

FOLLOWUS
School of Computer Science and Technology, University of Electronic Science and Technology of China, Chengdu 610031, China
Department of Computer Science, Sukkur IBA University, Sukkur 65200, Pakistan
School of Automation, University of Electronic Science and Technology of China, Chengdu 610031, China
[ "Raheel Ahmed MEMON, E-mail: raheelmemon@iba-suk.edu.pk" ]
Jian Ping LI, E-mail: jpli2222@uestc.edu.cn
Received:30 May 2018,
Revised:2020-;3-30,
Published:2020-04
Scan QR Code
MEMON Raheel Ahmed, LI Jian Ping, AHMED Junaid, et al. Cloud-based vs. blockchain-based IoT: a comparative survey and way forward[J]. Frontiers of Information Technology & Electronic Engineering, 2020, 21(4): 563-586.
MEMON Raheel Ahmed, LI Jian Ping, AHMED Junaid, et al. Cloud-based vs. blockchain-based IoT: a comparative survey and way forward[J]. Frontiers of Information Technology & Electronic Engineering, 2020, 21(4): 563-586. DOI: 10.1631/FITEE.1800343.
物联网已发展十多年,技术进步使其应用更加广泛,但随着连接设备增多,引发的担忧及带来的风险也在显著增加。2013年,一种新的基于加密技术的基础设施--区块链--应运而生,通过去中心化,基于区块链的物联网有可能取代现有基于云的物联网。本文对当前物联网基础设施面临的挑战进行分类,并对采用区块链作为基础设施后物联网可能遇到的问题作文献调查,比较了两种体系结构的优缺点。简要介绍了正在进行的有关区块链的关键研究,这些研究将对克服区块链在物联网应用中遇到的挑战产生显著影响。最后,考虑到这两种体系各自面临的挑战和问题以及最新研究进展,提出一种高水平的混合方案,该方案综合利用云、边缘/雾计算和区块链,以避免这两种体系的局限性。
The Internet of Things (IoT) has been evolving for more than a decade. Technological advancements have increased its popularity
but concerns and risks related to IoT are growing considerably along with the increased number of connected devices. In 2013
a new cryptography-based infrastructure called blockchain emerged with the potential to replace the existing cloud-based infrastructure of IoT through decentralization. In this article
we provide a taxonomy of the challenges in the current IoT infrastructure
and a literature survey with a taxonomy of the issues to expect in the future of the IoT after adopting blockchain as an infrastructure. The two architectures are compared based on their strengths and weaknesses. Then a brief survey of ongoing key research activities in blockchain is presented
which will have considerable impact on overcoming the challenges encountered in the applicability of blockchain in IoT. Finally
considering the challenges and issues in both infrastructures and the latest research activities
we propose a high-level hybrid IoT approach that uses the cloud
edge/fog
and blockchain together to avoid the limitations of each infrastructure.
M Aazam , , , I Khan , , , AA Alsaffar , , , 等 . . Cloud of Things: integrating Internet of Things and cloud computing and the issues involved . . Proc 11 th Int Bhurban Conf on Applied Sciences and Technology , , 2014 . . p.414 - - 419 . . DOI: 10.1109/IBCAST.2014.6778179 http://doi.org/10.1109/IBCAST.2014.6778179 . .
F Ahmed , , , YB Ko . . Mitigation of black hole attacks in routing protocol for low power and lossy networks . . Secur Commun Netw , , 2016 . . 9 ( ( 18 ): ): 5143 - - 5154 . . DOI: 10.1002/sec.1684 http://doi.org/10.1002/sec.1684 . .
S Akoush , , , R Sohan , , , A Rice , , , 等 . . Free lunch: exploiting renewable energy for computing . . 2011 . . https://www.usenix.org/events/hotos/tech/final_files/Akoush.pdf https://www.usenix.org/events/hotos/tech/final_files/Akoush.pdf , , [Accessed on Sept. 22, 2018] . .
R Almadhoun , , , M Kadadha , , , M Alhemeiri , , , 等 . . A user authentication scheme of IoT devices using blockchain- enabled fog nodes . . IEEE/ACS 15 th Int Conf on Computer Systems and Applications , , 2018 . . p.1 - - 8 . . DOI: 10.1109/AICCSA.2018.8612856 http://doi.org/10.1109/AICCSA.2018.8612856 . .
Amazon . . Announcing Amazon Elastic Compute Cloud (Amazon EC2) - beta . . 2006 . . 2018 https://aws.amazon.com/about-aws/whats-new/2006/08/24/announcing-amazon-elastic-compute-cloud-amazon-ec2---beta/ https://aws.amazon.com/about-aws/whats-new/2006/08/24/announcing-amazon-elastic-compute-cloud-amazon-ec2---beta/ , , [Accessed on Jan. 18, 2018] . .
MP Andersen , , , J Kolb , , , KF Chen , , , 等 . . Wave: a decentralized authorization system for IoT via blockchain smart contracts . . 2017 . . 2019 https://www2.eecs.berkeley.edu/Pubs/TechRpts/2017/EECS-2017-234.pdf https://www2.eecs.berkeley.edu/Pubs/TechRpts/2017/EECS-2017-234.pdf , , [Accessed on May 29, 2019] . .
M Armbrust , , , A Fox , , , R Griffith , , , 等 . . A view of cloud computing . . Commun ACM , , 2010 . . 53 ( ( 4 ): ): 50 - - 58 . . DOI: 10.1145/1721654.1721672 http://doi.org/10.1145/1721654.1721672 . .
S Aulbach , , , T Grust , , , D Jacobs , , , 等 . . Multi-tenant databases for software as a service: schema-mapping techniques . . Proc ACM SIGMOD Int Conf on Management of Data , , 2008 . . p.1195 - - 1206 . . DOI: 10.1145/1376616.1376736 http://doi.org/10.1145/1376616.1376736 . .
