Security in Internet of Things (IoT) remains a significant concern within academia and industry. With the great potential of IoT data, the traditional centralized architecture of IoT system is limited and cannot afford security solutions. In this paper, to address the issue of IoT data security, we propose a blockchain-based data acquisition and processing architecture. The proposed architecture ensures IoT data security through data consistency. It supports distributed IoT nodes to negotiate consensus on the processed data, and decides to write the consensus data to blockchain ledger. Since distributed nodes are non-peer and have different voting weights in the proposed architecture, traditional consensus algorithms are not applicable. Therefore, we design a novel consensus algorithm for data consistency between non-peer nodes: Byzantine Fault-Tolerant consensus algorithm based on Dynamic Permission Adjustment (DPA-PBFT) algorithm. The DPA-PBFT algorithm works in the consensus domain of different weight nodes with the ability of self-optimize. It improves consensus efficiency and reduces communication overhead for data consistency. Finally, we conduct numerous experiments to evaluate the performance improvement of the DPA-PBFT algorithm under the proposed distributed architecture.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
Tax calculation will be finalised during checkout.
Kharb S, Singhrova A (2019) Fuzzy based priority aware scheduling technique for dense industrial IoT networks [J]. J Netw Comput Appl 125:17–27
De La Torre G, Rad P, Choo KKR (2019) Implementation of deep packet inspection in smart grids and industrial internet of things: challenges and opportunities [J]. J Netw Comput Appl 135:32–46
Puri V, Jagdev SS, Tromp JG et al (2020) Smart bicycle: IoT-based transportation service. Intelligent computing in engineering: select proceedings of RICE 2019, pp 1037–1043
Alaa M, Zaidan AA, Zaidan BB et al (2017) A review of smart home applications based on internet of things [J]. J Netw Comput Appl 97:48–65
Pal S, Hitchens M, Varadharajan V et al (2019) Policy-based access control for constrained healthcare resources in the context of the internet of things [J]. J Netw Comput Appl 139:57–74
Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Available at: https://bitcoin.org/bitcoin.pdf. Accessed 7 2019
Calderbank M (2007) The RSA cryptosystem: history, algorithm, primes. Available at:http://www.math.uchicago.edu/~may/VIGRE/VIGRE2007/REUPapers/FINALAPP/Calderbank.pdf. Accessed 7 2019
Zheng Z, Xie S, Dai HN et al (2020) An overview on smart contracts: challenges, advances and platforms. Future Generation Computer Systems 105:475–491
Agrawal S, Bünz KB, Zamani M et al (2019) Blockchain system for confidential and anonymous smart contracts. United States patent application US No.16/206, 661. Accessed 3 2020
Kolluri A, Nikolic I, Sergey I et al (2019) Exploiting the laws of order in smart contracts. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp 363–373
Aggarwal S, Chaudhary R, Aujla GS et al (2019) Blockchain for smart communities: applications, challenges and opportunities[J]. J Netw Comput Appl 144:13–48
Zhu L, Wu Y, Gai K et al (2019) Controllable and trustworthy blockchain-based cloud data management. Futur Gener Comput Syst 91:527–535
Huang X, Xu C, Wang P et al (2018) Lnsc: a security model for electric vehicle and charging pile management based on blockchain ecosystem. IEEE Access, pp 1–1
Song G, Kim S, Hwang H et al (2019) Blockchain-based notarization for social media. IEEE International Conference on Consumer Electronics (ICCE), pp 1–2
Mcghin T, Choo KR, Liu CZ et al (2019) Blockchain in healthcare applications: research challenges and opportunities [J]. J Netw Comput Appl 135:62–75
Patil AS, Hamza R, Hassan A et al (2020) Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts. Computers & Security 97:101958
