Survey on blockchain for Internet of Things
Tài liệu tham khảo
Fabian, 2009, Security challenges of the EPCglobal network, Commun. ACM, 52, 121, 10.1145/1538788.1538816
Rose, 2015, 1
Liu, 2015, Combination of cloud computing and Internet of Things (IOT) in medical monitoring systems, Int. J. Hybrid Inform. Technol., 8, 367, 10.14257/ijhit.2015.8.12.28
H.F. Atlam, A. Alenezi, A. Alharthi, R.J. Walters, G.B. Wills, Integration of cloud computing with Internet of Things: Challenges and open issues, in: 2017 Proc. IEEE Int. Conf. Internet of Things (iThings) and IEEE Green Comput. Commun. (GreenCom) and IEEE Cyber, Physical Social Comput. (CPSCom) and IEEE Smart Data (SmartData), pp. 670–675, http://dx.doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.105.
Lyu, 2017, Optimal schedule of mobile edge computing for Internet of Things using partial information, IEEE J. Sel. Areas Commun., 35, 2606, 10.1109/JSAC.2017.2760186
Booth, 2013, Cloud security: Attacks and current defenses, 4
Chidambaram, 2016, Enhancing the security of customer data in cloud environments using a novel digital fingerprinting technique, Int. J. Digit. Multimed. Broadcast., 2016, 1, 10.1155/2016/8789397
Kshetri, 2017, Can Blockchain strengthen the Internet of Things?, IT Prof., 19, 68, 10.1109/MITP.2017.3051335
Christidis, 2016, Blockchains and smart contracts for the Internet of Things, IEEE Access, 4, 2292, 10.1109/ACCESS.2016.2566339
B. Betts, Blockchain and the promise of cooperative cloud storage, URL http://www.computerweekly.com/feature/Blockchain-and-the-promise-of-cooperative-cloud-storage, 2017-05-22.
A. Dorri, S.S. Kanhere, R. Jurdak, Blockchain in internet of things: Challenges and solutions, 2016, arXiv:1608.05187.
Zha, 2017, Blockchain for IoT: The tradeoff between consistency and capacity, Chin. J. Internet of Things, 1, 21
Khalilov, 2018, A survey on anonymity and privacy in bitcoin-like digital cash systems, IEEE Commun. Surv. Tutor., 20, 2543, 10.1109/COMST.2018.2818623
X. Zha, K. Zheng, D. Zhang, Anti-pollution source location privacy preserving scheme in wireless sensor networks, in: 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking, SECON, 2016, pp. 1–8, URL http:/dx.doi.org/10.1109/SAHCN.2016.7732970.
. I.O.T.A, IOTA, 2017, URL https://www.iotatoken.com.
Panikkar, 2014
Brody, 2014
. I.B.M., Watson Internet of Things, 2017, URL https://www.ibm.com/internet-of-things/.
O’Connor, 2017
Fedak, 2016
Tschorsch, 2016, Bitcoin and beyond: A technical survey on decentralized digital currencies, IEEE Commun. Surv. Tutor., 18, 2084, 10.1109/COMST.2016.2535718
Swan, 2015
Lewis, 2015
Crosby, 2016, BlockChain technology: Beyond bitcoin, Appl. Innov., 2, 6
Pticek, 2016, Beyond the internet of things: The social networking of machines, Int. J. Distrib. Sens. Netw., 12, 10.1155/2016/8178417
Perera, 2014, Context aware computing for the internet of things: A survey, IEEE Commun. Surv. Tutor., 16, 414, 10.1109/SURV.2013.042313.00197
Xu, 2014, Internet of things in industries: A survey, IEEE Trans. Ind. Inf., 10, 2233, 10.1109/TII.2014.2300753
Al-Fuqaha, 2015, Internet of things: A survey on enabling technologies, protocols, and applications, IEEE Commun. Surv. Tutor., 17, 2347, 10.1109/COMST.2015.2444095
Zha, 2018, The impact of link duration on the integrity of distributed mobile networks, IEEE Trans. Inf. Forensics Secur., 13, 2240, 10.1109/TIFS.2018.2812714
Cui, 2018, Big data analytics and network calculus enabling intelligent management of autonomous vehicles in a smart city, IEEE Internet of Things J., 10.1109/JIOT.2018.2872442
Sethi, 2017, Internet of Things: Architectures, protocols, and applications, J. Electr. Comput. Eng., 10.1155/2017/9324035
R. Ratasuk, B. Vejlgaard, N. Mangalvedhe, A. Ghosh, NB-IoT system for M2M communication, in: 2016 Proc. IEEE Wireless Commun. and Netw. Conf. Workshops, WCNCW’16, pp. 1–5.