A Bahga , , , VK Madisetti . . Blockchain platform for Industrial Internet of Things . . J Softw Eng Appl , , 2016 . . 9 ( ( 10 ): ): 533 - - 546 . . DOI: 10.4236/jsea.2016.910036 http://doi.org/10.4236/jsea.2016.910036 . .
A Banafa . . IoT and blockchain convergence: benefits and challenges . . 2017 . . 2018 http://iot.ieee.org/newsletter/january-2017/iot-and-blockchain-convergence-benefits-and-challenges.html http://iot.ieee.org/newsletter/january-2017/iot-and-blockchain-convergence-benefits-and-challenges.html , , [Accessed on Feb. 23, 2018] . .
S Bano , , , M Al-Bassam , , , G Danzis . . The road to scalable blockchain designs . . Winter , , 2017a . . 42 ( ( 4 ): ): 31 - - 36 . . . .
S Bano , , , A Sonnino , , , M Al-Bassam , , , 等 . . SoK: consensus in the age of blockchains . . 2017b . . 2018 https://arxiv.org/pdf/1711.03936.pdf https://arxiv.org/pdf/1711.03936.pdf , , [Accessed on Sept. 27, 2018] . .
NZ Bawany , , , JA Shamsi , , , K Salah . . DDoS attack detection and mitigation using SDN: methods, practices, and solutions . . Arab J Sci Eng , , 2017 . . 42 ( ( 2 ): ): 425 - - 441 . . DOI: 10.1007/s13369-017-2414-5 http://doi.org/10.1007/s13369-017-2414-5 . .
P Bellavista , , , A Zanni . . Towards better scalability for IoT-cloud interactions via combined exploitation of MQTT and CoAP . . IEEE 2 nd Int Forum on Research and Technologies for Society and Industry Leveraging a Better Tomorrow , , 2016 . . p.1 - - 6 . . DOI: 10.1109/RTSI.2016.7740614 http://doi.org/10.1109/RTSI.2016.7740614 . .
T Bhattasali , , , R Chaki . . A survey of recent intrusion detection systems for wireless sensor network . . In: Wyld DC, Wozniak M, Chaki N, et al. (Eds.), Advances in Network Security and Applications. Springer Berlin Heidelberg , , 2011 . . p.268 - - 280 . . DOI: 10.1007/978-3-642-22540-6_27 http://doi.org/10.1007/978-3-642-22540-6_27 . .
K Biswas , , , V Muthukkumarasamy . . Securing smart cities using blockchain technology . . IEEE 18 th Int Conf on High Performance Computing and Communications , , 2016 . . p.1392 - - 1393 . . DOI: 10.1109/HPCC-SmartCity-DSS.2016.0198 http://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0198 . .
J Bonneau , , , A Miller , , , J Clark , , , 等 . . SoK: research perspectives and challenges for Bitcoin and crypto- currencies . . Proc IEEE Symp on Security and Privacy , , 2015 . . p.104 - - 121 . . DOI: 10.1109/SP.2015.14 http://doi.org/10.1109/SP.2015.14 . .
F Bonomi , , , R Milito , , , J Zhu , , , 等 . . Fog computing and its role in the Internet of Things . . Proc 1 st Edition of the MCC Workshop on Mobile Cloud Computing , , 2012 . . p.13 - - 16 . . DOI: 10.1145/2342509.2342513 http://doi.org/10.1145/2342509.2342513 . .
M Brachmann , , , O Garcia-Morchon , , , M Kirsche . . Security for practical CoAP applications: issues and solution approaches . . 10 th GI/ITG KuVS Fachgespraech Sensornetze , , 2011 . . p.1 - - 4 . . https://www.researchgate.net/profile/Michael_Kirsche/publication/265973615_Security_for_Practical_CoAP_Applications_Issues_and_Solution_Approaches/links/5583f51c08ae4738295c2028.pdf https://www.researchgate.net/profile/Michael_Kirsche/publication/265973615_Security_for_Practical_CoAP_Applications_Issues_and_Solution_Approaches/links/5583f51c08ae4738295c2028.pdf , , [Accessed on Feb. 24, 2018] . .
J Brito , , , A Castillo . . Bitcoin: a Primer for Policymakers . . Mercatus Center at George Mason University , , 2013 . . .
J Brown . . Companies forge cooperative to explore blockchain-based IoT security . . 2017 . . https://www.ciodive.com/news/companies-forge-cooperative-to-explore-blockchain-based-iot-security/435007/ https://www.ciodive.com/news/companies-forge-cooperative-to-explore-blockchain-based-iot-security/435007/ , , [Accessed on Feb. 23, 2018] . .
V Buterin . . Ethereum white paper . . GitHub Repository , , 2013 . . .
V Buterin . . Privacy on the blockchain . . Available from , , 2016 . . https://blog.ethereum.org/2016/01/15/privacy-on-the-blockchain/ https://blog.ethereum.org/2016/01/15/privacy-on-the-blockchain/ , , [Accessed on Sept. 27, 2018] . .
C Cachin . . Architecture of the Hyperledger Blockchain Fabric . . IBM Research , , 2016 . . https://pdfs.semanticscholar.org/f852/c5f3fe649f8a17ded391df0796677a59927f.pdf https://pdfs.semanticscholar.org/f852/c5f3fe649f8a17ded391df0796677a59927f.pdf , , [Accessed on Feb. 24, 2018] . .
M Castro , , , B Liskov . . Practical Byzantine fault tolerance and proactive recovery . . ACM Trans Comput Syst , , 2002 . . 20 ( ( 4 ): ): 398 - - 461 . . DOI: 10.1145/571637.571640 http://doi.org/10.1145/571637.571640 . .
