Trusted Blockchain-Driven IoT Security Consensus Mechanism

被引:7
作者
Wang, Chuansheng [1 ]
Tan, Xuecheng [1 ]
Yao, Cuiyou [1 ]
Gu, Feng [2 ]
Shi, Fulei [1 ]
Cao, Haiqing [1 ]
机构
[1] Capital Univ Econ & Business, Sch Management & Engn, Beijing 100070, Peoples R China
[2] CUNY, Dept Comp Sci, Coll Staten Isl, New York, NY 10314 USA
关键词
blockchain; IoT; rrust model; PoT;
D O I
10.3390/su14095200
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Single point of failure and node attack tend to cause instability in the centralized Internet of Things (IoT). Combined with blockchain technology, the deficiency of traditional IoT architecture can be effectively alleviated. However, the existing blockchain consensus mechanism still has the problems of forks and wasting of computing power. Therefore, this paper proposes a new framework based on a two-stage credit calculation to handle these problems. Notably, the nodes are selected through the model, and these nodes will compete on the chain according to the behavior of participating in the creation of the block. Then, a comparative simulation with the existing consensus mechanism proof of work (PoW) is presented. The results show that the proposed framework can quickly eliminate malicious nodes, maintain the overall security of the blockchain and reduce consensus delay.
引用
收藏
页数:14
相关论文
共 32 条
[1]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[2]   Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT) [J].
Alshehri, Mohammad Dahman ;
Hussain, Farookh Khadeer ;
Hussain, Omar Khadeer .
MOBILE NETWORKS & APPLICATIONS, 2018, 23 (03) :419-431
[3]  
Barhanpure A., 2019, 6 INT S SEC COMP COM, P104, DOI [10.1007/978-981-13-5826-5_8, DOI 10.1007/978-981-13-5826-58]
[4]   On Security Analysis of Proof-of-Elapsed-Time (PoET) [J].
Chen, Lin ;
Xu, Lei ;
Shah, Nolan ;
Gao, Zhimin ;
Lu, Yang ;
Shi, Weidong .
STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2017, 2018, 10616 :282-297
[5]  
Dorri Ali, 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P618, DOI 10.1109/PERCOMW.2017.7917634
[6]  
Eyal I, 2016, 13TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI '16), P45
[7]   Using Blockchain in a Reputation-Based Model for Grouping Agents in the Internet of Things [J].
Fortino, Giancarlo ;
Messina, Fabrizio ;
Rosaci, Domenico ;
Sarne, Giuseppe M. L. .
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2020, 67 (04) :1231-1243
[8]   Treatment by Posaconazole Tablets, Compared to Posaconazole Suspension, Does Not Reduce Variability of Posaconazole Trough Concentrations [J].
Gautier-Veyret, Elodie ;
Bolcato, Lea ;
Roustit, Matthieu ;
Weiss, Stephanie ;
Tonini, Julia ;
Brenier-Pinchart, Marie-Pierre ;
Cornet, Muriel ;
Thiebaut-Bertrand, Anne ;
Stanke-Labesque, Francoise .
ANTIMICROBIAL AGENTS AND CHEMOTHERAPY, 2019, 63 (10)
[9]   Towards Secure Industrial IoT: Blockchain System With Credit-Based Consensus Mechanism [J].
Huang, Junqin ;
Kong, Linghe ;
Chen, Guihai ;
Wu, Min-You ;
Liu, Xue ;
Zeng, Peng .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (06) :3680-3689
[10]   A Framework for Malicious Traffic Detection in IoT Healthcare Environment [J].
Hussain, Faisal ;
Abbas, Syed Ghazanfar ;
Shah, Ghalib A. ;
Pires, Ivan Miguel ;
Fayyaz, Ubaid U. ;
Shahzad, Farrukh ;
Garcia, Nuno M. ;
Zdravevski, Eftim .
SENSORS, 2021, 21 (09)