676
Views
62
Downloads
3
Crossref
N/A
WoS
5
Scopus
N/A
CSCD
In recent years, the theory and method of swarm intelligence based on the Internet have become the core research field of the new generation of Internet of Things (IoT). Both play a basic and supporting role in other research fields of IoT. With the popularization and development of crowd network systems, massive swarm intelligence data have brought unprecedented challenges to traditional centralized data management. The most prominent is the aspect of privacy and security. In view of the fact that source data are easy to be tampered with and stolen, and there is a lack of credit guarantee mechanism in information sharing, a blockchain-based trusted uploading scheme of IoT nodes is proposed. It carries out trusted design from three dimensions of node hardware, transmission link, and platform and provides relevant references for similar designs.
In recent years, the theory and method of swarm intelligence based on the Internet have become the core research field of the new generation of Internet of Things (IoT). Both play a basic and supporting role in other research fields of IoT. With the popularization and development of crowd network systems, massive swarm intelligence data have brought unprecedented challenges to traditional centralized data management. The most prominent is the aspect of privacy and security. In view of the fact that source data are easy to be tampered with and stolen, and there is a lack of credit guarantee mechanism in information sharing, a blockchain-based trusted uploading scheme of IoT nodes is proposed. It carries out trusted design from three dimensions of node hardware, transmission link, and platform and provides relevant references for similar designs.
X. Lu, S. Wang, F. Kang, S. Liu, H. Li, X. Xu, and L Cui, An anomaly detection method to improve the intelligent level of smart articles based on multiple group correlation probability models, International Journal of Crowd Science, vol. 3No.3, pp. 333–347, 2019.
P. Tedeschi, S. Sciancalepore, A. Eliyan, and R Di Pietro, LiKe: Lightweight certificateless key agreement for secure IoT communications, IEEE Internet Things J, vol. 7, no. 1, pp. 621–638, 2020.
K. Christidis and M Devetsikiotis, Blockchains and smart contracts for the internet of things, IEEE Access, vol. 4, pp. 2292–2303, 2016.
J, Partala, Provably secure covert communication on Blockchain, Cryptography, vol. 2, no. 3, p. 18, 2018.
K. El Bouchti, S. Ziti, F. Omary, and N Kharmoum, A new database encryption model based on encryption classes, J. Comput. Sci, vol. 15, no. 6, pp. 844–854, 2019.
K. Salah, N. Nizamuddin, R. Jayaraman, and M Omar, Blockchain-based soybean traceability in agricultural supply chain, IEEE Access, vol. 7, pp. 73295–73305, 2019.
R. S. Fletcher and D. K Fisher, A miniature sensor for measuring reflectance, relative humidity, and temperature: A greenhouse example, Agricultural Sciences, vol. 9, no. 11, pp. 1516–1527, 2018.
Y. Lee, J. Jeong, and Y Son, Design and implementation of the secure compiler and virtual machine for developing secure IoT services, Future Gener. Comput. Syst, vol. 76, pp. 350–357, 2017.
S. Belguith, N. Kaaniche, M. Laurent, A. Jemai, and R. Attia, PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT, Comput. Netw, vol. 133, pp. 141–156, 2018.
A. K. Das, S. Zeadally, and D He, Taxonomy and analysis of security protocols for Internet of Things, Future Gener. Comput. Syst, vol. 89, pp. 110–125, 2018.
Y. Zeng, B. Clerckx, and R Zhang, Communications and signals design for wireless power transmission, IEEE Trans. Commun, vol. 65, no. 5, pp. 2264–2290, 2017.
This work was supported by the National Key Research and Development Program of China (No. 2020YFB2104602).
The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).