The document summarizes a literature review on the use of blockchain technology for the Internet of Things (IoT). It finds 18 documented use cases of blockchain beyond cryptocurrencies, with 4 cases explicitly designed for IoT applications. Regarding implementation differences from Bitcoin, it identifies variations in data stored on-chain and mining techniques used. The review also examines issues with blockchain integrity from attacks, and degrees of anonymity and adaptability.
Control of Communication and Energy Networks Final Project - Service Function...Biagio Botticelli
Ā
Final Project of the Control of Communication and Energy Networks course of the Master Degree in Engineering in Computer Science at University of Rome "La Sapienza".
The technical report introduce the concepts of Service Function Chaining (SFC) and Network Function Virtualization (NFV) analyzing an approach to merge the two technologies.
Get in-depth insights on the emergence, growth and future prospects of Blockchain in India. The historical timeline of the Blockchain technology in India. A detailed breakdown of the Blockchain technology and decoding the types of Blockchain currently in use.
In this case study, we are providing information about the Introduction of Blockchain Technology, Bitcoin and its environment setup, Ethereum coin, other cryptocurrencies, Bitcoin in education, and a case study of healthcare using blockchain.
Control of Communication and Energy Networks Final Project - Service Function...Biagio Botticelli
Ā
Final Project of the Control of Communication and Energy Networks course of the Master Degree in Engineering in Computer Science at University of Rome "La Sapienza".
The technical report introduce the concepts of Service Function Chaining (SFC) and Network Function Virtualization (NFV) analyzing an approach to merge the two technologies.
Get in-depth insights on the emergence, growth and future prospects of Blockchain in India. The historical timeline of the Blockchain technology in India. A detailed breakdown of the Blockchain technology and decoding the types of Blockchain currently in use.
In this case study, we are providing information about the Introduction of Blockchain Technology, Bitcoin and its environment setup, Ethereum coin, other cryptocurrencies, Bitcoin in education, and a case study of healthcare using blockchain.
Seminar of the Web Security and Privacy course of the Master Degree in Engineering in Computer Science (Cyber Security) of the University of Rome "La Sapienza".
The presentation is about a research project called "Smart Home" in which the Block Chain method is applied in a Smart Home environment to assure Privacy and Security in an IoT context.
Nowadays everyone uses their personal identification documents on a regular basis, which gets shared with third parties without their explicit consent and stored at an unknown location. Companies such as government institutions, banks, credit agencies and other financial organizations are considered to be the weakest point in the current identity management system as they are unfortified to theft and hacking of data. Although the financial services sector have been seeking solutions for identity problem for a long time, it is only now that a viable solution has arrived in form of blockchain. KYC Know Your Customer using Blockchain eliminates the repeated KYC checks that banks currently perform by maintaining a common secure database in a blockchain. The nature of a blockchain ensures that unauthorized changes to the data are automatically invalidated. The proof of reputation concept makes the verification process more robust and secure. Decentralized computing architecture, blockchain will allow for the accumulation of data from multiple authoritative service provider into a single immutable, cryptographically secured and validated database. Blockchain KYC solution take advantages of a secure, public digital ledger to give almost instantaneous and truly secure verification of identity. Due to the immutable and unalterable nature of the record kept in the blockchain, fraud could become a thing of the past. Sreelakshmi V G | Meera P M | Senna Mariya Pius | Mathews Jose | Swapna B Sasi "KYC using Blockchain" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31542.pdf Paper Url :https://www.ijtsrd.com/computer-science/other/31542/kyc-using-blockchain/sreelakshmi-v-g
A blockchain is a decentralised database that is shared across computer network nodes. A blockchain acts as a database, storing information in a digital format. The study primarily aims to explore how in the future, block chain technology will alter several areas of the Indian economy. The current study aims to obtain a deeper understanding of blockchain technology's idea and implementation in India, as well as the technology's potential as a disruptive financial technological innovation.
Secondary sources such as reports, journals, papers, and websites were used to compile all the data. Current and relevant information were utilised to help understand the research goals. All the information is rationally organised to fulfil the objectives. The current research focuses on recommendations for enhancing India's Blockchain ecosystem so that it may become one of the best in the world at utilising this new technology.
This course covers in detail the technical principles & concepts behind blockchain. In addition, it seeks to provide you with the insights and deep understanding of the various components of blockchain technology, and enables you to determine for yourself how to best leverage and exploit blockchain for your project, organisation or start-up.
Link - https://www.experfy.com/training/courses/blockchain-technology-fundamentals
Blockchain for AI: Review and Open. Research Challenges
K. SALAH, M. H. REHMAN, N. NIZAMUDDIN and A. Al-Fuqaha
ABSTRACT
Recently, Artificial Intelligence (AI) and blockchain have become two of the most trending and disruptive technologies. Blockchain technology has the ability to automate payment in cryptocurrency and to provide access to a shared ledger of data, transactions, and logs in a decentralized, secure, and trusted manner. Also with smart contracts, blockchain has the ability to govern interactions among participants with no intermediary or a trusted third party. AI, on the other hand, offers intelligence and decision- making capabilities for machines similar to humans. In this paper, we present a detailed survey on blockchain applications for AI. We review the literature, tabulate, and summarize the emerging blockchain applications, platforms, and protocols specifically targeting AI area. We also identify and discuss open research challenges of utilizing blockchain technologies for AI.
What is Blockchain Technology and How does it work ?evontech
Ā
Blockchain is one of the most discussed buzzwords among tech entrepreneurs of today.Although the concept of blockchain was first introduced in 1991 by Stuart Haber and W. Scott Stornetta, the tech community started to realize its incredible potential after it gave birth to the first cryptocurrency and digital payment system, called Bitcoin, in 2009.Know here what is blockchain technology and how does it works?
The WIPO document notes that there are already existing blockchain solutions offered by ZERTIFIER which use blockchain to store and encrypt documents via a hashing technique.
Blockchain Technology in Banking Services - A ReviewGokul Alex
Ā
My session for IIM Bengaluru for the Executive Leaders of Public Sector Banks in India about the principles, paradigms, platforms, protocols and potentials of Blockchain Technology in 2020.
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...AlAtfat
Ā
Introducing IBchain, a new blockchain architecture with the Internet of Things (IoT), could be an
attractive framework regarding improvements in connectivity implementation through the smart cities.
Instead of meriting innovation and security, the IoT links people, sites, and products and provides
opportunities. Everything that transfers information to the IoT system is integrated by advanced
microchips, sensors, and actuators in actual things. The analytical ability of the IoT converts observations
into actions, impacting business advancements and significant ways of activity. IoT enables connected
objects to transmit information to personal blockchain systems to create tamper-resistant transaction
records. The information from sensors and microchips is progressing rapidly with blockchain ledgers,
making them more portable and relevant for immediate conversations. In IBchain methodology, the smart
objects are permissible to connect securely with other smart objects in diverse situations. IBchain creates
an innovative blockchain-based processing configuration through the IoT. The IBchain could analyze
blockchain to the main expertise or supports the IoT validation and trustworthiness. It reinforces
blockchain and cloud to build an empowering IoT ubiquitous situation for secure communication among
the smart devices.
