Internet of Things (IoT) networks have become part and parcel of the present life. In the present-day scenario, IoT networks are distributed, and they generate heterogeneous data to be shared, processed and analyzed. But, the prevailing centralized IoT architecture has numerous security vulnerabilities, specifically in data hosting and transfer.Blockchain, a cryptographically distributed tamper-proof database when blends with IoT, enables a secure data archival and exchange of peer-to-peer (P2P) transactions to be more private. In this work, a multilayered consortium blockchain network that inherits the benefits of private blockchain for its privacy and public blockchain's decentralized governance is launched. The adoption of a semi-private system in an IoT environment enables regulated data transparency to form novel HIBchain. It can support the heterogeneity of IoT data and has the principle of marking permissions to the public addresses. The out-turn of an off-chain layer is the hashed IoT blocks with a consistent transaction volume of 464 bits. The most common techniques are computationally demanding and frequently unfeasible in IoT contexts. We design and analyze the diversity mining-based proof of work (DM-PoW) consensus protocol on HIBchain, which yields an average processing time of 1760 transactions per second (TPS) and mining time of 3 minutes. K E Y W O R D S consensus models, consortium blockchain, IoT networks, MultiChain, proof of work
INTRODUCTIONBlockchain technology makes up a significantly viable technical innovation that facilitates transactions between peers without any demand for central authoritative management. It is a distributed ledger that encloses only validated transactions composed as a chain of chronologically listed back linked blocks. The secrecy of the transactions is assured with signature verification using asymmetric key cryptography and guaranteed with cryptographic hashes. Merkle tree keeps track of the transaction histories and its summarization to efficiently maintain a chain of actions. Hence, any attempt to crack a prior transaction urges a recalculation of all successive blocks in the chain, which is practically not feasible. All the coordinated nodes distributed across the network hold back a ledger bundling the transactions that retain decentralization. Every new block is validated by solving a computationally intensive but easy to verify hash puzzle. For this cause, blockchain has been explored in numerous applications apart from cryptocurrencies. 1,2 The main contents of the blockchain are pointers and lists, where the pointer shows the header information such as the hash of the preceding block, the index of the current block, the hash of the Merkle tree root, and the timestamp denoting the time of the block creation.