Journal Home > Volume 6 , Issue 2

In recent years, the theory and method of swarm intelligence based on the Internet have become the core research field of the new generation of Internet of Things (IoT). Both play a basic and supporting role in other research fields of IoT. With the popularization and development of crowd network systems, massive swarm intelligence data have brought unprecedented challenges to traditional centralized data management. The most prominent is the aspect of privacy and security. In view of the fact that source data are easy to be tampered with and stolen, and there is a lack of credit guarantee mechanism in information sharing, a blockchain-based trusted uploading scheme of IoT nodes is proposed. It carries out trusted design from three dimensions of node hardware, transmission link, and platform and provides relevant references for similar designs.


menu
Abstract
Full text
Outline
About this article

A Blockchain-Based Trusted Upload Scheme for the Internet of Things Nodes

Show Author's information Yulei Jiao1( )Cexun Wang1
Beijing Academy of Blockchain and Edge Computing, Beijing 100086, China

Abstract

In recent years, the theory and method of swarm intelligence based on the Internet have become the core research field of the new generation of Internet of Things (IoT). Both play a basic and supporting role in other research fields of IoT. With the popularization and development of crowd network systems, massive swarm intelligence data have brought unprecedented challenges to traditional centralized data management. The most prominent is the aspect of privacy and security. In view of the fact that source data are easy to be tampered with and stolen, and there is a lack of credit guarantee mechanism in information sharing, a blockchain-based trusted uploading scheme of IoT nodes is proposed. It carries out trusted design from three dimensions of node hardware, transmission link, and platform and provides relevant references for similar designs.

Keywords: Internet of Things, blockchain, crowd network, reliable communication, encryption and decryption

References(18)

1
F. Wu, C. Lu, M. Zhu, H. Chen, J. Zhu, K. Yu, L. Li, M. Li, Q. Chen, X. Li, et al., Towards a new generation of artificial intelligence in China, Nat. Mach. Intell., vol. 2, no. 6, pp. 312–316, 2020.https://doi.org/10.1038/s42256-020-0183-4
DOI
2
Y. Chai, C. Miao, B. Sun, Y. Zheng, and Q. Li, Crowd science and engineering: concept and research framework, International Journal of Crowd Science, vol. 1, no. 1, pp. 2−8, 2017.https://doi.org/10.1108/IJCS-01-2017-0004
DOI
3

X. Lu, S. Wang, F. Kang, S. Liu, H. Li, X. Xu, and L Cui, An anomaly detection method to improve the intelligent level of smart articles based on multiple group correlation probability models, International Journal of Crowd Science, vol. 3No.3, pp. 333–347, 2019.

4

P. Tedeschi, S. Sciancalepore, A. Eliyan, and R Di Pietro, LiKe: Lightweight certificateless key agreement for secure IoT communications, IEEE Internet Things J, vol. 7, no. 1, pp. 621–638, 2020.

5

K. Christidis and M Devetsikiotis, Blockchains and smart contracts for the internet of things, IEEE Access, vol. 4, pp. 2292–2303, 2016.

6
E. Khorov, A. Kiryanov, A. Lyakhov, and G. Bianchi, A tutorial on IEEE 802.11ax high efficiency WLANs, IEEE Commun. Surv. Tutorials, vol. 21, no. 1, pp. 2292−2303, 2019.https://doi.org/10.1109/COMST.2018.2871099
DOI
7
G. Liu and S. Xiao, Scalable security solution against wiretapping for network coding based priority encoding transmission, Chin. J. Electron., vol. 27, no. 1, pp. 191−197, 2018.https://doi.org/10.1049/cje.2017.09.017
DOI
8

J, Partala, Provably secure covert communication on Blockchain, Cryptography, vol. 2, no. 3, p. 18, 2018.

9

K. El Bouchti, S. Ziti, F. Omary, and N Kharmoum, A new database encryption model based on encryption classes, J. Comput. Sci, vol. 15, no. 6, pp. 844–854, 2019.

10

K. Salah, N. Nizamuddin, R. Jayaraman, and M Omar, Blockchain-based soybean traceability in agricultural supply chain, IEEE Access, vol. 7, pp. 73295–73305, 2019.

11

R. S. Fletcher and D. K Fisher, A miniature sensor for measuring reflectance, relative humidity, and temperature: A greenhouse example, Agricultural Sciences, vol. 9, no. 11, pp. 1516–1527, 2018.

12
M. Gautschi, P. D. Schiavone, A. Traber, I. Loi, A. Pullini, D. Rossi, E. Flamand, F. K. Gürkaynak, and L. Benini, Near-threshold RISC-V core with DSP extensions for scalable IoT endpoint devices, IEEE Trans. Very Large Scale Integr. (VLSI) Syst. , vol. 25, no. 10, pp. 2700−2713, 2017.https://doi.org/10.1109/TVLSI.2017.2654506
DOI
13
V. Essien, C. A. Bolu, J. Azeta, I. P. Okokpujie, O. Kilanko, and S. A. Afolalu, Application of data logger for monitoring indoor and outdoor temperature of buildings: A review, IOP Conf. Ser. : Mater. Sci. Eng. , vol. 1107, no. 1, p. 012181, 2021.https://doi.org/10.1088/1757-899X/1107/1/012181
DOI
14

Y. Lee, J. Jeong, and Y Son, Design and implementation of the secure compiler and virtual machine for developing secure IoT services, Future Gener. Comput. Syst, vol. 76, pp. 350–357, 2017.

15
M. Moraga and Y. Y. Zhao, Reverse engineering a legacy software in a complex system: A systems engineering approach, INCOSE Int. Symp., vol. 28, no. 1, pp. 1250−1264, 2018.https://doi.org/10.1002/j.2334-5837.2018.00546.x
DOI
16

S. Belguith, N. Kaaniche, M. Laurent, A. Jemai, and R. Attia, PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT, Comput. Netw, vol. 133, pp. 141–156, 2018.

17

A. K. Das, S. Zeadally, and D He, Taxonomy and analysis of security protocols for Internet of Things, Future Gener. Comput. Syst, vol. 89, pp. 110–125, 2018.

18

Y. Zeng, B. Clerckx, and R Zhang, Communications and signals design for wireless power transmission, IEEE Trans. Commun, vol. 65, no. 5, pp. 2264–2290, 2017.

Publication history
Copyright
Acknowledgements
Rights and permissions

Publication history

Received: 10 February 2022
Revised: 23 March 2022
Accepted: 23 March 2022
Published: 30 June 2022
Issue date: June 2022

Copyright

© The author(s) 2022

Acknowledgements

Acknowledgment

This work was supported by the National Key Research and Development Program of China (No. 2020YFB2104602).

Rights and permissions

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return