SH Chae , , , W Choi , , , JH Lee , , , 等 . . Enhanced secrecy in stochastic wireless networks: artificial noise with secrecy protected zone . . IEEE Trans Inform Forens Secur , , 2014 . . 9 ( ( 10 ): ): 1617 - - 1628 . . DOI: 10.1109/TIFS.2014.2341453 http://doi.org/10.1109/TIFS.2014.2341453 . .
YY Chen , , , W Trappe , , , RP Martin . . Detecting and localizing wireless spoofing attacks . . 4 th Annual IEEE Communications Society Conf on Sensor, Mesh and Ad Hoc Communications and Networks , , 2007 . . p.193 - - 202 . . DOI: 10.1109/SAHCN.2007.4292831 http://doi.org/10.1109/SAHCN.2007.4292831 . .
K Christidis , , , M Devetsikiotis . . Blockchains and smart contracts for the Internet of Things . . IEEE Access , , 2016 . . 4 2292 - - 2303 . . DOI: 10.1109/ACCESS.2016.2566339 http://doi.org/10.1109/ACCESS.2016.2566339 . .
Cisco . . Fog computing the Internet of Things: extend the cloud to where the things are . . White Paper , , 2015 . . https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf , , . .
RJ Cohn , , , RJ Coppen , , , A Banks , , , 等 . . MQTT version 3.1 . . 2014 . . https://www.oasis-open.org/committees/download.php/52951/mqtt-v3.1.1-csd06.pdf https://www.oasis-open.org/committees/download.php/52951/mqtt-v3.1.1-csd06.pdf , , [Accessed on May 29, 2019] . .
D Conzon , , , T Bolognesi , , , P Brizzi , , , 等 . . The VIRTUS middleware: an XMPP based architecture for secure IoT communications . . 21 st Int Conf on Computer Communications and Networks , , 2012 . . p.1 - - 6 . . DOI: 10.1109/ICCCN.2012.6289309 http://doi.org/10.1109/ICCCN.2012.6289309 . .
NT Courtois , , , L Bahack . . On subversive miner strategies and block withholding attack in Bitcoin digital currency . . 2014 . . https://arxiv.org/abs/1402.1718 https://arxiv.org/abs/1402.1718 , , [Accessed on Sept. 16, 2018] . .
V Dhillon , , , D Metcalf , , , M Hooper . . Blockchain enabled applications: understand the blockchain ecosystem and how to make it work for you . . Apress, Berkeley, CA , , 2017 . . DOI: 10.1007/978-1-4842-3081-7_1 http://doi.org/10.1007/978-1-4842-3081-7_1 . .
A Dorri , , , SS Kanhere , , , R Jurdak , , , 等 . . LSB: a lightweight scalable blockchain for IoT security and privacy . . 2017a . . https://arxiv.org/pdf/1712.02969.pdf https://arxiv.org/pdf/1712.02969.pdf , , [Accessed on Sept. 14, 2018] . .
A Dorri , , , SS Kanhere , , , R Jurdak , , , 等 . . Blockchain for IoT security and privacy: the case study of a smart home . . IEEE Int Conf on Pervasive Computing and Communi- cations Workshops (PerCom Workshops) , , 2017b . . p.618 - - 623 . . DOI: 10.1109/PERCOMW.2017.7917634 http://doi.org/10.1109/PERCOMW.2017.7917634 . .
D Drescher . . Blockchain basics . . Apress, Berkeley, CA , , 2017 . . DOI: 10.1007/978-1-4842-2604-9 http://doi.org/10.1007/978-1-4842-2604-9 . .
A Dvir , , , T Holczer , , , L Buttyan . . VeRA-version number and rank authentication in RPL . . IEEE 8 th Int Conf on Mobile Ad-hoc and Sensor Systems , , 2011 . . p.709 - - 714 . . DOI: 10.1109/MASS.2011.76 http://doi.org/10.1109/MASS.2011.76 . .
C Dwork , , , M Naor . . Pricing via processing or combatting junk mail . . In: Brickell EF (Ed.), Advances in Cryptology—CRYPTO' 92. Springer Berlin Heidelberg , , 1993 . . p.139 - - 147 . . DOI: 10.1007/3-540-48071-4_10 http://doi.org/10.1007/3-540-48071-4_10 . .
H Elham , , , A Lebbat , , , H Medromi . . Enhance security of cloud computing through fork virtual machine . . IEEE Int Conf on Complex Systems , , 2012 . . p.1 - - 4 . . DOI: 10.1109/ICoCS.2012.6458569 http://doi.org/10.1109/ICoCS.2012.6458569 . .
I Eyal , , , EG Sirer . . Majority is not enough: Bitcoin mining is vulnerable . . Commun ACM , , 2018 . . 61 ( ( 7 ): ): 95 - - 102 . . DOI: 10.1145/3212998 http://doi.org/10.1145/3212998 . .
I Eyal , , , AE Gencer , , , EG Sirer , , , 等 . . Bitcoin-NG: a scalable blockchain protocol . . 2015 . . https://arxiv.org/abs/1510.02037 https://arxiv.org/abs/1510.02037 , , . .
M Ficco , , , C Esposito , , , Y Xiang , , , 等 . . Pseudo-dynamic testing of realistic edge-fog cloud ecosystems . . IEEE Commun Mag , , 2017 . . 55 ( ( 11 ): ): 98 - - 104 . . DOI: 10.1109/MCOM.2017.1700328 http://doi.org/10.1109/MCOM.2017.1700328 . .
