scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Blockchains and Smart Contracts for the Internet of Things

10 May 2016-IEEE Access (IEEE)-Vol. 4, pp 2292-2303
TL;DR: The conclusion is that the blockchain-IoT combination is powerful and can cause significant transformations across several industries, paving the way for new business models and novel, distributed applications.
Abstract: Motivated by the recent explosion of interest around blockchains, we examine whether they make a good fit for the Internet of Things (IoT) sector. Blockchains allow us to have a distributed peer-to-peer network where non-trusting members can interact with each other without a trusted intermediary, in a verifiable manner. We review how this mechanism works and also look into smart contracts—scripts that reside on the blockchain that allow for the automation of multi-step processes. We then move into the IoT domain, and describe how a blockchain-IoT combination: 1) facilitates the sharing of services and resources leading to the creation of a marketplace of services between devices and 2) allows us to automate in a cryptographically verifiable manner several existing, time-consuming workflows. We also point out certain issues that should be considered before the deployment of a blockchain network in an IoT setting: from transactional privacy to the expected value of the digitized assets traded on the network. Wherever applicable, we identify solutions and workarounds. Our conclusion is that the blockchain-IoT combination is powerful and can cause significant transformations across several industries, paving the way for new business models and novel, distributed applications.
Citations
More filters
Proceedings ArticleDOI
23 Jul 2018
TL;DR: This article portrays the symbiotic relationship between blockchain and smart health, and identifies and analyse three individual streams of possible synergies.
Abstract: Blockchain technology is rapidly gaining traction in healthcare industry as one of the most exciting technological developments. In particular, blockchain technology presents numerous opportunities for healthcare industry such as reduced transaction costs, increased transparency for regulatory reporting, efficient healthcare data management and healthcare records universality. In the context of smart health, blockchain may provide distinct benefits, particularly from a context-aware perspective where efficient and personalised solutions may be provided to citizens and the society in general. In this article, we portray the symbiotic relationship between blockchain and smart health. Among others, we identify and analyse three individual streams of possible synergies. In addition, we discuss several challenges for actually implementing blockchain-based applications in the healthcare industry along with several opportunities for future research directions.

34 citations


Cites background from "Blockchains and Smart Contracts for..."

  • ...gr structure, or a public ledger, they have paved the way for a wide range of applications that span from supply chain management, to finance and from IoT to citizen services [5], [6]....

    [...]

Journal ArticleDOI
TL;DR: The intellectual core of BIoT is examined through a co-citation proximity analysis–based systematic review (CPASR) of the correlations between 44 highly influential articles out of 473 relevant research studies to establish the intellectual core.
Abstract: PurposeDue to the rapid growth of blockchain technology in recent years, the fusion of blockchain and the Internet of Things (BIoT) has drawn considerable attention from researchers and industrial practitioners and is regarded as a future trend in technological development. Although several authors have conducted literature reviews on the topic, none have examined the development of the knowledge structure of BIoT, resulting in scattered research and development (R&D) efforts.Design/methodology/approachThis study investigates the intellectual core of BIoT through a co-citation proximity analysis–based systematic review (CPASR) of the correlations between 44 highly influential articles out of 473 relevant research studies. Subsequently, we apply a series of statistical analyses, including exploratory factor analysis (EFA), hierarchical cluster analysis (HCA), k-means clustering (KMC) and multidimensional scaling (MDS) to establish the intellectual core.FindingsOur findings indicate that there are nine categories in the intellectual core of BIoT: (1) data privacy and security for BIoT systems, (2) models and applications of BIoT, (3) system security theories for BIoT, (4) frameworks for BIoT deployment, (5) the fusion of BIoT with emerging methods and technologies, (6) applied security strategies for using blockchain with the IoT, (7) the design and development of industrial BIoT, (8) establishing trust through BIoT and (9) the BIoT ecosystem.Originality/valueWe use the CPASR method to examine the intellectual core of BIoT, which is an under-researched and topical area. The paper also provides a structural framework for investigating BIoT research that may be applicable to other knowledge domains.

34 citations

Journal ArticleDOI
TL;DR: A credibility mechanism to effectively prevent vehicles from broadcasting mendacious messages and malicious requests is proposed, thereby enhancing the credibility of vehicles and providing a secure and trustworthy communication environment for the VANETs.
Abstract: The development of vehicular ad-hoc networks (VANETs) has facilitated adaptive traffic signal control for intelligent transportation. In this paper, we proposed the traffic signal control mechanism based on a consortium blockchain, which has saved plenty of financial and material resources. It has solved the centralization problems and minimized the high degree of human intervention in the process of traffic signal light management. As a road is congested, the vehicle forwards road condition messages. The traffic department ( $TD$ ) adjusts the signal light duration to allow the synergistic optimization management, and control the traffic vehicle status through a smart contract. In addition, we propose a credibility mechanism to effectively prevent vehicles from broadcasting mendacious messages and malicious requests, thereby enhancing the credibility of vehicles and providing a secure and trustworthy communication environment for the VANETs. It is hazardous for vehicles to send plaintext messages in an open environment because their privacy and security are threatened. Thus, we utilize ElGamal encryption and group signature algorithm to guarantee the confidentiality, privacy, and non-repudiation of any information. The safety analysis and performance evaluation demonstrate that the scheme is feasible and valid, and it can facilitate the adaptive control of traffic signal lights.

