Achieving IoT data security based blockchain

被引:1
作者
Dan Liao
Hui Li
Wentao Wang
Xiong Wang
Ming Zhang
Xue Chen
机构
[1] University of Electronic Science and Technology of China,Key Lab of Optical Fiber Sensing and Communications (Ministry of Education)
[2] University of Electronic Science and Technology of China,Chengdu Research Institute
[3] University of Electronic Science and Technology of China,Tianfu Collaborative Innovation Center
来源
Peer-to-Peer Networking and Applications | 2021年 / 14卷
关键词
IoT; Blockchain; Data security; Consensus;
D O I
暂无
中图分类号
学科分类号
摘要
Security in Internet of Things (IoT) remains a significant concern within academia and industry. With the great potential of IoT data, the traditional centralized architecture of IoT system is limited and cannot afford security solutions. In this paper, to address the issue of IoT data security, we propose a blockchain-based data acquisition and processing architecture. The proposed architecture ensures IoT data security through data consistency. It supports distributed IoT nodes to negotiate consensus on the processed data, and decides to write the consensus data to blockchain ledger. Since distributed nodes are non-peer and have different voting weights in the proposed architecture, traditional consensus algorithms are not applicable. Therefore, we design a novel consensus algorithm for data consistency between non-peer nodes: Byzantine Fault-Tolerant consensus algorithm based on Dynamic Permission Adjustment (DPA-PBFT) algorithm. The DPA-PBFT algorithm works in the consensus domain of different weight nodes with the ability of self-optimize. It improves consensus efficiency and reduces communication overhead for data consistency. Finally, we conduct numerous experiments to evaluate the performance improvement of the DPA-PBFT algorithm under the proposed distributed architecture.
引用
收藏
页码:2694 / 2707
页数:13
相关论文
共 32 条
[1]  
Kharb S(2019)Fuzzy based priority aware scheduling technique for dense industrial IoT networks [J] J Netw Comput Appl 125 17-27
[2]  
Singhrova A(2019)Implementation of deep packet inspection in smart grids and industrial internet of things: challenges and opportunities [J] J Netw Comput Appl 135 32-46
[3]  
De La Torre G(2017)A review of smart home applications based on internet of things [J] J Netw Comput Appl 97 48-65
[4]  
Rad P(2019)Policy-based access control for constrained healthcare resources in the context of the internet of things [J] J Netw Comput Appl 139 57-74
[5]  
Choo KKR(2020)An overview on smart contracts: challenges, advances and platforms Future Generation Computer Systems 105 475-491
[6]  
Alaa M(2019)Blockchain for smart communities: applications, challenges and opportunities[J] J Netw Comput Appl 144 13-48
[7]  
Zaidan AA(2019)Controllable and trustworthy blockchain-based cloud data management Futur Gener Comput Syst 91 527-535
[8]  
Zaidan BB(2019)Blockchain in healthcare applications: research challenges and opportunities [J] J Netw Comput Appl 135 62-75
[9]  
Pal S(2020)Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts Computers & Security 97 101958-401
[10]  
Hitchens M(1982)The byzantine generals problem ACM Trans Program Lang Syst 4 382-5593