Abstract

The Internet of Things (IoT) industry is growing very fast to transform factories, homes, farms and practically everything else to make them efficient and intelligent. IoT is applied in different resilient scenarios and applications. IoT faces lots of challenges due to lack of computational power, battery and storage resources. Fortunately, the rise of blockchain technology facilitates IoT in many security solutions. Using blockchain, communication between IoT and emerging computing technologies is made efficient. In this work, we propose a secure service provisioning scheme with a fair payment system for Lightweight Clients (LCs) based on blockchain. Furthermore, an incentive mechanism based on reputation is proposed. We use consortium blockchain with the Proof of Authority (PoA) consensus mechanism. Furthermore, we use Smart Contracts (SCs) to validate the services provided by the Service Providers (SPs) to the LCs, transfer cryptocurrency to the SPs and maintain the reputation of the SPs. Moreover, the Keccak256 hashing algorithm is used for converting the data of arbitrary size to the hash of fixed size. AES128 encryption technique is used to encrypt service codes before sending to the LCs. The simulation results show that the LCs receive validated services from the SPs at an affordable cost. The results also depict that the participation rate of SPs is increased because of the incentive mechanism.

Highlights

  • The Internet of Things (IoT) industry has remarkably evolved over the last decade and is applied in different fields of life to make them efficient and intelligent

  • An incentive mechanism based on the reputation of Service Providers (SPs) is proposed

  • We use blockchain as an evidence recorder, which records all of the evidences of the service provisioning from SPs to the Lightweight Clients (LCs)

Read more

Summary

Introduction

The Internet of Things (IoT) industry has remarkably evolved over the last decade and is applied in different fields of life to make them efficient and intelligent. The abilities of resource constraint IoT devices are extended by fog computing, edge computing and transparent computing through service provisioning and sharing. Security issues arise unintentionally during service provisioning to IoT devices. The services provided by transparent computing technologies are not always accurate and must be validated before execution. Several works are done to validate the services provided by cloud computing. The authors in [2] use

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call