C Formisano , , , D Pavia , , , L Gurgen , , , 等 . . The advantages of IoT and cloud applied to smart cities . . 3 rd Int Conf on Future Internet of Things and Cloud , , 2015 . . p.325 - - 332 . . DOI: 10.1109/FiCloud.2015.85 http://doi.org/10.1109/FiCloud.2015.85 . .
L Foschini , , , T Taleb , , , A Corradi , , , 等 . . M2M-based metropolitan platform for IMS-enabled road traffic management in IoT . . IEEE Commun Mag , , 2011 . . 49 ( ( 11 ): ): 50 - - 57 . . DOI: 10.1109/MCOM.2011.6069709 http://doi.org/10.1109/MCOM.2011.6069709 . .
E Gaetani , , , L Aniello , , , R Baldoni , , , 等 . . Blockchain- based database to ensure data integrity in cloud computing environments . . Italian Conf on Cybersecurity , , 2017 . . https://eprints.soton.ac.uk/411996/ https://eprints.soton.ac.uk/411996/ , , [Accessed on Sept. 27, 2018] . .
Garai , , , A Attila , , , I Péntek . . Cognitive telemedicine IoT technology for dynamically adaptive eHealth content management reference framework embedded in cloud architecture . . 7 th IEEE Int Conf on Cognitive Infocommunications , , 2016 . . p.187 - - 192 . . DOI: 10.1109/CogInfoCom.2016.7804547 http://doi.org/10.1109/CogInfoCom.2016.7804547 . .
A Gervais , , , GO Karame , , , K Wüst , , , 等 . . On the security and performance of proof of work blockchains . . Proc ACM SIGSAC Conf on Computer and Communications Security , , 2016 . . p.3 - - 16 . . DOI: 10.1145/2976749.2978341 http://doi.org/10.1145/2976749.2978341 . .
Goiri , , , R Beauchea , , , K Le , , , 等 . . Greenslot: scheduling energy consumption in green datacenters . . Proc Int Conf for High Performance Computing, Networking, Storage and Analysis , , 2011a . . p.1 - - 11 . . DOI: 10.1145/2063384.2063411 http://doi.org/10.1145/2063384.2063411 . .
Goiri , , , K Le , , , J Guitart , , , 等 . . Intelligent placement of datacenters for Internet services . . 31 st Int Conf on Distributed Computing Systems , , 2011b . . p.131 - - 142 . . DOI: 10.1109/ICDCS.2011.19 http://doi.org/10.1109/ICDCS.2011.19 . .
J Granjal , , , E Monteiro , , , J Sá Silva . . End-to-end transport- layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication . . IFIP Networking Conf , , 2013a . . p.1 - - 9 . . http://ieeexplore.ieee.org/abstract/document/6663530/ http://ieeexplore.ieee.org/abstract/document/6663530/ , , [Accessed on Feb. 24, 2018] . .
J Granjal , , , E Monteiro , , , J Sá Silva . . Application-layer security for the WoT: extending CoAP to support end-to- end message security for Internet-integrated sensing applications . . LNCS , , 2013b . . 7889 140 - - 153 . . DOI: 10.1007/978-3-642-38401-1_11 http://doi.org/10.1007/978-3-642-38401-1_11 . .
J Granjal , , , E Monteiro , , , Silva J Sá . . Security for the Internet of Things: a survey of existing protocols and open research issues . . IEEE Commun Surv Tutor , , 2015 . . 17 ( ( 3 ): ): 1294 - - 1312 . . DOI: 10.1109/COMST.2015.2388550 http://doi.org/10.1109/COMST.2015.2388550 . .
A Hameed , , , A Khoshkbarforoushha , , , R Ranjan , , , 等 . . A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems . . Computing , , 2016 . . 98 ( ( 7 ): ): 751 - - 774 . . DOI: 10.1007/s00607-014-0407-8 http://doi.org/10.1007/s00607-014-0407-8 . .
M Henze , , , B Wolters , , , R Matzutt , , , 等 . . Distributed configuration, authorization and management in the cloud-based Internet of Things . . IEEE Trustcom/ BigDataSE/ICESS , , 2017 . . p.185 - - 192 . . DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.236 http://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.236 . .
S Hilton . . Dyn analysis summary of Friday October 21 Attack . . Company News , , 2016 . . https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/ https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/ , , [Accessed on Feb. 24, 2018] . .
YWP Hong , , , PC Lan , , , CCJ Kuo . . Enhancing physical- layer secrecy in multiantenna wireless systems: an overview of signal processing approaches . . IEEE Signal Process Mag , , 2013 . . 30 ( ( 5 ): ): 29 - - 40 . . DOI: 10.1109/MSP.2013.2256953 http://doi.org/10.1109/MSP.2013.2256953 . .
R Hummen , , , J Hiller , , , H Wirtz , , , 等 . . 6LoWPAN fragmentation attacks and mitigation mechanisms . . Proc 6 th ACM Conf on Security and Privacy in Wireless and Mobile Networks , , 2013 . . p.55 - - 66 . . DOI: 10.1145/2462096.2462107 http://doi.org/10.1145/2462096.2462107 . .
J Hur , , , DK Noh . . Attribute-based access control with efficient revocation in data outsourcing systems . . IEEE Trans Parall Distrib Syst , , 2011 . . 22 ( ( 7 ): ): 1214 - - 1221 . . DOI: 10.1109/TPDS.2010.203 http://doi.org/10.1109/TPDS.2010.203 . .
K Jagdeep , , , S Meghna . . Extending IoTs into the cloud- based platform for examining Amazon web services . . Examining Cloud Computing Technologies Through the Internet of Things , , 2017 . . p.216 - - 227 . . . .
