scispace - formally typeset
Search or ask a question
Journal ArticleDOI

A Service-Oriented Permissioned Blockchain for the Internet of Things

TL;DR: A service-oriented permissioned blockchain, where different consensus protocols are launched according to users’ quality of service (QoS) requirements is proposed, and a dueling deep reinforcement learning approach is used to solve the scalability problem.
Abstract: Recently, the emergence of blockchain has stirred great interests in the field of Internet of Things (IoT). However, numerous non-trivial problems in the current blockchain system prevent it from being used as a generic platform for large-scale services and applications in IoT. One notable drawback is the scalability problem. Lots of projects and researches have been done to solve this problem. Nevertheless, they do not consider different users’ conditions, only using a single consensus protocol as the best fit one, as well as the IoT system is heavily constrained by computing and networking resources. In this article, we study a permissioned blockchain-based IoT architecture. In order to improve the scalability of the blockchain system and meet the needs of different users, we propose a service-oriented permissioned blockchain, where different consensus protocols are launched according to users’ quality of service (QoS) requirements. Specially, we quantify a few popular consensus protocols. Additionally, we select block producers, which need a great number of computation resources, as well as dynamically allocate network bandwidth to the blockchain system. We formulate consensus protocols selection, block producers selection, and network bandwidth allocation as a joint optimization problem. We then use a dueling deep reinforcement learning approach to solve the problem. Simulation results demonstrate the effectiveness of our proposed scheme.
Citations
More filters
Journal ArticleDOI
TL;DR: This paper identifies several important aspects of integrating blockchain and ML, including overview, benefits, and applications, and discusses some open issues, challenges, and broader perspectives that need to be addressed to jointly consider blockchain andML for communications and networking systems.
Abstract: Recently, with the rapid development of information and communication technologies, the infrastructures, resources, end devices, and applications in communications and networking systems are becoming much more complex and heterogeneous. In addition, the large volume of data and massive end devices may bring serious security, privacy, services provisioning, and network management challenges. In order to achieve decentralized, secure, intelligent, and efficient network operation and management, the joint consideration of blockchain and machine learning (ML) may bring significant benefits and have attracted great interests from both academia and industry. On one hand, blockchain can significantly facilitate training data and ML model sharing, decentralized intelligence, security, privacy, and trusted decision-making of ML. On the other hand, ML will have significant impacts on the development of blockchain in communications and networking systems, including energy and resource efficiency, scalability, security, privacy, and intelligent smart contracts. However, some essential open issues and challenges that remain to be addressed before the widespread deployment of the integration of blockchain and ML, including resource management, data processing, scalable operation, and security issues. In this paper, we present a survey on the existing works for blockchain and ML technologies. We identify several important aspects of integrating blockchain and ML, including overview, benefits, and applications. Then we discuss some open issues, challenges, and broader perspectives that need to be addressed to jointly consider blockchain and ML for communications and networking systems.

158 citations


Cites methods from "A Service-Oriented Permissioned Blo..."

  • ...It has been successfully used in a variety of applications, such as vehicle ad hoc networks (VANET) [15], [16], Internet of Things (IoT) [17], [18], healthcare systems [4], [19], content-centric networks [20], [21], reputation systems [22], [23], and security services [24], [25]....

    [...]

Journal ArticleDOI
TL;DR: An in-depth survey of blockchain technology is provided to provide insights into the blockchain security threats, to highlight the privacy necessities for current applications, and give an insight on how these challenges can be resolved by the blockchain technology.

