scholarly journals Blockchain-Based DNS Root Zone Management Decentralization for Internet of Things

2021 ◽  
Vol 2021 ◽  
pp. 1-20
Author(s):  
Yu Zhang ◽  
Wenfeng Liu ◽  
Zhongda Xia ◽  
Zhongze Wang ◽  
Lu Liu ◽  
...  

Domain Name System (DNS) is a widely used infrastructure for remote control and batch management of IoT devices. As a critical Internet infrastructure, DNS is structured as a tree-like hierarchy with single root zone authority at the top, which puts the operation of DNS at risk from single point of failure. The current root zone management is lack of transparency and accountability, since only the root zone file is published as the final outcome of operations inside the root zone authority. Towards distributed root zone operation in DNS, this paper presents a blockchain-based root operation architecture—RootChain, composed of multiple root servers. On the basis of maintaining the single root authority for top-level domain (TLD), RootChain decentralizes TLD data publication by empowering delegated TLD authorities to publish authenticated data directly. The transparency and accountability of root zone operation are attained by smart-contracting the whole life cycle of TLD operation and logging all operations on the chain. RootChain is transparent to recursive/stub resolver and DNS/DNSSEC-compatible. A proof-of-concept prototype of RootChain has been implemented with Hyperledger Fabric and evaluated by experiments.

2021 ◽  
Vol 13 (2) ◽  
pp. 24
Author(s):  
Mohammed Amine Bouras ◽  
Qinghua Lu ◽  
Sahraoui Dhelim ◽  
Huansheng Ning

Identity management is a fundamental feature of Internet of Things (IoT) ecosystem, particularly for IoT data access control. However, most of the actual works adopt centralized approaches, which could lead to a single point of failure and privacy issues that are tied to the use of a trusted third parties. A consortium blockchain is an emerging technology that provides a neutral and trustable computation and storage platform that is suitable for building identity management solutions for IoT. This paper proposes a lightweight architecture and the associated protocols for consortium blockchain-based identity management to address privacy, security, and scalability issues in a centralized system for IoT. Besides, we implement a proof-of-concept prototype and evaluate our approach. We evaluate our work by measuring the latency and throughput of the transactions while using different query actions and payload sizes, and we compared it to other similar works. The results show that the approach is suitable for business adoption.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2664 ◽  
Author(s):  
Luis Belem Pacheco ◽  
Eduardo Pelinson Alchieri ◽  
Priscila Mendez Barreto

The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security.


2001 ◽  
Vol 5 (4) ◽  
pp. 629-644 ◽  
Author(s):  
M. T. van Wijk ◽  
W. Bouten

Abstract. In this modelling study differences in vertical root distributions measured in four contrasting forest locations in the Netherlands were investigated. Root distributions are seen as a reflection of the plant’s optimisation strategy, based on hydrological grounds. The "optimal" root distribution is defined as the one that maximises the water uptake from the root zone over a period of ten years. The optimal root distributions of four forest locations with completely different soil physical characteristics are calculated using the soil hydrological model SWIF. Two different model configurations for root interactions were tested: the standard model configuration in which one single root profile was used (SWIF-NC), and a model configuration in which two root profiles compete for the same available water (SWIF-C). The root profiles were parameterised with genetic algorithms. The fitness of a certain root profile was defined as the amount of water uptake over a simulation period of ten years. The root profiles of SWIF-C were optimised using an evolutionary game. The results showed clear differences in optimal root distributions between the various sites and also between the two model configurations. Optimisation with SWIF-C resulted in root profiles that were easier to interpret in terms of feasible biological strategies. Preferential water uptake in wetter soil regions was an important factor for interpretation of the simulated root distributions. As the optimised root profiles still showed differences with measured profiles, this analysis is presented, not as the final solution for explaining differences in root profiles of vegetation but as a first step using an optimisation theory to increase understanding of the root profiles of trees. Keywords: forest hydrology, optimisation, roots


Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 945 ◽  
Author(s):  
Rafael Torres Moreno ◽  
Jorge Bernal Bernabe ◽  
Jesús García Rodríguez ◽  
Tore Kasper Frederiksen ◽  
Michael Stausholm ◽  
...  