Misra S, Mukherjee A, Roy A et al (2021) Blockchain at the edge: performance of resource-constrained IoT networks. IEEE Trans Parallel Distrib Syst 32:174–183
Fox A, Brewer EA (1999) Harvest, yield, and scalable tolerant systems. Hot Topics in Operating Systems, pp 174–178
Brewer EA (2000) Towards robust distributed systems. Available at: http://pld.cs.luc.edu/courses/353/spr11/notes/brewer_keynote.pdf
Browne J. Brewer's cap theorem-the kool aid Amazon and Ebay have been drinking. Available at: http://www.julianbrowne.com/article/viewer/brewers-cap-theorem. Retrieved. 25.03.2016
Gilbert S, Lynch N (2002) Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services. ACM SIGACT News, pp 51–59
Jakobsson M, Juels A (1999) Proofs of work and bread pudding protocols. Secure Information Networks, pp 258–272
Dwork C, Naor M (1992) Pricing via processing or combatting junk mail. Annual international cryptology conference, pp 139–147
Han R, Foutris N, Kotselidis C (2019) Demystifying crypto-mining: analysis and optimizations of memory-hard PoW algorithms. IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), pp 22–33
Sukhwani H, Martínez JM, Chang X et al (2017) Performance modeling of pbft consensus process for permissioned blockchain network (hyperledger fabric). Reliable Distributed Systems, pp 253–255
Castro M, Liskov B (1999) Practical byzantine fault tolerance. USENIX Symposium on Operating Systems Design and Implementation (OSDI), pp 173–186
Cachin C (2016) Architecture of the hyperledger blockchain fabric. Workshop on Distributed Cryptocurrencies and Consensus Ledgers, pp 310
Sousa J, Bessani A, Vukolic M (2018) A byzantine fault-tolerant ordering service for the hyperledger fabric blockchain platform. Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp 51–58
Lamport L, Shostak R, Pease M (1982) The byzantine generals problem. ACM Trans Program Lang Syst 4:382–401
Vukolić M (2015) The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. International Workshop on Open Problems in Network Security, pp 112–125
Wan SH, Li MJ, Liu GY et al (2020) Recent advances in consensus protocols for blockchain: a survey. Wirel Netw 26:5579–5593
Larimer D (2013) Transactions as proof-of-stake. Available at:https://bravenewcoin.com/assets/Uploads/TransactionsAsProofOfStake10.pdf. Accessed 3 2020
Nguyen CT, Hoang DT, Nguyen DN et al (2019) Proof-of-stake consensus mechanisms for future blockchain networks: fundamentals, applications and opportunities. IEEE Access:5727–85745
Saleh F (2019) Blockchain without waste: proof-of-stake. Social Science Electronic Publishing. Available at SSRN 3183935
Yang F, Zhou W, Wu Q, et al. (2019) Delegated proof of stake with downgrade: a secure and efficient Blockchain consensus algorithm with downgrade mechanism. IEEE Access, pp 18541–118555
The go programming language (2009) Available at:https://golang.org. Accessed 5 2020
GRPC Remote Procedure Call. Available at: https://grpc.io. Accessed on 2015
Seres IA, Gulyás L, Nagy DA et al (2019) Topological analysis of bitcoin's lightning network. arXiv preprint arXiv:1901.04972
Protocol Buffers (2008) Available at:https://developers.google.com/protocol-buffers. Accessed 6 2020
This research was partially supported by National Key R&D Program of China (2018YFC0831002), Sichuan science and technology program (2020YFG0040), National Natural Science Foundation of China (61971105), Science and Technology on Complex Electronic System Simulation Laboratory (DXZT-JC-ZZ-2017-012).
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on Blockchain for Peer-to-Peer Computing
Guest Editors: Keping Yu, Chunming Rong, Yang Cao, and Wenjuan Li
About this article
Cite this article
Liao, D., Li, H., Wang, W. et al. Achieving IoT data security based blockchain. Peer-to-Peer Netw. Appl. (2021). https://doi.org/10.1007/s12083-020-01042-w
- Data security