2022
DOI: 10.3390/sym14081664
|View full text |Cite
|
Sign up to set email alerts
|

Effective Consensus-Based Distributed Auction Scheme for Secure Data Sharing in Internet of Things

Abstract: In a traditional electronic auction, the centralized auctioneer and decentralized bidders are in an asymmetric structure, where the auctioneer has more ability to decide the auction result. This asymmetric auction structure is not fair to the participants and not suitable for data auctions in the Internet of Things (IoT). The blockchain-based auction system, with participant equality and fairness, is typically symmetrical and particularly suitable for IoT data sharing. However, when applied to IoT data sharing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 41 publications
0
5
0
Order By: Relevance
“…The blockchain is represented as an append-only ledger L that is managed by a global ideal functionality F L (same as [37]). Blockchain nodes are honest but curious [16]. They perform according to the blockchain rules and try to infer others' private information.…”
Section: Threat Model and Design Goalsmentioning
confidence: 99%
See 2 more Smart Citations
“…The blockchain is represented as an append-only ledger L that is managed by a global ideal functionality F L (same as [37]). Blockchain nodes are honest but curious [16]. They perform according to the blockchain rules and try to infer others' private information.…”
Section: Threat Model and Design Goalsmentioning
confidence: 99%
“…Only when both the buyer and seller reach a consensus on the revocation, is it taken as legal; otherwise, the misbehaved user will lose all the deposit. What is more, participation fairness can also be guaranteed for all users during the off-chain scheduling according to [16], which is not the focus of this paper and we do not extend it.…”
Section: Threat Model and Design Goalsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the era of big data, a large number of personal information data are generated every day, such as social information [1], physiological signals collected by intelligent wearable devices [2], and data auctions in the internet of things [3]. Information digitization technology enables various institutions to easily collect a large amount of information and data, publish statistical results in various forms, and conduct data analysis and research.…”
Section: Introductionmentioning
confidence: 99%
“…Vehicles share pictures, videos, and control signaling collected by themselves, such as road traffic data, vehicle location data, driving habits data, and vehicle-to-vehicle interaction data [2], so that vehicles can grasp the surrounding environment information more quickly, to comprehensively consider and judge their own driving state. In order to better realize information sharing and interaction between vehicles, collaborative vehicle networking emerged [3][4][5].…”
Section: Introductionmentioning
confidence: 99%