102 citations

Journal ArticleDOI
TL;DR: A novel analysis of sharded blockchain latency and security-level characterization is provided and the proposed DQNSB scheme provides a much higher TPS than the existing DRL-enabled blockchain technology while maintaining a high security level.
Abstract: High levels of scalability and reliability are needed to support the massive Internet-of-Things (IoT) services In particular, blockchains can be effectively used to safely manage data from large-scale IoT networks However, current blockchain systems have low transactions per second (TPS) rates and scalability limitations that make them unsuitable To solve the above issues, this article proposes a deep $Q$ network shard-based blockchain (DQNSB) scheme that dynamically finds the optimal throughput configuration In this article, a novel analysis of sharded blockchain latency and security-level characterization is provided Using the analysis equations, the DQNSB scheme estimates the level of maliciousness and adapts the blockchain parameters to enhance the security level considering the amount of malicious attacks on the consensus process To achieve this purpose, deep reinforcement learning (DRL) agents are trained to find the optimal system parameters in response to the network status, and adaptively optimizes the system throughput and security level The simulation results show that the proposed DQNSB scheme provides a much higher TPS than the existing DRL-enabled blockchain technology while maintaining a high security level

43 citations


Cites background from "A Service-Oriented Permissioned Blo..."

  • ...[31], [32] proposed blockchain optimization frameworks in various IoT environment, and performed mathematical analysis and optimization on throughput and latency....

    [...]

  • ...However, both [31] and [32] do not consider dynamic malicious attacks scenarios....

    [...]

Journal ArticleDOI
TL;DR: In this paper, the authors summarized and analyzed the applications of blockchain and machine learning in industrial Internet of Things (IIoT) from three important aspects, i.e., consensus mechanism, storage and communication.

42 citations

Journal ArticleDOI
TL;DR: This article constructs a blockchain-based privacy-preserving and rewarding private data-sharing scheme (BPRPDS) for IoT and utilizes the licensing technology executed by smart contracts to ensure flexible access control of multisharing.
Abstract: The Internet of Things (IoT) devices possessed by individuals produce massive amounts of data. The private data onto specific IoT devices can be combined with intelligent platform to provide help for future research and prediction. As an important digital asset, individuals can sell private data to get rewards. Problems, such as privacy, security, and access control prevent individuals from sharing their private data. The blockchain technology is widely used to build an anonymous trading system. In this article, we construct a blockchain-based privacy-preserving and rewarding private data-sharing scheme (BPRPDS) for IoT. A privacy issue worth considering is that the malicious cloud server may establish a behavior profile database of data users (DUs). In the case of anonymity, the transactions of private data sharing are easy to cause disputes. When anonymous DUs are framed, it is hard to protect their rights. With the help of the deniable ring signature and Monero, we realize the behavior profile building prevention and nonframeability of BPRPDS. At the same time, we utilize the licensing technology executed by smart contracts to ensure flexible access control of multisharing. The proposed BPRPDS is provably secure. Performance analysis and experimental results show that BPRPDS is efficient and practical.

38 citations

References
More filters
Journal ArticleDOI
TL;DR: A new replication algorithm, BFT, is described that can be used to build highly available systems that tolerate Byzantine faults and is used to implement the first Byzantine-fault-tolerant NFS file system, BFS.
Abstract: Our growing reliance on online services accessible on the Internet demands highly available systems that provide correct service without interruptions. Software bugs, operator mistakes, and malicious attacks are a major cause of service interruptions and they can cause arbitrary behavior, that is, Byzantine faults. This article describes a new replication algorithm, BFT, that can be used to build highly available systems that tolerate Byzantine faults. BFT can be used in practice to implement real services: it performs well, it is safe in asynchronous environments such as the Internet, it incorporates mechanisms to defend against Byzantine-faulty clients, and it recovers replicas proactively. The recovery mechanism allows the algorithm to tolerate any number of faults over the lifetime of the system provided fewer than 1/3 of the replicas become faulty within a small window of vulnerability. BFT has been implemented as a generic program library with a simple interface. We used the library to implement the first Byzantine-fault-tolerant NFS file system, BFS. The BFT library and BFS perform well because the library incorporates several important optimizations, the most important of which is the use of symmetric cryptography to authenticate messages. The performance results show that BFS performs 2p faster to 24p slower than production implementations of the NFS protocol that are not replicated. This supports our claim that the BFT library can be used to build practical systems that tolerate Byzantine faults.

