![Page 1: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/1.jpg)
B-IoT: Blockchain Driven Internet of Things with Credit-Based Consensus
MechanismICDCS 2019, Dallas, Texas
Junqin Huang, Linghe Kong, Guihai Chen, Long Cheng, Kaishun Wu and Xue Liu
Shanghai Jiao Tong University
1
![Page 2: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/2.jpg)
Internet of Things Systems
2
Transportation Healthcare Industrial/Manufacturing Field
![Page 3: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/3.jpg)
Internet of Things Systems
2
IoT smart objects are expected to reach 212 billion entities deployed
globally by the end of 2020
Transportation Healthcare Industrial/Manufacturing Field
![Page 4: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/4.jpg)
Open Issues in IoT Systems
• Single point of failure [1]
• Malicious attacks such as DDoS, Sybil attack [2], [3]
• Data disclosure & credibility [4]
• System scalability [5]
3
[1] I. J. Vergara-Laurens, L. G. Jaimes, and M. A. Labrador, “Privacy-preserving mechanisms for crowdsensing:
Survey and research challenges,” IEEE Internet of Things Journal, vol. 4, no. 4, pp. 855–869, 2017.
[2] H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, “Sybillimit: A near-optimal social network defense against sybil attacks,” in IEEE
Symposium on Security and Privacy (S&P), May 2008, pp. 3–17.
[3] Y. Lu and L. D. Xu, “Internet of things (iot) cybersecurity research: A review of current research topics,” IEEE Internet of Things Journal, pp.
1–1, 2018.
[4] IoTeX, “Blockchain & iot: What’s it all about?” Oct 2018. [Online]. Available: https://hackernoon.com/blockchain-iot-whats-it-all-about-
f594b3f0da1e
[5] K. Iwanicki, “A distributed systems perspective on industrial iot,” in IEEE 38th International Conference on Distributed Computing Systems
(ICDCS), July 2018, pp. 1164–1170.
![Page 5: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/5.jpg)
Combine Blockchain with IoT?
• Why Blockchain in IoT
• non-manipulated source of data
• break down monolithic data silos and enable trust across parties
• Related Work
• A scalable access management system in IoT [IOTJ’18]
• vulnerable to the single point failure and attacks
• Consortium blockchain for secure energy trading in IIoT [TII’18]
• data disclosure risk
• A blockchain platform for clinical trial and precision medicine [ICDCS’17]
• stuck in the concept stage
• Integrating low power IoT devices to a blockchain-based infrastructure [EMSOFT’17]
• bring too much overloads in IoT systems
4
![Page 6: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/6.jpg)
Main Challenges
• The conflicts between high concurrency and low throughput
• The trade-off between efficiency and security
• The coexistence of transparency and privacy
5
![Page 7: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/7.jpg)
Main Challenges
• The conflicts between high concurrency and low throughput
• We explore a DAG-structured blockchain based solution
• The trade-off between efficiency and security
• The coexistence of transparency and privacy
5
![Page 8: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/8.jpg)
Blockchains
• Distributed ledgers or databases that enable parties which do not fully trust each other to form and maintain consensus
6
0
1
2
3
4
6
5
7
8
9
10
11
1214
13
16
19
17
15
18
Chain-structured blockchain
(bitcoin, Ethereum, Hyperledger, etc.)
Directed acyclic graph (DAG)-structured blockchain
(IOTA, Byteball, NANO, etc.)
![Page 9: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/9.jpg)
Blockchains
• Distributed ledgers or databases that enable parties which do not fully trust each other to form and maintain consensus
6
0
1
2
3
4
6
5
7
8
9
10
11
1214
13
16
19
17
15
18
Chain-structured blockchain
(bitcoin, Ethereum, Hyperledger, etc.)
Directed acyclic graph (DAG)-structured blockchain
(IOTA, Byteball, NANO, etc.)
