Proceedings of the Second International Conference on Internet-of-Things Design and Implementation 2017
DOI: 10.1145/3054977.3055003
|View full text |Cite
|
Sign up to set email alerts
|

Towards an Optimized BlockChain for IoT

Abstract: ere has been increasing interest in adopting BlockChain (BC), that underpins the crypto-currency Bitcoin, in Internet of ings (IoT) for security and privacy. However, BCs are computationally expensive and involve high bandwidth overhead and delays, which are not suitable for most IoT devices. is paper proposes a lightweight BC-based architecture for IoT that virtually eliminates the overheads of classic BC, while maintaining most of its security and privacy bene ts. IoT devices bene t from a private immutable … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
311
0
3

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 495 publications
(314 citation statements)
references
References 10 publications
0
311
0
3
Order By: Relevance
“…On the other hand, when the proposed scheme is not an available scenario (i.e., = 1), i.e., in the traditional environment, the average response time becomes 176 s Note that not only the mining task but also the ICN mechanism is provided in the cloud server in the related studies [14], [15]; therefore, in the conventional scheme, we can assume that there are no ICN-available users, in other words, all users are legacy users. In a practical environment, the caching data are not necessarily available anywhere and anytime in the CH's cache memory.…”
Section: Computer Simulation Results For Benchmark Of Response Timementioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, when the proposed scheme is not an available scenario (i.e., = 1), i.e., in the traditional environment, the average response time becomes 176 s Note that not only the mining task but also the ICN mechanism is provided in the cloud server in the related studies [14], [15]; therefore, in the conventional scheme, we can assume that there are no ICN-available users, in other words, all users are legacy users. In a practical environment, the caching data are not necessarily available anywhere and anytime in the CH's cache memory.…”
Section: Computer Simulation Results For Benchmark Of Response Timementioning
confidence: 99%
“…Zhang et al [14] and Dorri et al [15] proposed a secure home network system in order to share secure health data by using pervasive social network nodes, such as smartphones, tablet computers, and personal computers. Banerjee et al [16] surveyed the existing security approaches in the Internet of Things domain, and categorized and discussed them into two types (reactive and proactive solutions).…”
Section: Related Workmentioning
confidence: 99%
“…A similar method is considered in relation to a Smart Home scenario in [21]. Also, there is an unchanged transaction log as an advantage of integrating IoT and Blockchain technologies.…”
Section: Related Work Analysis In the Area Of Blockchain Technology Umentioning
confidence: 99%
“…The blockchain is mostly used as immutable storage for information exchange between robots. Information stored in the blockchain could contain records about task and assets distribution [7,21], smart contracts and payment transactions [20], or global knowledge about coalition actions [22]. In combination with IoT, concept blockchain technology can provide more trust for transaction through IoT, due to the storing information about transactions in immutable log that can be verified by every IoT participant.…”
Section: Related Work Analysis In the Area Of Blockchain Technology Umentioning
confidence: 99%
“…Dorri ve arkadaşlarının bir diğer çalışmasında [13], IoT için iyileştirilmiş yeni bir blokzinciri mimarisi önerilmektedir. Bu çalışmada, Bitcoin'in altyapısını oluşturan klasik blokzinciri kullanımının getirdiği yükleri ortadan kaldırmak için hafif (lightweight) bir blokzinciri mimarisi kullanımından bahsedilmektedir.…”
Section: Güvenli̇k Servi̇sleri̇ (Security Services)unclassified