2019
DOI: 10.1109/jiot.2018.2878154
|View full text |Cite
|
Sign up to set email alerts
|

EdgeChain: An Edge-IoT Framework and Prototype Based on Blockchain and Smart Contracts

Abstract: The emerging Internet of Things (IoT) is facing significant scalability and security challenges. On the one hand, IoT devices are "weak" and need external assistance. Edge computing provides a promising direction addressing the deficiency of centralized cloud computing in scaling massive number of devices. On the other hand, IoT devices are also relatively "vulnerable" facing malicious hackers due to resource constraints. The emerging blockchain and smart contracts technologies bring a series of new security f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
100
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 226 publications
(102 citation statements)
references
References 34 publications
0
100
0
2
Order By: Relevance
“…With NECTAR took care of and successfully handled the issue of improving the security, precision and undeniable status of sharp gets that are executed as an element of exchange endorsement on the blockchain. Evidences of right executions are then fused into blockchain transactions [7].The creating IOT is going up against basic flexibility and secure challenges .Of two one hand, IOT devices are "fragile" & require outer help . Corner figuring ensures bearing watching out for the insufficiency of bound together appropriated registering in scaling immense number contraptions.…”
Section: Discussion and Resultsmentioning
confidence: 99%
“…With NECTAR took care of and successfully handled the issue of improving the security, precision and undeniable status of sharp gets that are executed as an element of exchange endorsement on the blockchain. Evidences of right executions are then fused into blockchain transactions [7].The creating IOT is going up against basic flexibility and secure challenges .Of two one hand, IOT devices are "fragile" & require outer help . Corner figuring ensures bearing watching out for the insufficiency of bound together appropriated registering in scaling immense number contraptions.…”
Section: Discussion and Resultsmentioning
confidence: 99%
“…At the same time, the system proposes a cache strategy based on edge computing to improve the hit rate. Pan et al [7] designed and prototyped an edge IoT framework based on blockchain and smart contracts. The core idea is to integrate the licensed blockchain with an internal currency or system to link the edge cloud resource pool with each IoT device's linked account and resource usage, as well as the behavior of the IoT device.…”
Section: Related Workmentioning
confidence: 99%
“…While not always, these systems are more suitable for authenticating information transferred from the IoT device, but less frequently they address authentication and validating blockchain state as transferred to the device. While not explicitly using a trusted gateway, IoT devices are often used as full nodes on a (small) private network, either implying the use of an IoT-friendly blockchain, or the use of gateways in a more realistic, fullscale deployment [8]. Similarly, the proposed overlay network by Dorri et al [9] establishes a layer of trusted nodes, pushing the security boundary outside of the most constrained nodes on the network.…”
Section: Related Workmentioning
confidence: 99%
“…More formally, we define a decentralized beacon to be a mechanism for transporting an attestation A = f A (b n ) for block n, and f A is a function of the block identified by its block hash b n where its result satisfies the property that b n can be inferred from it. 8 For Ethereum, we place the attestation A to a transaction's data portion, T d = A, set the target address to the trusted party's own address a s (or other predefined address), T t = a s , the transaction sequence number T n to the next sequence number, 9 and transaction value to zero T v = 0. The gas limit T g is set to a sufficient value.…”
Section: B Beacon Structurementioning
confidence: 99%