Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3390566.3391672acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbctConference Proceedingsconference-collections
research-article
Public Access

Secure Hierarchical Processing and Logging of Sensing Data and IoT Events with Blockchain

Published: 29 May 2020 Publication History

Abstract

Recently, we have seen increasing popularity of using the blockchain technology to secure sensing data generated by traditional wireless sensor networks and Internet of Things (IoT). One of the biggest obstacles for integrating the IoT and blockchain technologies is the limited throughput of the current distributed ledgers. In this paper, we propose a novel method for hierarchical processing and logging of potentially large amount of sensing data with the blockchain technology, which could drastically address the issue of limited throughput in blockchains. Depending on the scale of the sensing need, two or more levels of processing and logging could be involved, where only the highest level of summative sensor data are placed on the blockchain or a secure distributed ledger. By establishing a strong linkage between different level of data, all lower-level and raw data are also made immutable once the highest level of summative data are placed on the blockchain.

References

[1]
Chen, M., Li, Y., Luo, X., Wang, W., Wang, L., & Zhao, W. 2019. A novel human activity recognition scheme for smart health using multilayer extreme learning machine. IEEE Internet of Things Journal, 6, (2019), 1410--1418.
[2]
De Michelis, C., Rinaldi, C., Sampietri, C., & Vario, R. 2011. Condition monitoring and assessment of power plant components. In Power Plant Life Management and Performance Improvement (pp. 38--109). Woodhead Publishing.
[3]
Wang, Y., Attebury, G., & Ramamurthy, B. 2006. A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 8, 2, (2006), 2--23.
[4]
Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. 2014. Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12, 1, (2014), 98--110.
[5]
Przydatek, B., Song, D., & Perrig, A. 2003. SIA: Secure information aggregation in sensor networks. In Proceedings of the 1st international conference on Embedded networked sensor systems (Los Angeles, California, 2003, November) (pp. 255--265). ACM.
[6]
Formicola, V., Di Pietro, A., Alsubaie, A., D'antonio, S., & Marti, J. 2014. Assessing the impact of cyber attacks on wireless sensor nodes that monitor interdependent physical systems. In Proceedings of the International Conference on Critical Infrastructure Protection (Berlin, Heidelberg, 2014, March). Springer, 213--229.
[7]
Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. http://www.bitcoin.org.
[8]
Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin. Applied Innovation, 2(6--10), 71.
[9]
Zhao, W. 2014. Building dependable distributed systems. John Wiley & Sons.
[10]
Zhao, W., Melliar-Smith, P. M., & Moser, L. E. 2012. Low latency fault tolerance system. The Computer Journal, 56, 6 (June 2012), 716--740.
[11]
Castro, M., & Liskov, B. 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems 20, 4 (Nov. 2002), 398--461.
[12]
Zhao, W. 2016. Optimistic byzantine fault tolerance. International Journal of Parallel, Emergent and Distributed Systems 31, 3 (2016), 254--267.
[13]
Zhao, W. 2014. Application-aware byzantine fault tolerance. In Proceedings of the IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (Dalian, China, August 24-27, 2014). IEEE, 45--50.
[14]
Babi, M., & Zhao, W. 2017. Towards Trustworthy Collaborative Editing. Computers 6, 2 (March 2017), 13.
[15]
Zhao, W. 2016. Performance optimization for state machine replication based on application semantics: a review. Journal of Systems and Software, 112 (February 2012), 96--109.
[16]
Zhang, H., Chai, H., Zhao, W., Melliar-Smith, P. M., & Moser, L. E. 2012. Trustworthy coordination of Web services atomic transactions. IEEE Transactions on Parallel and Distributed Systems, 23, 8, (2012), 1551--1565.
[17]
Chai, H., Zhang, H., Zhao, W., Melliar-Smith, P. M., & Moser, L. E. 2013. Toward trustworthy coordination of Web services business activities. IEEE Transactions on Services Computing, 6, 2, (2013), 276--288.
[18]
Akbari, E., Wu, Q., Zhao, W., Arabnia, H. R., & Yang, M. Q. 2017. From Blockchain to Internet-Based Voting. In Proceedings of the International Conference on Computational Science and Computational Intelligence (Las Vegas, NV, USA, December 14-16, 2017). IEEE, 218--221.
[19]
Zhao, W., Yang, S., & Luo, X. 2019. On Consensus in Public Blockchains. In Proceedings of the 2019 International Conference on Blockchain Technology (Honolulu, Hawaii, USA, March 2019). ACM, 1--5.
[20]
Wang, W., Hoang, D. T., Xiong, Z., Niyato, D., Wang, P., Hu, P., & Wen, Y. 2019. A survey on consensus mechanisms and mining management in blockchain networks. IEEE Access, 7, (2019), 22328--22370.
[21]
Andoni, M., Robu, V., Flynn, D., Abram, S., Geach, D., Jenkins, D., McCallum, P. & Peacock, A. 2019. Blockchain technology in the energy sector: A systematic review of challenges and opportunities. Renewable and Sustainable Energy Reviews, 100, (February 2019), 143--174.
[22]
Poon, J. and Dryja, T. 2016. The bitcoin lightning network: Scalable offchain instant payments, Lightning Labs, Tech. Rep., Nov. 2016
[23]
Szydlo, M. 2004. Merkle tree traversal in log space and time. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (May 2004). Springer, Berlin, Heidelberg. 541--554.
[24]
Gabriel, J. (2017). IOTA: The next generation blockchain. https://oracletimes.com/iota-the-next-generation-blockchain/.

