Survey on blockchain for Internet of Things

Computer Communications - Tập 136 - Trang 10-29 - 2019
Xu Wang1,2, Xuan Zha3,1,2, Wei Ni4, Ren Ping Liu2, Y. Jay Guo2, Xinxin Niu1,5, Kangfeng Zheng1
1School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China
2Global Big Data Technologies Centre, University of Technology Sydney, Australia
3China Academy of Information and Communications Technology (CAICT), Beijing, China
4Cyber-Physical System (CPS), Data 61, CSIRO, Sydney, NSW, Australia
5State Key Laboratory of Public Big Data, Guizhou, China

Tài liệu tham khảo

Fabian, 2009, Security challenges of the EPCglobal network, Commun. ACM, 52, 121, 10.1145/1538788.1538816

Rose, 2015, 1

Liu, 2015, Combination of cloud computing and Internet of Things (IOT) in medical monitoring systems, Int. J. Hybrid Inform. Technol., 8, 367, 10.14257/ijhit.2015.8.12.28

H.F. Atlam, A. Alenezi, A. Alharthi, R.J. Walters, G.B. Wills, Integration of cloud computing with Internet of Things: Challenges and open issues, in: 2017 Proc. IEEE Int. Conf. Internet of Things (iThings) and IEEE Green Comput. Commun. (GreenCom) and IEEE Cyber, Physical Social Comput. (CPSCom) and IEEE Smart Data (SmartData), pp. 670–675, http://dx.doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.105.

Lyu, 2017, Optimal schedule of mobile edge computing for Internet of Things using partial information, IEEE J. Sel. Areas Commun., 35, 2606, 10.1109/JSAC.2017.2760186

Booth, 2013, Cloud security: Attacks and current defenses, 4

Chidambaram, 2016, Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique, Int. J. Digit. Multimed. Broadcast., 2016, 1, 10.1155/2016/8789397

Kshetri, 2017, Can Blockchain strengthen the Internet of Things?, IT Prof., 19, 68, 10.1109/MITP.2017.3051335

Christidis, 2016, Blockchains and smart contracts for the Internet of Things, IEEE Access, 4, 2292, 10.1109/ACCESS.2016.2566339

B. Betts, Blockchain and the promise of cooperative cloud storage, URL http://www.computerweekly.com/feature/Blockchain-and-the-promise-of-cooperative-cloud-storage, 2017-05-22.

A. Dorri, S.S. Kanhere, R. Jurdak, Blockchain in internet of things: Challenges and solutions, 2016, arXiv:1608.05187.

Zha, 2017, Blockchain for IoT: The tradeoff between consistency and capacity, Chin. J. Internet of Things, 1, 21

Khalilov, 2018, A survey on anonymity and privacy in bitcoin-like digital cash systems, IEEE Commun. Surv. Tutor., 20, 2543, 10.1109/COMST.2018.2818623

X. Zha, K. Zheng, D. Zhang, Anti-pollution source location privacy preserving scheme in wireless sensor networks, in: 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON, 2016, pp. 1–8, URL http:/dx.doi.org/10.1109/SAHCN.2016.7732970.

. I.O.T.A, IOTA, 2017, URL https://www.iotatoken.com.

Panikkar, 2014

Brody, 2014

. I.B.M., Watson Internet of Things, 2017, URL https://www.ibm.com/internet-of-things/.

O’Connor, 2017

Fedak, 2016

Chen, 2014, Big data: A survey, Springer Mobile Netw. Appl., 19, 171, 10.1007/s11036-013-0489-0

Tschorsch, 2016, Bitcoin and beyond: A technical survey on decentralized digital currencies, IEEE Commun. Surv. Tutor., 18, 2084, 10.1109/COMST.2016.2535718

Swan, 2015

Lewis, 2015

Crosby, 2016, BlockChain technology: Beyond bitcoin, Appl. Innov., 2, 6

Pticek, 2016, Beyond the internet of things: The social networking of machines, Int. J. Distrib. Sens. Netw., 12, 10.1155/2016/8178417