DAG-structured blockchains have a higher throughput than chain-
structured blockchains
![Page 10: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/10.jpg)
B-IoT: System Overview
• Node type:
• Light nodes
• Full nodes
• A case study of smart factory:
• Wireless sensors
• Gateways
• Manager
• Tangle network
7
Tangle Network
Smart Factory
Gateway
Topology
Manager
Manage
IoT devices
Wireless sensors
Wireless sensors
Credit-based PoW Mechanism
AES
![Page 11: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/11.jpg)
B-IoT: System Overview
• Node type:
• Light nodes
• Full nodes
• A case study of smart factory:
• Wireless sensors
• Gateways
• Manager
• Tangle network
7
Tangle Network
Smart Factory
Gateway
Topology
Manager
Manage
IoT devices
Wireless sensors
Wireless sensors
Credit-based PoW Mechanism
AES
![Page 12: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/12.jpg)
B-IoT: System Overview
• Node type:
• Light nodes
• Full nodes
• A case study of smart factory:
• Wireless sensors
• Gateways
• Manager
• Tangle network
7
Tangle Network
Smart Factory
Gateway
Topology
Manager
Manage
IoT devices
Wireless sensors
Wireless sensors
Credit-based PoW Mechanism
AES
![Page 13: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/13.jpg)
B-IoT: System Overview
• Node type:
• Light nodes
• Full nodes
• A case study of smart factory:
• Wireless sensors
• Gateways
• Manager
• Tangle network
7
Tangle Network
Smart Factory
Gateway
Topology
Manager
Manage
IoT devices
Wireless sensors
Wireless sensors
Credit-based PoW Mechanism
AES
![Page 14: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/14.jpg)
Main Challenges
• The conflicts between high concurrency and low throughput
• We explore a DAG-structured blockchain based solution
• The trade-off between efficiency and security
• The coexistence of transparency and privacy
8
![Page 15: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/15.jpg)
Main Challenges
• The conflicts between high concurrency and low throughput
• We explore a DAG-structured blockchain based solution
• The trade-off between efficiency and security
• We design a moderate-cost credit-based PoW mechanism
• The coexistence of transparency and privacy
8
![Page 16: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/16.jpg)
Tuning the difficulty of PoW algorithm
• Less than the target hash value, i.e. the length of prefix zero
• E.g. hash space is 0x00000000~0xffffffff
9
Whole hash space
<0x00111111
<0x00001111
![Page 17: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/17.jpg)
Positive Component
Negative Component
Credit Value
Credit-Based PoW Mechanism
10
![Page 18: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/18.jpg)
Positive Component
Negative Component
Credit Value
Credit-Based PoW Mechanism
10
![Page 19: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/19.jpg)
Positive Component
Negative Component
Credit Value
Credit-Based PoW Mechanism
10
![Page 20: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/20.jpg)
Positive Component
Negative Component
Credit Value
Credit-Based PoW Mechanism
10
![Page 21: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/21.jpg)
• Double-spending
• Lazy-tips
Malicious Behaviours
11
![Page 22: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/22.jpg)
• Double-spending
• Lazy-tips
Malicious Behaviours
11
![Page 23: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/23.jpg)
• Double-spending
• Lazy-tips
Malicious Behaviours
11
![Page 24: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/24.jpg)
• Double-spending
• Lazy-tips
Malicious Behaviours
11
![Page 25: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/25.jpg)
Positive Component
Negative Component
Credit Value
Credit-Based PoW Mechanism
12
![Page 26: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/26.jpg)
Main Challenges
• The conflicts between high concurrency and low throughput
• We explore a DAG-structured blockchain based solution
• The trade-off between efficiency and security
• We design a moderate-cost credit-based PoW mechanism
• The coexistence of transparency and privacy
13
![Page 27: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/27.jpg)
Main Challenges
• The conflicts between high concurrency and low throughput
• We explore a DAG-structured blockchain based solution
• The trade-off between efficiency and security
• We design a moderate-cost credit-based PoW mechanism
• The coexistence of transparency and privacy
• We propose an efficient data authority management method
13
![Page 28: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/28.jpg)
Data Authority Management Method( , )D DPK SK ( , )M MPK SK
Generate symmetric
secret keySSK
1( )DSKDec M
2( )SSKDec M
3( )Sb SKnonce Dec M
Distribute the symmetric secret key without
central trust server