34 citations


Cites background from "Blockchains and Smart Contracts for..."

  • ...A smart contract [34] is a programmable code embedded in a blockchain, which can automatically enforce the treaty provisions....

    [...]

Proceedings ArticleDOI
01 Oct 2017
TL;DR: This paper presents blockchain and its work in progress, the VMOA blockchain, to secure virtual machine orchestration operations for cloud computing and network functions virtualization systems and describes design choices and implementation plans.
Abstract: The blockchain technology is gaining momentum because of its possible application to other systems than the cryptocurrency one. Indeed, blockchain, as a de-centralized system based on a distributed digital ledger, can be utilized to securely manage any kind of assets, constructing a system that is independent of any authorization entity. In this paper, we briefly present blockchain and our work in progress, the VMOA blockchain, to secure virtual machine orchestration operations for cloud computing and network functions virtualization systems. Using tutorial examples, we describe our design choices and draw implementation plans.

34 citations


Cites background from "Blockchains and Smart Contracts for..."

  • ...Such a database systems is distributed in the sense that the complete blockchain is copied in multiple places in the blockchain network as is [6]....

    [...]

  • ...Record integrity in blockchain is granted by public key cryptography communication [6] and reinforced by the heavy usage of hashing in block construction and transaction coding....

    [...]

Journal ArticleDOI
TL;DR: In this paper, the authors provide an overview of blockchain in supply chain and modeling of challenges in the adoption of blockchain technology in SC, using interpretive structural modeling (ISM) to model the challenges of adoption of BT in SC.
Abstract: Adoption of blockchain technology (BT) leads to shrinking supply chains, produces a better quality product, saves product development time and increases the customized offering to the customer. Since it is a new and growing area of research, researchers and practitioners are not entirely aware of challenges in the adoption of BT in supply chain (SC). Therefore, the objective of this research is to provide an overview of BT in SC and modeling of challenges in the adoption of BT in SC.,Interpretive structural modeling (ISM) is used to model the challenges of adoption of BT in SC. Challenges are identified by the literature review and verified by expert's opinions.,This study presents some key challenges, i.e. to develop trust within SC management system, obey the governance rules and regulations of institution while implementation of BT in SC, provide transparency of data, obtain tamperproof data to avoid fraud, improve coordination and information sharing among the SC partners, choose a profit-earning product SC for adoption of BT, adopt societal changes and train the participants to strengthen behavioral intention towards adoption of BT in SC. Additionally, interrelationships among the challenges have been identified. This work discusses potential implications based on challenges and provides a platform for the adoption of BT in SC.,The interrelations of the challenges will provide valuable understandings for developing BT solutions in SC to the practitioners.

34 citations

References
More filters
Journal ArticleDOI
TL;DR: The Albanian Generals Problem as mentioned in this paper is a generalization of Dijkstra's dining philosophers problem, where two generals have to come to a common agreement on whether to attack or retreat, but can communicate only by sending messengers who might never arrive.
Abstract: I have long felt that, because it was posed as a cute problem about philosophers seated around a table, Dijkstra’s dining philosopher’s problem received much more attention than it deserves. (For example, it has probably received more attention in the theory community than the readers/writers problem, which illustrates the same principles and has much more practical importance.) I believed that the problem introduced in [41] was very important and deserved the attention of computer scientists. The popularity of the dining philosophers problem taught me that the best way to attract attention to a problem is to present it in terms of a story. There is a problem in distributed computing that is sometimes called the Chinese Generals Problem, in which two generals have to come to a common agreement on whether to attack or retreat, but can communicate only by sending messengers who might never arrive. I stole the idea of the generals and posed the problem in terms of a group of generals, some of whom may be traitors, who have to reach a common decision. I wanted to assign the generals a nationality that would not offend any readers. At the time, Albania was a completely closed society, and I felt it unlikely that there would be any Albanians around to object, so the original title of this paper was The Albanian Generals Problem. Jack Goldberg was smart enough to realize that there were Albanians in the world outside Albania, and Albania might not always be a black hole, so he suggested that I find another name. The obviously more appropriate Byzantine generals then occurred to me. The main reason for writing this paper was to assign the new name to the problem. But a new paper needed new results as well. I came up with a simpler way to describe the general 3n+1-processor algorithm. (Shostak’s 4-processor algorithm was subtle but easy to understand; Pease’s generalization was a remarkable tour de force.) We also added a generalization to networks that were not completely connected. (I don’t remember whose work that was.) I also added some discussion of practical implementation details.

