scholarly journals IoT Micro-Blockchain Fundamentals

Sensors ◽  
2021 ◽  
Vol 21 (8) ◽  
pp. 2784
Author(s):  
Aristidis G. Anagnostakis ◽  
Nikolaos Giannakeas ◽  
Markos G. Tsipouras ◽  
Euripidis Glavas ◽  
Alexandros T. Tzallas

In this paper we investigate the essential minimum functionality of the autonomous blockchain, and the minimum hardware and software required to support it in the micro-scale in the IoT world. The application of deep-blockchain operation in the lower-level activity of the IoT ecosystem, is expected to bring profound clarity and constitutes a unique challenge. Setting up and operating bit-level blockchain mechanisms on minimal IoT elements like smart switches and active sensors, mandates pushing blockchain engineering to the limits. “How deep can blockchain actually go?” “Which is the minimum Thing of the IoT world that can actually deliver autonomous blockchain functionality?” To answer, an experiment based on IoT micro-controllers was set. The “Witness Protocol” was defined to set the minimum essential micro-blockchain functionality. The protocol was developed and installed on a peer, ad-hoc, autonomous network of casual, real-life IoT micro-devices. The setup was tested, benchmarked, and evaluated in terms of computational needs, efficiency, and collective resistance against malicious attacks. The leading considerations are highlighted, and the results of the experiment are presented. Findings are intriguing and prove that fully autonomous, private micro-blockchain networks are absolutely feasible in the smart dust world, utilizing the capacities of the existing low-end IoT devices.

Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4034
Author(s):  
Arie Haenel ◽  
Yoram Haddad ◽  
Maryline Laurent ◽  
Zonghua Zhang

The Internet of Things world is in need of practical solutions for its security. Existing security mechanisms for IoT are mostly not implemented due to complexity, budget, and energy-saving issues. This is especially true for IoT devices that are battery powered, and they should be cost effective to be deployed extensively in the field. In this work, we propose a new cross-layer approach combining existing authentication protocols and existing Physical Layer Radio Frequency Fingerprinting technologies to provide hybrid authentication mechanisms that are practically proved efficient in the field. Even though several Radio Frequency Fingerprinting methods have been proposed so far, as a support for multi-factor authentication or even on their own, practical solutions are still a challenge. The accuracy results achieved with even the best systems using expensive equipment are still not sufficient on real-life systems. Our approach proposes a hybrid protocol that can save energy and computation time on the IoT devices side, proportionally to the accuracy of the Radio Frequency Fingerprinting used, which has a measurable benefit while keeping an acceptable security level. We implemented a full system operating in real time and achieved an accuracy of 99.8% for the additional cost of energy, leading to a decrease of only ~20% in battery life.


Transport ◽  
2008 ◽  
Vol 23 (4) ◽  
pp. 291-298 ◽  
Author(s):  
Saleh Yousefi ◽  
Mahmood Fathy

In the recent years, direct message exchange between vehicles in order to improve the safety of road traffic has been attracting lots of interest in both networking and road safety communities. While travelling on a road, vehicles form an ad hoc network called Vehicular Ad hoc NETwork (VANET) and deploy life safety applications. Evaluating the performance of these applications is primordial for realizing VANETs in real life. Current literature lacks efficient ways to evaluate the performance of safety applications and mostly leverages on classical networking metrics like delay, delivery rate etc. In this paper, we consider both networking and safety concerns simultaneously to come up with more efficient methods. In particular, we first point out the significance of fairness and coverage from safety viewpoint. Then, we introduce two new metrics called beaconing rate and effective range aiming at providing more facilities for safety performance evaluation in VANET s research. Furthermore, realizing special characteristics of safety applications while disseminating beacon messages, we study the way that beacon dissemination protocols affect the performance of safety applications. We then conduct extensive simulation study to show the usefulness of the introduced metrics and derive some insights on the feasibility of driver‐assistant safety applications. Our evaluation also shows that sending the aggregated status of neighbouring vehicles in addition to vehicle's own status, and instead, increasing beacon transmission interval may be invoked in order to assist safety applications in providing satisfactory services to drivers.


2018 ◽  
Vol 45 (1) ◽  
pp. 67-82
Author(s):  
Zbigniew Kasprzyk ◽  
Mariusz Rychlicki

Abstract Bluetooth is a type of wireless communication used to transmit voice and data at high speeds using radio waves. It is a standard protocol for short-range radio communications between many different types of devices, including mobile phones, computers and other electronics [1]. The use of this type of data transmission standard for voice communications at close range in the vehicle is commonly known. The trend of integrating new services in vehicles increases rapidly and Bluetooth is one of the emerging communication technologies for realizing ad-hoc networks. The paper presents the possibility of using Bluetooth to build ad-hoc network suitable for the transmission of sound, in particular voice data using the modulation GSFK. We analyzed the features or problems that Bluetooth offers for transmitting audio data in an ad-hoc network. Some initial results of simulations and real-life tests give an impression of the performance and efficiency this standard for the transmission of voice data in an ad-hoc networks [2].