Perera, 2014, Context aware computing for the internet of things: A survey, IEEE Commun. Surv. Tutor., 16, 414, 10.1109/SURV.2013.042313.00197

Xu, 2014, Internet of things in industries: A survey, IEEE Trans. Ind. Inf., 10, 2233, 10.1109/TII.2014.2300753

Al-Fuqaha, 2015, Internet of things: A survey on enabling technologies, protocols, and applications, IEEE Commun. Surv. Tutor., 17, 2347, 10.1109/COMST.2015.2444095

Zha, 2018, The impact of link duration on the integrity of distributed mobile networks, IEEE Trans. Inf. Forensics Secur., 13, 2240, 10.1109/TIFS.2018.2812714

Cui, 2018, Big data analytics and network calculus enabling intelligent management of autonomous vehicles in a smart city, IEEE Internet of Things J., 10.1109/JIOT.2018.2872442

Sethi, 2017, Internet of Things: Architectures, protocols, and applications, J. Electr. Comput. Eng., 10.1155/2017/9324035

R. Ratasuk, B. Vejlgaard, N. Mangalvedhe, A. Ghosh, NB-IoT system for M2M communication, in: 2016 Proc. IEEE Wireless Commun. and Netw. Conf. Workshops, WCNCW’16, pp. 1–5.

2016

Ren, 2018, Distributed online learning of fog computing under non-uniform device cardinality, IEEE Internet of Things J., 10.1109/JIOT.2018.2867481

Tsai, 2014, Data mining for Internet of Things: A survey, IEEE Commun. Surv. Tutor., 16, 77, 10.1109/SURV.2013.103013.00206

Zha, 2017, Collaborative authentication in decentralized dense mobile networks with key predistribution, IEEE Trans. Inf. Forensics Secur., 12, 2261, 10.1109/TIFS.2017.2705584

Makhdoom, 2018, Anatomy of threats to the Internet of Things, IEEE Commun. Surv. Tutor., 10.1109/COMST.2018.2874978

Alsaadi, 2015, Internet of Things: Features, challenges, and vulnerabilities, Int. J. Adv. Comput. Sci. Inf. Technol., 4, 1

Liu, 2017, A security framework for the Internet of Things in the future internet architecture, Future Internet, 9, 10.3390/fi9030027

Roman, 2011, Securing the Internet of Things, Comput., 44, 51, 10.1109/MC.2011.291

Lin, 2017, A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications, IEEE Internet of Things J., 4, 1125, 10.1109/JIOT.2017.2683200

Xu, 2017, Achieving efficient detection against false data injection attacks in smart grid, IEEE Access, 5, 13787, 10.1109/ACCESS.2017.2728681

Mehta, 2012, Protecting location privacy in sensor networks against a global eavesdropper, IEEE Trans. Mobile Comput., 11, 320, 10.1109/TMC.2011.32

Zhang, 2014, Sybil attacks and their defenses in the Internet of Things, IEEE Internet of Things J., 1, 372, 10.1109/JIOT.2014.2344013

Mosenia, 2017, A comprehensive study of security of Internet-of-Things, IEEE Trans. Emerg. Top. Comput., 5, 586, 10.1109/TETC.2016.2606384

Perry, 2017

Wang, 2016, Virus propagation modeling and convergence analysis in large-scale networks, IEEE Trans. Inf. Forensics Secur., 11, 2241, 10.1109/TIFS.2016.2581305

Boritz, 2005, Is practitioners’ views on core concepts of information integrity, Int. J. Account. Inf. Syst., 6, 260, 10.1016/j.accinf.2005.07.001

Davidson, 2016

Nakamoto, 2008

Bitcoin, 2017-05-20, URL https://bitcoin.org/en/.

Miller, 2015

How do Bitcoin Transactions Work? 2015-03-20, URL http://www.coindesk.com/information/how-do-bitcoin-transactions-work/.

Wyman, 2016

Bitcoin developer guide, 2017, URL https://bitcoin.org/en/developer-guide.

