Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3098954.3098983acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
short-paper

Overcoming Limits of Blockchain for IoT Applications

Published: 29 August 2017 Publication History

Abstract

Blockchain technology allows the implementation of a public ledger securely recording transactions among peers without the need of trusted third parties. For both researchers and industry IoT appears a domain in which there would be extraordinary benefits if the features of Blockchain can be exploited. Indeed, the possibility that IoT devices participate in public shared transactions enables a lot of challenging applications. However, there are some aspects that may limit the use of Blockchain in IoT. These are mainly related to the low computational power and storage capabilities of IoT devices. In this paper, we propose an alternative way to implement a public ledger overcoming the above drawbacks, thus appearing more suitable to IoT applications. The proposed protocol leverages the popular social network Twitter and works by building a meshed chain of tweets to ensure transaction security. Importantly, Twitter does not play neither the role of trusted third party nor the role of ledger provider.

References

[1]
2016. Twitter authentication. https://support.twitter.com/articles/20171580. (2016).
[2]
Michael Abd-El-Malek, Gregory R Ganger, Garth R Goodson, Michael K Reiter, and Jay J Wylie. 2005. Fault-scalable Byzantine fault-tolerant services. In ACM SIGOPS Operating Systems Review, Vol. 39. ACM, 59--74.
[3]
Moshe Babaioff, Shahar Dobzinski, Sigal Oren, and Aviv Zohar. 2012. On bitcoin and red balloons. In Proceedings of the 13th ACM conference on electronic commerce. ACM, 56--73.
[4]
Adam Back, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Timón, and Pieter Wuille. 2014. Enabling blockchain innovations with pegged sidechains. URL: http://www.opensciencereview.com/papers/123/enablingblockchain-innovations-with-pegged-sidechains (2014).
[5]
Lear Bahack. 2013. Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft). arXiv preprint arXiv:1312.7013 (2013).
[6]
Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, and Antonino Nocera. 2016. A model to support design and development of multiple-social-network applications. Information Sciences 331 (2016), 99--119.
[7]
Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, and Antonino Nocera. 2017. Tweetchain: An Alternative to Blockchain for Crowd-Based Applications. In International Conference on Web Engineering. Springer, 386--393.
[8]
Francesco Buccafurri, Gianluca Lax, Antonino Nocera, and Domenico Ursino. 2015. A system for extracting structural information from Social Network accounts. Software: Practice and Experience 45, 9 (2015), 1251--1275.
[9]
Ronald Cramery, Rosario Gennaroz, and Berry Schoenmakersx. 1997. A secure and optimally efficient multi-authority election scheme. European Transactions on Telecommunications 8, 5 (1997), 481--490.
[10]
Christian Decker and Roger Wattenhofer. 2015. A fast and scalable payment network with bitcoin duplex micropayment channels. In Symposium on Self-Stabilizing Systems. Springer, 3--18.
[11]
Youssou Faye, Ibrahima Niang, and Thomas Noel. 2011. A survey of access control schemes in wireless sensor networks. Proc. World Acad. Sci. Eng. Tech 59 (2011), 814--823.
[12]
Pierre-Alain Fouque, Guillaume Poupard, and Jacques Stern. 2001. Sharing decryption in the context of voting or lotteries. In Financial Cryptography. Springer, 90--104.
[13]
Jon M Kleinberg. 2000. Navigation in a small world. Nature 406, 6798 (2000), 845--845.
[14]
Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, and Charalampos Papamanthou. 2015. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. University of Maryland and Cornell University (2015).
[15]
Yoad Lewenberg, Yoram Bachrach, Yonatan Sompolinsky, Aviv Zohar, and Jeffrey S Rosenschein. 2015. Bitcoin mining pools: A cooperative game theoretic analysis. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 919--927.
[16]
Yoad Lewenberg, Yonatan Sompolinsky, and Aviv Zohar. 2015. Inclusive block chain protocols. In International Conference on Financial Cryptography and Data Security. Springer, 528--547.
[17]
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M Voelker, and Stefan Savage. 2013. A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference. ACM, 127--140.
[18]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).
[19]
Joseph Poon and Thaddeus Dryja. 2015. The bitcoin lightning network. (2015).
[20]
Dorit Ron and Adi Shamir. 2013. Quantitative analysis of the full bitcoin transaction graph. In International Conference on Financial Cryptography and Data Security. Springer, 6--24.
[21]
Fred B Schneider. 1990. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys (CSUR) 22, 4 (1990), 299--319.
[22]
Brian L Shultz and Dave Bayer. 2015. Certification of Witness: Mitigating Blockchain Fork Attacks. (2015). http://bshultz.com/paper/Shultz_Thesis.pdf.
[23]
Yonatan Sompolinsky and Aviv Zohar. 2013. Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains. IACR Cryptology ePrint Archive 2013 (2013), 881.
[24]
Melanie Swan. 2015. Blockchain: Blueprint for a new economy. " O'Reilly Media, Inc.".
[25]
Tim Swanson. 2015. Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems. (2015). R3, Tech. Rep., 6 Apr. 2015. http://www.ofnumbers.com/2015/04/06/.
[26]
Marie Vasek, Micah Thornton, and Tyler Moore. 2014. Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In International Conference on Financial Cryptography and Data Security. Springer, 57--71.
[27]
Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151 (2014).
[28]
Aneta Zwierko and Zbigniew Kotulski. 2007. A light-weight e-voting system with distributed trust. Electronic Notes in Theoretical Computer Science 168 (2007), 109--126.