2018 ◽  
Vol 46 (1) ◽  
pp. 153-169
Author(s):  
Zbigniew Kasprzyk ◽  
Mariusz Rychlicki

Abstract Bluetooth is a type of wireless communication used to transmit voice and data at high speeds using radio waves. It is a standard protocol for short-range radio communications between many different types of devices, including mobile phones, computers and other electronics [1]. The trend of integrating new services in vehicles increases rapidly and Bluetooth is one of the emerging communication technologies for realizing ad-hoc networks. The paper presents the possibility of using Bluetooth to build ad-hoc network suitable for the transmission of sound, in particular voice data using the modulation GSFK. We analyzed the features or problems that Bluetooth offers for transmitting audio data in an ad-hoc network. Some initial results of simulations and real-life tests give an impression of the performance and efficiency this standard for the transmission of voice data in an ad-hoc networks [2].


Author(s):  
إسراء عصام بن موسى ◽  
عبدالسلام صالح الراشدي

Vehicular Ad-hoc Network (VANET) becomes one of the most popular modern technologies these days, due to its contribution to the development and modernization of Intelligent Transportation Systems (ITS). The primary goal of these networks is to provide safety and comfort for drivers and passengers in roads. There are many types of VANET that are used in ITS, in this paper, we particularly focus on the Vehicle to Vehicle communication (V2V), which each vehicle can exchange information to inform drivers of other vehicles about the current state of the road flow, in the event of any emergency to avoid accidents, and reduce congestion on roads. We proposed V2V using Wi-Fi (wireless fidelity); the reason of its unique characteristics that distinguish it from other types. There are many difficulties and the challenges in implementing most types of V2V, and the reason is due to the lack of devices and equipment needed for real implementation. To prove the possibility of applying this type in real life, we made a prototype contains a modified toy car, a 12-volt power supply, sensors, visual, audible alarm, a visual “LED” devices, and finally a 12-volt DC relay unit. As a conclusion, the proposed implementation in spite of minimal requirements and use simple equipment, we have achieved the most important main objectives of the paper: preventing vehicles from collision, early warning, and avoiding congestion on the roads.


Technologies ◽  
2019 ◽  
Vol 7 (1) ◽  
pp. 16 ◽  
Author(s):  
Marge Kusmin

The rapidly developing technological landscape challenges require educational institutions to constantly renew the school's digital infrastructure in order to keep students engaged in learning difficult subjects such as Science, Technology, Engineering, and Mathematics (STEM). The Internet of Things (IoT) is one of such new technology platforms that could help the schools enhance learning processes with innovative resources, and to increase students' motivation to learn. This paper summarizes the first stage of a design-based research focusing on introducing IoT technologies to secondary education. Five kits of IoT devices were co-designed by researchers, teachers, and students, to optimize their match with the curricular objectives, cost, learning curve, and re-usability in various educational contexts. The study included three steps: (1) mapping out the IoT devices on the basis of the desk research, (2) literature review on STEM education practices, and (3) two focus group interviews with teachers and students from different schools. As a result of the study, five different kits of IoT devices were purchased for schools and pilot-tested in real-life settings.


2019 ◽  
Vol 2019 ◽  
pp. 1-19 ◽  
Author(s):  
Zeeshan Ali Khan ◽  
Peter Herrmann

Many Internet of Things (IoT) systems run on tiny connected devices that have to deal with severe processor and energy restrictions. Often, the limited processing resources do not allow the use of standard security mechanisms on the nodes, making IoT applications quite vulnerable to different types of attacks. This holds particularly for intrusion detection systems (IDS) that are usually too resource-heavy to be handled by small IoT devices. Thus, many IoT systems are not sufficiently protected against typical network attacks like Denial-of-Service (DoS) and routing attacks. On the other side, IDSs have already been successfully used in adjacent network types like Mobile Ad hoc Networks (MANET), Wireless Sensor Networks (WSN), and Cyber-Physical Systems (CPS) which, in part, face limitations similar to those of IoT applications. Moreover, there is research work ongoing that promises IDSs that may better fit to the limitations of IoT devices. In this article, we will give an overview about IDSs suited for IoT networks. Besides looking on approaches developed particularly for IoT, we introduce also work for the three similar network types mentioned above and discuss if they are also suitable for IoT systems. In addition, we present some suggestions for future research work that could be useful to make IoT networks more secure.


Sign in / Sign up

Export Citation Format

Share Document