Privacy enhancing technologies (PETs) allow to achieve user’s transactions unlinkability across different online Service Providers. However, current PETs fail to guarantee unlinkability against the Identity Provider (IdP), which becomes a single point of failure in terms of privacy and security, and therefore, might impersonate its users. To address this issue, OLYMPUS EU project establishes an interoperable framework of technologies for a distributed privacy-preserving identity management based on cryptographic techniques that can be applied both to online and offline scenarios. Namely, distributed cryptographic techniques based on threshold cryptography are used to split up the role of the Identity Provider (IdP) into several authorities so that a single entity is not able to impersonate or track its users. The architecture leverages PET technologies, such as distributed threshold-based signatures and privacy attribute-based credentials (p-ABC), so that the signed tokens and the ABC credentials are managed in a distributed way by several IdPs. This paper describes the Olympus architecture, including its associated requirements, the main building blocks and processes, as well as the associated use cases. In addition, the paper shows how the Olympus oblivious architecture can be used to achieve privacy-preserving M2M offline transactions between IoT devices.


Soil Research ◽  
2008 ◽  
Vol 46 (3) ◽  
pp. 228
Author(s):  
M. A. Hamza ◽  
S. H. Anderson ◽  
L. A. G. Aylmore

Although measurements of water drawdown by single radish root systems have been previously published by the authors, further research is needed to evaluate water drawdown patterns in multiple-root systems. The objective of this study was to compare water transpiration patterns estimated using X-ray computed tomography (CT) with the traditional gravimetric method and to evaluate the effects of variably spaced multiple root systems on soil water content and corresponding water content gradients. Water drawdown showed a dual pattern in which it increased rapidly when soil water content was high at the beginning of transpiration, then slowed down to an almost constant level with time as water content decreased. These results contrast with the single-root system wherein transpiration rates initially increased rapidly and then slowly increased with time. Water uptake estimated using the CT method was observed to be 27–38% lower than the gravimetrically estimated water uptake; this difference was attributed to lower water uptake for the upper 30 mm layer (CT measured) than lower layers due to differences in root density. However, good correlation (r = 0.97) was found between both measurement methods. The drawdown patterns for multiple root systems showed a convex shape from the root surface to the bulk soil, compared with a nearly linear shape for single roots. The water content drawdown areas and the drawdown distances for multiple root systems were found to be much larger than those corresponding to single radish roots. Differential water content gradients were observed for roots spaced at 15-mm distances compared with 3–4-mm distances. These differential gradients from the bulk soil towards the root-zone occurred probably creating localised water potential gradients within the root-zone, which moved water from between roots to root surfaces. The lowest water content values were located in the inter-root areas. The CT-scanned layer probably acted as one drawdown area with particularly higher water drawdown from the inter-root areas.


Sensors ◽  
2020 ◽  
Vol 20 (7) ◽  
pp. 2156
Author(s):  
Nachiket Tapas ◽  
Yechiav Yitzchak ◽  
Francesco Longo ◽  
Antonio Puliafito ◽  
Asaf Shabtai

P 4 UIoT—pay-per-piece patch update delivery for IoT using gradual release—introduces a distributed framework for delivering patch updates to IoT devices. The framework facilitates distribution via peer-to-peer delivery networks and incentivizes the distribution operation. The peer-to-peer delivery network reduces load by delegating the patch distribution to the nodes of the network, thereby protecting against a single point of failure and reducing costs. Distributed file-sharing solutions currently available in the literature are limited to sharing popular files among peers. In contrast, the proposed protocol incentivizes peers to distribute patch updates, which might be relevant only to IoT devices, using a blockchain-based lightning network. A manufacturer/owner named vendor of the IoT device commits a bid on the blockchain, which can be publicly verified by the members of the network. The nodes, called distributors, interested in delivering the patch update, compete among each other to exchange a piece of patch update with cryptocurrency payment. The pay-per-piece payments protocol addresses the problem of misbehavior between IoT devices and distributors as either of them may try to take advantage of the other. The pay-per-piece protocol is a form of a gradual release of a commodity like a patch update, where the commodity can be divided into small pieces and exchanged between the sender and the receiver building trust at each step as the transactions progress into rounds. The permissionless nature of the framework enables the proposal to scale as it incentivizes the participation of individual distributors. Thus, compared to the previous solutions, the proposed framework can scale better without any overhead and with reduced costs. A combination of the Bitcoin lightning network for cryptocurrency incentives with the BitTorrent delivery network is used to present a prototype of the proposed framework. Finally, a financial and scalability evaluation of the proposed framework is presented.