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...AlAtfat
Ā
Advances in technology always had an impact on our lives. Several emerging technologies, most notably the Internet of Things (IoT) and blockchain, present transformative opportunities. The blockchain is a decentralized, transparent ledger for storing transaction data. By effectively establishing trust between nodes, it has the remarkable potential to design unique architectures for most enterprise applications. When it first appeared as a platform for anonymous cryptocurrency trading, such as Bitcoin, on a public network platform, blockchain piqued the interest of researchers. The chain is completed when each block connects to the previous block. The Internet of Things (IoT) is a network of networked devices that can exchange data and be managed and controlled via unique identifiers. Automation, wireless sensor networks, embedded systems, and control systems are just a few of the well-known technologies that power the IoT. Converging advancements in real-time analytics, machine learning, commodity sensors, and embedded systems demonstrate the rapid expansion of the IoT paradigm. The Internet of Things refers to the global networking of millions of networked smart gadgets that gather and exchange data. Integrating the IoT and blockchain technology would be a significant step toward developing a reliable, secure, and comprehensive method of storing data collected by smart devices. Internet-enabled devices in the IoT can send data to private blockchain networks, creating immutable records of all transaction history. As a result, these networks produce unchangeable logs of all transactions. This research looks at how blockchain technology and the Internet of Things interact to understand better how devices can communicate with one another. The blockchain-enabled Internet of Things architecture proposed in this article is a useful framework for integrating blockchain technology and the Internet of Things using the most cutting-edge tools and methods currently available. This article discusses the principles of blockchain-based IoT, consensus methods, reviews, difficulties, prospects, applications, trends, and communication between IoT nodes in an integrated framework.
Seminar of the Web Security and Privacy course of the Master Degree in Engineering in Computer Science (Cyber Security) of the University of Rome "La Sapienza".
The presentation is about a research project called "Smart Home" in which the Block Chain method is applied in a Smart Home environment to assure Privacy and Security in an IoT context.
Nowadays everyone uses their personal identification documents on a regular basis, which gets shared with third parties without their explicit consent and stored at an unknown location. Companies such as government institutions, banks, credit agencies and other financial organizations are considered to be the weakest point in the current identity management system as they are unfortified to theft and hacking of data. Although the financial services sector have been seeking solutions for identity problem for a long time, it is only now that a viable solution has arrived in form of blockchain. KYC Know Your Customer using Blockchain eliminates the repeated KYC checks that banks currently perform by maintaining a common secure database in a blockchain. The nature of a blockchain ensures that unauthorized changes to the data are automatically invalidated. The proof of reputation concept makes the verification process more robust and secure. Decentralized computing architecture, blockchain will allow for the accumulation of data from multiple authoritative service provider into a single immutable, cryptographically secured and validated database. Blockchain KYC solution take advantages of a secure, public digital ledger to give almost instantaneous and truly secure verification of identity. Due to the immutable and unalterable nature of the record kept in the blockchain, fraud could become a thing of the past. Sreelakshmi V G | Meera P M | Senna Mariya Pius | Mathews Jose | Swapna B Sasi "KYC using Blockchain" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31542.pdf Paper Url :https://www.ijtsrd.com/computer-science/other/31542/kyc-using-blockchain/sreelakshmi-v-g
A blockchain is a decentralised database that is shared across computer network nodes. A blockchain acts as a database, storing information in a digital format. The study primarily aims to explore how in the future, block chain technology will alter several areas of the Indian economy. The current study aims to obtain a deeper understanding of blockchain technology's idea and implementation in India, as well as the technology's potential as a disruptive financial technological innovation.
Secondary sources such as reports, journals, papers, and websites were used to compile all the data. Current and relevant information were utilised to help understand the research goals. All the information is rationally organised to fulfil the objectives. The current research focuses on recommendations for enhancing India's Blockchain ecosystem so that it may become one of the best in the world at utilising this new technology.
This course covers in detail the technical principles & concepts behind blockchain. In addition, it seeks to provide you with the insights and deep understanding of the various components of blockchain technology, and enables you to determine for yourself how to best leverage and exploit blockchain for your project, organisation or start-up.
Link - https://www.experfy.com/training/courses/blockchain-technology-fundamentals
Blockchain for AI: Review and Open. Research Challenges
K. SALAH, M. H. REHMAN, N. NIZAMUDDIN and A. Al-Fuqaha
ABSTRACT
Recently, Artificial Intelligence (AI) and blockchain have become two of the most trending and disruptive technologies. Blockchain technology has the ability to automate payment in cryptocurrency and to provide access to a shared ledger of data, transactions, and logs in a decentralized, secure, and trusted manner. Also with smart contracts, blockchain has the ability to govern interactions among participants with no intermediary or a trusted third party. AI, on the other hand, offers intelligence and decision- making capabilities for machines similar to humans. In this paper, we present a detailed survey on blockchain applications for AI. We review the literature, tabulate, and summarize the emerging blockchain applications, platforms, and protocols specifically targeting AI area. We also identify and discuss open research challenges of utilizing blockchain technologies for AI.
What is Blockchain Technology and How does it work ?evontech
Ā
Blockchain is one of the most discussed buzzwords among tech entrepreneurs of today.Although the concept of blockchain was first introduced in 1991 by Stuart Haber and W. Scott Stornetta, the tech community started to realize its incredible potential after it gave birth to the first cryptocurrency and digital payment system, called Bitcoin, in 2009.Know here what is blockchain technology and how does it works?
The WIPO document notes that there are already existing blockchain solutions offered by ZERTIFIER which use blockchain to store and encrypt documents via a hashing technique.
Blockchain Technology in Banking Services - A ReviewGokul Alex
Ā
My session for IIM Bengaluru for the Executive Leaders of Public Sector Banks in India about the principles, paradigms, platforms, protocols and potentials of Blockchain Technology in 2020.
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...AlAtfat
Ā
Introducing IBchain, a new blockchain architecture with the Internet of Things (IoT), could be an
attractive framework regarding improvements in connectivity implementation through the smart cities.
Instead of meriting innovation and security, the IoT links people, sites, and products and provides
opportunities. Everything that transfers information to the IoT system is integrated by advanced
microchips, sensors, and actuators in actual things. The analytical ability of the IoT converts observations
into actions, impacting business advancements and significant ways of activity. IoT enables connected
objects to transmit information to personal blockchain systems to create tamper-resistant transaction
records. The information from sensors and microchips is progressing rapidly with blockchain ledgers,
making them more portable and relevant for immediate conversations. In IBchain methodology, the smart
objects are permissible to connect securely with other smart objects in diverse situations. IBchain creates
an innovative blockchain-based processing configuration through the IoT. The IBchain could analyze
blockchain to the main expertise or supports the IoT validation and trustworthiness. It reinforces
blockchain and cloud to build an empowering IoT ubiquitous situation for secure communication among
the smart devices.
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...AlAtfat
Ā
Advances in technology always had an impact on our lives. Several emerging technologies, most notably the Internet of Things (IoT) and blockchain, present transformative opportunities. The blockchain is a decentralized, transparent ledger for storing transaction data. By effectively establishing trust between nodes, it has the remarkable potential to design unique architectures for most enterprise applications. When it first appeared as a platform for anonymous cryptocurrency trading, such as Bitcoin, on a public network platform, blockchain piqued the interest of researchers. The chain is completed when each block connects to the previous block. The Internet of Things (IoT) is a network of networked devices that can exchange data and be managed and controlled via unique identifiers. Automation, wireless sensor networks, embedded systems, and control systems are just a few of the well-known technologies that power the IoT. Converging advancements in real-time analytics, machine learning, commodity sensors, and embedded systems demonstrate the rapid expansion of the IoT paradigm. The Internet of Things refers to the global networking of millions of networked smart gadgets that gather and exchange data. Integrating the IoT and blockchain technology would be a significant step toward developing a reliable, secure, and comprehensive method of storing data collected by smart devices. Internet-enabled devices in the IoT can send data to private blockchain networks, creating immutable records of all transaction history. As a result, these networks produce unchangeable logs of all transactions. This research looks at how blockchain technology and the Internet of Things interact to understand better how devices can communicate with one another. The blockchain-enabled Internet of Things architecture proposed in this article is a useful framework for integrating blockchain technology and the Internet of Things using the most cutting-edge tools and methods currently available. This article discusses the principles of blockchain-based IoT, consensus methods, reviews, difficulties, prospects, applications, trends, and communication between IoT nodes in an integrated framework.
