Abstract
With the fast development of mobile Internet, Internet of Things (IoT) has been found in many important applications recently. However, it still faces many challenges in security and privacy. Blockchain (BC) technology, which underpins the cryptocurrency Bitcoin, has played an important role in the development of decentralized and data intensive applications running on millions of devices. In this paper, to establish the relationship between IoT and BC for device credibility verification, we propose a framework with layers, intersect, and self-organization Blockchain Structures (BCS). In this new framework, each BCS is organized by Blockchain technology. We describe the credibility verification method and show how it provide the verification. The efficiency and security analysis are also given in this paper, including its response time, storage efficiency, and verification. The conducted experiments have been shown to demonstrate the validity of the proposed method in satisfying the credible requirement achieved by Blockchain technology and certain advantages in storage space and response time.
Highlights
The Internet of things (IoT) is a worldwide network of interconnected objects and humans, which through unique address schemes are able to interact with each other and cooperate with their neighbours to reach common goals [1]
In our previous work [26, 27], we proposed a model of transactions on the Semantic Web of Things (SWoT) to satisfy the needs of intelligent IoT
The main contribution of this paper is to propose a novel credibility verification method based on Blockchain technology for IoT entities
Summary
The IoT consists of devices that generate, process, and exchange vast amounts of critical security and safety data as well as privacy-sensitive information and are appealing targets for cyberattacks [5,6,7,8]. The task of affordably supporting security and privacy is quite challenging because many new networkable devices, which constitute the IoT, require less energy, are lightweight and have less memory [9]. These devices must devote most of their available energy and computation to executing core application functions [10]. The security research includes transmission field [11, 12], cloud storage field [13, 14], digital signature field [15, 16], and permission identification [17, 18]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.