2016
Ren, 2018, Distributed online learning of fog computing under non-uniform device cardinality, IEEE Internet of Things J., 10.1109/JIOT.2018.2867481
Tsai, 2014, Data mining for Internet of Things: A survey, IEEE Commun. Surv. Tutor., 16, 77, 10.1109/SURV.2013.103013.00206
Zha, 2017, Collaborative authentication in decentralized dense mobile networks with key predistribution, IEEE Trans. Inf. Forensics Secur., 12, 2261, 10.1109/TIFS.2017.2705584
Makhdoom, 2018, Anatomy of threats to the Internet of Things, IEEE Commun. Surv. Tutor., 10.1109/COMST.2018.2874978
Alsaadi, 2015, Internet of Things: Features, challenges, and vulnerabilities, Int. J. Adv. Comput. Sci. Inf. Technol., 4, 1
Liu, 2017, A security framework for the Internet of Things in the future internet architecture, Future Internet, 9, 10.3390/fi9030027
Lin, 2017, A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications, IEEE Internet of Things J., 4, 1125, 10.1109/JIOT.2017.2683200
Xu, 2017, Achieving efficient detection against false data injection attacks in smart grid, IEEE Access, 5, 13787, 10.1109/ACCESS.2017.2728681
Mehta, 2012, Protecting location privacy in sensor networks against a global eavesdropper, IEEE Trans. Mobile Comput., 11, 320, 10.1109/TMC.2011.32
Zhang, 2014, Sybil attacks and their defenses in the Internet of Things, IEEE Internet of Things J., 1, 372, 10.1109/JIOT.2014.2344013
Mosenia, 2017, A comprehensive study of security of Internet-of-Things, IEEE Trans. Emerg. Top. Comput., 5, 586, 10.1109/TETC.2016.2606384
Perry, 2017
Wang, 2016, Virus propagation modeling and convergence analysis in large-scale networks, IEEE Trans. Inf. Forensics Secur., 11, 2241, 10.1109/TIFS.2016.2581305
Boritz, 2005, Is practitioners’ views on core concepts of information integrity, Int. J. Account. Inf. Syst., 6, 260, 10.1016/j.accinf.2005.07.001
Davidson, 2016
Nakamoto, 2008
Miller, 2015
How do Bitcoin Transactions Work? 2015-03-20, URL http://www.coindesk.com/information/how-do-bitcoin-transactions-work/.
Wyman, 2016
R.C. Merkle, Protocols for public key cryptosystems, in: Proc. 1st IEEE Symp. Secur. Privacy, SP’ 80, 1980, pp. 122–122, http://dx.dio.org/10.1109/SP.1980.10006.
D. Ghosh, How the byzantine general sacked the castle: A look into blockchain, 2016-04-06, URL https://medium.com/@DebrajG/how-the-byzantine-general-sacked-the-castle-a-look-into-blockchain-370fe637502c.