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...AlAtfat
Ā
Advances in technology always had an impact on our lives. Several emerging technologies, most notably the Internet of Things (IoT) and blockchain, present transformative opportunities. The blockchain is a decentralized, transparent ledger for storing transaction data. By effectively establishing trust between nodes, it has the remarkable potential to design unique architectures for most enterprise applications. When it first appeared as a platform for anonymous cryptocurrency trading, such as Bitcoin, on a public network platform, blockchain piqued the interest of researchers. The chain is completed when each block connects to the previous block. The Internet of Things (IoT) is a network of networked devices that can exchange data and be managed and controlled via unique identifiers. Automation, wireless sensor networks, embedded systems, and control systems are just a few of the well-known technologies that power the IoT. Converging advancements in real-time analytics, machine learning, commodity sensors, and embedded systems demonstrate the rapid expansion of the IoT paradigm. The Internet of Things refers to the global networking of millions of networked smart gadgets that gather and exchange data. Integrating the IoT and blockchain technology would be a significant step toward developing a reliable, secure, and comprehensive method of storing data collected by smart devices. Internet-enabled devices in the IoT can send data to private blockchain networks, creating immutable records of all transaction history. As a result, these networks produce unchangeable logs of all transactions. This research looks at how blockchain technology and the Internet of Things interact to understand better how devices can communicate with one another. The blockchain-enabled Internet of Things architecture proposed in this article is a useful framework for integrating blockchain technology and the Internet of Things using the most cutting-edge tools and methods currently available. This article discusses the principles of blockchain-based IoT, consensus methods, reviews, difficulties, prospects, applications, trends, and communication between IoT nodes in an integrated framework.
Running head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docxtoddr4
Ā
Running head: BLOCKCHAIN TECHNOLOGY: BEYOND CRYPTOCURRENCY
1
BLOCKCHAIN TECHNOLOGY: BEYOND CRYPTOCURRENCY
7
Block-chain Technology: Beyond Crypto-currency
Christophe Bassono
University of Nebraska Omaha
CYBR-4360-860-Foundation of IA
Assignment: Semester Project Presentation
Block-chain Technology: Beyond the Crypto-currency
Contents
Contents
2
Abstract
3
Introduction
3
Fundamentals of Block-chain Technology
4
Application of Block-chain Beyond Crypto-currency
5
Future of Block-chain
8
Conclusion
8
Abstract
Block-chain is relatively new; therefore, a representative research sample is presented that spans over the last couple of years from the earlier literature addressing the field. The different usage types of Block-chain, as well as the digital ledger methods, applications, challenges privacy, and security issues, are examined. The technology constitutes two distinct components including block and transaction. Block refers to the collection of data, transaction recording, as well as other related details such as the creation of timestamp, correct sequence, et cetera. Blockchain which is the digital technology fundamental for crypto-currency has managed to bring forth a novel revolution through the provision of a mechanism that can be used for peer-to-peer transactions (P2P). The blockchain is a globally accepted ledger that is capable of achieving numerous new applications beyond transaction verification. Bitcoin that is progressively gaining awareness around the world is a vital example of Blockchain in practice. The block-chain technology is still at the stage of building up and is expected to be full-blown in the next few years. Introduction
The predominant goal of this proposal is to outline the literature on the functionality of Block-chain and other techniques of the digital ledger in several different spheres of influence beyond its use to crypto-currency and to come up with an appropriate conclusion. The technology of block-chain is relatively new; therefore, a representative research sample is presented that spans over the last couple of years from the earlier literature addressing the field. The different usage types of Block-chain, as well as the digital ledger methods, applications, challenges privacy, and security issues, are examined. However, the main focus of this proposal is to determine the most auspicious for future application of Block-chain beyond crypto-currency.
Block-chain is the technology that facilitates the system of Bitcoin crypto-currency, which is also regarded to be important in the formation of the backbone that guarantees privacy and security of several applications in different areas such as the eco-system of the Internet of Things. The block-chain technology has also been successfully applied in the industrial and the educational sectors (Pilkington, 2016). A Proof-of-Work, which is a mathematical challenge, guarantees the security of the chain-block by maintaining the transactions of the digital le.
Blockchain-based Security Mechanisms for Internet of Medical Things (IOMT)IJCNCJournal
Ā
Traditional standards and security protocols are recognized as unable to solve the security, privacy, and availability of services of the Internet of Medical Things (IoMT) ecosystem, especially during the Coronavirus (COVID-19) pandemic. Blockchain technology has then emerged as a distributed ledger technology that can manage many intelligent transactions and ensure greater security in data management. The Blockchain-based security mechanisms with specific adaptation and additional layers of authentication and verification can offer a complete resources' management system. It has demonstrated itās superlatively as the core component of the Bitcoin cryptocurrency. In this paper, we propose a ThreeTier Blockchain Architecture in a hierarchical clustering network, with a lightweight authentication system-based API Gateway model that provides network and communication security. Reasonable implementation is proposed and the obtained results demonstrate that our approach shows satisfactory performances in terms of transfer time, energy consumption, and CPU impacts. The traffic analysis also shows that the proposed model can meet the requested security, integrity, and confidentiality of user data.
BLOCKCHAIN-BASED SECURITY MECHANISMS FOR INTERNET OF MEDICAL THINGS (IOMT)IJCNCJournal
Ā
Traditional standards and security protocols are recognized as unable to solve the security, privacy, and
availability of services of the Internet of Medical Things (IoMT) ecosystem, especially during the
Coronavirus (COVID-19) pandemic. Blockchain technology has then emerged as a distributed ledger
technology that can manage many intelligent transactions and ensure greater security in data
management. The Blockchain-based security mechanisms with specific adaptation and additional layers of
authentication and verification can offer a complete resources' management system. It has demonstrated
itās superlatively as the core component of the Bitcoin cryptocurrency. In this paper, we propose a ThreeTier Blockchain Architecture in a hierarchical clustering network, with a lightweight authentication
system-based API Gateway model that provides network and communication security.
Reasonable implementation is proposed and the obtained results demonstrate that our approach shows
satisfactory performances in terms of transfer time, energy consumption, and CPU impacts. The traffic
analysis also shows that the proposed model can meet the requested security, integrity, and confidentiality
of user data.
One of the most hyped IT buzzwords to have emerged in the last couple of years. Blockchain has found its way into major media headlines on a near-daily basis, but a year and a half ago, it was a word used by a relatively small number of people to describe the peer-to-peer distributed ledger technology.
EvaluaciĆ³n de t-MOOC universitario sobre competencias
digitales docentes mediante juicio de expertos
segĆŗn el Marco DigCompEdu.
Julio Cabero-Almenara
Universidad de Sevilla, Sevilla, EspaƱa
cabero@us.es
Julio Barroso--āOsuna
Universidad de Sevilla, Sevilla, EspaƱa
jbarroso@us.es
Antonio Palacios--āRodrĆguez
Universidad de Sevilla, Sevilla, EspaƱa
aprodriguez@us.es
Carmen Llorente--āCejudo
Universidad de Sevilla, Sevilla, EspaƱa
karen@us.es
Proposal for a
REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
LAYING DOWN HARMONISED RULES ON ARTIFICIAL INTELLIGENCE
(ARTIFICIAL INTELLIGENCE ACT) AND AMENDING CERTAIN UNION
LEGISLATIVE ACTS
Predicting Big Data Adoption in Companies With an Explanatory and Predictive Model
Predecir la adopciĆ³n de Big Data en empresas con un modelo explicativo y predictivo. @currovillarejo @jpcabrera71 @gutiker yĀ @fliebc
#StopBigTechGoverningBigTech: More than 170 Civil Society Groups Worldwide Oppose Plans for a
Big Tech Dominated Body for Global Digital Governance.
