SlideShare a Scribd company logo
1 of 31
Decentralized and
Secure Delivery
Network of IoT
Update Files Based on
Ethereum Smart
Contracts and
Blockchain Technology
Salar Arbabi Mehdi Shajari
Agenda
System
Architecture
Problem Definition, Solution and
Goals
2
1
Proof of Concept
4
3
Protocol
Conclusion
5
Before starting the main
part of the presentation
Blockchain Technology
fundamentals
Smart Contracts
Ethereum Principals
Previous and related works
Part 1.
Problem Definition,
Solution and Goals
Problem Definition
Based on Gartner Inc. 25 billion connected “things” will be in use by the end of 2020.
Control Structure: Centralized Architecture, Trusted Third Parties, Central Controller
Security
Privacy
Availability
Cost
Single Point Of
Failure!
Ethereum Smart
Contracts to Control
Business Logic
Use of Blockchain as
a Distributed Public
Ledger
Decentralized Control
Mechanism
Micropayment
Incentives to Boost Full
Nodes’ Participation in
File Transfer
P2P File Transfer
Distributed File
Storage
IDEA
Goals
Decentralization Security Privacy Cost Reduction
Eliminate Single
Point of Failure
Transparency
Availability
Authentication
Access Control
Anonymity
Copyright
Provider in Control
of the Content
Maintenance Cost
Security Costs
Part 2.
System
Architecture
Ethereum Contract Accounts
Account Management Layer
Ethereum Externally
Owned Accounts (EOA)
Ethereum Wallets
Presentation Layer
Abstract Binary Interface (ABI)
Web-3 Technology
Abstract Binary Interface (ABI)
GUI
Blockchain Layer (Ethereum)
Cryptocurrency (Ether)
Smart Contracts
Light Client Support
Network Layer
Distributed Storage
Distributed Hash Tables (DHT)
P2P File Transfer
Incentive Mechanism
Part 3.
Proposed Protocol
Limitations
IoT devices are
often limited in
resources
IoT Devices can’t
store the
blockchain
Blockchain has
limited storage and
computation
capability
Roles
IoT Devices with limited
resources and capabilities
Intra-Network connection
Update Receiver
A User who owns a few IoT
devices to use in his own
network
Transacts in Ethereum on
IoT Devices’ behalf
IoT Device Vendor
Update Producer
1 2 3Network Owner
IoT Devices –
End Peers –
Target Nodes
Vendor
Roles (2)
Update Distributor
Registers IoT Devices
Provided by each vendor
4 5
Vendor Registrar
Contract
Full Node
CONTRACT
Registration
CONTRACT
Vendor Vendor Registrar
Contract
Network Owner
Purchase
Registers Device
to enable it and
benefit update
possibilityDeploy
Provide
Protocol - Registration
Registration with
network owner’s
EOA
Protocol
Proposed Protocol
Update provider Super Contract
(Proposed Framework)
Instance 1
(Service 1)
Instance 2
(Service 2)
Network Owner
asks for a service
(update in our
case)
{Full Nodes
(P2P File
Distributors)
Update Provider Injects
new encrypted update
to the P2P Distribution
Network
Many to many
relationship
Each instance
for one service
{
update provider informs our
system of new content release
Contract checks for an
agreement
Auction for
Transferring File
and receiving
reward
Grants
Access
(Ticket) in
Case of
Agreement
Auction winner full node
transfers encrypted
update
(Network Owner) Gets
decryption key from
related service contract
Decrypted
update
Protocol – Content Abstraction and Access
Control
Blockchains are not efficient for data storing due to its distributed architecture and proof of work
mechanisms
How to achieve content authentication?
Remember
this
Symbol?
Content Abstraction
Checksum
How to store?
Recall Hashmaps from OO.
programming
Solidity
Mapping
x: Update Provider Address
(msg.sender)
y: Update Name Digest
_Update_abstraction[x][y] :
Checksum
z: Network Owner Address
_access_tickets[x][y][z][w] :
Ticket
How about a mapping
of mappings of
mappings?
O(1)
w: IoT Device ID
Protocol – Content Abstraction and
AuthenticationProposed
Mechanism
Content
provider
Developed Contract
Content Provider
establishes content
checksum in contract
Upon receiving content, consumer
checks received file with the
checksum of the abstraction stored
at contract
Only the one with
access to private key
can trigger this
Recall msg.sender in
Solidity
Checksum checking
Only gets payed if delivers
authentic file
Otherwise, Waste of gas,
Costly!!!
Access Checking done
before all this! Right at
the request
Consumer
Full Node
Protocol - Incentives
Napster, As the first decentralized content delivery system, free riding challenge
Reputation-based
Mechanisms
Micropayment Mechanisms
Reciprocity Mechanism
Capacity
Free Bandwidth
Transfer Duration
Content Size and etc.
Lowest Price Offer wins the
auction
Nash EquilibriumFile Transfer Reverse Auction
Reward := Bid
Protocol – File Transfer Auction
First Price Reverse Auction
N ≥ 2 Participants
Each seller i = 1, · · · , N knows his private cost ci ≥ 0 of
production
Production costs are independent and identically
distributed as a p.d.f. f and c.d.f. F, and have a continuous
support J
bidding strategy β maps a bidder’s cost ci to a
corresponding bid bi
Denote the infimum and the supremum of the support J of
the cost distribution by č and ĉ, allowing the possibility of ĉ
being ∞.
Part 4.
Proof of Concept
Evaluation – Centralized Architectures
Amazon
62%
Microsoft Azure
20%
Google
12%
Other
6%
IoT Market Distribution
3923 $
Monthly
Amazon Web Service
2447 $
Monthly
Microsoft Azure
1443 $
Monthly
Google Cloud Platform
• Node Assignments
• Key Management
• Functional Features
• IoT Core
• Storage
• IoT Hub
• File Transfer
• DDOS Protection
• Functional Features
• Storage
• API
• Azure Firewall
• Automation
• IP Assignment
• IoT Hub
• DDOS Protection
• Storage
• Functional Features
• API
• Bandwidth
• Network Traffic
Management
Storage Cost Analysis
Storage Cost
Finished Updates
Demanded Updates
_updateOwner
Field
Maximum Storage
Space
(Bytes)
_updateFileName
_updateFileHash
_winnerBidderIP
_transferPrice
_bandWidth
20
1024
256
60
64
64
_price 64
Total: 1536
Total: 1536 Bytes
_updateOwner
_updateFileName
_updateFileHash
_timestamp
20
1024
256
256
_initialized 8
Total: 1564
Total: 1564 Bytes
Functional Cost Analysis
Actor Function Gas Price
per
Execution
Cost Per Month
(8K
transactions -
Dollars)
Network
Owner
Instance
Contract
Finalize
Register IoT
Device
Demand Update
Total:
128.874
320000
42000
28223
28351
0.073
76.961
0.006
51.95
Full
Node
Register Full
Node
Bid to Update
28415
28287
0.007
51.833
Total:
51.84
Response Time Analysis
(Mili Seconds)
620.22 584.75 681.38
Number of
Transactions
(Seconds)
8 × 103
4 × 105
6 × 106
3 × 108
4200 6 × 105
8 × 106
16.7916
21.758
74.4197
519.528
15.491
20.58
58.793
382.87
13.41
18.143
51.8362
226.025
Choosing the device to be updated
Update Information
Strengths and Weaknesses
Strengths
Eliminate Single Point of Failure - Availability
Transparency
Content Provider in Control of The Content
Cost Reduction
Weaknesses
Cannot prevent or detect hardcopy distribution of Updates
High average response time and low throughput (Offchain State Channels / Parachains /
Consensus Algorithms)
Scalability
Part 5 – Proof of Concept

