Efficient Data Communication Using Distributed Ledger Technology and IOTA-Enabled Internet of Things for a Future Machine-to-Machine Economy

被引:13
|
作者
Akhtar, Mohd Majid [1 ]
Rizvi, Danish Raza [1 ]
Ahad, Mohd Abdul [2 ]
Kanhere, Salil S. [3 ]
Amjad, Mohammad [1 ]
Coviello, Giuseppe [4 ]
机构
[1] Jamia Millia Islamia, Dept Comp Engn, New Delhi 110025, India
[2] Jamia Hamdard, Dept Comp Sci & Engn, New Delhi 110062, India
[3] Univ New South Wales, Sch Comp Sci & Engn, Sydney, NSW 2052, Australia
[4] Polytech Univ Bari, Dept Elect & Informat Engn, I-70126 Bari, Italy
关键词
IoT; blockchain; DLT; IOTA; communication; security; privacy; scalability; BLOCKCHAIN; SECURITY; DEVICES; HEALTH;
D O I
10.3390/s21134354
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
A potential rise in interest in the Internet of Things in the upcoming years is expected in the fields of healthcare, supply chain, logistics, industries, smart cities, smart homes, cyber physical systems, etc. This paper discloses the fusion of the Internet of Things (IoT) with the so-called "distributed ledger technology" (DLT). IoT sensors like temperature sensors, motion sensors, GPS or connected devices convey the activity of the environment. Sensor information acquired by such IoT devices are then stored in a blockchain. Data on a blockchain remains immutable however its scalability still remains a challenging issue and thus represents a hindrance for its mass adoption in the IoT. Here a communication system based on IOTA and DLT is discussed with a systematic architecture for IoT devices and a future machine-to-machine (M2M) economy. The data communication between IoT devices is analyzed using multiple use cases such as sending DHT-11 sensor data to the IOTA tangle. The value communication is analyzed using a novel "micro-payment enabled over the top" (MP-OTT) streaming platform that is based on the "pay-as-you-go" and "consumption based" models to showcase IOTA value transactions. In this paper, we propose an enhancement to the classical "masked authenticated message" (MAM) communication protocol and two architectures called dual signature masked authenticated message (DSMAM) and index-based address value transaction (IBAVT). Further, we provided an empirical analysis and discussion of the proposed techniques. The implemented solution provides better address management with secured sharing and communication of IoT data, complete access control over the ownership of data and high scalability in terms of number of transactions that can be handled.
引用
收藏
页数:38
相关论文
共 50 条
  • [41] RETRACTED: Machine-Type Video Communication Using Pretrained Network for Internet of Things (Retracted Article)
    Li, Ran
    Hao, Peinan
    Sun, Fengyuan
    Li, Yanling
    You, Lei
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [42] Research on the Performance of Network Propagation by Using the Machine Learning and Internet-of-Things Technology Integrating Model
    Chen, Feng
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [43] Research on the Performance of Network Propagation by Using the Machine Learning and Internet-of-Things Technology Integrating Model
    Chen, Feng
    Computational Intelligence and Neuroscience, 2022, 2022
  • [44] Big Data in Memory: Benchimarking In Memory Database Using the Distributed Key-Value Store for Machine to Machine Communication
    Iwazume, Michiaki
    Iwase, Takahiro
    Tanaka, Kouji
    Fujii, Hideaki
    Hijiya, Makoto
    Haraguchi, Hiroshi
    2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 467 - 473
  • [45] RETRACTED: Development of intrusion detection system using machine learning for the analytics of Internet of Things enabled enterprises (Retracted Article)
    Raghavendra, S.
    Dhabliya, Dharmesh
    Mondal, Dipannita
    Omarov, Batyrkhan
    Sankaran, Krishnan Sakthidasan
    Dhablia, Anishkumar
    Chaudhury, Sushovan
    Shabaz, Mohammad
    IET COMMUNICATIONS, 2023, 17 (13) : 1619 - 1625
  • [46] Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques
    Mihoub, Alaeddine
    Ben Fredj, Ouissem
    Cheikhrouhou, Omar
    Derhab, Abdelouahid
    Krichen, Moez
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
  • [47] Understanding and Personalising Smart City Services Using Machine Learning, the Internet-of-Things and Big Data
    Chin, Jeannette
    Callaghan, Vic
    Lam, Ivan
    2017 IEEE 26TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2017, : 2050 - 2055
  • [48] A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things
    Hao Xu
    Zihan Sun
    Yuan Cao
    Hazrat Bilal
    Soft Computing, 2023, 27 : 14469 - 14481
  • [49] A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things
    Xu, Hao
    Sun, Zihan
    Cao, Yuan
    Bilal, Hazrat
    SOFT COMPUTING, 2023, 27 (19) : 14469 - 14481
  • [50] A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions
    Asharf, Javedz
    Moustafa, Nour
    Khurshid, Hasnat
    Debie, Essam
    Haider, Waqas
    Wahab, Abdul
    ELECTRONICS, 2020, 9 (07)