R.C. Merkle, Protocols for public key cryptosystems, in: Proc. 1st IEEE Symp. Secur. Privacy, SP’ 80, 1980, pp. 122–122, http://dx.dio.org/10.1109/SP.1980.10006.

D. Ghosh, How the byzantine general sacked the castle: A look into blockchain, 2016-04-06, URL https://medium.com/@DebrajG/how-the-byzantine-general-sacked-the-castle-a-look-into-blockchain-370fe637502c.

Lamport, 1982, The Byzantine generals problem, ACM Trans. Program. Lang. Syst., 4, 382, 10.1145/357172.357176

Poledna, 2007

Dolev, 1983, Authenticated algorithms for Byzantine agreement, SIAM J. Comput., 12, 656, 10.1137/0212045

Cristian, 1995, Atomic broadcast: From simple message diffusion to Byzantine agreement, Inform. and Comput., 118, 158, 10.1006/inco.1995.1060

Perry, 1986, Distributed agreement in the presence of processor and communication faults, IEEE Trans. Softw. Eng., SE-12, 477, 10.1109/TSE.1986.6312888

Schlichting, 1983, Fail-stop processors: An approach to designing fault-tolerant computing systems, ACM Trans. Comput. Syst., 1, 222, 10.1145/357369.357371

Lamport, 1998, The part-time parliament, ACM Trans. Comput. Syst., 16, 133, 10.1145/279227.279229

Mostéfaoui, 2001

Charron-Bost, 2009, The heard-of model: Computing in distributed systems with benign faults, Distrib. Comput., 22, 49, 10.1007/s00446-009-0084-6

Pease, 1980, Reaching agreement in the presence of faults, J. ACM, 27, 228, 10.1145/322186.322188

Fitzi, 1998, Efficient byzantine agreement secure against general adversaries, Distrib. Comput., 134, 10.1007/BFb0056479

Marandi, 2011, High performance state-machine replication, 454

King, 2012

Buterin, 2015, On public and private blockchains, Ethereum Blog

Finney, 2011

Bastiaan, 2015

E. Heilman, A. Kendler, A. Zohar, S. Goldberg, Eclipse attacks on bitcoin’s peer-to-peer network, in: Proc. 24th USENIX Secur. Symp., USENIX Secur.’ 15, Washington, D.C., 2015, pp. 129–144.

Yuval Marcus, 2018, 15

Team, 2018

Meegan, 2016

Yang, 2017, Lightweight break-glass access control system for healthcare Internet-of-Things, IEEE Trans. Ind. Inf., 14, 10.1109/TII.2017.2751640

Chin, 2017, Energy big data security threats in IoT-based smart grid communications, IEEE Commun. Mag., 55, 70, 10.1109/MCOM.2017.1700154

Langner, 2011, Stuxnet: Dissecting a cyberwarfare weapon, IEEE Secur. Privacy, 9, 49, 10.1109/MSP.2011.67

Oraclize, 2018, URL http://www.oraclize.it.

Golle, 2004, Detecting and correcting malicious data in vanets, 29

Wallet knowledge base, 2018, URL https://iotasupport.com/walletknowledgebase.shtml.

Schiener, 2017

Why 0chain, not IOTA, is ideal for IOT apps, Dec, 2017, URL https://medium.com/0chain/why-0chain-not-iota-is-ideal-for-iot-web-enterprise-apps-bdd1154d148f.

McKinney, 2017

. I.O.T.A, Light vs. Full Node, URL https://iota.readme.io/v1.2.0/docs/light-vs-full-node.

Fabric, 2017, URL https://github.com/hyperledger/fabric.

Dorri, 2017, Towards an optimized blockchain for IoT, 173

Elements project, 2017, URL https://z.cash/support/zig.html.

Protocol rules, 2016, URL https://en.bitcoin.it/wiki/Protocol_rules.

Blockchain, 2017, URL https://blockchain.info.