M Jakobsson , , , A Juels . . Proofs of work and bread pudding protocols (extended abstract) . . In: Preneel B (Ed.), Secure Information Networks. Springer, Boston, MA , , 1999 . . p.258 - - 272 . . DOI: 10.1007/978-0-387-35568-9_18 http://doi.org/10.1007/978-0-387-35568-9_18 . .
Research Juniper . . Cybercrime will cost businesses over $2 trillion by 2019 . . Press Releases , , 2015 . . https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion , , [Accessed on Feb. 24, 2018] . .
MA Khan , , , K Salah . . IoT security: review, blockchain solutions, and open challenges . . Fut Gener Comput Syst , , 2018 . . 82 395 - - 411 . . DOI: 10.1016/j.future.2017.11.022 http://doi.org/10.1016/j.future.2017.11.022 . .
A Khosravi , , , R Buyya . . Energy and carbon footprint- aware management of geo-distributed cloud data centers: a taxonomy, state of the art, and future directions . . 2018 . . https://www.igi-global.com/chapter/energy-and-carbon-footprint-aware-management-of-geo-distributed-cloud- data-centers/189954 https://www.igi-global.com/chapter/energy-and-carbon-footprint-aware-management-of-geo-distributed-cloud- data-centers/189954 , , [Accessed on Sept. 22, 2018] . .
HG Kim . . Protection against packet fragmentation attacks at 6LoWPAN adaptation layer . . Proc Int Conf on Convergence and Hybrid Information Technology , , 2008 . . p.796 - - 801 . . DOI: 10.1109/ICHIT.2008.261 http://doi.org/10.1109/ICHIT.2008.261 . .
E Kokoris-Kogias , , , P Jovanovic , , , N Gailly , , , 等 . . Enhancing Bitcoin security and performance with strong consistency via collective signing . . 2016 . . https://arxiv.org/abs/1602.06997 https://arxiv.org/abs/1602.06997 , , . .
N Kshetri . . Can blockchain strengthen the Internet of Things . . IT Prof , , 2017a . . 19 ( ( 4 ): ): 68 - - 72 . . DOI: 10.1109/MITP.2017.3051335 http://doi.org/10.1109/MITP.2017.3051335 . .
N Kshetri . . Blockchain's roles in strengthening cyber- security and protecting privacy . . Telecommun Pol , , 2017b . . 41 ( ( 10 ): ): 1027 - - 1038 . . DOI: 10.1016/j.telpol.2017.09.003 http://doi.org/10.1016/j.telpol.2017.09.003 . .
DR Li , , , X Shen , , , NC Chen , , , 等 . . Space-based information service in Internet plus era . . Sci China Inform Sci , , 2017 . . 60 ( ( 10 ): ): 102308 DOI: 10.1007/s11432-016-9164-1 http://doi.org/10.1007/s11432-016-9164-1 . .
JW Li , , , CF Jia , , , J Li , , , 等 . . Outsourcing encryption of attribute-based encryption with mapreduce . . LNCS , , 2012 . . 7618 191 - - 201 . . DOI: 10.1007/978-3-642-34129-8_17 http://doi.org/10.1007/978-3-642-34129-8_17 . .
Y Li , , , T Marier-Bienvenue , , , A Perron-Brault , , , 等 . . Blockchain technology in business organizations: a scoping review . . Proc 51 st Hawaii Int Conf on System Sciences , , 2018 . . DOI: 10.24251/HICSS.2018.565 http://doi.org/10.24251/HICSS.2018.565 . .
CF Liao , , , SW Bao , , , CJ Cheng , , , 等 . . On design issues and architectural styles for blockchain-driven IoT services . . IEEE Int Conf on Consumer Electronics , , 2017 . . p.351 - - 352 . . DOI: 10.1109/ICCE-China.2017.7991140 http://doi.org/10.1109/ICCE-China.2017.7991140 . .
IC Lin , , , TC Liao . . A survey of blockchain security issues and challenges . . Int J Netw Secur , , 2017 . . 19 ( ( 5 ): ): 653 - - 659 . . DOI: 10.6633/IJNS.201709.19(5).01 http://doi.org/10.6633/IJNS.201709.19(5).01 . .
CH Liu , , , B Yang , , , TC Liu . . Efficient naming, addressing and profile services in Internet-of-Things sensory environments . . Ad Hoc Netw , , 2014 . . 18 85 - - 101 . . DOI: 10.1016/j.adhoc.2013.02.008 http://doi.org/10.1016/j.adhoc.2013.02.008 . .
L Luu , , , DH Chu , , , H Olickel , , , 等 . . Making smart contracts smarter . . Proc ACM SIGSAC Conf on Computer and Communications Security , , 2016a . . p.254 - - 269 . . DOI: 10.1145/2976749.2978309 http://doi.org/10.1145/2976749.2978309 . .
L Luu , , , V Narayanan , , , CD Zheng , , , 等 . . A secure sharding protocol for open blockchains . . Proc ACM SIGSAC Conf on Computer and Communications Security , , 2016b . . p.17 - - 30 . . DOI: 10.1145/2976749.2978389 http://doi.org/10.1145/2976749.2978389 . .
PN Mahalle , , , B Anggorojati , , , NR Prasad , , , 等 . . Identity authentication and capability based access control (IACAC) for the Internet of Things . . J Cyber Secur Mob , , 2013 . . 1 309 - - 348 . . . .
J Manral . . IoT enabled insurance ecosystem— possibilities, challenges and risks . . 2015 . . http://arxiv.org/abs/1510.03146 http://arxiv.org/abs/1510.03146 , , . .
YD Marinakis , , , ST Walsh , , , R Harms . . Internet of Things technology diffusion forecasts . . Portland Int Conf on Management of Engineering and Technology , , 2017 . . p.1 - - 5 . . DOI: 10.23919/PICMET.2017.8125435 http://doi.org/10.23919/PICMET.2017.8125435 . .