Not only in developing countries but also in the US and EU, calls for stronger regulation of Big Tech
are rising. At the precise point when we should be shaping global norms to regulate Big Tech, plans
have emerged for an āempoweredā global digital governance body that will evidently be dominated
by Big Tech. Adding vastly to its already overweening power, this new Body would help Big Tech
resist effective regulation, globally and at national levels. Indeed, we face the unbelievable prospect
of āa Big Tech led body for Global Governance of Big Techā.
PACTO POR LA CIENCIA Y LA INNOVACIĆN
8 de febrero de 2021.
El conocimiento y la innovaciĆ³n son esenciales para mantener y mejorar el bienestar social y el crecimiento
econĆ³mico. La competitividad y la productividad del tejido econĆ³mico depende, casi en exclusiva, de la
cantidad de conocimiento avanzado incorporado por la actividad productiva y, por ende, de su continua
renovaciĆ³n. La investigaciĆ³n en las ciencias naturales, sociales y humanas es fuente de valores y
enriquecimiento cultural.
"Experiencias booktuber: MƔs allƔ del libro y de la pantalla"
Maria Del Mar SuƔrez
Cristina Alcaraz Andreu
University of Barcelona
2020, R. Roig-Vila (Coord.), J. M. AntolĆ MartĆnez & R. DĆez Ros (Eds.), XARXES-INNOVAESTIC 2020. Llibre dāactes / REDES-INNOVAESTIC 2020. Libro de actas (pp. 479-480). Alacant: Universitat d'Alacant. ISBN: 978-84-09-20651-3.
Recursos educativos abiertos (REA) en las universidades espaƱolas. Open educational resources (OER) in the Spanish universities. Gema Santos-Hermosa; Eva EstupinyĆ ; Brigit NonĆ³-Rius; LidĆ³n ParĆs-Folch; Jordi Prats-Prat
Covid-19 and IoT: Some Perspectives on the Use of
IoT Technologies in Preventing and Monitoring
COVID-19 Like Infectious Diseases & Lessons
Learned and Impact of Pandemic on IoT
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
Ā
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Ā
Clients donāt know what they donāt know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clientsā needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
Ā
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties ā USA
Expansion of bot farms ā how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks ā Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
Ā
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
ā¢ The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
ā¢ Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
ā¢ Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
ā¢ Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Ā
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Ā
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Blockchain for the internet of things a systematic literature review
1. c IEEE. This is the authorās version of the work. It is posted here by permission of the IEEE for your personal use. Not for redistribution. The deļ¬nitive
version was published in the conference/workshop proceedings.
Blockchain for the Internet of Things: a Systematic
Literature Review
Marco Conoscenti
Nexa Center for Internet & Society
DAUIN-Politecnico di Torino
ITALY
Email: marco.conoscenti@polito.it
Antonio Vetr`o
Nexa Center for Internet & Society
DAUIN-Politecnico di Torino
ITALY
Email: antonio.vetro@polito.it
Juan Carlos De Martin
Nexa Center for Internet & Society
DAUIN-Politecnico di Torino
ITALY
Email: demartin@polito.it
AbstractāIn the Internet of Things (IoT) scenario, the block-
chain and, in general, Peer-to-Peer approaches could play an
important role in the development of decentralized and data-
intensive applications running on billion of devices, preserving the
privacy of the users. Our research goal is to understand whether
the blockchain and Peer-to-Peer approaches can be employed to
foster a decentralized and private-by-design IoT. As a ļ¬rst step
in our research process, we conducted a Systematic Literature
Review on the blockchain to gather knowledge on the current
uses of this technology and to document its current degree of
integrity, anonymity and adaptability. We found 18 use cases of
blockchain in the literature. Four of these use cases are explicitly
designed for IoT. We also found some use cases that are designed
for a private-by-design data management. We also found several
issues in the integrity, anonymity and adaptability. Regarding
anonymity, we found that in the blockchain only pseudonymity is
guaranteed. Regarding adaptability and integrity, we discovered
that the integrity of the blockchain largely depends on the high
difļ¬culty of the Proof-of-Work and on the large number of honest
miners, but at the same time a difļ¬cult Proof-of-Work limits the
adaptability. We documented and categorized the current uses of
the blockchain, and provided a few recommendations for future
work to address the above-mentioned issues.
I. INTRODUCTION
As deļ¬ned by ITU [1], the Internet of Things (IoT) refers
to the network of numerous physical objects (20 billion by
2020, according to Gartner [2]) which are provided with
Internet connection. Such devices acquire information about
the surrounding environment, and they communicate with each
other and with software systems through the Internet. As a
consequence of such rich interaction, they also produce a large
amount of data, in turn usable to enable dependent services.
Despite the beneļ¬ts provided by these services, critical
privacy issues may arise. That is because the connected
devices (the things) spread sensitive personal data and reveal
behaviors and preferences of their owners. Peopleās privacy
is particularly at risk when such sensitive data are managed
by centralized companies, which can make an illegitimate use
of them: as a matter of fact, Edward Snowdenās revelations
showed that peopleās data stored by Internet and telecom-
munication companies have been exploited within a mass
surveillance program, i.e, the PRISM program [3].
With the purpose of preventing this situation, the goal
of our research is to encourage a decentralized and private-
by-design IoT, where privacy is guaranteed by the technical
design of the systems. We believe that this can be achieved
by adopting Peer-to-Peer (P2P) systems. In particular, the
blockchain could be very helpful in building such privacy-
preserving IoT. The blockchain is a P2P ledger, ļ¬rstly used
in the Bitcoin cryptocurrency [4] for economic transactions.
It is tamper-proof and contains only authentic information; in
addition, since it is P2P, it is not controlled by any single
centralized entity. For these reasons, cryptocurrencies are just
one of the possible applications of this technology.
A private-by-design IoT could be fostered by the combina-
tion of the blockchain and a P2P storage system. Sensitive data
produced and exchanged among IoT devices are stored in such
storage system, whose P2P nature could ensure privacy, robust-
ness and absence of single points of failure. Combined with
this storage system, the blockchain has the fundamental role
to register and authenticate all operations performed on IoT
devices data. Each operation on data (creation, modiļ¬cation,
deletion) is registered in the blockchain: this could ensure that
any abuse on data can be detected. Moreover, access policies
can be speciļ¬ed and enforced by the blockchain, preventing
unauthorized operations on data. In this framework, people are
not required to entrust IoT data produced by their devices to
centralized companies: data could be safely stored in different
peers, and the blockchain could guarantee their authenticity
and prevent unauthorized access.
In the paper we performed a Systematic Literature Review
(SLR) to verify whether documented use cases in the state
of the art conļ¬rm this possibility, and, on the other side, to
investigate which are the main factors that affect the levels of
integrity, anonymity and adaptability of the blockchain.
The remainder of the paper is structured as follows. In
Section II ļ¬rst we brieļ¬y delineate the main features of the
blockchain, and then we describe goal and research questions
of the SLR and the research process. In Section III we
report the results obtained from the literature survey and in
Section IV we discuss them. Finally, in Section V we provide
conclusions and future work.