Ethereum mining hardware, 2017, URL https://www.buybitcoinworldwide.com/ethereum/mining-hardware/.

Raspberry pi, 2017, URL https://www.raspberrypi.org.

Mining bitcoin only with raspberry pi, 2016, URL https://bitcointalk.org/index.php?topic=1535364.0.

Etherscan, 2017, URL https://etherscan.io.

Goland, 2017

Hou, 2012, Real-time communication over unreliable wireless links: A theory and its applications, IEEE Wirel. Commun., 19, 48, 10.1109/MWC.2012.6155876

Liang, 2013, An energy-efficient sleep scheduling with QoS consideration in 3GPP LTE-advanced networks for Internet of Things, IEEE J. Emerg. Sec. Top. Circuits Syst., 3, 13, 10.1109/JETCAS.2013.2243631

Zorzi, 2010, From today’s INTRAnet of Things to a future INTERnet of Things: A wireless- and mobility-related view, IEEE Wirel. Commun., 17, 44, 10.1109/MWC.2010.5675777

Rathore, 2016, Urban planning and building smart cities based on the internet of things using big data analytics, Comput. Netw., 101, 63, 10.1016/j.comnet.2015.12.023

Buterin, 2014

Chen, 2011, TRM-IoT: A trust management model based on fuzzy reputation for Internet of Things, Comput. Sci. Inf. Syst., 8, 1207, 10.2298/CSIS110303056C

Raval, 2016

Szabo, 1996, Smart contracts: Building blocks for digital markets, EXTROPY: J. Transhumanist Thought

Universa, 2017

Al Khalil, 2017

Kaiser, 2017

Hertig, 2018

Asor, 2015

Nxt, 2018, URL https://nxtplatform.org/.

RSK, 2018, URL https://www.rsk.co/.

This is how smart contracts and ethereum work, 2017, URL https://medium.com/startup-grind/gentle-intro-to-blockchain-and-smart-contracts-part-2-30a6c9a40946.

Blockchain-oracles, 2018, URL https://blockchainhub.net/blockchain-oracles.

Maymounkov, 2002, Kademlia: A peer-to-peer information system based on the XOR metric, 53

Reid, 2013, An analysis of anonymity in the bitcoin system, 197

Androulaki, 2013, Evaluating user privacy in bitcoin, 34

Ron, 2013, 6

S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G.M. Voelker, S. Savage, A fistful of bitcoins: Characterizing payments among men with no names, in: 2013 Proc. Conf. Internet measurement, ACM, pp. 127–140.

Biryukov, 2014, Deanonymisation of clients in Bitcoin P2P network, 15

N. van Saberhagen, Cryptonote v 2. 0, 2013.

Koshy, 2014

bitcoinwiki, 2017

Feige, 1988, Zero-knowledge proofs of identity, J. Cryptology, 1, 77, 10.1007/BF02351717

Rackoff, 1992, 433

Miers, 2013, Zerocoin: Anonymous distributed e-cash from Bitcoin, 397

Sasson, 2014, Zerocash: Decentralized anonymous payments from Bitcoin, 459

MONERO, 2017, URL https://getmonero.org.

G. Maxwell, Confidential transaction, the initial investigation, URL https://elementsproject.org/elements/confidential-transactions/investigation.html.

Noether, 2016, Ring confidential transactions, Ledger, 1, 1, 10.5195/LEDGER.2016.34

Ouaddah, 2017, Towards a novel privacy-preserving access control model based on blockchain technology in IoT, 523

Ouaddah, 2016, FairAccess: A new Blockchain-based access control framework for the Internet of Things, Secur. Commun. Netw., 9, 5943, 10.1002/sec.1748

Pilkington, 2016, Blockchain technology: Principles and applications, 225

Vukolić, 2015, The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication, 112

R. Kotla, L. Alvisi, M. Dahlin, A. Clement, E. Wong, Zyzzyva: Speculative byzantine fault tolerance, in: Proc. 21st ACM SIGOPS Symp. Operating Syst. Principles, SOSP ’07, Vol. 41, pp. 45–58.