RA Memon , , , JP Li , , , J Ahmed . . Simulation model for blockchain systems using queuing theory . . Electronics , , 2019a . . 8 ( ( 2 ): ): 234 DOI: 10.3390/electronics8020234 http://doi.org/10.3390/electronics8020234 . .
RA Memon , , , JP Li , , , J Ahmed , , , 等 . . Modeling of blockchain based systems using queuing theory simulation . . 15 th Int Computer Conf on Wavelet Active Media Technology and Information Processing , , 2019b . . p.107 - - 111 . . DOI: 10.1109/ICCWAMTIP.2018.8632560 http://doi.org/10.1109/ICCWAMTIP.2018.8632560 . .
J Moar . . Cybercrime & the Internet of Threats . . White Paper, Juniper Research , , 2017 . . .
MB Mollah , , , MAK Azad , , , A Vasilakos . . Security and privacy challenges in mobile cloud computing: survey and way ahead . . J Netw Comput Appl , , 2017 . . 84 38 - - 54 . . DOI: 10.1016/j.jnca.2017.02.001 http://doi.org/10.1016/j.jnca.2017.02.001 . .
JH Mosakheil . . Security threats classification in blockchains . . 2018 . . http://repository.stcloudstate.edu/msia_etds/48 http://repository.stcloudstate.edu/msia_etds/48 , , [Accessed on Sept. 25, 2018] . .
S Nakamoto . . Bitcoin: a peer-to-peer electronic cash system . . 2008 . . https://bitcoinsv.io/bitcoin https://bitcoinsv.io/bitcoin , , . .
SM Nakano . . Cryptocurrency and Blockchain Blueprint for Beginners: All You Need to Know about Bitcoin, Ethereum, Ripple, Litecoin and other Popular Crypto- currencies . . CreateSpace Independent Publishing Platform, USA , , 2018 . . .
HS Ning , , , H Liu . . Cyber-physical-social-thinking space based science and technology framework for the Internet of Things . . Sci China Inform Sci , , 2015 . . 58 ( ( 3 ): ): 1 - - 19 . . DOI: 10.1007/s11432-014-5209-2 http://doi.org/10.1007/s11432-014-5209-2 . .
G Noubir , , , GL Lin . . Low-power DOS attacks in data wireless LANs and countermeasures . . ACM SIGMOBILE Mob Comput Commun Rev , , 2003 . . 7 ( ( 3 ): ): 29 - - 30 . . DOI: 10.1145/961268.961277 http://doi.org/10.1145/961268.961277 . .
AZ Ourad , , , B Belgacem , , , K Salah . . Using blockchain for IoT access control and authentication management . . LNCS , , 2018 . . 10972 150 - - 164 . . DOI: 10.1007/978-3-319-94370-1_11 http://doi.org/10.1007/978-3-319-94370-1_11 . .
RM Qi , , , C Feng , , , Z Liu , , , 等 . . Blockchain-powered Internet of Things, E-governance and E-democracy . . In: Vinod KT (Ed.), E-Democracy for Smart Cities. Springer, Singapore , , 2017 . . p.509 - - 520 . . DOI: 10.1007/978-981-10-4035-1_17 http://doi.org/10.1007/978-981-10-4035-1_17 . .
XC Qian , , , JD Zhang . . Study on the structure of "Internet of Things (IoT)" business operation support platform . . IEEE 12 th Int Conf on Communication Technology , , 2010 . . p.1068 - - 1071 . . DOI: 10.1109/ICCT.2010.5688537 http://doi.org/10.1109/ICCT.2010.5688537 . .
PP Ray . . A survey of IoT cloud platforms . . Fut Comput Inform J , , 2016 . . 1 ( ( 1-2 ): ): 35 - - 46 . . DOI: 10.1016/j.fcij.2017.02.001 http://doi.org/10.1016/j.fcij.2017.02.001 . .
R Riaz , , , KH Kim , , , HF Ahmed . . Security analysis survey and framework design for IP connected LoWPANs . . Proc Int Symp on Autonomous Decentralized Systems , , 2009 . . p.29 - - 34 . . DOI: 10.1109/ISADS.2009.5207373 http://doi.org/10.1109/ISADS.2009.5207373 . .
BP Rimal , , , E Choi , , , I Lumb . . A taxonomy and survey of cloud computing systems . . 5 th Int Joint Conf on INC, IMS, and IDC , , 2009 . . p.44 - - 51 . . DOI: 10.1109/NCM.2009.218 http://doi.org/10.1109/NCM.2009.218 . .
P Rimba , , , AB Tran , , , I Weber , , , 等 . . Comparing blockchain and cloud services for business process execution . . IEEE Int Conf on Software Architecture , , 2017 . . p.257 - - 260 . . DOI: 10.1109/ICSA.2017.44 http://doi.org/10.1109/ICSA.2017.44 . .
S Sagiroglu , , , D Sinanc . . Big data: a review . . Int Conf on Collaboration Technologies and Systems , , 2013 . . p.42 - - 47 . . DOI: 10.1109/CTS.2013.6567202 http://doi.org/10.1109/CTS.2013.6567202 . .
M Samaniego , , , R Deters . . Blockchain as a service for IoT . . IEEE Int Conf on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) , , 2017 . . p.433 - - 436 . . DOI: 10.1109/iThings-GreenCom-CPSCom-SmartData.2016.102 http://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.102 . .
AP S . . SAP announces first co-innovation customers, partners in blockchain initiative for Internet of Things . . 2017 . . https://news.sap.com/sap-announces-first-co-innovation-customers-partners-in-blockchain-initiative-for-internet-of-things/ https://news.sap.com/sap-announces-first-co-innovation-customers-partners-in-blockchain-initiative-for-internet-of-things/ , , [Accessed on Feb. 24, 2018] . .