5,208 citations

Book ChapterDOI
TL;DR: In this article, a group of generals of the Byzantine army camped with their troops around an enemy city are shown to agree upon a common battle plan using only oral messages, if and only if more than two-thirds of the generals are loyal; so a single traitor can confound two loyal generals.
Abstract: Reliable computer systems must handle malfunctioning components that give conflicting information to different parts of the system. This situation can be expressed abstractly in terms of a group of generals of the Byzantine army camped with their troops around an enemy city. Communicating only by messenger, the generals must agree upon a common battle plan. However, one or more of them may be traitors who will try to confuse the others. The problem is to find an algorithm to ensure that the loyal generals will reach agreement. It is shown that, using only oral messages, this problem is solvable if and only if more than two-thirds of the generals are loyal; so a single traitor can confound two loyal generals. With unforgeable written messages, the problem is solvable for any number of generals and possible traitors. Applications of the solutions to reliable computer systems are then discussed.

4,901 citations

Book ChapterDOI
John R. Douceur1
07 Mar 2002
TL;DR: It is shown that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.
Abstract: Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these "Sybil attacks" is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.

4,816 citations


"Blockchains and Smart Contracts for..." refers background in this paper

  • ...Because of the Sybil attack [15], consensus in public networks is costly...

    [...]

  • ...anyone can join though, this would be catastrophic because of the Sybil attack [15]: a single entity could join with multiple identities, get multiple votes, and thus influence the network to favor this entity’s interests....

    [...]

Proceedings ArticleDOI
22 Feb 1999
TL;DR: A new replication algorithm that is able to tolerate Byzantine faults that works in asynchronous environments like the Internet and incorporates several important optimizations that improve the response time of previous algorithms by more than an order of magnitude.
Abstract: This paper describes a new replication algorithm that is able to tolerate Byzantine faults. We believe that Byzantinefault-tolerant algorithms will be increasingly important in the future because malicious attacks and software errors are increasingly common and can cause faulty nodes to exhibit arbitrary behavior. Whereas previous algorithms assumed a synchronous system or were too slow to be used in practice, the algorithm described in this paper is practical: it works in asynchronous environments like the Internet and incorporates several important optimizations that improve the response time of previous algorithms by more than an order of magnitude. We implemented a Byzantine-fault-tolerant NFS service using our algorithm and measured its performance. The results show that our service is only 3% slower than a standard unreplicated NFS.

3,562 citations


"Blockchains and Smart Contracts for..." refers background or methods in this paper

  • ...5If more than 3f + 1 nodes are used, then the quorum thresholds listed in [26] may lead to forks....

    [...]

  • ...Tendermint vs PBFT—Tendermint....

    [...]

  • ...Sieve [38], a mechanism used in the HyperLedger Fabric project, augments the PBFT algorithm [26] by adding speculative execution and verification phases, inspired by the execute-verify architecture presented in [39]....

    [...]

  • ...Tendermint [32] provides BFT tolerance and is similar to the PBFT algorithm; however it provides a tighter guarantee with regards to the results returned to the client when more than one third of the nodes are faulty, and allows for a dynamically changing set of set of validators, and leaders that can be rotated in a round-robin manner, among other optimizations [33]....

    [...]

  • ...PBFT works on the assumption that less than one third of the nodes are faulty (f ), which is why say that it requires at least5 3f + 1 nodes....

    [...]

Proceedings Article
19 Jun 2014
TL;DR: Raft is a consensus algorithm for managing a replicated log that separates the key elements of consensus, such as leader election, log replication, and safety, and it enforces a stronger degree of coherency to reduce the number of states that must be considered.
Abstract: Raft is a consensus algorithm for managing a replicated log. It produces a result equivalent to (multi-)Paxos, and it is as efficient as Paxos, but its structure is different from Paxos; this makes Raft more understandable than Paxos and also provides a better foundation for building practical systems. In order to enhance understandability, Raft separates the key elements of consensus, such as leader election, log replication, and safety, and it enforces a stronger degree of coherency to reduce the number of states that must be considered. Results from a user study demonstrate that Raft is easier for students to learn than Paxos. Raft also includes a new mechanism for changing the cluster membership, which uses overlapping majorities to guarantee safety.

1,811 citations


"Blockchains and Smart Contracts for..." refers methods in this paper

  • ...popular Raft algorithm [30], is used as a consensus mechanism in Juno [31]....

    [...]