FOLLOWUS
School of Computer Science and Technology, University of Electronic Science and Technology of China, Chengdu 610031, China
Department of Computer Science, Sukkur IBA University, Sukkur 65200, Pakistan
School of Automation, University of Electronic Science and Technology of China, Chengdu 610031, China
[ "Raheel Ahmed MEMON, E-mail: raheelmemon@iba-suk.edu.pk" ]
Jian Ping LI, E-mail: jpli2222@uestc.edu.cn
纸质出版日期:2020-04,
收稿日期:2018-05-30,
修回日期:2020-03-30,
Scan QR Code
Raheel Ahmed MEMON, 李建平, Junaid AHMED, 等. 基于云或区块链的物联网:比较调查和前进道路[J]. 信息与电子工程前沿(英文), 2020,21(4):563-586.
MEMON RAHEEL AHMED, LI JIAN PING, AHMED JUNAID, et al. Cloud-based vs. blockchain-based IoT: a comparative survey and way forward. [J]. Frontiers of information technology & electronic engineering, 2020, 21(4): 563-586.
Raheel Ahmed MEMON, 李建平, Junaid AHMED, 等. 基于云或区块链的物联网:比较调查和前进道路[J]. 信息与电子工程前沿(英文), 2020,21(4):563-586. DOI: 10.1631/FITEE.1800343.
MEMON RAHEEL AHMED, LI JIAN PING, AHMED JUNAID, et al. Cloud-based vs. blockchain-based IoT: a comparative survey and way forward. [J]. Frontiers of information technology & electronic engineering, 2020, 21(4): 563-586. DOI: 10.1631/FITEE.1800343.
物联网已发展十多年,技术进步使其应用更加广泛,但随着连接设备增多,引发的担忧及带来的风险也在显著增加。2013年,一种新的基于加密技术的基础设施--区块链--应运而生,通过去中心化,基于区块链的物联网有可能取代现有基于云的物联网。本文对当前物联网基础设施面临的挑战进行分类,并对采用区块链作为基础设施后物联网可能遇到的问题作文献调查,比较了两种体系结构的优缺点。简要介绍了正在进行的有关区块链的关键研究,这些研究将对克服区块链在物联网应用中遇到的挑战产生显著影响。最后,考虑到这两种体系各自面临的挑战和问题以及最新研究进展,提出一种高水平的混合方案,该方案综合利用云、边缘/雾计算和区块链,以避免这两种体系的局限性。
The Internet of Things (IoT) has been evolving for more than a decade. Technological advancements have increased its popularity
but concerns and risks related to IoT are growing considerably along with the increased number of connected devices. In 2013
a new cryptography-based infrastructure called blockchain emerged with the potential to replace the existing cloud-based infrastructure of IoT through decentralization. In this article
we provide a taxonomy of the challenges in the current IoT infrastructure
and a literature survey with a taxonomy of the issues to expect in the future of the IoT after adopting blockchain as an infrastructure. The two architectures are compared based on their strengths and weaknesses. Then a brief survey of ongoing key research activities in blockchain is presented
which will have considerable impact on overcoming the challenges encountered in the applicability of blockchain in IoT. Finally
considering the challenges and issues in both infrastructures and the latest research activities
we propose a high-level hybrid IoT approach that uses the cloud
edge/fog
and blockchain together to avoid the limitations of each infrastructure.
物联网云区块链数据中心分类
Internet of Things (IoT)CloudBlockchainData centerTaxonomy
M Aazam, , , I Khan, , , AA Alsaffar, , , 等. . Cloud of Things: integrating Internet of Things and cloud computing and the issues involved. . Proc 11th Int Bhurban Conf on Applied Sciences and Technology, , 2014. . p.414--419. . DOI:10.1109/IBCAST.2014.6778179http://doi.org/10.1109/IBCAST.2014.6778179..
F Ahmed, , , YB Ko. . Mitigation of black hole attacks in routing protocol for low power and lossy networks. . Secur Commun Netw, , 2016. . 9((18):):5143--5154. . DOI:10.1002/sec.1684http://doi.org/10.1002/sec.1684..
S Akoush, , , R Sohan, , , A Rice, , , 等. . Free lunch: exploiting renewable energy for computing. . 2011. . https://www.usenix.org/events/hotos/tech/final_files/Akoush.pdfhttps://www.usenix.org/events/hotos/tech/final_files/Akoush.pdf, , [Accessed on Sept. 22, 2018]..
R Almadhoun, , , M Kadadha, , , M Alhemeiri, , , 等. . A user authentication scheme of IoT devices using blockchain- enabled fog nodes. . IEEE/ACS 15th Int Conf on Computer Systems and Applications, , 2018. . p.1--8. . DOI:10.1109/AICCSA.2018.8612856http://doi.org/10.1109/AICCSA.2018.8612856..
Amazon. . Announcing Amazon Elastic Compute Cloud (Amazon EC2) - beta. . 2006. . 2018https://aws.amazon.com/about-aws/whats-new/2006/08/24/announcing-amazon-elastic-compute-cloud-amazon-ec2---beta/https://aws.amazon.com/about-aws/whats-new/2006/08/24/announcing-amazon-elastic-compute-cloud-amazon-ec2---beta/, , [Accessed on Jan. 18, 2018]..
MP Andersen, , , J Kolb, , , KF Chen, , , 等. . Wave: a decentralized authorization system for IoT via blockchain smart contracts. . 2017. . 2019https://www2.eecs.berkeley.edu/Pubs/TechRpts/2017/EECS-2017-234.pdfhttps://www2.eecs.berkeley.edu/Pubs/TechRpts/2017/EECS-2017-234.pdf, , [Accessed on May 29, 2019]..
M Armbrust, , , A Fox, , , R Griffith, , , 等. . A view of cloud computing. . Commun ACM, , 2010. . 53((4):):50--58. . DOI:10.1145/1721654.1721672http://doi.org/10.1145/1721654.1721672..
S Aulbach, , , T Grust, , , D Jacobs, , , 等. . Multi-tenant databases for software as a service: schema-mapping techniques. . Proc ACM SIGMOD Int Conf on Management of Data, , 2008. . p.1195--1206. . DOI:10.1145/1376616.1376736http://doi.org/10.1145/1376616.1376736..
A Bahga, , , VK Madisetti. . Blockchain platform for Industrial Internet of Things. . J Softw Eng Appl, , 2016. . 9((10):):533--546. . DOI:10.4236/jsea.2016.910036http://doi.org/10.4236/jsea.2016.910036..
A Banafa. . IoT and blockchain convergence: benefits and challenges. . 2017. . 2018http://iot.ieee.org/newsletter/january-2017/iot-and-blockchain-convergence-benefits-and-challenges.htmlhttp://iot.ieee.org/newsletter/january-2017/iot-and-blockchain-convergence-benefits-and-challenges.html, , [Accessed on Feb. 23, 2018]..
S Bano, , , M Al-Bassam, , , G Danzis. . The road to scalable blockchain designs. . Winter, , 2017a. . 42((4):):31--36. . ..
S Bano, , , A Sonnino, , , M Al-Bassam, , , 等. . SoK: consensus in the age of blockchains. . 2017b. . 2018https://arxiv.org/pdf/1711.03936.pdfhttps://arxiv.org/pdf/1711.03936.pdf, , [Accessed on Sept. 27, 2018]..
NZ Bawany, , , JA Shamsi, , , K Salah. . DDoS attack detection and mitigation using SDN: methods, practices, and solutions. . Arab J Sci Eng, , 2017. . 42((2):):425--441. . DOI:10.1007/s13369-017-2414-5http://doi.org/10.1007/s13369-017-2414-5..
P Bellavista, , , A Zanni. . Towards better scalability for IoT-cloud interactions via combined exploitation of MQTT and CoAP. . IEEE 2nd Int Forum on Research and Technologies for Society and Industry Leveraging a Better Tomorrow, , 2016. . p.1--6. . DOI:10.1109/RTSI.2016.7740614http://doi.org/10.1109/RTSI.2016.7740614..
T Bhattasali, , , R Chaki. . A survey of recent intrusion detection systems for wireless sensor network. . In: Wyld DC, Wozniak M, Chaki N, et al. (Eds.), Advances in Network Security and Applications. Springer Berlin Heidelberg, , 2011. . p.268--280. . DOI:10.1007/978-3-642-22540-6_27http://doi.org/10.1007/978-3-642-22540-6_27..
K Biswas, , , V Muthukkumarasamy. . Securing smart cities using blockchain technology. . IEEE 18th Int Conf on High Performance Computing and Communications, , 2016. . p.1392--1393. . DOI:10.1109/HPCC-SmartCity-DSS.2016.0198http://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0198..
J Bonneau, , , A Miller, , , J Clark, , , 等. . SoK: research perspectives and challenges for Bitcoin and crypto- currencies. . Proc IEEE Symp on Security and Privacy, , 2015. . p.104--121. . DOI:10.1109/SP.2015.14http://doi.org/10.1109/SP.2015.14..
F Bonomi, , , R Milito, , , J Zhu, , , 等. . Fog computing and its role in the Internet of Things. . Proc 1st Edition of the MCC Workshop on Mobile Cloud Computing, , 2012. . p.13--16. . DOI:10.1145/2342509.2342513http://doi.org/10.1145/2342509.2342513..
M Brachmann, , , O Garcia-Morchon, , , M Kirsche. . Security for practical CoAP applications: issues and solution approaches. . 10th GI/ITG KuVS Fachgespraech Sensornetze, , 2011. . p.1--4. . https://www.researchgate.net/profile/Michael_Kirsche/publication/265973615_Security_for_Practical_CoAP_Applications_Issues_and_Solution_Approaches/links/5583f51c08ae4738295c2028.pdfhttps://www.researchgate.net/profile/Michael_Kirsche/publication/265973615_Security_for_Practical_CoAP_Applications_Issues_and_Solution_Approaches/links/5583f51c08ae4738295c2028.pdf, , [Accessed on Feb. 24, 2018]..
J Brito, , , A Castillo. . Bitcoin: a Primer for Policymakers. . Mercatus Center at George Mason University, , 2013. ..
J Brown. . Companies forge cooperative to explore blockchain-based IoT security. . 2017. . https://www.ciodive.com/news/companies-forge-cooperative-to-explore-blockchain-based-iot-security/435007/ https://www.ciodive.com/news/companies-forge-cooperative-to-explore-blockchain-based-iot-security/435007/ , , [Accessed on Feb. 23, 2018]..
V Buterin. . Ethereum white paper. . GitHub Repository, , 2013. ..
V Buterin. . Privacy on the blockchain. . Available from, , 2016. . https://blog.ethereum.org/2016/01/15/privacy-on-the-blockchain/https://blog.ethereum.org/2016/01/15/privacy-on-the-blockchain/, , [Accessed on Sept. 27, 2018]..
C Cachin. . Architecture of the Hyperledger Blockchain Fabric. . IBM Research, , 2016. . https://pdfs.semanticscholar.org/f852/c5f3fe649f8a17ded391df0796677a59927f.pdfhttps://pdfs.semanticscholar.org/f852/c5f3fe649f8a17ded391df0796677a59927f.pdf, , [Accessed on Feb. 24, 2018]..
M Castro, , , B Liskov. . Practical Byzantine fault tolerance and proactive recovery. . ACM Trans Comput Syst, , 2002. . 20((4):):398--461. . DOI:10.1145/571637.571640http://doi.org/10.1145/571637.571640..
SH Chae, , , W Choi, , , JH Lee, , , 等. . Enhanced secrecy in stochastic wireless networks: artificial noise with secrecy protected zone. . IEEE Trans Inform Forens Secur, , 2014. . 9((10):):1617--1628. . DOI:10.1109/TIFS.2014.2341453http://doi.org/10.1109/TIFS.2014.2341453..
YY Chen, , , W Trappe, , , RP Martin. . Detecting and localizing wireless spoofing attacks. . 4th Annual IEEE Communications Society Conf on Sensor, Mesh and Ad Hoc Communications and Networks, , 2007. . p.193--202. . DOI:10.1109/SAHCN.2007.4292831http://doi.org/10.1109/SAHCN.2007.4292831..
K Christidis, , , M Devetsikiotis. . Blockchains and smart contracts for the Internet of Things. . IEEE Access, , 2016. . 42292--2303. . DOI:10.1109/ACCESS.2016.2566339http://doi.org/10.1109/ACCESS.2016.2566339..
Cisco. . Fog computing the Internet of Things: extend the cloud to where the things are. . White Paper, , 2015. . https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdfhttps://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf, , ..
RJ Cohn, , , RJ Coppen, , , A Banks, , , 等. . MQTT version 3.1. . 2014. . https://www.oasis-open.org/committees/download.php/52951/mqtt-v3.1.1-csd06.pdfhttps://www.oasis-open.org/committees/download.php/52951/mqtt-v3.1.1-csd06.pdf, , [Accessed on May 29, 2019]..
D Conzon, , , T Bolognesi, , , P Brizzi, , , 等. . The VIRTUS middleware: an XMPP based architecture for secure IoT communications. . 21st Int Conf on Computer Communications and Networks, , 2012. . p.1--6. . DOI:10.1109/ICCCN.2012.6289309http://doi.org/10.1109/ICCCN.2012.6289309..
NT Courtois, , , L Bahack. . On subversive miner strategies and block withholding attack in Bitcoin digital currency. . 2014. . https://arxiv.org/abs/1402.1718https://arxiv.org/abs/1402.1718, , [Accessed on Sept. 16, 2018]..
V Dhillon, , , D Metcalf, , , M Hooper. . Blockchain enabled applications: understand the blockchain ecosystem and how to make it work for you. . Apress, Berkeley, CA, , 2017. . DOI:10.1007/978-1-4842-3081-7_1http://doi.org/10.1007/978-1-4842-3081-7_1..
A Dorri, , , SS Kanhere, , , R Jurdak, , , 等. . LSB: a lightweight scalable blockchain for IoT security and privacy. . 2017a. . https://arxiv.org/pdf/1712.02969.pdfhttps://arxiv.org/pdf/1712.02969.pdf, , [Accessed on Sept. 14, 2018]..
A Dorri, , , SS Kanhere, , , R Jurdak, , , 等. . Blockchain for IoT security and privacy: the case study of a smart home. . IEEE Int Conf on Pervasive Computing and Communi- cations Workshops (PerCom Workshops), , 2017b. . p.618--623. . DOI:10.1109/PERCOMW.2017.7917634http://doi.org/10.1109/PERCOMW.2017.7917634..
D Drescher. . Blockchain basics. . Apress, Berkeley, CA, , 2017. . DOI:10.1007/978-1-4842-2604-9http://doi.org/10.1007/978-1-4842-2604-9..
A Dvir, , , T Holczer, , , L Buttyan. . VeRA-version number and rank authentication in RPL. . IEEE 8th Int Conf on Mobile Ad-hoc and Sensor Systems, , 2011. . p.709--714. . DOI:10.1109/MASS.2011.76http://doi.org/10.1109/MASS.2011.76..
C Dwork, , , M Naor. . Pricing via processing or combatting junk mail. . In: Brickell EF (Ed.), Advances in Cryptology—CRYPTO' 92. Springer Berlin Heidelberg, , 1993. . p.139--147. . DOI:10.1007/3-540-48071-4_10http://doi.org/10.1007/3-540-48071-4_10..
H Elham, , , A Lebbat, , , H Medromi. . Enhance security of cloud computing through fork virtual machine. . IEEE Int Conf on Complex Systems, , 2012. . p.1--4. . DOI:10.1109/ICoCS.2012.6458569http://doi.org/10.1109/ICoCS.2012.6458569..
I Eyal, , , EG Sirer. . Majority is not enough: Bitcoin mining is vulnerable. . Commun ACM, , 2018. . 61((7):):95--102. . DOI:10.1145/3212998http://doi.org/10.1145/3212998..
I Eyal, , , AE Gencer, , , EG Sirer, , , 等. . Bitcoin-NG: a scalable blockchain protocol. . 2015. . https://arxiv.org/abs/1510.02037https://arxiv.org/abs/1510.02037, , ..
M Ficco, , , C Esposito, , , Y Xiang, , , 等. . Pseudo-dynamic testing of realistic edge-fog cloud ecosystems. . IEEE Commun Mag, , 2017. . 55((11):):98--104. . DOI:10.1109/MCOM.2017.1700328http://doi.org/10.1109/MCOM.2017.1700328..
C Formisano, , , D Pavia, , , L Gurgen, , , 等. . The advantages of IoT and cloud applied to smart cities. . 3rd Int Conf on Future Internet of Things and Cloud, , 2015. . p.325--332. . DOI:10.1109/FiCloud.2015.85http://doi.org/10.1109/FiCloud.2015.85..
L Foschini, , , T Taleb, , , A Corradi, , , 等. . M2M-based metropolitan platform for IMS-enabled road traffic management in IoT. . IEEE Commun Mag, , 2011. . 49((11):):50--57. . DOI:10.1109/MCOM.2011.6069709http://doi.org/10.1109/MCOM.2011.6069709..
E Gaetani, , , L Aniello, , , R Baldoni, , , 等. . Blockchain- based database to ensure data integrity in cloud computing environments. . Italian Conf on Cybersecurity, , 2017. . https://eprints.soton.ac.uk/411996/https://eprints.soton.ac.uk/411996/, , [Accessed on Sept. 27, 2018]..
Garai, , , A Attila, , , I Péntek. . Cognitive telemedicine IoT technology for dynamically adaptive eHealth content management reference framework embedded in cloud architecture. . 7th IEEE Int Conf on Cognitive Infocommunications, , 2016. . p.187--192. . DOI:10.1109/CogInfoCom.2016.7804547http://doi.org/10.1109/CogInfoCom.2016.7804547..
A Gervais, , , GO Karame, , , K Wüst, , , 等. . On the security and performance of proof of work blockchains. . Proc ACM SIGSAC Conf on Computer and Communications Security, , 2016. . p.3--16. . DOI:10.1145/2976749.2978341http://doi.org/10.1145/2976749.2978341..
Goiri, , , R Beauchea, , , K Le, , , 等. . Greenslot: scheduling energy consumption in green datacenters. . Proc Int Conf for High Performance Computing, Networking, Storage and Analysis, , 2011a. . p.1--11. . DOI:10.1145/2063384.2063411http://doi.org/10.1145/2063384.2063411..
Goiri, , , K Le, , , J Guitart, , , 等. . Intelligent placement of datacenters for Internet services. . 31st Int Conf on Distributed Computing Systems, , 2011b. . p.131--142. . DOI:10.1109/ICDCS.2011.19http://doi.org/10.1109/ICDCS.2011.19..
J Granjal, , , E Monteiro, , , J Sá Silva. . End-to-end transport- layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication. . IFIP Networking Conf, , 2013a. . p.1--9. . http://ieeexplore.ieee.org/abstract/document/6663530/http://ieeexplore.ieee.org/abstract/document/6663530/, , [Accessed on Feb. 24, 2018]..
J Granjal, , , E Monteiro, , , J Sá Silva. . Application-layer security for the WoT: extending CoAP to support end-to- end message security for Internet-integrated sensing applications. . LNCS, , 2013b. . 7889140--153. . DOI:10.1007/978-3-642-38401-1_11http://doi.org/10.1007/978-3-642-38401-1_11..
J Granjal, , , E Monteiro, , , Silva J Sá. . Security for the Internet of Things: a survey of existing protocols and open research issues. . IEEE Commun Surv Tutor, , 2015. . 17((3):):1294--1312. . DOI:10.1109/COMST.2015.2388550http://doi.org/10.1109/COMST.2015.2388550..
A Hameed, , , A Khoshkbarforoushha, , , R Ranjan, , , 等. . A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems. . Computing, , 2016. . 98((7):):751--774. . DOI:10.1007/s00607-014-0407-8http://doi.org/10.1007/s00607-014-0407-8..
M Henze, , , B Wolters, , , R Matzutt, , , 等. . Distributed configuration, authorization and management in the cloud-based Internet of Things. . IEEE Trustcom/ BigDataSE/ICESS, , 2017. . p.185--192. . DOI:10.1109/Trustcom/BigDataSE/ICESS.2017.236http://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.236..
S Hilton. . Dyn analysis summary of Friday October 21 Attack. . Company News, , 2016. . https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/, , [Accessed on Feb. 24, 2018]..
YWP Hong, , , PC Lan, , , CCJ Kuo. . Enhancing physical- layer secrecy in multiantenna wireless systems: an overview of signal processing approaches. . IEEE Signal Process Mag, , 2013. . 30((5):):29--40. . DOI:10.1109/MSP.2013.2256953http://doi.org/10.1109/MSP.2013.2256953..
R Hummen, , , J Hiller, , , H Wirtz, , , 等. . 6LoWPAN fragmentation attacks and mitigation mechanisms. . Proc 6th ACM Conf on Security and Privacy in Wireless and Mobile Networks, , 2013. . p.55--66. . DOI:10.1145/2462096.2462107http://doi.org/10.1145/2462096.2462107..
J Hur, , , DK Noh. . Attribute-based access control with efficient revocation in data outsourcing systems. . IEEE Trans Parall Distrib Syst, , 2011. . 22((7):):1214--1221. . DOI:10.1109/TPDS.2010.203http://doi.org/10.1109/TPDS.2010.203..
K Jagdeep, , , S Meghna. . Extending IoTs into the cloud- based platform for examining Amazon web services. . Examining Cloud Computing Technologies Through the Internet of Things, , 2017. . p.216--227. . ..
M Jakobsson, , , A Juels. . Proofs of work and bread pudding protocols (extended abstract). . In: Preneel B (Ed.), Secure Information Networks. Springer, Boston, MA, , 1999. . p.258--272. . DOI:10.1007/978-0-387-35568-9_18http://doi.org/10.1007/978-0-387-35568-9_18..
Research Juniper. . Cybercrime will cost businesses over $2 trillion by 2019. . Press Releases, , 2015. . https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillionhttps://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion, , [Accessed on Feb. 24, 2018]..
MA Khan, , , K Salah. . IoT security: review, blockchain solutions, and open challenges. . Fut Gener Comput Syst, , 2018. . 82395--411. . DOI:10.1016/j.future.2017.11.022http://doi.org/10.1016/j.future.2017.11.022..
A Khosravi, , , R Buyya. . Energy and carbon footprint- aware management of geo-distributed cloud data centers: a taxonomy, state of the art, and future directions. . 2018. . https://www.igi-global.com/chapter/energy-and-carbon-footprint-aware-management-of-geo-distributed-cloud- data-centers/189954https://www.igi-global.com/chapter/energy-and-carbon-footprint-aware-management-of-geo-distributed-cloud- data-centers/189954, , [Accessed on Sept. 22, 2018]..
HG Kim. . Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. . Proc Int Conf on Convergence and Hybrid Information Technology, , 2008. . p.796--801. . DOI:10.1109/ICHIT.2008.261http://doi.org/10.1109/ICHIT.2008.261..
E Kokoris-Kogias, , , P Jovanovic, , , N Gailly, , , 等. . Enhancing Bitcoin security and performance with strong consistency via collective signing. . 2016. . https://arxiv.org/abs/1602.06997https://arxiv.org/abs/1602.06997, , ..
N Kshetri. . Can blockchain strengthen the Internet of Things. . IT Prof, , 2017a. . 19((4):):68--72. . DOI:10.1109/MITP.2017.3051335http://doi.org/10.1109/MITP.2017.3051335..
N Kshetri. . Blockchain's roles in strengthening cyber- security and protecting privacy. . Telecommun Pol, , 2017b. . 41((10):):1027--1038. . DOI:10.1016/j.telpol.2017.09.003http://doi.org/10.1016/j.telpol.2017.09.003..
DR Li, , , X Shen, , , NC Chen, , , 等. . Space-based information service in Internet plus era. . Sci China Inform Sci, , 2017. . 60((10):):102308DOI:10.1007/s11432-016-9164-1http://doi.org/10.1007/s11432-016-9164-1..
JW Li, , , CF Jia, , , J Li, , , 等. . Outsourcing encryption of attribute-based encryption with mapreduce. . LNCS, , 2012. . 7618191--201. . DOI:10.1007/978-3-642-34129-8_17http://doi.org/10.1007/978-3-642-34129-8_17..
Y Li, , , T Marier-Bienvenue, , , A Perron-Brault, , , 等. . Blockchain technology in business organizations: a scoping review. . Proc 51st Hawaii Int Conf on System Sciences, , 2018. . DOI:10.24251/HICSS.2018.565http://doi.org/10.24251/HICSS.2018.565..
CF Liao, , , SW Bao, , , CJ Cheng, , , 等. . On design issues and architectural styles for blockchain-driven IoT services. . IEEE Int Conf on Consumer Electronics, , 2017. . p.351--352. . DOI:10.1109/ICCE-China.2017.7991140http://doi.org/10.1109/ICCE-China.2017.7991140..
IC Lin, , , TC Liao. . A survey of blockchain security issues and challenges. . Int J Netw Secur, , 2017. . 19((5):):653--659. . DOI:10.6633/IJNS.201709.19(5).01http://doi.org/10.6633/IJNS.201709.19(5).01..
CH Liu, , , B Yang, , , TC Liu. . Efficient naming, addressing and profile services in Internet-of-Things sensory environments. . Ad Hoc Netw, , 2014. . 1885--101. . DOI:10.1016/j.adhoc.2013.02.008http://doi.org/10.1016/j.adhoc.2013.02.008..
L Luu, , , DH Chu, , , H Olickel, , , 等. . Making smart contracts smarter. . Proc ACM SIGSAC Conf on Computer and Communications Security, , 2016a. . p.254--269. . DOI:10.1145/2976749.2978309http://doi.org/10.1145/2976749.2978309..
L Luu, , , V Narayanan, , , CD Zheng, , , 等. . A secure sharding protocol for open blockchains. . Proc ACM SIGSAC Conf on Computer and Communications Security, , 2016b. . p.17--30. . DOI:10.1145/2976749.2978389http://doi.org/10.1145/2976749.2978389..
PN Mahalle, , , B Anggorojati, , , NR Prasad, , , 等. . Identity authentication and capability based access control (IACAC) for the Internet of Things. . J Cyber Secur Mob, , 2013. . 1309--348. . ..
J Manral. . IoT enabled insurance ecosystem— possibilities, challenges and risks. . 2015. . http://arxiv.org/abs/1510.03146http://arxiv.org/abs/1510.03146, , ..
YD Marinakis, , , ST Walsh, , , R Harms. . Internet of Things technology diffusion forecasts. . Portland Int Conf on Management of Engineering and Technology, , 2017. . p.1--5. . DOI:10.23919/PICMET.2017.8125435http://doi.org/10.23919/PICMET.2017.8125435..
RA Memon, , , JP Li, , , J Ahmed. . Simulation model for blockchain systems using queuing theory. . Electronics, , 2019a. . 8((2):):234DOI:10.3390/electronics8020234http://doi.org/10.3390/electronics8020234..
RA Memon, , , JP Li, , , J Ahmed, , , 等. . Modeling of blockchain based systems using queuing theory simulation. . 15th Int Computer Conf on Wavelet Active Media Technology and Information Processing, , 2019b. . p.107--111. . DOI:10.1109/ICCWAMTIP.2018.8632560http://doi.org/10.1109/ICCWAMTIP.2018.8632560..
J Moar. . Cybercrime & the Internet of Threats. . White Paper, Juniper Research, , 2017. ..
MB Mollah, , , MAK Azad, , , A Vasilakos. . Security and privacy challenges in mobile cloud computing: survey and way ahead. . J Netw Comput Appl, , 2017. . 8438--54. . DOI:10.1016/j.jnca.2017.02.001http://doi.org/10.1016/j.jnca.2017.02.001..
JH Mosakheil. . Security threats classification in blockchains. . 2018. . http://repository.stcloudstate.edu/msia_etds/48http://repository.stcloudstate.edu/msia_etds/48, , [Accessed on Sept. 25, 2018]..
S Nakamoto. . Bitcoin: a peer-to-peer electronic cash system. . 2008. . https://bitcoinsv.io/bitcoinhttps://bitcoinsv.io/bitcoin, , ..
SM Nakano. . Cryptocurrency and Blockchain Blueprint for Beginners: All You Need to Know about Bitcoin, Ethereum, Ripple, Litecoin and other Popular Crypto- currencies. . CreateSpace Independent Publishing Platform, USA, , 2018. ..
HS Ning, , , H Liu. . Cyber-physical-social-thinking space based science and technology framework for the Internet of Things. . Sci China Inform Sci, , 2015. . 58((3):):1--19. . DOI:10.1007/s11432-014-5209-2http://doi.org/10.1007/s11432-014-5209-2..
G Noubir, , , GL Lin. . Low-power DOS attacks in data wireless LANs and countermeasures. . ACM SIGMOBILE Mob Comput Commun Rev, , 2003. . 7((3):):29--30. . DOI:10.1145/961268.961277http://doi.org/10.1145/961268.961277..
AZ Ourad, , , B Belgacem, , , K Salah. . Using blockchain for IoT access control and authentication management. . LNCS, , 2018. . 10972150--164. . DOI:10.1007/978-3-319-94370-1_11http://doi.org/10.1007/978-3-319-94370-1_11..
RM Qi, , , C Feng, , , Z Liu, , , 等. . Blockchain-powered Internet of Things, E-governance and E-democracy. . In: Vinod KT (Ed.), E-Democracy for Smart Cities. Springer, Singapore, , 2017. . p.509--520. . DOI:10.1007/978-981-10-4035-1_17http://doi.org/10.1007/978-981-10-4035-1_17..
XC Qian, , , JD Zhang. . Study on the structure of "Internet of Things (IoT)" business operation support platform. . IEEE 12th Int Conf on Communication Technology, , 2010. . p.1068--1071. . DOI:10.1109/ICCT.2010.5688537http://doi.org/10.1109/ICCT.2010.5688537..
PP Ray. . A survey of IoT cloud platforms. . Fut Comput Inform J, , 2016. . 1((1-2):):35--46. . DOI:10.1016/j.fcij.2017.02.001http://doi.org/10.1016/j.fcij.2017.02.001..
R Riaz, , , KH Kim, , , HF Ahmed. . Security analysis survey and framework design for IP connected LoWPANs. . Proc Int Symp on Autonomous Decentralized Systems, , 2009. . p.29--34. . DOI:10.1109/ISADS.2009.5207373http://doi.org/10.1109/ISADS.2009.5207373..
BP Rimal, , , E Choi, , , I Lumb. . A taxonomy and survey of cloud computing systems. . 5th Int Joint Conf on INC, IMS, and IDC, , 2009. . p.44--51. . DOI:10.1109/NCM.2009.218http://doi.org/10.1109/NCM.2009.218..
P Rimba, , , AB Tran, , , I Weber, , , 等. . Comparing blockchain and cloud services for business process execution. . IEEE Int Conf on Software Architecture, , 2017. . p.257--260. . DOI:10.1109/ICSA.2017.44http://doi.org/10.1109/ICSA.2017.44..
S Sagiroglu, , , D Sinanc. . Big data: a review. . Int Conf on Collaboration Technologies and Systems, , 2013. . p.42--47. . DOI:10.1109/CTS.2013.6567202http://doi.org/10.1109/CTS.2013.6567202..
M Samaniego, , , R Deters. . Blockchain as a service for IoT. . IEEE Int Conf on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), , 2017. . p.433--436. . DOI:10.1109/iThings-GreenCom-CPSCom-SmartData.2016.102http://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2016.102..
AP S. . SAP announces first co-innovation customers, partners in blockchain initiative for Internet of Things. . 2017. . https://news.sap.com/sap-announces-first-co-innovation-customers-partners-in-blockchain-initiative-for-internet-of-things/https://news.sap.com/sap-announces-first-co-innovation-customers-partners-in-blockchain-initiative-for-internet-of-things/, , [Accessed on Feb. 24, 2018]..
S Seibold, , , G Samman. . Consensus immutable agreement for the Internet of Value. . Technical Report, , 2016. . https://assets.kpmg.com/content/dam/kpmg/pdf/2016/06/kpmg-blockchain-consensus-mechanism.pdfhttps://assets.kpmg.com/content/dam/kpmg/pdf/2016/06/kpmg-blockchain-consensus-mechanism.pdf, , ..
M Sethi, , , J Arkko, , , A Ker nen. . End-to-end security for sleepy smart object networks. . 37th Annual IEEE Conf on Local Computer Networks, , 2012. . p.964--972. . DOI:10.1109/LCNW.2012.6424089http://doi.org/10.1109/LCNW.2012.6424089..
MH Sherif. . Protocols for Secure Electronic Commerce (3rd Ed. . CRC Press, Boca Raton, USA, , 2016. ..
Shveta, , , A Pandey. . Energy conservation and security issues in cloud computing: a review. . Int J Adv Comput Sci Cloud Comput, , 2014. . 2((1):):57--60. . ..
S Sicari, , , A Rizzardi, , , LA Grieco, , , 等. . Security, privacy and trust in Internet of Things: the road ahead. . Comput Netw, , 2015. . 76146--164. . DOI:10.1016/j.comnet.2014.11.008http://doi.org/10.1016/j.comnet.2014.11.008..
D Singh, , , G Tripathi, , , AJ Jara. . A survey of Internet-of- Things: future vision, architecture, challenges and services. . IEEE World Forum on Internet of Things, , 2014. . p.287--292. . DOI:10.1109/WF-IoT.2014.6803174http://doi.org/10.1109/WF-IoT.2014.6803174..
I Singh, , , SW Lee. . Comparative requirements analysis for the feasibility of blockchain for secure cloud. . In: Kamalrudin M, Ahmad S, Ikram N (Eds.), Requirements Engineering for Internet of Things. Springer, Singapore, , 2018. . p.57--72. . DOI:10.1007/978-981-10-7796-8_5http://doi.org/10.1007/978-981-10-7796-8_5..
J Singh, , , T Pasquier, , , J Bacon, , , 等. . Twenty security considerations for cloud-supported Internet of Things. . IEEE Int Things J, , 2016. . 3((3):):269--284. . DOI:10.1109/JIOT.2015.2460333http://doi.org/10.1109/JIOT.2015.2460333..
B Singhal, , , G Dhameja, , , PS Panda. . Building an Ethereum DApp. . In: Beginning Blockchain. Apress, Berkeley, CA, , 2018. . p.319--375. . DOI:10.1007/978-1-4842-3444-0_6http://doi.org/10.1007/978-1-4842-3444-0_6..
D Soubra. . The 3Vs that define Big Data. . 2012. . https://www.datasciencecentral.com/forum/topics/the-3vs-that-define-big-datahttps://www.datasciencecentral.com/forum/topics/the-3vs-that-define-big-data, , ..
C Stergiou, , , KE Psannis, , , BG Kim, , , 等. . Secure integration of IoT and cloud computing. . Fut Gener Comput Syst, , 2018. . 78964--975. . DOI:10.1016/j.future.2016.11.031http://doi.org/10.1016/j.future.2016.11.031..
H Stormer, , , A Meier. . ePayment. . In: eBusiness & eCommerce. Springer Berlin Heidelberg, , 2012. . p.181--202. . DOI:10.1007/978-3-642-29802-8_7http://doi.org/10.1007/978-3-642-29802-8_7..
CP Strite. . Bread-Toaster. . US1394450A, , 1920. . https://patents.google.com/patent/US1394450https://patents.google.com/patent/US1394450, , [Accessed on Feb. 23, 2018]..
L Sun, , , Y Li, , , RA Memon. . An open IoT framework based on microservices architecture. . China Commun, , 2017. . 14((2):):154--162. . DOI:10.1109/CC.2017.7868163http://doi.org/10.1109/CC.2017.7868163..
N Szabo. . Smart contracts: building blocks for digital markets. . 1996. . http://www.alamut.com/subj/economics/nick_ szabo/smartContracts.htmlhttp://www.alamut.com/subj/economics/nick_ szabo/smartContracts.html, , [Accessed on Feb. 24, 2018]..
M Thakur. . Authentication, authorization and accounting with Ethereum blockchain. . 2017. . https://helda.helsinki.fi/bit stream/handle/10138/228842/aaa-ethereum-blockchain.pdfhttps://helda.helsinki.fi/bit stream/handle/10138/228842/aaa-ethereum-blockchain.pdf, , [Accessed on Sept. 11, 2018]..
S Underwood. . Blockchain beyond Bitcoin. . Commun ACM, , 2016. . 59((11):):15--17. . DOI:10.1145/2994581http://doi.org/10.1145/2994581..
R van der Meulen. . Gartner Says 8.4 Billion Connected "Things" will be in use in 2017, up 31 Percent from 2016. . Gartner Press Release, , 2017. ..
J Wang, , , P Wu, , , XY Wang, , , 等. . The outlook of blockchain technology for construction engineering management. . Front Eng Manag, , 2017. . 4((1):):67--75. . DOI:10.15302/J-FEM-2017006http://doi.org/10.15302/J-FEM-2017006..
WB Wang, , , SQ Fan. . Attacking OpenSSL ECDSA with a small amount of side-channel information. . Sci China Inform Sci, , 2018. . 61((3):):032105DOI:10.1007/s11432-016-9030-0http://doi.org/10.1007/s11432-016-9030-0..
YF Wang, , , T Uehara, , , R Sasaki. . Fog computing: issues and challenges in security and forensics. . IEEE 39th Annual Computer Software and Applications Conf, , 2015. . p.53--59. . DOI:10.1109/COMPSAC.2015.173http://doi.org/10.1109/COMPSAC.2015.173..
W Warren, , , A Bandeali. . 0x: an open protocol for decentralized exchange on the ethereum blockchain. . 2017. . https://0x.org/pdfs/0x_white_paper.pdfhttps://0x.org/pdfs/0x_white_paper.pdf, , [Accessed on Feb. 24, 2018]..
K Weekly, , , K Pister. . Evaluating sinkhole defense techniques in RPL networks. . 20th Int Conf on Network Protocols, , 2012. . p.1--6. . DOI:10.1109/ICNP.2012.6459948http://doi.org/10.1109/ICNP.2012.6459948..
A Whitmore, , , A Agarwal, , , XL Da. . The Internet of Things—a survey of topics and trends. . Inform Syst Front, , 2015. . 17((2):):261--274. . DOI:10.1007/s10796-014-9489-2http://doi.org/10.1007/s10796-014-9489-2..
S Wilkinson, , , T Boshevski, , , J Brandoff, , , 等. . Storj—a peer-to-peer cloud storage network. . 2014. . http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.693.785http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.693.785, , [Accessed on Sept. 15, 2018]..
D Wilusz, , , J Rykowski. . The architecture of coupon-based, semi-off-line, anonymous micropayment system for Internet of Things. . In: Camarinha-Matos LM, Tomic S, Gra a P (Eds.), Technological Innovation for the Internet of Things. Springer Berlin Heidelberg, , 2013. . p.125--132. . DOI:10.1007/978-3-642-37291-9_14http://doi.org/10.1007/978-3-642-37291-9_14..
Worldometer. . World Population Projections. . 2018. . http://www.worldometers.info/world-population/world- population-projections/http://www.worldometers.info/world-population/world- population-projections/, , [Accessed on Sept. 15, 2018]..
L Xiao, , , LJ Greenstein, , , NB Mandayam, , , 等. . Channel- based detection of Sybil attacks in wireless networks. . IEEE Trans Inform Forens Secur, , 2009. . 4((3):):492--503. . DOI:10.1109/TIFS.2009.2026454http://doi.org/10.1109/TIFS.2009.2026454..
ZH Xiong, , , Y Zhang, , , D Niyato, , , 等. . When mobile blockchain meets edge computing. . 2017. . https://arxiv.org/abs/1711.05938?context=cshttps://arxiv.org/abs/1711.05938?context=cs, , ..
WY Xu, , , W Trappe, , , YY Zhang, , , 等. . The feasibility of launching and detecting jamming attacks in wireless networks. . Proc 6th ACM Int Symp on Mobile Ad Hoc Networking and Computing, , 2005. . p.46--57. . DOI:10.1145/1062689.1062697http://doi.org/10.1145/1062689.1062697..
C Yang, , , D Puthal, , , SP Mohanty, , , 等. . Big-sensing-data curation for the cloud is coming: a promise of scalable cloud-data-center mitigation for next-generation IoT and wireless sensor networks. . IEEE Consum Electron Mag, , 2017. . 6((4):):48--56. . DOI:10.1109/MCE.2017.2714695http://doi.org/10.1109/MCE.2017.2714695..
Q Yao. . A systematic framework to understand central bank digital currency. . Sci China Inform Sci, , 2018. . 61((3):):033101DOI:10.1007/s11432-017-9294-5http://doi.org/10.1007/s11432-017-9294-5..
SH Yi, , , ZR Qin, , , Q Li. . Security and privacy issues of fog computing: a survey. . In: Xu K, Zhu H (Eds.), Wireless Algorithms, Systems, and Applications. Springer, Cham, , 2015. . p.685--695. . DOI:10.1007/978-3-319-21837-3_67http://doi.org/10.1007/978-3-319-21837-3_67..
JC Zhao, , , JF Zhang, , , Y Feng, , , 等. . The study and application of the IoT technology in agriculture. . 3rd Int Conf on Computer Science and Information Technology, , 2010. . p.462--465. . DOI:10.1109/ICCSIT.2010.5565120http://doi.org/10.1109/ICCSIT.2010.5565120..
W Zhao, , , CW Wang, , , Y Nakahira. . Medical application on Internet of Things. . IET Int Conf on Commun Technology and Application, , 2011. . p.660--665. . DOI:10.1049/cp.2011.0751http://doi.org/10.1049/cp.2011.0751..
J Zhou, , , ZF Cao, , , XL Dong, , , 等. . Security and privacy for cloud-based IoT: challenges. . IEEE Commun Mag, , 2017. . 55((1):):26--33. . DOI:10.1109/MCOM.2017.1600363CMhttp://doi.org/10.1109/MCOM.2017.1600363CM..
关联资源
相关文章
相关作者
相关机构