S Seibold , , , G Samman . . Consensus immutable agreement for the Internet of Value . . Technical Report , , 2016 . . https://assets.kpmg.com/content/dam/kpmg/pdf/2016/06/kpmg-blockchain-consensus-mechanism.pdf https://assets.kpmg.com/content/dam/kpmg/pdf/2016/06/kpmg-blockchain-consensus-mechanism.pdf , , . .
M Sethi , , , J Arkko , , , A Ker nen . . End-to-end security for sleepy smart object networks . . 37 th Annual IEEE Conf on Local Computer Networks , , 2012 . . p.964 - - 972 . . DOI: 10.1109/LCNW.2012.6424089 http://doi.org/10.1109/LCNW.2012.6424089 . .
MH Sherif . . Protocols for Secure Electronic Commerce (3 rd Ed . . CRC Press, Boca Raton, USA , , 2016 . . .
Shveta , , , A Pandey . . Energy conservation and security issues in cloud computing: a review . . Int J Adv Comput Sci Cloud Comput , , 2014 . . 2 ( ( 1 ): ): 57 - - 60 . . . .
S Sicari , , , A Rizzardi , , , LA Grieco , , , 等 . . Security, privacy and trust in Internet of Things: the road ahead . . Comput Netw , , 2015 . . 76 146 - - 164 . . DOI: 10.1016/j.comnet.2014.11.008 http://doi.org/10.1016/j.comnet.2014.11.008 . .
D Singh , , , G Tripathi , , , AJ Jara . . A survey of Internet-of- Things: future vision, architecture, challenges and services . . IEEE World Forum on Internet of Things , , 2014 . . p.287 - - 292 . . DOI: 10.1109/WF-IoT.2014.6803174 http://doi.org/10.1109/WF-IoT.2014.6803174 . .
I Singh , , , SW Lee . . Comparative requirements analysis for the feasibility of blockchain for secure cloud . . In: Kamalrudin M, Ahmad S, Ikram N (Eds.), Requirements Engineering for Internet of Things. Springer, Singapore , , 2018 . . p.57 - - 72 . . DOI: 10.1007/978-981-10-7796-8_5 http://doi.org/10.1007/978-981-10-7796-8_5 . .
J Singh , , , T Pasquier , , , J Bacon , , , 等 . . Twenty security considerations for cloud-supported Internet of Things . . IEEE Int Things J , , 2016 . . 3 ( ( 3 ): ): 269 - - 284 . . DOI: 10.1109/JIOT.2015.2460333 http://doi.org/10.1109/JIOT.2015.2460333 . .
B Singhal , , , G Dhameja , , , PS Panda . . Building an Ethereum DApp . . In: Beginning Blockchain. Apress, Berkeley, CA , , 2018 . . p.319 - - 375 . . DOI: 10.1007/978-1-4842-3444-0_6 http://doi.org/10.1007/978-1-4842-3444-0_6 . .
D Soubra . . The 3Vs that define Big Data . . 2012 . . https://www.datasciencecentral.com/forum/topics/the-3vs-that-define-big-data https://www.datasciencecentral.com/forum/topics/the-3vs-that-define-big-data , , . .
C Stergiou , , , KE Psannis , , , BG Kim , , , 等 . . Secure integration of IoT and cloud computing . . Fut Gener Comput Syst , , 2018 . . 78 964 - - 975 . . DOI: 10.1016/j.future.2016.11.031 http://doi.org/10.1016/j.future.2016.11.031 . .
H Stormer , , , A Meier . . ePayment . . In: eBusiness & eCommerce. Springer Berlin Heidelberg , , 2012 . . p.181 - - 202 . . DOI: 10.1007/978-3-642-29802-8_7 http://doi.org/10.1007/978-3-642-29802-8_7 . .
CP Strite . . Bread-Toaster . . US1394450A , , 1920 . . https://patents.google.com/patent/US1394450 https://patents.google.com/patent/US1394450 , , [Accessed on Feb. 23, 2018] . .
L Sun , , , Y Li , , , RA Memon . . An open IoT framework based on microservices architecture . . China Commun , , 2017 . . 14 ( ( 2 ): ): 154 - - 162 . . DOI: 10.1109/CC.2017.7868163 http://doi.org/10.1109/CC.2017.7868163 . .
N Szabo . . Smart contracts: building blocks for digital markets . . 1996 . . http://www.alamut.com/subj/economics/nick_ szabo/smartContracts.html http://www.alamut.com/subj/economics/nick_ szabo/smartContracts.html , , [Accessed on Feb. 24, 2018] . .
M Thakur . . Authentication, authorization and accounting with Ethereum blockchain . . 2017 . . https://helda.helsinki.fi/bit stream/handle/10138/228842/aaa-ethereum-blockchain.pdf https://helda.helsinki.fi/bit stream/handle/10138/228842/aaa-ethereum-blockchain.pdf , , [Accessed on Sept. 11, 2018] . .
S Underwood . . Blockchain beyond Bitcoin . . Commun ACM , , 2016 . . 59 ( ( 11 ): ): 15 - - 17 . . DOI: 10.1145/2994581 http://doi.org/10.1145/2994581 . .
R van der Meulen . . Gartner Says 8.4 Billion Connected "Things" will be in use in 2017, up 31 Percent from 2016 . . Gartner Press Release , , 2017 . . .
J Wang , , , P Wu , , , XY Wang , , , 等 . . The outlook of blockchain technology for construction engineering management . . Front Eng Manag , , 2017 . . 4 ( ( 1 ): ): 67 - - 75 . . DOI: 10.15302/J-FEM-2017006 http://doi.org/10.15302/J-FEM-2017006 . .
