Abstract
Security in Internet of Things (IoT) remains a significant concern within academia and industry. With the great potential of IoT data, the traditional centralized architecture of IoT system is limited and cannot afford security solutions. In this paper, to address the issue of IoT data security, we propose a blockchain-based data acquisition and processing architecture. The proposed architecture ensures IoT data security through data consistency. It supports distributed IoT nodes to negotiate consensus on the processed data, and decides to write the consensus data to blockchain ledger. Since distributed nodes are non-peer and have different voting weights in the proposed architecture, traditional consensus algorithms are not applicable. Therefore, we design a novel consensus algorithm for data consistency between non-peer nodes: Byzantine Fault-Tolerant consensus algorithm based on Dynamic Permission Adjustment (DPA-PBFT) algorithm. The DPA-PBFT algorithm works in the consensus domain of different weight nodes with the ability of self-optimize. It improves consensus efficiency and reduces communication overhead for data consistency. Finally, we conduct numerous experiments to evaluate the performance improvement of the DPA-PBFT algorithm under the proposed distributed architecture.
This is a preview of subscription content, access via your institution.










References
- 1.
Kharb S, Singhrova A (2019) Fuzzy based priority aware scheduling technique for dense industrial IoT networks [J]. J Netw Comput Appl 125:17–27
- 2.
De La Torre G, Rad P, Choo KKR (2019) Implementation of deep packet inspection in smart grids and industrial internet of things: challenges and opportunities [J]. J Netw Comput Appl 135:32–46
- 3.
Puri V, Jagdev SS, Tromp JG et al (2020) Smart bicycle: IoT-based transportation service. Intelligent computing in engineering: select proceedings of RICE 2019, pp 1037–1043
- 4.
Alaa M, Zaidan AA, Zaidan BB et al (2017) A review of smart home applications based on internet of things [J]. J Netw Comput Appl 97:48–65
- 5.
Pal S, Hitchens M, Varadharajan V et al (2019) Policy-based access control for constrained healthcare resources in the context of the internet of things [J]. J Netw Comput Appl 139:57–74
- 6.
Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Available at: https://bitcoin.org/bitcoin.pdf. Accessed 7 2019
- 7.
Calderbank M (2007) The RSA cryptosystem: history, algorithm, primes. Available at:http://www.math.uchicago.edu/~may/VIGRE/VIGRE2007/REUPapers/FINALAPP/Calderbank.pdf. Accessed 7 2019
- 8.
Zheng Z, Xie S, Dai HN et al (2020) An overview on smart contracts: challenges, advances and platforms. Future Generation Computer Systems 105:475–491
- 9.
Agrawal S, Bünz KB, Zamani M et al (2019) Blockchain system for confidential and anonymous smart contracts. United States patent application US No.16/206, 661. Accessed 3 2020
- 10.
Kolluri A, Nikolic I, Sergey I et al (2019) Exploiting the laws of order in smart contracts. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp 363–373
- 11.
Aggarwal S, Chaudhary R, Aujla GS et al (2019) Blockchain for smart communities: applications, challenges and opportunities[J]. J Netw Comput Appl 144:13–48
- 12.
Zhu L, Wu Y, Gai K et al (2019) Controllable and trustworthy blockchain-based cloud data management. Futur Gener Comput Syst 91:527–535
- 13.
Huang X, Xu C, Wang P et al (2018) Lnsc: a security model for electric vehicle and charging pile management based on blockchain ecosystem. IEEE Access, pp 1–1
- 14.
Song G, Kim S, Hwang H et al (2019) Blockchain-based notarization for social media. IEEE International Conference on Consumer Electronics (ICCE), pp 1–2
- 15.
Mcghin T, Choo KR, Liu CZ et al (2019) Blockchain in healthcare applications: research challenges and opportunities [J]. J Netw Comput Appl 135:62–75
- 16.
Patil AS, Hamza R, Hassan A et al (2020) Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts. Computers & Security 97:101958
- 17.
Misra S, Mukherjee A, Roy A et al (2021) Blockchain at the edge: performance of resource-constrained IoT networks. IEEE Trans Parallel Distrib Syst 32:174–183
- 18.