Lamport, 1982, The Byzantine generals problem, ACM Trans. Program. Lang. Syst., 4, 382, 10.1145/357172.357176
Poledna, 2007
Dolev, 1983, Authenticated algorithms for Byzantine agreement, SIAM J. Comput., 12, 656, 10.1137/0212045
Cristian, 1995, Atomic broadcast: From simple message diffusion to Byzantine agreement, Inform. and Comput., 118, 158, 10.1006/inco.1995.1060
Perry, 1986, Distributed agreement in the presence of processor and communication faults, IEEE Trans. Softw. Eng., SE-12, 477, 10.1109/TSE.1986.6312888
Schlichting, 1983, Fail-stop processors: An approach to designing fault-tolerant computing systems, ACM Trans. Comput. Syst., 1, 222, 10.1145/357369.357371
Mostéfaoui, 2001
Charron-Bost, 2009, The heard-of model: Computing in distributed systems with benign faults, Distrib. Comput., 22, 49, 10.1007/s00446-009-0084-6
Fitzi, 1998, Efficient byzantine agreement secure against general adversaries, Distrib. Comput., 134, 10.1007/BFb0056479
Marandi, 2011, High performance state-machine replication, 454
King, 2012
Buterin, 2015, On public and private blockchains, Ethereum Blog
Finney, 2011
Bastiaan, 2015
E. Heilman, A. Kendler, A. Zohar, S. Goldberg, Eclipse attacks on bitcoin’s peer-to-peer network, in: Proc. 24th USENIX Secur. Symp., USENIX Secur.’ 15, Washington, D.C., 2015, pp. 129–144.
Yuval Marcus, 2018, 15
Team, 2018
Meegan, 2016
Yang, 2017, Lightweight break-glass access control system for healthcare Internet-of-Things, IEEE Trans. Ind. Inf., 14, 10.1109/TII.2017.2751640
Chin, 2017, Energy big data security threats in IoT-based smart grid communications, IEEE Commun. Mag., 55, 70, 10.1109/MCOM.2017.1700154
Langner, 2011, Stuxnet: Dissecting a cyberwarfare weapon, IEEE Secur. Privacy, 9, 49, 10.1109/MSP.2011.67
Golle, 2004, Detecting and correcting malicious data in vanets, 29
Schiener, 2017
Why 0chain, not IOTA, is ideal for IOT apps, Dec, 2017, URL https://medium.com/0chain/why-0chain-not-iota-is-ideal-for-iot-web-enterprise-apps-bdd1154d148f.
McKinney, 2017
. I.O.T.A, Light vs. Full Node, URL https://iota.readme.io/v1.2.0/docs/light-vs-full-node.
Dorri, 2017, Towards an optimized blockchain for IoT, 173
Goland, 2017
Hou, 2012, Real-time communication over unreliable wireless links: A theory and its applications, IEEE Wirel. Commun., 19, 48, 10.1109/MWC.2012.6155876
Liang, 2013, An energy-efficient sleep scheduling with QoS consideration in 3GPP LTE-advanced networks for Internet of Things, IEEE J. Emerg. Sec. Top. Circuits Syst., 3, 13, 10.1109/JETCAS.2013.2243631
Zorzi, 2010, From today’s INTRAnet of Things to a future INTERnet of Things: A wireless- and mobility-related view, IEEE Wirel. Commun., 17, 44, 10.1109/MWC.2010.5675777
Rathore, 2016, Urban planning and building smart cities based on the internet of things using big data analytics, Comput. Netw., 101, 63, 10.1016/j.comnet.2015.12.023
Buterin, 2014
Chen, 2011, TRM-IoT: A trust management model based on fuzzy reputation for Internet of Things, Comput. Sci. Inf. Syst., 8, 1207, 10.2298/CSIS110303056C
Raval, 2016
Szabo, 1996, Smart contracts: Building blocks for digital markets, EXTROPY: J. Transhumanist Thought
Universa, 2017
Al Khalil, 2017
Kaiser, 2017
Hertig, 2018
Asor, 2015
This is how smart contracts and ethereum work, 2017, URL https://medium.com/startup-grind/gentle-intro-to-blockchain-and-smart-contracts-part-2-30a6c9a40946.
Maymounkov, 2002, Kademlia: A peer-to-peer information system based on the XOR metric, 53
Reid, 2013, An analysis of anonymity in the bitcoin system, 197
Androulaki, 2013, Evaluating user privacy in bitcoin, 34
Ron, 2013, 6
S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G.M. Voelker, S. Savage, A fistful of bitcoins: Characterizing payments among men with no names, in: 2013 Proc. Conf. Internet measurement, ACM, pp. 127–140.
Biryukov, 2014, Deanonymisation of clients in Bitcoin P2P network, 15
N. van Saberhagen, Cryptonote v 2. 0, 2013.
Koshy, 2014
bitcoinwiki, 2017
Rackoff, 1992, 433
Miers, 2013, Zerocoin: Anonymous distributed e-cash from Bitcoin, 397
Sasson, 2014, Zerocash: Decentralized anonymous payments from Bitcoin, 459
G. Maxwell, Confidential transaction, the initial investigation, URL https://elementsproject.org/elements/confidential-transactions/investigation.html.