IoT Device Manager
1 1{ ( , , )}D MPK SK S aM Enc sign SK TS nonce=
2 2{ ( , , )}S DSK SK b aM Enc sign nonce TS nonce=
3 3{ ( , )}S MSK SK bM Enc sign nonce TS=
14
![Page 29: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/29.jpg)
Data Authority Management Method( , )D DPK SK ( , )M MPK SK
Generate symmetric
secret keySSK
1( )DSKDec M
2( )SSKDec M
3( )Sb SKnonce Dec M
Distribute the symmetric secret key without
central trust server
IoT Device Manager
1 1{ ( , , )}D MPK SK S aM Enc sign SK TS nonce=
2 2{ ( , , )}S DSK SK b aM Enc sign nonce TS nonce=
3 3{ ( , )}S MSK SK bM Enc sign nonce TS=
14
![Page 30: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/30.jpg)
Data Authority Management Method( , )D DPK SK ( , )M MPK SK
Generate symmetric
secret keySSK
1( )DSKDec M
2( )SSKDec M
3( )Sb SKnonce Dec M
Distribute the symmetric secret key without
central trust server
IoT Device Manager
1 1{ ( , , )}D MPK SK S aM Enc sign SK TS nonce=
2 2{ ( , , )}S DSK SK b aM Enc sign nonce TS nonce=
3 3{ ( , )}S MSK SK bM Enc sign nonce TS=
14
![Page 31: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/31.jpg)
Data Authority Management Method( , )D DPK SK ( , )M MPK SK
Generate symmetric
secret keySSK
1( )DSKDec M
2( )SSKDec M
3( )Sb SKnonce Dec M
Distribute the symmetric secret key without
central trust server
IoT Device Manager
1 1{ ( , , )}D MPK SK S aM Enc sign SK TS nonce=
2 2{ ( , , )}S DSK SK b aM Enc sign nonce TS nonce=
3 3{ ( , )}S MSK SK bM Enc sign nonce TS=
14
![Page 32: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/32.jpg)
Data Authority Management Method( , )D DPK SK ( , )M MPK SK
Generate symmetric
secret keySSK
1( )DSKDec M
2( )SSKDec M
3( )Sb SKnonce Dec M
Distribute the symmetric secret key without
central trust server
IoT Device Manager
1 1{ ( , , )}D MPK SK S aM Enc sign SK TS nonce=
2 2{ ( , , )}S DSK SK b aM Enc sign nonce TS nonce=
3 3{ ( , )}S MSK SK bM Enc sign nonce TS=
14
Distribute the symmetric secret key without the central trust server
![Page 33: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/33.jpg)
Implementation
• Full nodes: manager & gateway
• commercial computer
• implemented based on IRI
• SHA-256 & AES encryption
• Light nodes: IoT devices
• Raspberry Pi Model 3B
• implemented based on PyOTA
• Extended with local PoW
• AES encryption
15
![Page 34: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/34.jpg)
Performance in Credit-Based PoW
16
When one malicious attack happens When two malicious attacks happen
![Page 35: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/35.jpg)
Performance in Credit-Based PoW
16
When one malicious attack happens When two malicious attacks happen
![Page 36: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/36.jpg)
Performance in Credit-Based PoW
16
When one malicious attack happens When two malicious attacks happenIt will take longer time to recover normal transaction rate if the node
conducts malicious attacks twice or more
![Page 37: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/37.jpg)
• Four control experiments:
• PoW
• Cr-PoW w/o malicious attacks
• Cr-PoW with a malicious attack
• Cr-PoW with two malicious attacks
Performance in Credit-Based PoW
17
![Page 38: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/38.jpg)
• Four control experiments:
• PoW
• Cr-PoW w/o malicious attacks
• Cr-PoW with a malicious attack
• Cr-PoW with two malicious attacks
Performance in Credit-Based PoW
17
![Page 39: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/39.jpg)
• Four control experiments:
• PoW
• Cr-PoW w/o malicious attacks
• Cr-PoW with a malicious attack
• Cr-PoW with two malicious attacks
Performance in Credit-Based PoW
17
Credit-based PoW can speed up transactions for honest nodes, also can
defend malicious attacks efficiently
![Page 40: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/40.jpg)
Efficiency of Data Authority Management
18
![Page 41: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/41.jpg)
Efficiency of Data Authority Management
18
![Page 42: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/42.jpg)
Efficiency of Data Authority Management
18
The data authority management method has tiny impact on the whole
transaction process
![Page 43: B-IoT: Blockchain Driven Internet of Things with Credit](https://reader030.vdocument.in/reader030/viewer/2022012721/61b365c372c6cf6a7f2279cf/html5/thumbnails/43.jpg)
Conclusion & Thank you!
• A general DAG-structured blockchain-based IoT system to address aforementioned challenges for IoT
• The credit-based PoW mechanism helps to make the blockchain more suitable for IoT systems
• The data authority management method can protect data privacy without affecting the system performance
• Future directions:
• sensor data quality control
• storage limitations
19