2018 IEEE International Conference on Communications (ICC) 2018
DOI: 10.1109/icc.2018.8422485
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the Communication Traffic for Blockchain Synchronization of IoT Devices

Abstract: Blockchain is a technology uniquely suited to support massive number of transactions and smart contracts within the Internet of Things (IoT) ecosystem, thanks to the decentralized accounting mechanism. In a blockchain network, the states of the accounts are stored and updated by the validator nodes, interconnected in a peer-to-peer fashion. IoT devices are characterized by relatively low computing capabilities and low power consumption, as well as sporadic and low-bandwidth wireless connectivity. An IoT device… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0
3

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 67 publications
(40 citation statements)
references
References 5 publications
0
37
0
3
Order By: Relevance
“…Protocols from class P1 provide the device with all information necessary to verify the DLT, hence, the amount of trust outsourced the network is minimal. Such protocols are not envisaged for implementation in IoT devices due to high memory and communication requirements [4]. security, further mechanisms are implemented, such as charging fines to GWs that send false data [11].…”
Section: A Lightweight Synchronization Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…Protocols from class P1 provide the device with all information necessary to verify the DLT, hence, the amount of trust outsourced the network is minimal. Such protocols are not envisaged for implementation in IoT devices due to high memory and communication requirements [4]. security, further mechanisms are implemented, such as charging fines to GWs that send false data [11].…”
Section: A Lightweight Synchronization Protocolsmentioning
confidence: 99%
“…The conclusion is that, with DLT-based methods (B and C), the 802.11 APs are subject to a significantly higher load in DL. 4 Notice that devices are making use of the information received from the DLT as soon as it is received, without waiting for its confirmation. Waiting for confirmation may be required in some applications.…”
Section: B Case Study 2: Accountability Of Operationsmentioning
confidence: 99%
See 1 more Smart Citation
“…As the validation of blocks is an expensive process in terms of memory and computing resources, lightweight clients typically request only the block header, instead of the entire block, delegating the verification to trusted nodes. In addition, they may request part of the ledger that they are interested in observing [4], [7]. Since this entails full trust in the nodes, in order to detect misbehaving ones, a lightweight client can request the information from a set of nodes, and verify that the received block headers are consistent.…”
Section: A Blockchainsmentioning
confidence: 99%
“…1. These devices are constantly synchronizing with the BNs [7], receiving a minimal amount of information, namely the block headers. In addition, when certain events that are of interest to a specific device occur, e.g.…”
mentioning
confidence: 99%