Internet of Things (IoT) networks have become part and parcel of the present life. In the present-day scenario, IoT networks are distributed, and they generate heterogeneous data to be shared, processed and analyzed. But, the prevailing centralized IoT architecture has numerous security vulnerabilities, specifically in data hosting and transfer.Blockchain, a cryptographically distributed tamper-proof database when blends with IoT, enables a secure data archival and exchange of peer-to-peer (P2P) transactions to be more private. In this work, a multilayered consortium blockchain network that inherits the benefits of private blockchain for its privacy and public blockchain's decentralized governance is launched. The adoption of a semi-private system in an IoT environment enables regulated data transparency to form novel HIBchain. It can support the heterogeneity of IoT data and has the principle of marking permissions to the public addresses. The out-turn of an off-chain layer is the hashed IoT blocks with a consistent transaction volume of 464 bits. The most common techniques are computationally demanding and frequently unfeasible in IoT contexts. We design and analyze the diversity mining-based proof of work (DM-PoW) consensus protocol on HIBchain, which yields an average processing time of 1760 transactions per second (TPS) and mining time of 3 minutes. K E Y W O R D S consensus models, consortium blockchain, IoT networks, MultiChain, proof of work INTRODUCTIONBlockchain technology makes up a significantly viable technical innovation that facilitates transactions between peers without any demand for central authoritative management. It is a distributed ledger that encloses only validated transactions composed as a chain of chronologically listed back linked blocks. The secrecy of the transactions is assured with signature verification using asymmetric key cryptography and guaranteed with cryptographic hashes. Merkle tree keeps track of the transaction histories and its summarization to efficiently maintain a chain of actions. Hence, any attempt to crack a prior transaction urges a recalculation of all successive blocks in the chain, which is practically not feasible. All the coordinated nodes distributed across the network hold back a ledger bundling the transactions that retain decentralization. Every new block is validated by solving a computationally intensive but easy to verify hash puzzle. For this cause, blockchain has been explored in numerous applications apart from cryptocurrencies. 1,2 The main contents of the blockchain are pointers and lists, where the pointer shows the header information such as the hash of the preceding block, the index of the current block, the hash of the Merkle tree root, and the timestamp denoting the time of the block creation.
Internet of Things (IoT) and cloud metadata have highly sensitive details and facts about data and objects; it usually holds confidential information about the data for which there are access restrictions. Hence, it forms the most abundant source of information about any digital object from which the actual data can be rebuilt or duplicated with the same level of originality. However, it appears to be an emerging threat vector in IoT and cloud environments. If a misfeasor acquires access to the metadata information, then there arises a security threat. This article proposes a novel method on a bifold layered blockchain network, referred to as MetaInfoChain, to enhance the integrity and access controllability of safe storage. By default, blockchain protects the data while a permissioned blockchain forms an access control layer over the core blockchain. The acquired instance, compute, and the unique credentials sign device metadata to enforce controllability and validated by minters and add it to the base layer of the MetaInfoChain. Subsequently, we propose a consensus attainment algorithm to build an unrefined block on a candidate block comprising metadata packages. Consequently, all the nodes receive an unrefined block replica, which can afford absolute integrity. The top layer of MetaInfoChain is sensible to generate tamper-resistant metadata by executing hybrid PoS-PoW tasks on the unrefined block, causing robust integrity. After accomplishing all the checks, it endorses the MetaInfoChain to append the block with 35% block time efficiency in the base layer with a 56% throughput hike.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.