Fox A, Brewer EA (1999) Harvest, yield, and scalable tolerant systems. Hot Topics in Operating Systems, pp 174–178
- 19.
Brewer EA (2000) Towards robust distributed systems. Available at: http://pld.cs.luc.edu/courses/353/spr11/notes/brewer_keynote.pdf
- 20.
Browne J. Brewer's cap theorem-the kool aid Amazon and Ebay have been drinking. Available at: http://www.julianbrowne.com/article/viewer/brewers-cap-theorem. Retrieved. 25.03.2016
- 21.
Gilbert S, Lynch N (2002) Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services. ACM SIGACT News, pp 51–59
- 22.
Jakobsson M, Juels A (1999) Proofs of work and bread pudding protocols. Secure Information Networks, pp 258–272
- 23.
Dwork C, Naor M (1992) Pricing via processing or combatting junk mail. Annual international cryptology conference, pp 139–147
- 24.
Han R, Foutris N, Kotselidis C (2019) Demystifying crypto-mining: analysis and optimizations of memory-hard PoW algorithms. IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), pp 22–33
- 25.
Sukhwani H, Martínez JM, Chang X et al (2017) Performance modeling of pbft consensus process for permissioned blockchain network (hyperledger fabric). Reliable Distributed Systems, pp 253–255
- 26.
Castro M, Liskov B (1999) Practical byzantine fault tolerance. USENIX Symposium on Operating Systems Design and Implementation (OSDI), pp 173–186
- 27.
Cachin C (2016) Architecture of the hyperledger blockchain fabric. Workshop on Distributed Cryptocurrencies and Consensus Ledgers, pp 310
- 28.
Sousa J, Bessani A, Vukolic M (2018) A byzantine fault-tolerant ordering service for the hyperledger fabric blockchain platform. Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp 51–58
- 29.
Lamport L, Shostak R, Pease M (1982) The byzantine generals problem. ACM Trans Program Lang Syst 4:382–401
- 30.
Vukolić M (2015) The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. International Workshop on Open Problems in Network Security, pp 112–125
- 31.
Wan SH, Li MJ, Liu GY et al (2020) Recent advances in consensus protocols for blockchain: a survey. Wirel Netw 26:5579–5593
- 32.
Larimer D (2013) Transactions as proof-of-stake. Available at:https://bravenewcoin.com/assets/Uploads/TransactionsAsProofOfStake10.pdf. Accessed 3 2020
- 33.
Nguyen CT, Hoang DT, Nguyen DN et al (2019) Proof-of-stake consensus mechanisms for future blockchain networks: fundamentals, applications and opportunities. IEEE Access:5727–85745
- 34.
Saleh F (2019) Blockchain without waste: proof-of-stake. Social Science Electronic Publishing. Available at SSRN 3183935
- 35.
Yang F, Zhou W, Wu Q, et al. (2019) Delegated proof of stake with downgrade: a secure and efficient Blockchain consensus algorithm with downgrade mechanism. IEEE Access, pp 18541–118555
- 36.
The go programming language (2009) Available at:https://golang.org. Accessed 5 2020
- 37.
GRPC Remote Procedure Call. Available at: https://grpc.io. Accessed on 2015
- 38.
Seres IA, Gulyás L, Nagy DA et al (2019) Topological analysis of bitcoin's lightning network. arXiv preprint arXiv:1901.04972
- 39.
Protocol Buffers (2008) Available at:https://developers.google.com/protocol-buffers. Accessed 6 2020
Acknowledgements
This research was partially supported by National Key R&D Program of China (2018YFC0831002), Sichuan science and technology program (2020YFG0040), National Natural Science Foundation of China (61971105), Science and Technology on Complex Electronic System Simulation Laboratory (DXZT-JC-ZZ-2017-012).
Author information
Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: Special Issue on Blockchain for Peer-to-Peer Computing
Guest Editors: Keping Yu, Chunming Rong, Yang Cao, and Wenjuan Li
Rights and permissions
About this article
Cite this article
Liao, D., Li, H., Wang, W. et al. Achieving IoT data security based blockchain. Peer-to-Peer Netw. Appl. (2021). https://doi.org/10.1007/s12083-020-01042-w
Received:
Accepted:
Published:
Keywords
- IoT
- Blockchain
- Data security
- Consensus