DECENTRALIZED LEDGER TECHNOLOGY MEETS INTERNET OF THINGS. SECURITY AND FAULT-TOLERANCE ENHANCEMENT

Authors

  • Artem Popov National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Ukraine
  • Sergii Stirenko National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Ukraine
  • Heorhii Loutskii National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Ukraine

Keywords:

blockchain, IoT, consensus algorithms, distributed applications

Abstract

This paper focuses on increasing of performance and fault-tolerance of blockchain core and infrastructure that can be reached by design of lightweight protocol for IoT. Literature review has been made regarding to using of DLT in distributed systems design that have enhanced fault-tolerance and performance.

References

www.owasp.org OWASP IoT Top 10 (https://www.owasp.org/ images/1/1c/OWASP-IoT-Top-10-2018-final.pdf)

Abdul-Ghani, H. A., Konstantas, D., Mahyoub, M. (2018). A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model. (IJACSA) International Journal of Advanced Computer Science and Applications,Vol. 9, No. 3.

Tschorsch, F., Scheuermann, B. (2015). Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies. Humboldt University of Berlin.

Vukolic, M., (2016). The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication. IBM Research, Zurich.

Lamport, L., Shostak, R., Pease, M. (1982). The Byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS) vol. 4, No.3, 382-401.

Yang, Y. (2018) LinBFT: Linear-Communication Byzantine Fault Tolerance for Public Blockchains.

Kapitza, R. et al. (2012). CheapBFT: Resource-efficient Byzantine Fault Tolerance. ACM 978-1-4503-1223-3/12/04.

Tien Tuan Anh Dinh et al. (2017). Untangling Blockchain: A Data Processing View of Blockchain Systems. National University of Singapore.

Gai, A.-T., Viennot, L. (2004). Broose: a practical distributed hashtable based on the de-Bruijn topology. IEEE Fourth International Conference on Peer-to-Peer Computing.

Richa, A., Scheideler, C., Stevens, P. (2011). Self-stabilizing De Bruijn networks. Stabilization, Safety, and Security of Distributed Systems - 13th International Symposium, SSS 2011, Proceedings.

Amad, M., Aïssani, D., Meddahi, A., Benkerrou, M., Amghar, F. (2015). De Bruijn Graph based solution for lookup acceleration and optimization in P2P networks. Wireless Personal Communications 85: (3) ((2015) ), 1471–1486. doi:10.1007/s11277-015-2851-y.

Loutskii, H., Volokyta, A., Rehida, P., Honcharenko, O., Ivanishchev, B., Kaplunov, A. (2019). Increasing the fault tolerance of distributed systems for the Hyper de Bruijn topology with excess code. 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT).

Fayad, A., Hammi, B., Khatoun, R. (2018). An adaptive authentication and authorization scheme for IoT’s gateways: a blockchain based approach. 2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC).

Thien Duc Nguyen, Marchal, S., Miettinen, M., Fereidooni, H., Asokan, N., Sadeghi, A.-R. (2019). DÏoT: A Federated Self-learning Anomaly Detection System for IoT. 39th IEEE International Conference on Distributed Computing Systems (ICDCS).

Banerjee, M., Lee, J., Choo, K. R. (2018). A blockchain future for internet of things security: a position paper. Digital Communications and Networks, vol. 4, p. 149-160.

Banerjee, M., Lee, J., Chen, Q., Choo, K. R. (2018). Blockchain-Based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual Design. 27th International Conference on Computer Communication and Networks (ICCCN).

Team Rocket (2018). Snowflake to Avalanche: A Novel Metastable Consensus Protocol Family for Cryptocurrencies. t-rocket@protonmail.com.

Downloads

Published

2023-06-08

Issue

Section

Additional Section