WB Wang , , , SQ Fan . . Attacking OpenSSL ECDSA with a small amount of side-channel information . . Sci China Inform Sci , , 2018 . . 61 ( ( 3 ): ): 032105 DOI: 10.1007/s11432-016-9030-0 http://doi.org/10.1007/s11432-016-9030-0 . .
YF Wang , , , T Uehara , , , R Sasaki . . Fog computing: issues and challenges in security and forensics . . IEEE 39 th Annual Computer Software and Applications Conf , , 2015 . . p.53 - - 59 . . DOI: 10.1109/COMPSAC.2015.173 http://doi.org/10.1109/COMPSAC.2015.173 . .
W Warren , , , A Bandeali . . 0x: an open protocol for decentralized exchange on the ethereum blockchain . . 2017 . . https://0x.org/pdfs/0x_white_paper.pdf https://0x.org/pdfs/0x_white_paper.pdf , , [Accessed on Feb. 24, 2018] . .
K Weekly , , , K Pister . . Evaluating sinkhole defense techniques in RPL networks . . 20 th Int Conf on Network Protocols , , 2012 . . p.1 - - 6 . . DOI: 10.1109/ICNP.2012.6459948 http://doi.org/10.1109/ICNP.2012.6459948 . .
A Whitmore , , , A Agarwal , , , XL Da . . The Internet of Things—a survey of topics and trends . . Inform Syst Front , , 2015 . . 17 ( ( 2 ): ): 261 - - 274 . . DOI: 10.1007/s10796-014-9489-2 http://doi.org/10.1007/s10796-014-9489-2 . .
S Wilkinson , , , T Boshevski , , , J Brandoff , , , 等 . . Storj—a peer-to-peer cloud storage network . . 2014 . . http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.693.785 http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.693.785 , , [Accessed on Sept. 15, 2018] . .
D Wilusz , , , J Rykowski . . The architecture of coupon-based, semi-off-line, anonymous micropayment system for Internet of Things . . In: Camarinha-Matos LM, Tomic S, Gra a P (Eds.), Technological Innovation for the Internet of Things. Springer Berlin Heidelberg , , 2013 . . p.125 - - 132 . . DOI: 10.1007/978-3-642-37291-9_14 http://doi.org/10.1007/978-3-642-37291-9_14 . .
Worldometer . . World Population Projections . . 2018 . . http://www.worldometers.info/world-population/world- population-projections/ http://www.worldometers.info/world-population/world- population-projections/ , , [Accessed on Sept. 15, 2018] . .
L Xiao , , , LJ Greenstein , , , NB Mandayam , , , 等 . . Channel- based detection of Sybil attacks in wireless networks . . IEEE Trans Inform Forens Secur , , 2009 . . 4 ( ( 3 ): ): 492 - - 503 . . DOI: 10.1109/TIFS.2009.2026454 http://doi.org/10.1109/TIFS.2009.2026454 . .
ZH Xiong , , , Y Zhang , , , D Niyato , , , 等 . . When mobile blockchain meets edge computing . . 2017 . . https://arxiv.org/abs/1711.05938?context=cs https://arxiv.org/abs/1711.05938?context=cs , , . .
WY Xu , , , W Trappe , , , YY Zhang , , , 等 . . The feasibility of launching and detecting jamming attacks in wireless networks . . Proc 6 th ACM Int Symp on Mobile Ad Hoc Networking and Computing , , 2005 . . p.46 - - 57 . . DOI: 10.1145/1062689.1062697 http://doi.org/10.1145/1062689.1062697 . .
C Yang , , , D Puthal , , , SP Mohanty , , , 等 . . Big-sensing-data curation for the cloud is coming: a promise of scalable cloud-data-center mitigation for next-generation IoT and wireless sensor networks . . IEEE Consum Electron Mag , , 2017 . . 6 ( ( 4 ): ): 48 - - 56 . . DOI: 10.1109/MCE.2017.2714695 http://doi.org/10.1109/MCE.2017.2714695 . .
Q Yao . . A systematic framework to understand central bank digital currency . . Sci China Inform Sci , , 2018 . . 61 ( ( 3 ): ): 033101 DOI: 10.1007/s11432-017-9294-5 http://doi.org/10.1007/s11432-017-9294-5 . .
SH Yi , , , ZR Qin , , , Q Li . . Security and privacy issues of fog computing: a survey . . In: Xu K, Zhu H (Eds.), Wireless Algorithms, Systems, and Applications. Springer, Cham , , 2015 . . p.685 - - 695 . . DOI: 10.1007/978-3-319-21837-3_67 http://doi.org/10.1007/978-3-319-21837-3_67 . .
JC Zhao , , , JF Zhang , , , Y Feng , , , 等 . . The study and application of the IoT technology in agriculture . . 3 rd Int Conf on Computer Science and Information Technology , , 2010 . . p.462 - - 465 . . DOI: 10.1109/ICCSIT.2010.5565120 http://doi.org/10.1109/ICCSIT.2010.5565120 . .
W Zhao , , , CW Wang , , , Y Nakahira . . Medical application on Internet of Things . . IET Int Conf on Commun Technology and Application , , 2011 . . p.660 - - 665 . . DOI: 10.1049/cp.2011.0751 http://doi.org/10.1049/cp.2011.0751 . .
J Zhou , , , ZF Cao , , , XL Dong , , , 等 . . Security and privacy for cloud-based IoT: challenges . . IEEE Commun Mag , , 2017 . . 55 ( ( 1 ): ): 26 - - 33 . . DOI: 10.1109/MCOM.2017.1600363CM http://doi.org/10.1109/MCOM.2017.1600363CM . .
Publicity Resources
Related Articles
Related Author
Related Institution
京公网安备11010802024621