Cited By

View all
  • (2024)Integration of blockchain in smart systems: problems and opportunities for real-time sensor data storageDisruptive Technologies in Information Sciences VIII10.1117/12.3013828(25)Online publication date: 6-Jun-2024
  • (2023)SymbIoT: Towards An Extensible Blockchain Integration Testbed for IIoTProceedings of the 1st Workshop on Enhanced Network Techniques and Technologies for the Industrial IoT to Cloud Continuum10.1145/3609389.3610565(8-14)Online publication date: 10-Sep-2023
  • (2023)Secure data sharing with blockchain for remote health monitoring applications: a reviewJournal of Reliable Intelligent Environments10.1007/s40860-023-00204-w9:3(349-368)Online publication date: 11-May-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security
August 2017
853 pages
ISBN:9781450352574
DOI:10.1145/3098954
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 August 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Blockchain
  2. IoT applications
  3. Public Ledger
  4. Twitter

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Conference

ARES '17
ARES '17: International Conference on Availability, Reliability and Security
August 29 - September 1, 2017
Reggio Calabria, Italy

Acceptance Rates

ARES '17 Paper Acceptance Rate 100 of 191 submissions, 52%;
Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)24
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Integration of blockchain in smart systems: problems and opportunities for real-time sensor data storageDisruptive Technologies in Information Sciences VIII10.1117/12.3013828(25)Online publication date: 6-Jun-2024
  • (2023)SymbIoT: Towards An Extensible Blockchain Integration Testbed for IIoTProceedings of the 1st Workshop on Enhanced Network Techniques and Technologies for the Industrial IoT to Cloud Continuum10.1145/3609389.3610565(8-14)Online publication date: 10-Sep-2023
  • (2023)Secure data sharing with blockchain for remote health monitoring applications: a reviewJournal of Reliable Intelligent Environments10.1007/s40860-023-00204-w9:3(349-368)Online publication date: 11-May-2023
  • (2022)A Novel Intrusion Detection System for Internet of Things Network SecurityResearch Anthology on Convergence of Blockchain, Internet of Things, and Security10.4018/978-1-6684-7132-6.ch020(330-348)Online publication date: 8-Jul-2022
  • (2022)Emerging Information and Communication Technologies: the Challenges for the Dynamic Freight Management in City LogisticsFrontiers in Future Transportation10.3389/ffutr.2022.8873073Online publication date: 22-Jul-2022
  • (2022)Blockchain Technology Based Secure Data Sharing in Cloud Computing2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)10.1109/ICKECS56523.2022.10060616(1-5)Online publication date: 28-Dec-2022
  • (2022)An Extensive Blockchain Based Applications Survey: Tools, Frameworks, Opportunities, Challenges and SolutionsIEEE Access10.1109/ACCESS.2022.321916010(116858-116906)Online publication date: 2022
  • (2022)An approach for the automatic verification of blockchain protocols: the Tweetchain case studyJournal of Computer Virology and Hacking Techniques10.1007/s11416-022-00444-z19:1(17-32)Online publication date: 25-Aug-2022
  • (2022)Empowerment of Internet of Things Through the Integration of Blockchain TechnologyBlockchain and Deep Learning10.1007/978-3-030-95419-2_7(147-157)Online publication date: 26-Mar-2022
  • (2021)Towards a Blockchain-SDN Architecture for Secure and Trustworthy 5G Massive IoT NetworksProceedings of the 2021 ACM International Workshop on Software Defined Networks & Network Function Virtualization Security10.1145/3445968.3452090(11-18)Online publication date: 28-Apr-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media