II. STUDY DESIGN
A. Context
The blockchain is a P2P ledger for transactions. To issue
transactions, public key cryptography is employed. A user is
1
2. TABLE I: Use Cases of the Blockchain beyond Cryptocurrencies (RQ1 and RQ2)
Category Paper Usage of the blockchain IoT
Data storage management
[5] Management of access policies and references to usersā data
[6] Management of data storage contracts
[7] Management of document storage contracts
[8] Tamper-proof log of events and management of access control to data
[9] Management of metadata of data kept in a storage system
[10] Automatic compensation of clients of a storage server in case stored data are lost
[11] Immutable log where storing metadata of messages of decentralized applications
Trade of goods and data
[12] Purchase by devices or human beings of assets such as sensors data or goods
[13] Purchase of sensors data in IoT
Identity management
[14] Management of identity veriļ¬cation and certiļ¬cate revocation of PGP certiļ¬cates
[15], [16] Public Key Infrastructure (PKI). Management of update, registration and revocation of keys
Rating system
[17] Tracking of users and contents points in a social voting system
[18] Rating system where customers can give feedbacks about a purchase
Other
[19] Management of software license validation
[20] Timestamping service, in order to prove a content has been produced before a speciļ¬c date
[21] Implementation of a lottery
[22] Banking applications such as automated and distributed bank ledgers
[23] Implementation of a social cryptocurrency, to quantify social inļ¬uence
provided with a public and a secret key: the secret key is
used for signing transactions, while the public one is used as
address in the system. So, no real-world identity is needed for
transactions: this is a form of pseudonymity. A transaction can
have multiple inputs and outputs. For instance, in economic
transactions - i.e. transactions representing transfers of coins
- the inputs are the addresses where coins come from and the
outputs are the addresses of the recipients of the coins. Each
input must be signed with the secret key corresponding to the
address it represents.
Transactions are relayed in the P2P network and some peers,
called miners, collect them together into a data structure, called
block. Once a new block is assembled, it is relayed in the P2P
network and, if valid, is chained to the current last block of
the blockchain. Each block contains a reference to the previous
block (thatās why it is called blockchain). After some time a
block is stored the blockchain, the transactions of the block
are considered conļ¬rmed.
A block is valid if it contains valid transactions and if miners
have performed a computationally-hard puzzle, which consists
in ļ¬nding an hash of the block lower than a predeļ¬ned target.
The miner which adds the next block to the blockchain is the
ļ¬rst which has assembled a valid block and has found a valid
solution to the puzzle. This speciļ¬c mining technique is called
Proof-of-Work (PoW). The PoW allows to achieve distributed
consensus, which means that all nodes agree on the same
version of the blockchain and this blockchain contains valid
transactions. Forks could happen in this chain of blocks, that is,
there could be two contrasting branches of the chain. However,
thanks to PoW, eventually one of the branches should be
discarded and all nodes should agree on the same blockchain.
In case of forks, the rule is that miners extend the longest
branch or the one that has the most difļ¬cult PoW. Moreover,
thanks to PoW, the blockchain is hard to be tampered.
B. Goal and Research Questions
The goal of our research is to understand whether the
blockchain and, in general, P2P approaches can foster a
private-by-design IoT, where IoT devices data are not entrusted
to centralized companies, instead are property of the devices
owner, who can decide which data share and with whom. As
a ļ¬rst step of this research, we conducted a SLR to collect
use cases of the blockchain and to collect evidence from
the literature about the level of adaptability, integrity and
anonymity of the blockchain.
To achieve the goal of our SLR, we formulated the following
research questions (RQ):
RQ1) What are the use cases of the blockchain beyond
cryptocurrencies?
RQ2) Are there any use cases applicable to the IoT?
RQ3) What are the implementation differences with
respect to the Bitcoin blockchain?
RQ3.1) Which data are stored in the blockchain?
RQ3.2) Which mining techniques are used?
What is the degree of integrity (RQ4), anonymity (RQ5)
and adaptability (RQ6) of the blockchain?
RQ1 and RQ2 aim at discovering in the literature the uses of
the blockchain beyond Bitcoin and cryptocurrencies and which
of them are applicable to the IoT (according to the authors of
the papers).
By means of RQ3 we want to know the implementation
choices described in found papers which differs from the ones
of the Bitcoin blockchain: in fact, some of them could prove
to be useful when applying the blockchain in the IoT.
Regarding RQ4, we take as reference the deļ¬nition of in-
tegrity from the ISO 25010 [24], and we intend to characterize
the attacks to which the blockchain is vulnerable and which
could mine its integrity.
RQ5 concerns the need to further protect usersā privacy,
by avoiding that IoT devices can be linked to their owner.
Anonymity in blockchain systems is intended as pseudonymity
plus unlinkability, where the latter is the impossibility to link
an address of the blockchain system with a real identity or
an IP address, and also the impossibility to understand that
different addresses of the system belong to the same user. We
3. answer to this question by describing the techniques found in
the literature which undermines anonymity.
Finally, RQ6 aims at verifying whether the blockchain is
adaptable to the number of transactions. This is fundamental
if we want to employ the blockchain in the IoT, where the
number of transactions produced by IoT devices could be very
large. Also for this question we employ the generic deļ¬nition
of adaptability from [24], and we narrow it by intending the
adaptability of the blockchain as its ability to scale with the
number of transactions.
C. Search process
To conduct the study, we followed the guidelines on SLR
provided by Kitchenham [25]. We used the string blockchain
to search in the following digital libraries: IEEE Xplore; ACM
Digital Library; SpringerLink; ScienceDirect; Google Scholar.
We gathered 1511 papers. In order to decide which of them
deeply analyze, we performed two exclusion stages - one based
on titles and the other on abstracts - and we excluded papers
regarding non-engineering aspects (e.g., papers addressing
ethical issues of the blockchain or purely economic aspects of
cryptocurrencies). Finally, we left 35 papers, from which we
extracted the information necessary to answer our questions.
III. RESULTS
In this section we report the results extracted from the
analyzed papers, organized by research question. Discussion
on the results will follow in Section IV.
RQ1 and RQ2: Use cases and IoT. The results answering
RQ1 and RQ2 are shown in Table I. Speciļ¬cally, for each
paper we report: the category1
in which we classiļ¬ed the paper,
the reference to the paper in the bibliography, the usage of the
blockchain, and whether the authors of that paper believe that
it can be applied in the IoT.
RQ3: Implementation differences with Bitcoin. We report
the answer to RQ3 in two tables: Table II refers to RQ3.1,
while Table III to RQ3.2.
RQ4: Integrity. We report the attacks found in the papers
analyzed to which the blockchain is vulnerable.
In [28], it is shown that most of the peers known by a peer
of the Bitcoin network reside in its same autonomous system.
This means that the P2P network is not well connected and
there could be difļ¬culties in the relay of new blocks added
to the blockchain. This makes the achievement of distributed
consensus hard.
The authors of [29] shows that an attacker which controls
a large number of nodes, even if with not high computational
capabilities, could achieve an high fraction of the total com-
putational power in small blockchain systems where there are
few miners. This could threaten the integrity of the system,
because the attacker would be able to cause intentional forks.
