2020
DOI: 10.14569/ijacsa.2020.0110462
|View full text |Cite
|
Sign up to set email alerts
|

BlockTrack-L: A Lightweight Blockchain-based Provenance Message Tracking in IoT

Abstract: Data tracking is of great significance and a central part in digital forensics. In today's complex network design, Internet of Things (IoT) devices communicate with each other and require strong security mechanisms. In maintaining an audit trail of IoT devices or provenance of IoT device data, it is important to know the origins of requests to ensure certain level of trust in IoT data. Blockchain can provide traceability of records generated from IoT devices in a sensitive environment. In this paper, we presen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 16 publications
0
10
0
Order By: Relevance
“…A 13.75% of the researchers have used various simulators and emulators as CloudSim, 34,74,158 EdgeCloudSim, 166 iFogSim, 148 Contiki Cooja environment, 108 Open AI Gym Toolkit, 144 SDN-BC emulated environment including Minine, 144 COOJA, 66 SimuLTE, 157 and SUMO. 103 ProVerif, 160 Hyperledger caliper, 67,170 and Fabric BFT SMarT, 167 Ethereum, 67,144 were the blockchain and distributed ledger platforms considered by 7.50% of researchers for evaluating the authenticity while offloading tasks either on edge or cloud environment. Further, 3.75% of the researchers use Alibaba cloud, Google, Amazon EC2, Microsoft, 36,67,168 as a cloud environment, 3.75% use Zolertia RE-Motes, Contiki-NG's, RE-Mote, Raspberry Pi 170 as an IoT and Hardware tool, and pattern recognition toolbox nprtool, 162 Truffle tool, 67 Rover toolkit, Profiler 132 5.00% other tools considered by researchers for the evaluation.…”
Section: Toolsmentioning
confidence: 99%
See 1 more Smart Citation
“…A 13.75% of the researchers have used various simulators and emulators as CloudSim, 34,74,158 EdgeCloudSim, 166 iFogSim, 148 Contiki Cooja environment, 108 Open AI Gym Toolkit, 144 SDN-BC emulated environment including Minine, 144 COOJA, 66 SimuLTE, 157 and SUMO. 103 ProVerif, 160 Hyperledger caliper, 67,170 and Fabric BFT SMarT, 167 Ethereum, 67,144 were the blockchain and distributed ledger platforms considered by 7.50% of researchers for evaluating the authenticity while offloading tasks either on edge or cloud environment. Further, 3.75% of the researchers use Alibaba cloud, Google, Amazon EC2, Microsoft, 36,67,168 as a cloud environment, 3.75% use Zolertia RE-Motes, Contiki-NG's, RE-Mote, Raspberry Pi 170 as an IoT and Hardware tool, and pattern recognition toolbox nprtool, 162 Truffle tool, 67 Rover toolkit, Profiler 132 5.00% other tools considered by researchers for the evaluation.…”
Section: Toolsmentioning
confidence: 99%
“…Blockchain technology provides a solution by generating a trackable record of the data produced by IoT devices. Siddiqui et al 167 presented a cloud‐based IoT network application layer data provenance model that employed outsourced encryption on edge nodes to lessen the cryptographic load. All IoT device communications are connected to a permissioned blockchain network, which provides fast transaction throughput with minimum security overhead.…”
Section: Authentication and Traceability Based Offloading In Ecmentioning
confidence: 99%
“…Some survey articles have also presented different Blockchain applications [26,156] while major review focus has been on Blockchain applications with other technologies like IoT and smart cities [8,9,14], [21 -25]. The Blockchain security is also reviewed in some survey articles including [11,15,16,29,157]. However, on the other side, the contribution of this survey is as follows: preliminary technical concepts and characteristics and issues are discussed to enable the reader to understand the Blockchain concepts effectively.…”
Section: A Contribution Of This Survey and Comparison With Related Survey Articlesmentioning
confidence: 99%
“…The system functioning on resource-constrained devices [63] Hyperledger Transactions per second, network response time, digital signatures overhead [64] C++ Transactions per millisecond, performance of read operations data lookup [65] Hyperledger Transactions per second, computational overhead [66] N/A Computational overhead, communication overhead [67] N/A Network traffic overhead, processing overhead, energy saving [68] N/A Resource consumption, latency [69] N/A Mining speed & power consumption, signature performance, transactions per second, storage [70] N/A Space occupancy, network delay, network energy consumption [71] Python Network latency, transactions per second, transaction verification, block mining, block verification, vote verification [72] Ethereum Transaction packaging time, transactions per second [73] N/A Proof generation, proof verification [74] Ethereum Resource usage [75] N/A Computational and communication overhead [76] Ethereum Network throughput & latency [77] N/A Storage requirement, communication overhead, computational overhead [78] Java Transaction verification rate, storage, data reliability, data availability [79] N/A Transaction overhead [80] N/A Block generation time, data accuracy, truth value accuracy, task cost [81] NS-3 Network overhead, block generation latency [82] Hyperledger Computational time, memory requirement, bandwidth requirement [83] N/A Storage cost [84] Python CPU usage, block generation speed, computational cost, consensus stability, network usage, storage [85] Python Transaction processing time, block validation processing time, hash rate, hash quality, storage…”
Section: A Lightweight Blockchain Technical Aspectsmentioning
confidence: 99%