2019 Global IoT Summit (GIoTS) 2019
DOI: 10.1109/giots.2019.8766432
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized Beacons: Attesting the Ground Truth of Blockchain State for Constrained IoT Devices

Abstract: Internet of Thing devices (IoT devices) are often constrained in terms of computing, memory, storage, power, and network resources. This makes them ill-suited to operate as firstclass citizens on a blockchain, such as Ethereum, preventing the IoT devices from attaining the security guarantees that are available to better resourced nodes that are able to operate as full, validating nodes on the blockchain. IoT devices may use so-called light protocols to interact with the blockchain with minimal resource requir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 8 publications
(16 reference statements)
0
6
0
Order By: Relevance
“…any off-site or industrial applications in particular. If interaction with public blockchains is required, we would recommend to look into ledger-to-ledger bridging approaches [39], or employ a trusted third party to attest and pin down the blockchain state [34]. For other light clients we see at ≥ 12 the time for 1-inject success under somewhat "reasonable but powerful adversary" assumptions is several hundred block intervals or more.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…any off-site or industrial applications in particular. If interaction with public blockchains is required, we would recommend to look into ledger-to-ledger bridging approaches [39], or employ a trusted third party to attest and pin down the blockchain state [34]. For other light clients we see at ≥ 12 the time for 1-inject success under somewhat "reasonable but powerful adversary" assumptions is several hundred block intervals or more.…”
Section: Discussionmentioning
confidence: 99%
“…For example, Marcus et al describe countermeasures an Ethereum light client can take to protect itself against adversary attempting to eclipse it from the honest network [24]. Paavolainen and Nikander [34] propose a mechanism where the owner of an IoT device sends periodic decentralized beacons to the device attesting the owner's view of the canonical blockchain, allowing the device to determine a trusted blockchain state independently of the light protocol servers' intent.…”
Section: Related Workmentioning
confidence: 99%
“…A more advanced solution to protect against malicious forks was proposed in [12]. The client is no longer limited to request proofs only from trusted nodes, instead it can identify when the received information comes from a forked chain.…”
Section: Related Workmentioning
confidence: 99%
“…One approach is to leverage Trusted Execution Enclaves (TEE) such as Intel's SGX technology, where the TEE executed code is attested as authentic, and is used to provide secure updates on the ledger state to a light client [34]- [36]. There are other mechanisms as well that can increase the security of light clients albeit at the cost of relying on a trusted party [10]. It has been pointed out that the default Ethereum light protocol model provides no incentives for the servers to be honest, which has been addressed for example by Lu et al who devise a model which incentivizes light servers to provide honest answers [37].…”
Section: Related Workmentioning
confidence: 99%
“…There are several proposals to increase light client security that would mitigate the identified vulnerability, but these either require: Partial connectivity with the honest network [7]; a decentralized reputation system [8]; replacement of the entire blockchain [9]; or introduction of a remote trusted party [10]. In short, they do not comprehensively address the issue within the context of the current Ethereum blockchain.…”
Section: Introductionmentioning
confidence: 99%