当前位置: X-MOL 学术Comput. J. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A Blockchain-Based Framework for IoT Data Monetization Services
The Computer Journal ( IF 1.5 ) Pub Date : 2020-09-24 , DOI: 10.1093/comjnl/bxaa119
Muhammad Salek Ali 1, 2 , Massimo Vecchio 1 , Fabio Antonelli 1
Affiliation  

Abstract
Within internet of things (IoT) research, there is a growing interest in leveraging the decentralization properties of blockchains, towards developing IoT authentication and authorization mechanisms that do not inherently require centralized third-party intermediaries. This paper presents a framework for sharing IoT data in a decentralized and private-by-design manner in exchange for monetary services. The framework is built on a tiered blockchain architecture, along with InterPlanetary File System for IoT data storage and transfer. The goal is to enable IoT data users to exercise fine-grained control on how much data they share with entities authenticated through blockchains. To highlight how the framework would be used in real-life scenarios, this paper presents two use cases, namely an IoT data marketplace and a decentralized connected vehicle insurance. These examples showcase how the proposed framework can be used for varying smart contract-based applications involving exchanges of IoT data and cryptocurrency. Following the discussion about the use cases, the paper outlines a detailed security analysis performed on the proposed framework, based on multiple attack scenarios. Finally, it presents and discusses extensive evaluations, in terms of various performance metrics obtained from a real-world implementation.


中文翻译:

物联网数据货币化服务的基于区块链的框架

摘要
在物联网(IoT)研究中,人们越来越有兴趣利用区块链的去中心化属性来开发不需要固有地需要集中第三方中介的IoT身份验证和授权机制。本文提出了一种以分散和设计私密的方式共享IoT数据以交换货币服务的框架。该框架建立在分层的区块链架构以及用于物联网数据存储和传输的行星际文件系统的基础上。目的是使IoT数据用户能够对与通过区块链验证的实体共享多少数据进行精细控制。为了突出该框架在实际场景中的使用方式,本文提出了两个用例,即IoT数据市场和去中心化的联网汽车保险。这些示例展示了所建议的框架如何用于涉及物联网数据和加密货币交换的各种基于智能合约的应用程序。在讨论了用例之后,本文概述了基于多种攻击情形对提议的框架执行的详细安全分析。最后,它介绍和讨论了从实际实现中获得的各种性能指标方面的广泛评估。基于多种攻击场景。最后,它介绍和讨论了从实际实现中获得的各种性能指标方面的广泛评估。基于多种攻击场景。最后,它介绍和讨论了从实际实现中获得的各种性能指标方面的广泛评估。
更新日期:2020-09-24
down
wechat
bug