In [30], it is introduced the selļ¬sh mining attack. In this
attack, a malicious mining pool decides not to publish the
blocks it ļ¬nds, thus creating a fork in the blockchain, where
1The following categories have been deļ¬ned: data storage management,
trades of goods and data, identity management, rating system, other
TABLE II: Data Inserted into the Blockchain (RQ3.1)
Paper Data in the blockchain
[5] Access policy and reference to data
[12] Key to access sensors data and multisigned transactions to exchange
bitcoins with commodities
[14] Revocation or veriļ¬cation address of PGP certiļ¬cates
[15] Triples (ID, PK, action), where action refers to registration, update or
veriļ¬cation of the public key PK
[11] Messages metadata of the decentralized application
[19] Speciļ¬cations useful for license validation
[13] Data purchased from sensors
[17] Reference to published content
[18] Rating information
[20] Hash of contents to be timestamped
[6] Spend conditions, ļ¬le contract, storage proofs and arbitrary data
[7] Payment contracts
[21] A lottery contract
[16] Information for registration, revocation and update of public keys
[8] Access policy, reference to data and other information to recover data
[9] Reference to data and other metadata
[10] Transactions to safely deposit bitcoins
TABLE III: Mining Techniques (RQ3.2)
Paper Mining technique
[5] New measure of trust to give more weight to trusted nodes in mining
[26] The miner producing the minimum block hash is selected for mining
[23] Proof of Stake Velocity
[27] Proof of Space
there are the public branch of the honest miners and the private
branch of the malicious pool. It keeps mining on its private
branch until the public one approaches the private one in
length. At this point, it publishes its own private branch, which
could become the longest one and could be accepted also by
honest miners. So, after some time, the public branch and
the data contained in it would be discarded. Denoting with Ī³
the ratio of honest miners which mine on the malicious pool
branch when made public, the authors show that according to
the values of Ī³ the malicious pool could get more advantages
with the selļ¬sh mining strategy than with honest mining.
Another attack, called history-revision attack, is pointed out
in [31]. The authors state that, in the case an attacker owns a
computational power multiple of the computational power of
honest nodes (e.g., two times higher), it is able to produce a
branch of the blockchain which could overtake the current one
in terms of difļ¬culty of the PoW, and so could be accepted
by other miners, thus changing the history of the blockchain.
In [32], the authors show that an attacker could delay
delivery of blocks or transactions to other nodes in the Bitcoin
P2P network. This could bring to: more advantages in selļ¬sh
mining, if the attacker is able to avoid delivering of blocks
from honest miners to a portion of the network; denial of
service, because, if the attacker controls several nodes, it can
prevent dissemination of information.
In [33], an expansion of selļ¬sh mining called stubborn
4. mining is described. Results show that in some situations it
could be more advantageous than selļ¬sh mining.
TABLE IV: De-Anonymization Techniques (RQ5)
De-anonymization technique Papers
Multiple inputs [34], [35], [36]
Change address [34], [35], [36]
Associations with IP [28], [37]
Usage of centralized services [36], [38]
RQ5: Anonymity. In Table IV we classiļ¬ed the papers
according to the de-anonymization techniques they mention.
We identiļ¬ed four categories of de-anonymization techniques:
multiple inputs, change address, associations with IP and usage
of centralized services.
When an user issues a transaction with multiple addresses
as inputs, she reveals to own all those addresses. For this
reason, in [34]ā[36] the authors can safely state that all the
input addresses of the same transaction belong to the user that
issued that multiple-inputs transaction.
In systems like Bitcoin, in some transactions users send
coins to a particular address that belongs to themselves, called
change address. In [34]ā[36], the authors are able to link this
change address to other addresses of the same user.
In [28] and [37], starting from some hypotheses and analyz-
ing network trafļ¬c, the authors are able to associate Bitcoin
addresses with IP addresses.
In [36] [38], usage of centralized services that keep track
of associations between more addresses of the same user or
real identity of the user and her address is considered a risk
for the anonymity of the user.
RQ6: Adaptability. We found only three papers reporting
information on adaptability, with a coarse detail level. In [13],
where the blockchain is used to purchase sensors data via
bitcoins, the authors state there are scalability issues due
to the exploding number of transactions and sensors data
permanently stored on every Bitcoin node. In [8], according
to the authors the blockchain cannot scale to deal with many
complex transactions. For this reason, they propose that com-
putations and data storage should not be done by each node
of the network, instead by a small subset of them working
on different parts of data. The authors of [31] point out that
scalability is a problem because every node of the blockchain
should verify each block and transaction issued.
IV. DISCUSSION
Use cases and IoT. As one may notice in Table I, cryp-
tocurrencies like Bitcoin are just one of the possible use cases
of the blockchain. In some cases, the blockchain is employed
for decentralizing services that so far have been provided
by centralized trusted entities (e.g., PKI or timestamping).
Moreover, we observed that only 4 of the 18 found use
cases are considered applicable to the context of the Internet
of Things. Two of them, [12], [13], use the blockchain for
trading data collected by sensors of IoT devices and other
goods. In the third [15] the IoT is mentioned as a possible
ļ¬eld in which each device is identiļ¬ed by a public key to
interact with other devices through the blockchain. Finally,
the mechanism described in the fourth [8] can be employed
to store and manage data collected by IoT devices, in a
decentralized and private-by-design fashion. This last use case
and all the others classiļ¬ed as āData storage managementā
(even if not explicitly thought for the IoT) are in line with
the goal of our research: encouraging a private-by-design IoT
where devices data are not entrusted to centralized companies.
Just to mention some use cases of this category, [9] and [6] are
both decentralized storage platforms, where the blockchain is
employed for implementing storage audits, useful for detecting
any non-authorized deletion or modiļ¬cation of data. These
audits are performed by storing the hash of the data in the
blockchain. Then the data owner periodically sends a challenge
to the host of the data and checks the correctness of the
response using the hash in the blockchain. Any non-authorized
deletion or modiļ¬cation of the data entails a wrong response,
so any abuse can be detected. In [5] the blockchain enforces
access policies that deļ¬ne which data of a user share and with
whom. It leverages public key cryptography: each entity is
represented by a public key and the policy speciļ¬es restricted
accesses for the public keys of the interested entities. Only the
data owner has full access to her data. Policies are stored in
the blockchain and the nodes of the blockchain verify whether
they are respected. From observing such applications of the
blockchain in the literature, we can conclude that:
It has been documented that the blockchain can be used for
detecting abuses on data and deļ¬ning access policies, without
the need of entrusting peopleās data to centralized companies.
Implementation differences. Regarding RQ3.1, we ob-
served that in some papers data are inserted in the Bitcoin
blockchain, employing the 80 bytes of Bitcoin transactions
reserved for arbitrary data; in other papers, a customized
blockchain is used to store the data. Regarding RQ3.2, the min-
ing techniques reported are all less computationally-expensive
alternatives to PoW: in [5] the PoW is facilitated to trusted
nodes; in [26] the selection of the miner which adds the
new block depends on luck and not on the computations
performed by the miner; in [23] no computations are required,
the miner is chosen according to the age of coin she owns;
in [27] the miner is chosen according to her amount of space,
and not her computational capabilities. In the IoT scenario,
it could be useful to take into consideration one of the
less computationally-expensive alternatives to PoW showed
in Table III. In fact, PoW requires very high computational
power, and so IoT devices with limited capabilities would
not be able to add blocks in the blockchain. However, before
designing a blockchain with an alternative mining technique
which allows all IoT devices to fairly participate in the system,
we should further analyze what are the security properties
provided by the PoW, which up to now is one of the key factors
allowing to achieve distributed consensus. We refer to the
following discussion on integrity for more on that. Therefore,
from our analysis we conclude that:
Arbitrary data can be inserted in the blockchain, so in
theory any applications (not only cryptocurrencies) can be
5. developed on top of it. Some less expensive alternatives to
PoW are documented in the literature.
Integrity. Several countermeasures have been proposed for
some of the attacks described in Section III. For example, for
selļ¬sh mining attacks, [30] and [39] propose modiļ¬cations
in the way miners decide which block to extend, in order to
decrease Ī³, i.e. the portion of honest miners which extend the
blockchain proposed by selļ¬sh miners.
