scispace - formally typeset
Open AccessJournal ArticleDOI

Approaching the communication constraints of Ethereum-based decentralized applications

Matevž Pustišek, +2 more
- 11 Jun 2019 - 
- Vol. 19, Iss: 11, pp 2647
Reads0
Chats0
TLDR
This work proposed and evaluated three application architectures differing in communication, computation, storage, and security requirements of the Ethereum blockchain for the IoT, and found out that with the appropriate designs and the remote server architecture the authors can strongly reduce the storage and communication requirements imposed on devices, with predictable security implications.
Abstract
Those working on Blockchain technologies have described several new innovative directions and novel services in the Internet of things (IoT), including decentralized trust, trusted and verifiable execution of smart contracts, and machine-to-machine communications and automation that reach beyond the mere exchange of data. However, applying blockchain principles in the IoT is a challenge due to the constraints of the end devices. Because of fierce cost pressure, the hardware resources in these devices are usually reduced to the minimum necessary for operation. To achieve the high coverage needed, low bitrate mobile or wireless technologies are frequently applied, so the communication is often constrained, too. These constraints make the implementation of blockchain nodes for IoT as standalone end-devices impractical or even impossible. We therefore investigated possible design approaches to decentralized applications based on the Ethereum blockchain for the IoT. We proposed and evaluated three application architectures differing in communication, computation, storage, and security requirements. In a pilot setup we measured and analyzed the data traffic needed to run the blockchain clients and their applications. We found out that with the appropriate designs and the remote server architecture we can strongly reduce the storage and communication requirements imposed on devices, with predictable security implications. Periodic device traffic is reduced to 2400 B/s (HTTP) and 170 B/s (Websocket) from about 18 kB/s in the standalone-device full client architecture. A notification about a captured blockchain event and the corresponding verification resulted in about 2000 B of data. A transaction sent from the application to the client resulted in an about 500 B (HTTP) and 300 B message (Websocket). The key store location, which affects the serialization of a transaction, only had a small influence on the transaction-related data. Raw transaction messages were 45 B larger than when passing the JSON transaction objects. These findings provide directions for fog/cloud IoT application designers to avoid unrealistic expectations imposed upon their IoT devices and blockchain technologies, and enable them to select the appropriate system design according to the intended use case and system constraints. However, for very low bit-rate communication networks, new communication protocols for device to blockchain-client need to be considered.

read more

Citations
More filters
Journal ArticleDOI

Cost-effective IoT devices as trustworthy data sources for a blockchain-based water management system in precision agriculture

TL;DR: The findings show how solutions based on the proposed architecture can be implemented with only 6% of additional energy budget compared to the normal operations of the IoT devices, and the validation results make the contribution a strong candidate for use in automated and incentive-based irrigation water management systems.
Journal ArticleDOI

Taxonomy of centralization in public blockchain systems: A systematic literature review

TL;DR: This research derives an initial taxonomy of centralization present in decentralized blockchains through rigorous synthesis using a systematic literature review and proposes an encompassing taxonomyof centralization concerns based on empirically observable and measurable characteristics.
Journal ArticleDOI

Blockchain technology as an enabler of consumer trust: a text mining literature analysis

TL;DR: A text mining literature analysis of a body of published articles queried in the Scopus database regarding BC technology and consumer trust highlights the multidisciplinary nature of BC research within consumer trust and reveals the marketing, social and economic sciences’ researchers should devote efforts to the application of BC.
Journal ArticleDOI

Security Properties of Light Clients on the Ethereum Blockchain

TL;DR: The results clearly demonstrate that the assumption of normal operating conditions is insufficient to justify the security assumptions of light clients, and for any adversary that is able to manipulate the network, the security assurances provided by the light protocol are severely impacted, and in some cases entirely lost.
Proceedings ArticleDOI

Distributed Ledger Technologies for IoT and Business DApps

TL;DR: This paper proposes a set of diverse criteria for the evaluation of a distributed ledger ecosystem, which does not focus only on the technological aspects of viable solutions but also considers decentralized application development perspective and sustainability of its use.
References
More filters
Journal ArticleDOI

Blockchains and Smart Contracts for the Internet of Things

TL;DR: The conclusion is that the blockchain-IoT combination is powerful and can cause significant transformations across several industries, paving the way for new business models and novel, distributed applications.
Journal ArticleDOI

IoT security: Review, blockchain solutions, and open challenges

TL;DR: It is discussed, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems.
Proceedings ArticleDOI

Blockchain for IoT security and privacy: The case study of a smart home

TL;DR: This paper shows that the proposed BC-based smart home framework is secure by thoroughly analysing its security with respect to the fundamental security goals of confidentiality, integrity, and availability, and presents simulation results to highlight that the overheads are insignificant relative to its security and privacy gains.
Journal ArticleDOI

On blockchain and its integration with IoT. Challenges and opportunities

TL;DR: This paper focuses on the relationship between blockchain and IoT, investigates challenges in blockchain IoT applications, and surveys the most relevant work in order to analyze how blockchain could potentially improve the IoT.
Journal ArticleDOI

Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT

TL;DR: This paper proposes a new architecture for arbitrating roles and permissions in IoT based on blockchain technology and shows that the blockchain technology could be used as access management technology in specific scalable IoT scenarios.
Related Papers (5)