Cited By

View all
  • (2024)Blockchain-Based Logging to Defeat Malicious Insiders: The Case of Remote Health Monitoring SystemsIEEE Access10.1109/ACCESS.2023.334643212(12062-12079)Online publication date: 2024
  • (2023)The Design and Implementation of a Secure Datastore Based on Ethereum Smart ContractApplied Sciences10.3390/app1309528213:9(5282)Online publication date: 23-Apr-2023
  • (2023)A Blockchain-Facilitated Secure Sensing Data Processing and Logging SystemIEEE Access10.1109/ACCESS.2023.325203011(21712-21728)Online publication date: 2023
  • Show More Cited By

Index Terms

  1. Secure Hierarchical Processing and Logging of Sensing Data and IoT Events with Blockchain

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICBCT '20: Proceedings of the 2020 2nd International Conference on Blockchain Technology
    March 2020
    166 pages
    ISBN:9781450377676
    DOI:10.1145/3390566
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Shanghai Jiao Tong University: Shanghai Jiao Tong University
    • Huazhong University of Science and Technology

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 May 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Aggregation
    2. Blockchain
    3. Distributed consensus
    4. Hierarchical logging
    5. Internet of things (IoT)
    6. Merkle tree
    7. Wireless sensor networks

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    Conference

    ICBCT'20

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)77
    • Downloads (Last 6 weeks)14
    Reflects downloads up to 03 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Blockchain-Based Logging to Defeat Malicious Insiders: The Case of Remote Health Monitoring SystemsIEEE Access10.1109/ACCESS.2023.334643212(12062-12079)Online publication date: 2024
    • (2023)The Design and Implementation of a Secure Datastore Based on Ethereum Smart ContractApplied Sciences10.3390/app1309528213:9(5282)Online publication date: 23-Apr-2023
    • (2023)A Blockchain-Facilitated Secure Sensing Data Processing and Logging SystemIEEE Access10.1109/ACCESS.2023.325203011(21712-21728)Online publication date: 2023
    • (2022)Dos and Don’ts in Blockchain Research and DevelopmentProceedings of the 2022 4th International Conference on Blockchain Technology10.1145/3532640.3532646(37-43)Online publication date: 25-Mar-2022
    • (2022)NHS Big Data Intelligence on Blockchain ApplicationsBig Data Intelligence for Smart Applications10.1007/978-3-030-87954-9_8(191-208)Online publication date: 18-Jan-2022
    • (2021)Design and Implementation of a Blockchain-Enabled Secure Sensing Data Processing and Logging System2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC)10.1109/SMC52423.2021.9658949(386-391)Online publication date: 17-Oct-2021
    • (2021)Blockchain-Enabled Cyber–Physical Systems: A ReviewIEEE Internet of Things Journal10.1109/JIOT.2020.30148648:6(4023-4034)Online publication date: 15-Mar-2021
    • (2021)Exploring Blockchain-enabled Intelligent IoT Architecture2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)10.1109/3ICT53449.2021.9581499(477-482)Online publication date: 29-Sep-2021
    • (2021)Blockchain ApplicationsFrom Traditional Fault Tolerance to Blockchain10.1002/9781119682127.ch10(377-425)Online publication date: 18-Jun-2021
    • (2020)The Impact of Block Parameters on the Throughput and Security of BlockchainsProceedings of the 2020 2nd International Conference on Blockchain Technology10.1145/3390566.3391673(13-18)Online publication date: 12-Mar-2020
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media