However, what we evince from the results is that the greatest
risk for the blockchain integrity is represented by the presence
of misbehaving miners which own an high proportion of the
computational power of the system. They could cause forks
to the blockchain, bringing to a situation where distributed
consensus is difļ¬cult to achieve and some past data could be
lost. In addition, they could pollute the blockchain with invalid
data or transactions. Such risk is avoided in already large and
stable blockchains like the Bitcoin one, because obtaining an
high proportion of the computational power is hard thanks to
the difļ¬culty of the PoW and to the great number of miners,
which in addition are incentivized to act honestly. For this
reason, starting a completely new blockchain, which does not
have a critical mass in the initial phase, is risky. Even if
understanding in depth the security of the Bitcoin blockchain
is not trivial, because it depends also on socioeconomics factor,
in this moment Bitcoin is the most stable and secure block-
chain system. So, instead of designing a new blockchain from
scratch, our suggestion is to develop distributed applications
for the IoT on top of the Bitcoin or another secure and
stable blockchain. This can be done by leveraging a layered
architecture, like the one proposed in Blockstack [40]. In this
solution, the additional functionalities of the application are
deļ¬ned in another layer on top of the blockchain. Moreover,
the blockchain is hidden at the application level, so low-
performance IoT devices are not required to compute the PoW.
To conclude:
We believe that the most secure approach is to develop IoT
applications on top of an already existing stable blockchain,
where PoW and the great number of honest miners ensure
integrity, and avoid that misbehaving miners can obtain a
large portion of computational power.
Anonymity. From the results documented in papers of
Table IV, it is possible to de-anonymize a user by analyzing
network trafļ¬c or the blockchain itself, since it is public. So,
pseudonymity is not enough to guarantee total anonymity.
Countermeasures are proposed in [15], [31], [38], [41], [42]. In
[38], [41], [42], mixing protocols are analyzed. The main idea
behind mixing protocols is that a user sends some coins from
an address and receives them back to another address in a way
that it is difļ¬cult to discover the correspondence between input
and output addresses of the same user. Also the fair exchange
protocol described in [31] is based on the same principle of
mixing protocols and allows two parties to securely exchange
money. In the work regarding the blockchain used as PKI [15],
the authors describe a method for the user to update her public
key without linking it to her ID in the system. To conclude:
Pseudonimity is not enough to achieve total anonymity.
Solutions that reduce the possibility of linking IoT devices to
their owner should still be analyzed in future work.
Adaptability. As documented in Section III, the scalability
issue of the blockchain is reported in three papers. Actually,
there are two main scalability issues. The ļ¬rst is that, when
the number of transactions grows, the blockchain increases in
size, and it becomes expensive to store it, especially for IoT
devices with limited resources. This issue can be addressed
by the layered architecture described also for the integrity.
In this architecture, where the blockchain is separated from
the application layer, IoT devices with limited resources store
only the portion of the blockchain they need for their own
transactions (the so-called thin clients, already present also in
Bitcoin).
The second issue is the low throughput of transactions -
a typical issue of the Bitcoin blockchain, which we did not
ļ¬nd in the papers but is largely discussed within the Bitcoin
community. The low throughput is due to the difļ¬culty of
the PoW and to the maximum size of a block, which is set
to 1 MB. This issue represents a tradeoff between scalability
and security. In fact, regarding the PoW, if its difļ¬culty is
reduced, the throughput will be higher, but at the same time it
will be easier for an attacker to cause forks in the blockchain.
Regarding the block size, if its maximum is increased, the
throughput will increase too, but it will be more difļ¬cult to
validate transactions: this implies that only few nodes will be
able to do it, and so the power of Bitcoin will be concentrated
in few hands. Again, a solution could be a layered architecture,
where not all operations performed at the application layer
require a transaction in the underlying blockchain. However,
this may not be enough for the IoT, where the blockchain
should support billion of devices. For this reason, we retain
that, even if in this moment the Bitcoin blockchain is the most
secure, it could be prohibitive to leverage it in the IoT because
of its scalability issues. Instead, it could be more convenient to
employ another stable and secure blockchain which provides
higher level of scalability with respect to Bitcoin. To conclude:
The scalability issues of the Bitcoin blockchain make it
poorly suitable for the IoT, so we suggest to develop IoT
applications on top of another secure but scalable blockchain.
In future work, we will test different blockchains to ļ¬nd a
suitable one, in which the trade-off between scalability and
security is acceptable. Moreover, we suggest to adopt a layered
architecture which supports thin clients to allow IoT devices
with limited resources to store only a portion of the blockchain.
V. CONCLUSIONS AND FUTURE WORK
We conducted a Systematic Literature Review to investigate
which are the uses cases of the blockchain in the literature
and which factors affect integrity, anonymity and adaptability
of this technology. The ultimate goal of our research is to
leverage the blockchain and P2P approaches for a private-by-
design IoT where data produced by devices are not entrusted
to centralized companies.
We reported several uses of the blockchain. Even if few
of them are explicitly thought for the IoT, we found several
6. use cases for a private and decentralized data management,
which are in line with the goal of our research. Regarding the
integrity and the adaptability, we found that large blockchain
systems like Bitcoin are the most secure, but at the same time
Bitcoin scalability issues make it little suitable for the IoT.
Regarding the anonymity, we found that in the blockchain
only pseudonymity is guaranteed.
To address the integrity and the adaptability issues, our
future work will consist in testing existing secure and scalable
blockchains and in designing a layered architecture for IoT
applications on top of the most suitable of them. Moreover,
we will investigate mixing protocols and other solutions to
achieve anonymity and further protect peopleās privacy.
ACKNOWLEDGMENT
This work has been done with the Joint Open Lab SWARM
and it is supported by a fellowship from TIM. We also thank
Dr. Simone Basso for his valuable feedback.
REFERENCES
[1] International Telecommunication Union, āMeasuring the Information
Society Report,ā International Telecommunication Union (ITU), Report,
2015.
[2] āGartner Says 6.4 Billion Connected āThingsā Will
Be in Use in 2016, Up 30 Percent From 2015,ā
http://www.gartner.com/newsroom/id/3165317.
[3] āNSA Prism program taps in to user data of Apple, Google and others,ā
http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data.
[4] S. Nakamoto, āBitcoin: A peer-to-peer electronic cash system,ā 2009.
[Online]. Available: https://bitcoin.org/bitcoin.pdf
[5] G. Zyskind, O. Nathan, and A. Pentland, āDecentralizing Privacy: Using
Blockchain to Protect Personal Data,ā in IEEE Symposium on Security
and Privacy Workshops. IEEE Computer Society, 2015, pp. 180ā184.
[6] D. Vorick and L. Champine, āSia: Simple Decentralized Storage,ā
2014. [Online]. Available: https://sia.tech/assets/globals/sia.pdf
[7] C. Bocovich, J. A. Doucette, and I. Goldberg, āLavinia: An audit-
payment protocol for censorship-resistant storage.ā [Online]. Available:
http://cacr.uwaterloo.ca/techreports/2015/cacr2015-06.pdf
[8] G. Zyskind, O. Nathan, and A. Pentland, āEnigma: Decentralized
Computation Platform with Guaranteed Privacy,ā Jun. 2015. [Online].
Available: http://enigma.media.mit.edu/enigma full.pdf
[9] S. Wilkinson, āStorj A Peer-to-Peer Cloud Storage Network.ā [Online].
