Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2019, Vol. 13 Issue (6) : 1198-1209    https://doi.org/10.1007/s11704-018-6524-3
RESEARCH ARTICLE
SMER: a secure method of exchanging resources in heterogeneous internet of things
Yu ZHANG1, Yuxing HAN2(), Jiangtao WEN1()
1. Computer Science and Technology Department, Tsinghua University, Beijing 100084, China
2. Engineering College, South China Agricultural University, Guangzhou 510642, China
 Download: PDF(720 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

The number of IoT (internet of things) connected devices increases rapidly. These devices have different operation systems and therefore cannot communicate with each other. As a result, the data they collected is limited within their own platform. Besides, IoT devices have very constrained resources like weak MCU (micro control unit) and limited storage. Therefore, they need direct communication method to cooperate with each other, or with the help of nearby devices with rich resources. In this paper, we propose a secure method to exchange resources (SMER) between heterogeneous IoT devices. In order to exchange resources among devices, SMER adopts a compensable mechanism for resource exchange and a series of security mechanisms to ensure the security of resource exchanges. Besides, SMER uses a smart contract based scheme to supervise resource exchange, which guarantees the safety and benefits of IoT devices. We also introduce a prototype system and make a comprehensive discussion.

Keywords internet of things      P2P resource exchange      blockchain      smart contract     
Corresponding Author(s): Yuxing HAN,Jiangtao WEN   
Just Accepted Date: 25 September 2017   Online First Date: 06 August 2018    Issue Date: 19 July 2019
 Cite this article:   
Yu ZHANG,Yuxing HAN,Jiangtao WEN. SMER: a secure method of exchanging resources in heterogeneous internet of things[J]. Front. Comput. Sci., 2019, 13(6): 1198-1209.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-018-6524-3
https://academic.hep.com.cn/fcs/EN/Y2019/V13/I6/1198
1 D Wörner, V T Bomhard. When your sensor earns money: exchanging data for cash with bitcoin. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. 2014, 295–298
https://doi.org/10.1145/2638728.2638786
2 M Shiraz, A Gani, R H Khokhar, R Buyya. A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing. IEEE Communications Surveys & Tutorials, 2013, 15(3): 1294–1313
https://doi.org/10.1109/SURV.2012.111412.00045
3 X Ma, Y Cui, L Wang, I Stojmenovic. Energy optimizations for mobile terminals via computation offloading. In: Proceedings of the 2nd IEEE International Conference on Parallel Distributed and Grid Computing. 2012, 236–241
https://doi.org/10.1109/PDGC.2012.6449824
4 E Cuervo, A Balasubramanian, D K Cho, A Wolman, S Saroiu, R Chandra, P Bahl. Maui: making smartphones last longer with code offload. In: Proceedings of the 8th International Conference on Mobile systems, Applications, and Services. 2010, 49–62
https://doi.org/10.1145/1814433.1814441
5 B G Chun, S Ihm, P Maniatis, M Naik, A Patti. Clonecloud: elastic execution between mobile device and cloud. In: Proceedings of the 6th Conference on Computer Systems. 2011, 301–314
https://doi.org/10.1145/1966445.1966473
6 R Hasan, M M Hossain, R Khan. Aura: an IoT based cloud infrastructure for localized mobile computation outsourcing. In: Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). 2015, 183–188
https://doi.org/10.1109/MobileCloud.2015.37
7 S Al Noor, R Hasan, M M Haque. Cellcloud: a novel cost effective formation of mobile cloud based on bidding incentives. In: Proceedings of the 7th IEEE International Conference on Cloud Computing. 2014, 200–207
https://doi.org/10.1109/CLOUD.2014.36
8 E C Ferrer. The blockchain: a new framework for robotic swarm systems. In: Proceedings of the Future Technologies Conference. 2018, 1037–1058
9 J J Sikorski, J Haughton, M Kraft. Blockchain technology in the chemical industry: machine-to-machine electricity market. Applied Energy, 2017, 195: 234–246
https://doi.org/10.1016/j.apenergy.2017.03.039
10 K Christidis, M Devetsikiotis. Blockchains and smart contracts for the internet of things. IEEE Access, 2016, 4: 2292–2303
https://doi.org/10.1109/ACCESS.2016.2566339
11 D G Lowe. Object recognition from local scale-invariant features. In: Proceedings of the 7th IEEE International Conference on Computer Vision. 1999, 1150–1157
https://doi.org/10.1109/ICCV.1999.790410
12 M Muja, D G Lowe. Fast approximate nearest neighbors with automatic algorithm configuration. In: Proceedings of UISAPP International Conference on Computer Vision Theory and Application. 2009, 331–340
[1] Edje E. ABEL, Muhammad Shafie Abd LATIFF. The utilization of algorithms for cloud internet of things application domains: a review[J]. Front. Comput. Sci., 2021, 15(3): 153502-.
[2] Zeli WANG, Hai JIN, Weiqi DAI, Kim-Kwang Raymond CHOO, Deqing ZOU. Ethereum smart contract security research: survey and future research opportunities[J]. Front. Comput. Sci., 2021, 15(2): 152802-.
[3] Hao LIN, Guannan LIU, Fengzhi LI, Yuan ZUO. Where to go? Predicting next location in IoT environment[J]. Front. Comput. Sci., 2021, 15(1): 151306-.
[4] Yan ZHU, Khaled RIAD, Ruiqi GUO, Guohua GAN, Rongquan FENG. New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain[J]. Front. Comput. Sci., 2019, 13(6): 1182-1197.
[5] Lian YU, Wei-Tek TSAI. State synchronization in process-oriented chaincode[J]. Front. Comput. Sci., 2019, 13(6): 1166-1181.
[6] Libo FENG, Hui ZHANG, Wei-Tek TSAI, Simeng SUN. System architecture for high-performance permissioned blockchains[J]. Front. Comput. Sci., 2019, 13(6): 1151-1165.
[7] Xuan LI, Jin LI, Siuming YIU, Chongzhi GAO, Jinbo XIONG. Privacy-preserving edge-assisted image retrieval and classification in IoT[J]. Front. Comput. Sci., 2019, 13(5): 1136-1147.
[8] Chunjie ZHOU, Xiaoling WANG, Zhiwang ZHANG, Zhenxing ZHANG, Haiping QU. The time model for event processing in internet of things[J]. Front. Comput. