Trustworthy Blockchain Gateways for Resource-Constrained Clients and IoT Devices

نویسندگان

چکیده

Resource-constrained blockchain clients and the Internet of Things (IoT) devices pose limitations in terms processing storing entire ledger mining blocks. Such rely on a view provided by full nodes acting as gateways. However, gateway sometimes can provide distorted that makes lightweight vulnerable to eclipse attack. When under such an attack, client cannot differentiate between forked legitimate leading fatal consequences huge losses incurred. In this paper, we propose data attestation solution employs validators attest responses reported gateways nodes. We leverage smart contracts give confidence they are unable validate it from network themselves. The system governs process comprises submitting requests, approving them, recording response validators, manage payments. Clients can, thereafter, their feedback about validator/gateway performance form reputation score. present proposed architecture describe its implementation Ethereum network. evaluate with respect functionality testing, cost execution, security analysis developed contracts. make our code testing scripts publicly available.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Distributed Security Mechanism for Resource-Constrained IoT Devices

Internet of Things (IoT) devices have developed to comprise embedded systems and sensors with the ability to connect, collect, and transmit data over the Internet. Although solutions to secure IoT systems exist, Class-0 IoT devices with insufficient resources to support such solutions are considered a resourceconstrained in terms of secure communication. This paper provides a distributed securi...

متن کامل

Development of an IoT Environmental Monitoring Application with a Novel Middleware for Resource Constrained Devices

In this paper the development of a Mobile Health monitoring system is described. The system combines user location data with air quality information provided by a heterogeneous sensing infrastructure providing users with advises about their daily exposure to air pollutants. The highly dynamic integration of different kind of nodes, mostly characterized by rather constrained resources, of this a...

متن کامل

CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices

Because of the rapid increasing of malware attacks on the Internet of Things in recent years, it is critical for resource-constrained devices to guard against potential risks. The traditional host-based security solution becomes puffy and inapplicable with the development of malware attacks. Moreover, it is hard for the cloud-based security solution to achieve both the high performance detectio...

متن کامل

High-Level Programming and Symbolic Reasoning on IoT Resource Constrained Devices

While the vision of Internet of Things (IoT) is rather inspiring, its practical implementation remains challenging. Conventional programming approaches prove unsuitable to provide IoT resource constrained devices with the distributed processing capabilities required to implement intelligent, autonomic, and self-organizing behaviors. In our previous work, we had already proposed an alternative p...

متن کامل

Building Low-Cost Gateways and Devices for Open LoRa IoT Test-Beds

While benefits of IoT are clearly stated the deployment of such devices in a large scale is still held back by technical challenges such as short communication distances. Recent long-range radio technologies such as Semtech’s LoRa are promising to deploy Low Power WAN at a very low-cost for a large variety of applications. The paper describes our proposed low-cost and open IoT gateway & devices...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3115150