Available: https://storj.io/storj.pdf
[10] G. Ateniese, M. T. Goodrich, V. Lekakis, C. Papamanthou,
E. Paraskevas, and R. Tamassia, āAccountable Storage,ā IACR Cryp-
tology ePrint Archive, vol. 2014, p. 886, 2014.
[11] M. Bartoletti, D. Gessa, and A. S. Podda, āIdea: a general framework
for decentralized applications based on the Bitcoin blockchain.ā
[12] Y. Zhang and J. Wen, āAn IoT electric business model based on the
protocol of bitcoin,ā in ICIN. IEEE, 2015, pp. 184ā191.
[13] D. WĀØorner and T. von Bomhard, āWhen your sensor earns money:
exchanging data for cash with Bitcoin,ā in UbiComp Adjunct. ACM,
2014, pp. 295ā298.
[14] D. Wilson and G. Ateniese, āFrom Pretty Good To Great: Enhancing
PGP using Bitcoin and the Blockchain,ā CoRR, vol. abs/1508.04868,
2015.
[15] L. Axon, āPrivacy-awareness in Blockchain-based PKI,ā 2015. [Online].
Available: http://goo.gl/3Nv2oK
[16] C. Fromknecth, D. Velicanu, and S. Yakoubov, āCertCoin:
A NameCoin Based Decentralized Authentication System,ā
2014. [Online]. Available: https://courses.csail.mit.edu/6.857/2014/ļ¬les/
19-fromknecht-velicann-yakoubov-certcoin.pdf
[17] L. Matteis, āKudos: A Peer-to-Peer Discussion System Based on Social
Voting.ā [Online]. Available: http://lucaa.org/docs/kudos.pdf
[18] D. Vandervort, āChallenges and Opportunities Associated with a Bitcoin-
Based Transaction Rating System,ā in Financial Cryptography Work-
shops, ser. Lecture Notes in Computer Science, vol. 8438. Springer,
2014, pp. 33ā42.
[19] J. Herbert and A. Litchļ¬eld, āA Novel Method for Decentralised Peer-
to-Peer Software License Validation Using Cryptocurrency Blockchain
Technology,ā in ACSC, ser. CRPIT, vol. 159. Australian Computer
Society, 2015, pp. 27ā35.
[20] B. Gipp, N. Meuschke, and A. Gernandt, āDecentralized Trusted
Timestamping using the Crypto Currency Bitcoin,ā CoRR, vol.
abs/1502.04015, 2015.
[21] P. Bylica, L. Glen, P. Janiuk, A. Skrzypcaz, and A. Zawlocki,
āA Probabilistic Nanopayment Scheme for Golem,ā 2015. [Online].
Available: http://golemproject.net/doc/GolemNanopayments.pdf
[22] G. W. Peters and E. Panayi, āUnderstanding Modern Banking Ledgers
through Blockchain Technologies: Future of Transaction Processing and
Smart Contracts on the Internet of Money,ā CoRR, vol. abs/1511.05740,
2015.
[23] L. Ren, āProof of Stake Velocity: Building the Social Currency of
the Digital Age,ā 2014. [Online]. Available: https://www.reddcoin.com/
papers/PoSV.pdf
[24] ISO/IEC, āISO/IEC 25010 System and software quality models,ā Tech.
Rep., 2010.
[25] B. Kitchenham and S. Charters, āGuidelines for performing Systematic
Literature Reviews in Software Engineering,ā 2007.
[26] G. Paul, P. Sarkar, and S. Mukherjee, āTowards a More Democratic
Mining in Bitcoins,ā in ICISS, ser. Lecture Notes in Computer Science,
vol. 8880. Springer, 2014, pp. 185ā203.
[27] S. Park, K. Pietrzak, A. Kwon, J. Alwen, G. Fuchsbauer, and P. Gazi,
āSpacemint: A Cryptocurrency Based on Proofs of Space,ā IACR Cryp-
tology ePrint Archive, vol. 2015, p. 528, 2015.
[28] S. Feld, M. SchĀØonfeld, and M. Werner, āAnalyzing the Deployment of
Bitcoinās P2P Network under an AS-level Perspective,ā in ANT/SEIT,
ser. Procedia Computer Science, vol. 32. Elsevier, 2014, pp. 1121ā
1126.
[29] J. A. Dev, āBitcoin mining acceleration and performance quantiļ¬cation,ā
in CCECE. IEEE, 2014, pp. 1ā6.
[30] I. Eyal and E. G. Sirer, āMajority is not Enough: Bitcoin Mining is
Vulnerable,ā CoRR, vol. abs/1311.0243, 2013.
[31] S. Barber, X. Boyen, E. Shi, and E. Uzun, āBitter to Better - How
to Make Bitcoin a Better Currency,ā in Financial Cryptography, ser.
Lecture Notes in Computer Science, vol. 7397. Springer, 2012, pp.
399ā414.
[32] A. Gervais, H. Ritzdorf, G. O. Karame, and S. Capkun, āTampering with
the Delivery of Blocks and Transactions in Bitcoin,ā in ACM Conference
on Computer and Communications Security. ACM, 2015, pp. 692ā705.
[33] K. Nayak, S. Kumar, A. Miller, and E. Shi, āStubborn Mining: Gener-
alizing Selļ¬sh Mining and Combining with an Eclipse Attack,ā IACR
Cryptology ePrint Archive, vol. 2015, p. 796, 2015.
[34] M. Spagnuolo, F. Maggi, and S. Zanero, āBitIodine: Extracting Intel-
ligence from the Bitcoin Network,ā in Financial Cryptography, ser.
Lecture Notes in Computer Science, vol. 8437. Springer, 2014, pp.
457ā468.
[35] J. Herrera-JoancomartĀ“ı, āResearch and Challenges on Bitcoin Anony-
mity,ā in DPM/SETOP/QASA, ser. Lecture Notes in Computer Science,
vol. 8872. Springer, 2014, pp. 3ā16.
[36] M. Moser, R. Bohme, and D. Breuker, āAn Inquiry into Money
Laundering Tools in the Bitcoin Ecosystem.ā [Online]. Available:
https://maltemoeser.de/paper/money-laundering.pdf
[37] P. Koshy, D. Koshy, and P. McDaniel, āAn Analysis of Anonymity in
Bitcoin Using P2P Network Trafļ¬c,ā in Financial Cryptography, ser.
Lecture Notes in Computer Science, vol. 8437. Springer, 2014, pp.
469ā485.
[38] L. Valenta and B. Rowan, āBlindcoin: Blinded, Accountable Mixes for
Bitcoin,ā in Financial Cryptography Workshops, ser. Lecture Notes in
Computer Science, vol. 8976. Springer, 2015, pp. 112ā126.
[39] E. Heilman, āOne Weird Trick to Stop Selļ¬sh Miners: Fresh Bitcoins,
A Solution for the Honest Miner,ā IACR Cryptology ePrint Archive, vol.
2014, p. 7, 2014.
[40] M. Ali, J. Nelson, R. Shea, and M. J. Freedman, āBlockstack: Design
and Implementation of a Global Naming System with Blockchains,ā
2016. [Online]. Available: https://www.cs.princeton.edu/ā¼mfreed/docs/
blockstack-atc16.pdf
[41] G. D. Bissias, A. P. Ozisik, B. N. Levine, and M. Liberatore, āSybil-
Resistant Mixing for Bitcoin,ā in WPES. ACM, 2014, pp. 149ā158.
[42] S. Meiklejohn and C. Orlandi, āPrivacy-Enhancing Overlays in Bitcoin,ā
in Financial Cryptography Workshops, ser. Lecture Notes in Computer
Science, vol. 8976. Springer, 2015, pp. 127ā141.