Comparative study on hash functions for lightweight blockchain in Internet of Things (IoT)

被引:23
作者
Alfrhan, Aishah [1 ]
Moulahi, Tarek [1 ]
Alabdulatif, Abdulatif [2 ]
机构
[1] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah 51013, Saudi Arabia
[2] Qassim Univ, Coll Comp, Dept Comp Sci, Buraydah 51013, Saudi Arabia
来源
BLOCKCHAIN-RESEARCH AND APPLICATIONS | 2021年 / 2卷 / 04期
关键词
Lightweight blockchain; Internet of Things (IoT); Hash; Cybersecurity;
D O I
10.1016/j.bcra.2021.100036
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last few years, there has been a great interest in the Internet of Things (IoT). This is mainly because the IoT interacts directly with people's everyday lives in critical applications, such as in smart homes and healthcare applications. IoT devices typically have a resource-constrained architecture, rendering them vulnerable to cyberattacks. Accordingly, smart devices and stored data need to be secured through lightweight and energy-efficient security solutions, which have been identified as the main challenge facing adoption of IoT systems. To address this problem, a disruptive technology (blockchain) has been foreseen by the industry and research community as being able to deliver secure, fast, reliable, and transparent solutions for IoT systems. Hence, this work investigates the adoption of lightweight blockchain technology, mainly as a method of securing IoT systems. Because hashing plays a major role in creating a robust blockchain structure, we select a number of different hash techniques to be executed on a Raspberry Pi device. In summation, this work provides a numerical study to evaluate the performance of well-known hash functions that can be used for lightweight blockchain-based IoT.
引用
收藏
页数:7
相关论文
共 38 条
  • [1] [Anonymous], 2017, PyeongChang, Republic of Korea
  • [2] [Anonymous], 2005, IEEE 38 HAWAII INT C
  • [3] Balasch Josep, 2012, Smart Card Research and Advanced Applications. 11th International Conference (CARDIS 2012). Revised Selected Papers, P158, DOI 10.1007/978-3-642-37288-9_11
  • [4] Bertoni G., 2009, Keccak sponge function family main document
  • [5] NIST (Round 2),, V3, P320
  • [6] Bertoni G, 2013, LECT NOTES COMPUT SC, V7881, P313, DOI 10.1007/978-3-642-38348-9_19
  • [7] Buterin V., 2015, ETHEREUM BLOG
  • [8] Cheng H., 2018, SECITC 2018 INNOVATI, P273
  • [9] Conoscenti M, 2016, I C COMP SYST APPLIC
  • [10] Courtois N.T., 2014, INT C CRYPT SEC SYST, P131, DOI [10.1007/978-3-662-44893-9_12, DOI 10.1007/978-3-662-44893-9_12]