More Related Content

What's hot

Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Shakas Technologies
 
IS Unit 7_Network Security
IS Unit 7_Network SecurityIS Unit 7_Network Security
IS Unit 7_Network SecuritySarthak Patel
 
Architecture blockchain-azure
Architecture blockchain-azureArchitecture blockchain-azure
Architecture blockchain-azureTonyEsposito19
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTINGKayalvizhi Selvaraj
 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...IJCSIS Research Publications
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Girish Chandra
 
An efficient certificate less encryption for
An efficient certificate less encryption forAn efficient certificate less encryption for
An efficient certificate less encryption forShakas Technologies
 

What's hot (10)

Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
IS Unit 7_Network Security
IS Unit 7_Network SecurityIS Unit 7_Network Security
IS Unit 7_Network Security
 
Architecture blockchain-azure
Architecture blockchain-azureArchitecture blockchain-azure
Architecture blockchain-azure
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTINGPRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGESECURITY IN CLOUD COMPUTING
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Kerberos
KerberosKerberos
Kerberos
 
Kerberos
KerberosKerberos
Kerberos
 
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
An efficient certificate less encryption for
An efficient certificate less encryption forAn efficient certificate less encryption for
An efficient certificate less encryption for
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 

Similar to Cascon Decentralized IoT update - Blockchain and Smart Contracts

IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0Matt Lucas
 
Cloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptxCloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptxMichel Burger
 
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Hacken_Ecosystem
 
[Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발
[Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발 [Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발
[Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발 Yunho Maeng
 
Blockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networksBlockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networksNam Yong Kim
 
apidays LIVE LONDON - Architecting Scalable Software Platforms for IoT Applic...
apidays LIVE LONDON - Architecting Scalable Software Platforms for IoT Applic...apidays LIVE LONDON - Architecting Scalable Software Platforms for IoT Applic...
apidays LIVE LONDON - Architecting Scalable Software Platforms for IoT Applic...apidays
 
New Design Patterns in Microservice Solutions
New Design Patterns in Microservice SolutionsNew Design Patterns in Microservice Solutions
New Design Patterns in Microservice SolutionsMichel Burger
 
apidays LIVE Australia - Building a scalable API platform for an IoT ecosyste...
apidays LIVE Australia - Building a scalable API platform for an IoT ecosyste...apidays LIVE Australia - Building a scalable API platform for an IoT ecosyste...
apidays LIVE Australia - Building a scalable API platform for an IoT ecosyste...apidays
 
Hyperledger Fabric & Composer
Hyperledger Fabric & Composer Hyperledger Fabric & Composer
Hyperledger Fabric & Composer Dr. Ketan Parmar
 
Bit taka bangladeshi country owned crypto currency
Bit taka bangladeshi country owned crypto currencyBit taka bangladeshi country owned crypto currency
Bit taka bangladeshi country owned crypto currencyMohammad Salehin
 
Wwc developing hyperledger applications v4
Wwc  developing hyperledger applications v4Wwc  developing hyperledger applications v4
Wwc developing hyperledger applications v4LennartF
 
Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_final
Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_finalDoag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_final
Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_finalOPITZ CONSULTING Deutschland
 
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGEPRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGEEditor IJCTER
 
IRJET- Study of Blockchain and its Concepts
IRJET-  	  Study of Blockchain and its ConceptsIRJET-  	  Study of Blockchain and its Concepts
IRJET- Study of Blockchain and its ConceptsIRJET Journal
 
Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Integration of Things (Sam Vanhoutte @Iglooconf 2017) Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Integration of Things (Sam Vanhoutte @Iglooconf 2017) Codit
 
CPaaS.io Y1 Review Meeting - Citizen Empowerment
CPaaS.io Y1 Review Meeting - Citizen EmpowermentCPaaS.io Y1 Review Meeting - Citizen Empowerment
CPaaS.io Y1 Review Meeting - Citizen EmpowermentStephan Haller
 
Hyperledger Fabric update Meetup 20181101
Hyperledger Fabric update Meetup 20181101Hyperledger Fabric update Meetup 20181101
Hyperledger Fabric update Meetup 20181101Arnaud Le Hors
 
IRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and EthereumIRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and EthereumIRJET Journal
 

Similar to Cascon Decentralized IoT update - Blockchain and Smart Contracts (20)

IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0IBM Blockchain Platform - Architectural Good Practices v1.0
IBM Blockchain Platform - Architectural Good Practices v1.0
 
Cloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptxCloud to hybrid edge cloud evolution Jun112020.pptx
Cloud to hybrid edge cloud evolution Jun112020.pptx
 
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
 
[Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발
[Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발 [Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발
[Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발
 
Blockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networksBlockchain-based multiple AAA system in edge computing for IoT networks
Blockchain-based multiple AAA system in edge computing for IoT networks
 
apidays LIVE LONDON - Architecting Scalable Software Platforms for IoT Applic...
apidays LIVE LONDON - Architecting Scalable Software Platforms for IoT Applic...apidays LIVE LONDON - Architecting Scalable Software Platforms for IoT Applic...
apidays LIVE LONDON - Architecting Scalable Software Platforms for IoT Applic...
 
New Design Patterns in Microservice Solutions
New Design Patterns in Microservice SolutionsNew Design Patterns in Microservice Solutions
New Design Patterns in Microservice Solutions
 
Taw opening session
Taw opening sessionTaw opening session
Taw opening session
 
apidays LIVE Australia - Building a scalable API platform for an IoT ecosyste...
apidays LIVE Australia - Building a scalable API platform for an IoT ecosyste...apidays LIVE Australia - Building a scalable API platform for an IoT ecosyste...
apidays LIVE Australia - Building a scalable API platform for an IoT ecosyste...
 