Sharma, 2017, DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks, IEEE Commun. Mag., 55, 78, 10.1109/MCOM.2017.1700041

Y. Guo, C. Mate, Jr., Crysto: A Scalable and Permission-less Blockchain Platform, URL https://cdecker.github.io/btcresearch/2017/guocrysto.html.

D. Ongaro, J. Ousterhout, In search of an understandable consensus algorithm, in: 2014 Proc. USENIX Annu. Tech. Conf., USENIX ATC 14, Philadelphia, PA, pp. 305–319.

T. Crain, V. Gramoli, M. Larrea, M. Raynal, (Leader/Randomization/Signature)-free Byzantine Consensus for Consortium Blockchains, 2017, arXiv preprint URL arXiv:1702.03068.

Douceur, 2002, The sybil attack, 251

Difficulty, 2017, URL https://en.bitcoin.it/wiki/Difficulty.

Eastlake 3rd, 2011

Tanenbaum, 2011

M. Rosenfeld, Analysis of bitcoin pooled mining reward systems, 2011, arXiv preprint URL arXiv:1112.4980.

Laszka, 2015, When bitcoin mining pools run dry, 63

Eyal, 2015, The miner’s dilemma, 89

Miller, 2015, Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions, 680

Szabo, 1997

Bentov, 2014, Proof of activity: Extending Bitcoin’s proof of work via proof of stake, SIGMETRICS Perform. Eval. Rev., 42, 34, 10.1145/2695533.2695545

Vasin, 2014

Group, 2015

Kwon, 2014

Stewart, 2012

Sawtooth lake documentation, 2017, URL https://intelledger.github.io/introduction.html#proof-of-elapsed-time-poet.

Intel software guard extensions, 2017, URL https://software.intel.com/en-us/sgx.

Oki, 1988, Viewstamped replication: A new primary copy method to support highly-available distributed systems, 8

Bracha, 1985, Asynchronous consensus and broadcast protocols, J. ACM, 32, 824, 10.1145/4221.214134

Miller, 2016, The honey badger of bft protocols, 31

Hyperledger, 2015, URL https://www.hyperledger.org.

Burrow, 2017, URL https://github.com/hyperledger/burrow.

Iroha, 2017, URL https://www.hyperledger.org/projects/iroha.

Sawtooth, 2017, URL https://www.hyperledger.org/projects/sawtooth.

Stale block, 2017, URL https://bitcoin.org/en/glossary/stale-block.

Popov, 2016

Sompolinsky, 2013, Accelerating bitcoin’s transaction processing. Fast money grows on trees, not chains, IACR Cryptol. EPrint Archive, 2013

Buterin, 2014

Ethereum, 2017, URL https://www.ethereum.org.

Kabessa, 2017

. ethernodes.org, Network number 1, 2017, URL https://www.ethernodes.org/network/1.

Ethereum homestead documentation–the homestead release, 2016, URL http://www.ethdocs.org/en/latest/introduction/the-homestead-release.html.

. Vbuterin, On sharding blockchains, 2017, URL https://github.com/ethereum/wiki/wiki/Sharding-FAQ?from=groupmessagef.

A.S.d.P. Crespo, L.I.C. García, Stampery Blockchain Timestamping Architecture (BTA)-Version 6, 2017, arXiv preprint URL arXiv:1711.04709.

Back, 2014

Vuran, 2004, Spatio-temporal correlation: Theory and applications for wireless sensor networks, Comput. Netw., 45, 245, 10.1016/j.comnet.2004.03.007

Size of the bitcoin blockchain from 2010 to 2017, by quarter, Dec, 2017, URL https://www.statista.com/statistics/647523/worldwide-bitcoin-blockchain-size/.

G. Ateniese, B. Magri, D. Venturi, E. Andrade, Redactable blockchain - or-rewriting history in bitcoin and friends, in: 2017 IEEE Eur. Symp. Secur. Privacy, EuroSP’ 17, 2017, pp. 111–126.