Abstract
With the gradual popularization of Internet-of-Things (IoT) applications and the development of wireless networking technologies, the use of heterogeneous devices and runtime verification of task fulfillment with different constraints are required in real-world IoT scenarios. As far as IoT systems are concerned, most of them are built on centralized architectures, which reveal various assailable points in data security and privacy threats. Hence, this paper aims to investigate these issues by delegating the responsibility of a verification monitor from a centralized architecture to a decentralized manner using blockchain technology. We present a smart contract-based task management scheme to provide runtime verification of device behaviors and allows trustworthy access control to these devices. The business logic of the proposed system is specified by the smart contract, which automates all time-consuming processes cryptographically and correctly. The usability of the proposed solution is further demonstrated by implementing a prototype application in which the Hyperledger Fabric is utilized to implement the business logic for runtime verification and access control with one desktop and one Raspberry Pi. A comprehensive evaluation experiment is conducted, and the results indicate the effectiveness and efficiency of the proposed system.
Highlights
A typical IoT system is usually a combined system with computation and communication capabilities and provides physical environments, in which numerous embedded devices are connected to provide services to end-users [1]
Main contributions of this paper can be summed up as follows: 1. This paper introduces a task management scheme specified to IoT systems in a distributed and trusted manner
An edge computing enabled blockchain prototype is implemented as the proof of concept, and the results demonstrate the usability and efficiency of the proposed solution
Summary
A typical IoT system is usually a combined system with computation and communication capabilities and provides physical environments, in which numerous embedded devices are connected to provide services to end-users [1]. While the network scale of IoT systems is growing, a large amount of sensing data would significantly increase the processing effort, increasing the burden of the centralized verification monitor and reducing the stability of the whole system [6]. 2. A separate data storage solution is applied by deploying the Couch DB on each network node to serve as the file storage for the sheer volume of IoT data. A separate data storage solution is applied by deploying the Couch DB on each network node to serve as the file storage for the sheer volume of IoT data This approach supports productive queries that are flexible against large indexed data stores and provide various APIs to manipulate the data.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.