Hyperledger Fabric & Composer
Hyperledger Fabric & Composer Hyperledger Fabric & Composer
Hyperledger Fabric & Composer
 
Bit taka bangladeshi country owned crypto currency
Bit taka bangladeshi country owned crypto currencyBit taka bangladeshi country owned crypto currency
Bit taka bangladeshi country owned crypto currency
 
Wwc developing hyperledger applications v4
Wwc  developing hyperledger applications v4Wwc  developing hyperledger applications v4
Wwc developing hyperledger applications v4
 
Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_final
Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_finalDoag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_final
Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_final
 
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGEPRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
 
IRJET- Study of Blockchain and its Concepts
IRJET-  	  Study of Blockchain and its ConceptsIRJET-  	  Study of Blockchain and its Concepts
IRJET- Study of Blockchain and its Concepts
 
Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Integration of Things (Sam Vanhoutte @Iglooconf 2017) Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Integration of Things (Sam Vanhoutte @Iglooconf 2017)
 
Introduction to FIWARE Open Ecosystem
Introduction to FIWARE Open EcosystemIntroduction to FIWARE Open Ecosystem
Introduction to FIWARE Open Ecosystem
 
CPaaS.io Y1 Review Meeting - Citizen Empowerment
CPaaS.io Y1 Review Meeting - Citizen EmpowermentCPaaS.io Y1 Review Meeting - Citizen Empowerment
CPaaS.io Y1 Review Meeting - Citizen Empowerment
 
Hyperledger Fabric update Meetup 20181101
Hyperledger Fabric update Meetup 20181101Hyperledger Fabric update Meetup 20181101
Hyperledger Fabric update Meetup 20181101
 
IRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and EthereumIRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and Ethereum
 

