A Dynamic Scalable Blockchain Based Communication Architecture for IoT

  • Han Qiu
  • Meikang QiuEmail author
  • Gerard Memmi
  • Zhong Ming
  • Meiqin Liu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11373)


The recent development of Blockchain based cryptocurrency technology has enabled a high level of trust and security for many applications in people’s daily life. Traditional Blockchain architecture can provide decentralized and trustworthy systems for financial services with persistency, anonymity, and auditability guaranteed. Internet of Things (IoT), as the next promising smart system, has the similar decentralized topology with Blockchain. However, deploying Blockchain in IoT system is still unpractical in many aspects. In this paper, we first point out the practical obstacles to deploy Blockchain topology in IoT system. Then a dynamic Blockchain based trust system is proposed to provide a dynamic and scalable communication architecture for IoT networks. We also present a case study to further discuss the security issues and provide future research directions.


Blockchain IoT Trust Security Bitcoin Privacy 



Dr. H. Qiu and Prof. G. Memmi are supported by BART: Blockchain Advanced Research & Technologies teamed up by Telecom-ParisTech, Inria, IRT SystemX and Telecom-SudParis. This work is also partially supported by China NSFC 61836005 and 61672358; China NSFC 61728303 and the Open Research Project of the State Key Laboratory of Industrial Control Technology, Zhejiang University, China (ICT1800417). Prof. M. Qiu is the corresponding author.


  1. 1.
    Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O’Reilly Media Inc., Newton (2014)Google Scholar
  2. 2.
    Dai, W., Qiu, L., Wu, A., Qiu, M.: Cloud infrastructure resource allocation for big data applications. IEEE Trans. Big Data 4(3), 313–324 (2018)CrossRefGoogle Scholar
  3. 3.
    Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: Blockchain for IoT security and privacy: the case study of a smart home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 618–623. IEEE (2017)Google Scholar
  4. 4.
    Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P.: LSB: a lightweight scalable blockchain for IoT security and privacy. arXiv preprint arXiv:1712.02969 (2017)
  5. 5.
    Gai, K., Qiu, M.: Blend arithmetic operations on tensor-based fully homomorphic encryption over real numbers. IEEE Trans. Ind. Inform. 14(8), 3590–3598 (2018)CrossRefGoogle Scholar
  6. 6.
    Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 82, 395–411 (2018)CrossRefGoogle Scholar
  7. 7.
    Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357–388. Springer, Cham (2017). Scholar
  8. 8.
    Li, C., Qiu, M.: Reinforcement Learning for Cyber Physical Systems with Cybersecurity Case Studies. Chapman & Hall/CRC, Boca Raton (2018)Google Scholar
  9. 9.
    Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R., et al.: Identity authentication and capability based access control (IACAC) for the Internet of Things. J. Cyber Secur. Mobil. 1(4), 309–348 (2013)Google Scholar
  10. 10.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
  11. 11.
    Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, Princeton (2016)zbMATHGoogle Scholar
  12. 12.
    Qiu, H., Memmi, G., Noura, H.: An efficient secure storage scheme based on information fragmentation. In: 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 108–113. IEEE (2017)Google Scholar
  13. 13.
    Qiu, M., Gai, K., Thuraisingham, B., Tao, L., Zhao, H.: Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry. Future Gener. Comput. Syst. 80, 421–429 (2018)CrossRefGoogle Scholar
  14. 14.
    Vukolić, M.: The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. In: Camenisch, J., Kesdoğan, D. (eds.) iNetSec 2015. LNCS, vol. 9591, pp. 112–125. Springer, Cham (2016). Scholar
  15. 15.
    Wu, D., Arkhipov, D.I., Asmare, E., Qin, Z., McCann, J.A.: UbiFlow: mobility management in urban-scale software defined IoT. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 208–216. IEEE (2015)Google Scholar
  16. 16.
    Zhang, Y., Qiu, M., Tsai, C.W., Hassan, M.M., Alamri, A.: Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 11(1), 88–95 (2017)CrossRefGoogle Scholar
  17. 17.
    Zheng, Z., Xie, S., Dai, H.N., Wang, H.: Blockchain challenges and opportunities: a survey. Work Pap.-2016 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Han Qiu
    • 1
  • Meikang Qiu
    • 2
    Email author
  • Gerard Memmi
    • 1
  • Zhong Ming
    • 2
  • Meiqin Liu
    • 3
  1. 1.Telecom-ParisTechParisFrance
  2. 2.College of Computer ScienceShenzhen UniversityShenzhenChina
  3. 3.College of Electrical EngineeringZhejiang UniversityHangzhouChina

Personalised recommendations