当前位置: X-MOL 学术Cluster Comput. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Smart contract based policies for the Internet of Things
Cluster Computing ( IF 3.6 ) Pub Date : 2021-01-01 , DOI: 10.1007/s10586-020-03216-w
Vikram Puri , Ishaani Priyadarshini , Raghvendra Kumar , Chung Van Le

Internet of Things (IoT) is one of the most powerful platforms that incorporates several other technological components within itself. The IoT ecosystem comprises devices, communications, protocols, analytics, cloud, automation, etc. Its magnitude keeps on increasing with the addition of tools and services. While IoT has many advantages like connectivity, efficiency, and convenience, it is a known fact that privacy and security issues are prevalent in the IoT network. To minimize the security and privacy issues, we propose a blockchain-based solution. In this paper, we design policies based on smart contacts, which is a self-enforcing agreement embedded in computer code managed by a blockchain. We propose three different policies: Hardware and Device Security Policies, Access and Authentication policies, and Application security for the IoT network. Since blockchain-based solutions ensure trust and stability, this may be one of the most robust techniques to alleviate the IoT network’s security and privacy issues. Also, we calculate the throughput and latency of the IoT enabled blockchain network and compare the power consumption of the IoT device at the time of data request with other proposed systems.



中文翻译:

基于智能合约的物联网策略

物联网(IoT)是功能最强大的平台之一,其内部集成了其他几种技术组件。物联网生态系统包括设备,通信,协议,分析,云,自动化等。其规模随着工具和服务的增加而不断增加。尽管物联网具有许多优势,例如连通性,效率和便利性,但众所周知的事实是,物联网网络中普遍存在隐私和安全问题。为了最小化安全和隐私问题,我们提出了一种基于区块链的解决方案。在本文中,我们基于智能联系人设计策略,这是一种嵌入在由区块链管理的计算机代码中的自我执行协议。我们提出了三种不同的策略:硬件和设备安全策略,访问和身份验证策略,物联网的应用安全性。由于基于区块链的解决方案可确保信任和稳定性,因此这可能是缓解IoT网络的安全性和隐私问题的最强大的技术之一。此外,我们计算了支持IoT的区块链网络的吞吐量和延迟,并将数据请求时IoT设备的功耗与其他拟议系统进行了比较。

更新日期:2021-01-01
down
wechat
bug