2,190 citations


"A Service-Oriented Permissioned Blo..." refers background in this paper

  • ...Based on a certain view change protocol [13], one node is selected as the primary node....

    [...]

Posted Content
Ziyu Wang1, Tom Schaul1, Matteo Hessel1, Hado van Hasselt1, Marc Lanctot1, Nando de Freitas1 
TL;DR: This paper presents a new neural network architecture for model-free reinforcement learning that leads to better policy evaluation in the presence of many similar-valued actions and enables the RL agent to outperform the state-of-the-art on the Atari 2600 domain.
Abstract: In recent years there have been many successes of using deep representations in reinforcement learning. Still, many of these applications use conventional architectures, such as convolutional networks, LSTMs, or auto-encoders. In this paper, we present a new neural network architecture for model-free reinforcement learning. Our dueling network represents two separate estimators: one for the state value function and one for the state-dependent action advantage function. The main benefit of this factoring is to generalize learning across actions without imposing any change to the underlying reinforcement learning algorithm. Our results show that this architecture leads to better policy evaluation in the presence of many similar-valued actions. Moreover, the dueling architecture enables our RL agent to outperform the state-of-the-art on the Atari 2600 domain.

2,010 citations

Journal ArticleDOI
Oscar Novo1
TL;DR: This paper proposes a new architecture for arbitrating roles and permissions in IoT based on blockchain technology and shows that the blockchain technology could be used as access management technology in specific scalable IoT scenarios.
Abstract: The Internet of Things (IoT) is stepping out of its infancy into full maturity and establishing itself as a part of the future Internet. One of the technical challenges of having billions of devices deployed worldwide is the ability to manage them. Although access management technologies exist in IoT, they are based on centralized models which introduce a new variety of technical limitations to manage them globally. In this paper, we propose a new architecture for arbitrating roles and permissions in IoT. The new architecture is a fully distributed access control system for IoT based on blockchain technology. The architecture is backed by a proof of concept implementation and evaluated in realistic IoT scenarios. The results show that the blockchain technology could be used as access management technology in specific scalable IoT scenarios.

992 citations

Proceedings ArticleDOI
19 May 2004
TL;DR: This paper presented an open, fair and dynamic QoS computation model for web services selection through implementation of and experimentation with a QoS registry in a hypothetical phone service provisioning market place application.
Abstract: The emerging Service-Oriented Computing (SOC) paradigm promises to enable businesses and organizations to collaborate in an unprecedented way by means of standard web services. To support rapid and dynamic composition of services in this paradigm, web services that meet requesters' functional requirements must be able to be located and bounded dynamically from a large and constantly changing number of service providers based on their Quality of Service (QoS). In order to enable quality-driven web service selection, we need an open, fair, dynamic and secure framework to evaluate the QoS of a vast number of web services. The fair computation and enforcing of QoS of web services should have minimal overhead but yet able to achieve sufficient trust by both service requesters and providers. In this paper, we presented our open, fair and dynamic QoS computation model for web services selection through implementation of and experimentation with a QoS registry in a hypothetical phone service provisioning market place application.

969 citations


Additional excerpts

  • ...According to the work in [22], the matrix Q should be...

    [...]

Proceedings ArticleDOI
14 Oct 2007
TL;DR: In Zyzzyva, replicas respond to a client's request without first running an expensive three-phase commit protocol to reach agreement on the order in which the request must be processed.
Abstract: We present Zyzzyva, a protocol that uses speculation to reduce the cost and simplify the design of Byzantine fault tolerant state machine replication. In Zyzzyva, replicas respond to a client's request without first running an expensive three-phase commit protocol to reach agreement on the order in which the request must be processed. Instead, they optimistically adopt the order proposed by the primary and respond immediately to the client. Replicas can thus become temporarily inconsistent with one another, but clients detect inconsistencies, help correct replicas converge on a single total ordering of requests, and only rely on responses that are consistent with this total order. This approach allows Zyzzyva to reduce replication overheads to near their theoretical minimal.

763 citations