogeneous distributed computing [J].
Castiglione, Arcangelo ;
D'Arco, Paolo ;
De Santis, Alfredo ;
Russo, Rosario .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 74 :313-324
[4]   The future of geospatial intelligence [J].
Dold J. ;
Groopman J. .
Geo-Spatial Information Science, 2017, 20 (02) :151-162
[5]   Blockchain Technologies for the Internet of Things: Research Issues and Challenges [J].
Ferrag, Mohamed Amine ;
Derdour, Makhlouf ;
Mukherjee, Mithun ;
Derhab, Abdelouahid ;
Maglaras, Leandros ;
Janicke, Helge .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :2188-2204
[6]   Edge-centric Computing: Vision and Challenges [J].
Garcia Lopez, Pedro ;
Montresor, Alberto ;
Epema, Dick ;
Datta, Anwitaman ;
Higashino, Teruo ;
Iamnitchi, Adriana ;
Barcellos, Marinho ;
Felber, Pascal ;
Riviere, Etienne .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2015, 45 (05) :37-42
[7]   CESSNA: Resilient Edge-Computing [J].
Harchol, Yotam ;
Mushtaq, Aisha ;
McCauley, James ;
Panda, Aurojit ;
Shenker, Scott .
MECOMM'18: PROCEEDINGS OF THE 2018 WORKSHOP ON MOBILE EDGE COMMUNICATIONS, 2018, :1-6
[8]   A Portfolio Theory Approach to Edge Traffic Engineering via Bayesian Networks [J].
Hogan, Mary ;
Esposito, Flavio .
PROCEEDINGS OF THE 23RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM '17), 2017, :555-557
[9]   Local Electricity Storage for Blockchain-Based Energy Trading in Industrial Internet of Things [J].
Hou, Weigang ;
Guo, Lei ;
Ning, Zhaolong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (06) :3610-3619
[10]  
Hwang SJ, 2011, PROC CVPR IEEE, P1761, DOI 10.1109/CVPR.2011.5995543