Recently uploaded

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

Cascon Decentralized IoT update - Blockchain and Smart Contracts

  • 1. Decentralized and Secure Delivery Network of IoT Update Files Based on Ethereum Smart Contracts and Blockchain Technology Salar Arbabi Mehdi Shajari
  • 5. Before starting the main part of the presentation Blockchain Technology fundamentals Smart Contracts Ethereum Principals Previous and related works
  • 7. Problem Definition Based on Gartner Inc. 25 billion connected “things” will be in use by the end of 2020. Control Structure: Centralized Architecture, Trusted Third Parties, Central Controller Security Privacy Availability Cost Single Point Of Failure!
  • 8.
  • 9. Ethereum Smart Contracts to Control Business Logic Use of Blockchain as a Distributed Public Ledger Decentralized Control Mechanism Micropayment Incentives to Boost Full Nodes’ Participation in File Transfer P2P File Transfer Distributed File Storage IDEA
  • 10. Goals Decentralization Security Privacy Cost Reduction Eliminate Single Point of Failure Transparency Availability Authentication Access Control Anonymity Copyright Provider in Control of the Content Maintenance Cost Security Costs
  • 12. Ethereum Contract Accounts Account Management Layer Ethereum Externally Owned Accounts (EOA) Ethereum Wallets Presentation Layer Abstract Binary Interface (ABI) Web-3 Technology Abstract Binary Interface (ABI) GUI Blockchain Layer (Ethereum) Cryptocurrency (Ether) Smart Contracts Light Client Support Network Layer Distributed Storage Distributed Hash Tables (DHT) P2P File Transfer Incentive Mechanism
  • 14. Limitations IoT devices are often limited in resources IoT Devices can’t store the blockchain Blockchain has limited storage and computation capability
  • 15. Roles IoT Devices with limited resources and capabilities Intra-Network connection Update Receiver A User who owns a few IoT devices to use in his own network Transacts in Ethereum on IoT Devices’ behalf IoT Device Vendor Update Producer 1 2 3Network Owner IoT Devices – End Peers – Target Nodes Vendor
  • 16. Roles (2) Update Distributor Registers IoT Devices Provided by each vendor 4 5 Vendor Registrar Contract Full Node CONTRACT
  • 17. Registration CONTRACT Vendor Vendor Registrar Contract Network Owner Purchase Registers Device to enable it and benefit update possibilityDeploy Provide Protocol - Registration Registration with network owner’s EOA
  • 18. Protocol Proposed Protocol Update provider Super Contract (Proposed Framework) Instance 1 (Service 1) Instance 2 (Service 2) Network Owner asks for a service (update in our case) {Full Nodes (P2P File Distributors) Update Provider Injects new encrypted update to the P2P Distribution Network Many to many relationship Each instance for one service { update provider informs our system of new content release Contract checks for an agreement Auction for Transferring File and receiving reward Grants Access (Ticket) in Case of Agreement Auction winner full node transfers encrypted update (Network Owner) Gets decryption key from related service contract Decrypted update
  • 19. Protocol – Content Abstraction and Access Control Blockchains are not efficient for data storing due to its distributed architecture and proof of work mechanisms How to achieve content authentication? Remember this Symbol? Content Abstraction Checksum How to store? Recall Hashmaps from OO. programming Solidity Mapping x: Update Provider Address (msg.sender) y: Update Name Digest _Update_abstraction[x][y] : Checksum z: Network Owner Address _access_tickets[x][y][z][w] : Ticket How about a mapping of mappings of mappings? O(1) w: IoT Device ID
  • 20. Protocol – Content Abstraction and AuthenticationProposed Mechanism Content provider Developed Contract Content Provider establishes content checksum in contract Upon receiving content, consumer checks received file with the checksum of the abstraction stored at contract Only the one with access to private key can trigger this Recall msg.sender in Solidity Checksum checking Only gets payed if delivers authentic file Otherwise, Waste of gas, Costly!!! Access Checking done before all this! Right at the request Consumer Full Node
  • 21. Protocol - Incentives Napster, As the first decentralized content delivery system, free riding challenge Reputation-based Mechanisms Micropayment Mechanisms Reciprocity Mechanism Capacity Free Bandwidth Transfer Duration Content Size and etc. Lowest Price Offer wins the auction Nash EquilibriumFile Transfer Reverse Auction Reward := Bid
  • 22. Protocol – File Transfer Auction First Price Reverse Auction N ≥ 2 Participants Each seller i = 1, · · · , N knows his private cost ci ≥ 0 of production Production costs are independent and identically distributed as a p.d.f. f and c.d.f. F, and have a continuous support J bidding strategy β maps a bidder’s cost ci to a corresponding bid bi Denote the infimum and the supremum of the support J of the cost distribution by č and ĉ, allowing the possibility of ĉ being ∞.
  • 23. Part 4. Proof of Concept
  • 24. Evaluation – Centralized Architectures Amazon 62% Microsoft Azure 20% Google 12% Other 6% IoT Market Distribution 3923 $ Monthly Amazon Web Service 2447 $ Monthly Microsoft Azure 1443 $ Monthly Google Cloud Platform • Node Assignments • Key Management • Functional Features • IoT Core • Storage • IoT Hub • File Transfer • DDOS Protection • Functional Features • Storage • API • Azure Firewall • Automation • IP Assignment • IoT Hub • DDOS Protection • Storage • Functional Features • API • Bandwidth • Network Traffic Management
  • 25. Storage Cost Analysis Storage Cost Finished Updates Demanded Updates _updateOwner Field Maximum Storage Space (Bytes) _updateFileName _updateFileHash _winnerBidderIP _transferPrice _bandWidth 20 1024 256 60 64 64 _price 64 Total: 1536 Total: 1536 Bytes _updateOwner _updateFileName _updateFileHash _timestamp 20 1024 256 256 _initialized 8 Total: 1564 Total: 1564 Bytes
  • 26. Functional Cost Analysis Actor Function Gas Price per Execution Cost Per Month (8K transactions - Dollars) Network Owner Instance Contract Finalize Register IoT Device Demand Update Total: 128.874 320000 42000 28223 28351 0.073 76.961 0.006 51.95 Full Node Register Full Node Bid to Update 28415 28287 0.007 51.833 Total: 51.84
  • 27. Response Time Analysis (Mili Seconds) 620.22 584.75 681.38 Number of Transactions (Seconds) 8 × 103 4 × 105 6 × 106 3 × 108 4200 6 × 105 8 × 106 16.7916 21.758 74.4197 519.528 15.491 20.58 58.793 382.87 13.41 18.143 51.8362 226.025
  • 28. Choosing the device to be updated
  • 30. Strengths and Weaknesses Strengths Eliminate Single Point of Failure - Availability Transparency Content Provider in Control of The Content Cost Reduction Weaknesses Cannot prevent or detect hardcopy distribution of Updates High average response time and low throughput (Offchain State Channels / Parachains / Consensus Algorithms) Scalability
  • 31. Part 5 – Proof of Concept

Editor's Notes

  1. Currencies currently used in financial transactions are governed by national governments and in order for blockchain to be widely adopted by financial institutions, agreement has to be reached by the those governments to regulate the use of blockchain, otherwise, its status remains unsettled. Despite the existing security solutions with strong encryption algorithms, cyber security concerns are considered one of the main important factors that affect public’s decisions on sharing personal data using blockchain systems Bugs in software code always exist and poorly written software is especially vulnerable to malicious activity. As software gets more complicated and interconnected, its reliability goes down while the number of bugs goes up. Although we have huge and rapid advancements in technology, software is written by humans and therefore it will always be imperfect. Blockchain is no different. Additionally, the integrity of the software and network are fundamentally important in the evaluation of blockchain as an infrastructure technology. If the technology permeates every major financial system worldwide, the impacts of a glitch or hack could be catastrophic