Ouaddah, 2017, Towards a novel privacy-preserving access control model based on blockchain technology in IoT, 523
Ouaddah, 2016, FairAccess: A new Blockchain-based access control framework for the Internet of Things, Secur. Commun. Netw., 9, 5943, 10.1002/sec.1748
Pilkington, 2016, Blockchain technology: Principles and applications, 225
Vukolić, 2015, The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication, 112
R. Kotla, L. Alvisi, M. Dahlin, A. Clement, E. Wong, Zyzzyva: Speculative byzantine fault tolerance, in: Proc. 21st ACM SIGOPS Symp. Operating Syst. Principles, SOSP ’07, Vol. 41, pp. 45–58.
Sharma, 2017, DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks, IEEE Commun. Mag., 55, 78, 10.1109/MCOM.2017.1700041
Y. Guo, C. Mate, Jr., Crysto: A Scalable and Permission-less Blockchain Platform, URL https://cdecker.github.io/btcresearch/2017/guocrysto.html.
D. Ongaro, J. Ousterhout, In search of an understandable consensus algorithm, in: 2014 Proc. USENIX Annu. Tech. Conf., USENIX ATC 14, Philadelphia, PA, pp. 305–319.
T. Crain, V. Gramoli, M. Larrea, M. Raynal, (Leader/Randomization/Signature)-free Byzantine Consensus for Consortium Blockchains, 2017, arXiv preprint URL arXiv:1702.03068.
Douceur, 2002, The sybil attack, 251
Eastlake 3rd, 2011
Tanenbaum, 2011
M. Rosenfeld, Analysis of bitcoin pooled mining reward systems, 2011, arXiv preprint URL arXiv:1112.4980.
Laszka, 2015, When bitcoin mining pools run dry, 63
Eyal, 2015, The miner’s dilemma, 89
Miller, 2015, Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions, 680
Szabo, 1997
Bentov, 2014, Proof of activity: Extending Bitcoin’s proof of work via proof of stake, SIGMETRICS Perform. Eval. Rev., 42, 34, 10.1145/2695533.2695545
Vasin, 2014
Group, 2015
Kwon, 2014
Stewart, 2012
Sawtooth lake documentation, 2017, URL https://intelledger.github.io/introduction.html#proof-of-elapsed-time-poet.
Oki, 1988, Viewstamped replication: A new primary copy method to support highly-available distributed systems, 8
Miller, 2016, The honey badger of bft protocols, 31
Popov, 2016
Sompolinsky, 2013, Accelerating bitcoin’s transaction processing. Fast money grows on trees, not chains, IACR Cryptol. EPrint Archive, 2013
Buterin, 2014
Kabessa, 2017
. ethernodes.org, Network number 1, 2017, URL https://www.ethernodes.org/network/1.
Ethereum homestead documentation–the homestead release, 2016, URL http://www.ethdocs.org/en/latest/introduction/the-homestead-release.html.
. Vbuterin, On sharding blockchains, 2017, URL https://github.com/ethereum/wiki/wiki/Sharding-FAQ?from=groupmessagef.
A.S.d.P. Crespo, L.I.C. García, Stampery Blockchain Timestamping Architecture (BTA)-Version 6, 2017, arXiv preprint URL arXiv:1711.04709.
Back, 2014
Vuran, 2004, Spatio-temporal correlation: Theory and applications for wireless sensor networks, Comput. Netw., 45, 245, 10.1016/j.comnet.2004.03.007
Size of the bitcoin blockchain from 2010 to 2017, by quarter, Dec, 2017, URL https://www.statista.com/statistics/647523/worldwide-bitcoin-blockchain-size/.
G. Ateniese, B. Magri, D. Venturi, E. Andrade, Redactable blockchain - or-rewriting history in bitcoin and friends, in: 2017 IEEE Eur. Symp. Secur. Privacy, EuroSP’ 17, 2017, pp. 111–126.