Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3373477.3373498acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaissConference Proceedingsconference-collections
research-article

A blockchain internet of things data integrity detection model

Published: 15 January 2020 Publication History

Abstract

The Industrial Internet of Things (IIoT) plays an indispensable role in Industry 4.0. People are committed to a universal, scalable, and secure IIoT system for use in a variety of industries. However, existing IIoT systems are not prone to provide stable services due to single points of failure and malicious attacks. In the era of big data, countless machines and equipment are generating data all the time, which can be used for scientific research, commodity production, and improving the efficiency of industrial development. Since the Internet of Things (IoT) connects all the smart machines together, ensuring data integrity is of great significance. How to ensure and detect the data integrity of the IoT is a topic of concern. This paper designs and implements a distributed blockchain data simulation system for data integrity assurance and detection in the context of IIoT applications. A method for assuring and detecting the integrity of IoT data is presented. A complete simulation system of IoT data based on blockchain is designed and implemented. The time consumed in the block mining process under different parameters is measured, and the correlation between the block mining time and different parameters is found, and the law of the influence of different parameters on the block mining time is obtained.

References

[1]
Han Weiguo, Lei Yingmin. (2011). About the application of Internet of Things technology in enterprises. Information and Computer: Theoretical Edition (6), 98--99.
[2]
He Jiahong, Zheng Shurong. (2012). Construction of the indicator system of the development level of the Internet of Things industry. (15), 71--75.
[3]
Wu Zhuyi. (2017). IoT overview and key technology research. Digital communication world (09), 117.
[4]
Zhu Cheng, Qi Xiaoming. (2013). Application Research of Internet of Things Technology in Water Conservancy Informationization. Journal of Chifeng College (Natural Edition) (15), 28--29.
[5]
Jia Runliang. (2016). Research on Artificial Intelligence Related Technology for IoT Applications. Computer Knowledge and Technology (30).
[6]
Wan, J., Tang, S., Shu, Z., Li, D., & Vasilakos, A. V. (2016). Software-defined industrial internet of things in the context of industry 4.0. IEEE Sensors Journal, 16(20), 1--1.
[7]
Li Shining, Luo Guojia. (2014). Industrial IoT Technology and Application Overview. Telecom Network Technology (3), 26--31.
[8]
Aniello, L., Baldoni, R., & Lombardi, F. (2016). A Blockchain-Based Solution for Enabling Log-Based Resolution of Disputes in Multi-party Transactions. International Conference in Software Engineering for Defence Applications. Springer, Cham.
[9]
Klems, M., Eberhardt, J., Tai, S., Steffen Härtlein, Buchholz, S., & Tidjani, A. (2017). Trustless intermediation in blockchain-based decentralized service marketplaces.
[10]
Yu, S., Lv, K., Shao, Z., Guo, Y., & Zhang, B. (2018). A High Performance Blockchain Platform for Intelligent Devices. 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN). IEEE.
[11]
Han, R., Gramoli, V., & Xu, X. (2018). Evaluating blockchains for iot.
[12]
Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017). Lsb: a lightweight scalable blockchain for iot security and privacy.
[13]
Shyam, G. K., Manvi, S. S., & Bharti, P. (2017). Smart waste management using Internet-of-Things (IoT). International Conference on Computing & Communications Technologies.
[14]
Wang, S., Ouyang, L., Yuan, Y., Ni, X., Han, X., & Wang, F. Y. (2019). Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Transactions on Systems, Man, and Cybernetics: Systems, PP(99), 1--12.
[15]
Liu Aodi, Du Xuehui, Wang Na, Li Shaozhuo. (2018). Blockchain technology and its research progress in the field of information security. Journal of Software, v.29(07), 270--293.
[16]
China Radio and Television Network Co., Ltd. Business Unit. (2017). Application of Blockchain Technology in Cable TV Network. Cable TV Technology (7).
[17]
Jiang, S. (2015). Internet of things (IoT): Technologies and applications. Fifteenth International Conference on Advances in Ict for Emerging Regions.
[18]
Karimi, K. (2013). What is missing from the Internet of Things to become a reality?. China Electronic Business (Basic Electronics) (6), 51--54.
[19]
Chen Xi. (2017). The Internet of Things trillions of industries eve on the eve of the new era of China (10).
[20]
Hao Gang. (0). The development of the Internet of Things and its application research in the field of communication operators. (Doctoral dissertation, Beijing University of Posts and Telecommunications)

Cited By

View all
  • (2024)A Trusted Authentication Scheme Using Semantic LSTM and Blockchain in IoT Access Control SystemInternational Journal on Semantic Web & Information Systems10.4018/IJSWIS.34123320:1(1-27)Online publication date: 9-Apr-2024
  • (2024)EPOPTIS: A Monitoring-as-a-Service Platform for Internet-of-Things ApplicationsSensors10.3390/s2407220824:7(2208)Online publication date: 29-Mar-2024
  • (2024)Enhancement of Lightweight Secure Blockchain Based Edward-El Gamal in the Internet of Things (IoT)Wireless Personal Communications10.1007/s11277-024-10953-3134:3(1421-1442)Online publication date: 9-Apr-2024
  • Show More Cited By

Index Terms

  1. A blockchain internet of things data integrity detection model

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      AISS '19: Proceedings of the 1st International Conference on Advanced Information Science and System
      November 2019
      253 pages
      ISBN:9781450372916
      DOI:10.1145/3373477
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 January 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. IIoT
      2. IoT
      3. SHA-256
      4. blockchain
      5. data integrity

      Qualifiers

      • Research-article

      Conference

      AISS 2019

      Acceptance Rates

      AISS '19 Paper Acceptance Rate 41 of 95 submissions, 43%;
      Overall Acceptance Rate 41 of 95 submissions, 43%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)12
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 20 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A Trusted Authentication Scheme Using Semantic LSTM and Blockchain in IoT Access Control SystemInternational Journal on Semantic Web & Information Systems10.4018/IJSWIS.34123320:1(1-27)Online publication date: 9-Apr-2024
      • (2024)EPOPTIS: A Monitoring-as-a-Service Platform for Internet-of-Things ApplicationsSensors10.3390/s2407220824:7(2208)Online publication date: 29-Mar-2024
      • (2024)Enhancement of Lightweight Secure Blockchain Based Edward-El Gamal in the Internet of Things (IoT)Wireless Personal Communications10.1007/s11277-024-10953-3134:3(1421-1442)Online publication date: 9-Apr-2024
      • (2023)IoT and Blockchain Integration: Applications, Opportunities, and ChallengesNetwork10.3390/network30100063:1(115-141)Online publication date: 24-Jan-2023
      • (2023)Securing Big Data Integrity for Industrial IoT in Smart Manufacturing Based on the Trusted Consortium Blockchain (TCB)IoT10.3390/iot40100024:1(27-55)Online publication date: 6-Feb-2023
      • (2023)Blockchain Based Approach on Gathering Manufacturing Information Focused on Data IntegrityProduction at the Leading Edge of Technology10.1007/978-3-031-18318-8_48(473-483)Online publication date: 2-Feb-2023
      • (2020)EC-ElGamal and Genetic Algorithm-Based Enhancement for Lightweight Scalable Blockchain in IoT DomainIEEE Access10.1109/ACCESS.2020.30132828(141269-141281)Online publication date: 2020

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media