2020 ◽  
Vol 38 (4) ◽  
pp. 871-879
Author(s):  
Yahui Luo ◽  
Xiwen Yang ◽  
Pin Jiang

Vegetable growth requires a relatively stable environment for the root zone. If the temperature in root zone environment is optimal, the aeroponic cultivation will be energy-efficient, and the aeroponic vegetables will grow well at high, normal, or low temperature. By computational fluid dynamics (CFD), this paper numerically simulates the root zone temperature of lettuce in the aeroponic cultivation box, after the box was sprayed with nutrient solutions of different temperatures. Then, the root zone environments of aeroponic lettuce were monitored through experiments at three different temperatures: high temperature, normal temperature, and low temperature. Through comparison, it was learned that the error between the simulated and measured values at each point was smaller than 1.35℃; the maximum error at a single point was within 7.4%; overall, the mean relative error was merely 5.8%. The results prove that the proposed CFD simulation model is reasonable and effective. Our research provides a theoretical reference for optimizing the root zone temperature, regulating the spray of nutrient solutions at different temperatures, and building an energy-efficient efficient aeroponic cultivation system.


Sensors ◽  
2019 ◽  
Vol 19 (21) ◽  
pp. 4642
Author(s):  
Roberto Casado-Vara ◽  
Angel Canal-Alonso ◽  
Angel Martin-del Rey ◽  
Fernando De la Prieta ◽  
Javier Prieto

Internet of Things (IoT) is the paradigm that has largely contributed to the development of smart buildings in our society. This technology makes it possible to monitor all aspects of the smart building and to improve its operation. One of the main challenges encountered by IoT networks is that the the data they collect may be unreliable since IoT devices can lose accuracy for several reasons (sensor wear, sensor aging, poorly constructed buildings, etc.). The aim of our work is to study the evolution of IoT networks over time in smart buildings. The hypothesis we have tested is that, by amplifying the Lotka–Volterra equations as a community of living organisms (an ecosystem model), the reliability of the system and its components can be predicted. This model comprises a set of differential equations that describe the relationship between an IoT network and multiple IoT devices. Based on the Lotka–Volterra model, in this article, we propose a model in which the predators are the non-precision IoT devices and the prey are the precision IoT devices. Furthermore, a third species is introduced, the maintenance staff, which will impact the interaction between both species, helping the prey to survive within the ecosystem. This is the first Lotka–Volterra model that is applied in the field of IoT. Our work establishes a proof of concept in the field and opens a wide spectrum of applications for biology models to be applied in IoT.


Author(s):  
Kunal Suri ◽  
Walid Gaaloul ◽  
Arnaud Cuccuru ◽  
Sebastien Gerard

Recently, IoT adoption has increased in several domains. IoT devices are multi-modal and heterogeneous due to their varied properties, standards, and manufactures. This leads to interoperability issues, which can be solved using semantic technologies. Likewise, these devices participate in numerous cross-organizational business processes (BPs). Being resource-constrained, they must be managed in an energy-aware manner to avoid BP failures. However, due to lack of a common ontology and formalization of energy-related concepts impedes their optimal management in BPs. To bridge this gap, the authors capitalize on existing semantic models such as FIESTA-IoT and IoT-BPO. They propose the following: (i) formalization of IoT concepts in BPs related to energy, their properties and constraints, and (ii) resolving resource conflicts based on strategies. The feasibility of this framework is illustrated by evaluating the semantic model for its coverage of concepts from IoT-A reference model, along with proof of concept tools that allows ontology-based support for process modeling.


Sign in / Sign up

Export Citation Format

Share Document