Abstract

AbstractProblemThe Internet of Things (IoT) makes developers for integrating various collection of device, saving, and processing a huge amount of data, allowing new services for improving several personal and professional activities. But, the privacy problems occur with a large amount of data produced and therefore the solutions on the basis of blockchain with sidechain technology have been developed to overcome these problems.AimBlockchain powered IoT networks have high security levels, and are resilient to most network attacks. In order to deploy blockchains, a large set of hashing, encryption, and linking algorithms are implemented in the network. One of the recent developments is the sidechains and these sidechains reduce computational complexity during block creation, and thereby reduce the effect of high delay and high‐power consumption in the IoT network. But maintaining these sidechains requires an additional computational component, which adds to the computational complexity of the underlying system. To reduce the complexity of this maintenance while keeping the inherent advantages of side chaining networks, this article proposes a sidechain creation, updation, merging, and scanning processes.MethodsIn this article, the sidechain creation is done by modified two‐way peg protocol and updated by hybrid delegated practical byzantine fault tolerance‐delegated proof of stake (DPBFT‐DPOS), merging via continuous network information analysis and scanning via graph‐based searching mechanism to improve the Quality of Service (QoS) network and security.ResultsThe proposed methodology achieves an accuracy and ‐score of about 98.6% and 99.5%, reduces end‐to‐end communication delay by 10% while increasing the energy efficiency by 15%, and improving the throughput by 15% when compared to other existing methods.ConclusionThe IoT provides the possibility of creating real time data and the combination of the IoT with blockchain moves beyond authorization and financial recording. Then the utilization of sidechain provide better communication among devices and better sophistication of the data processing.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.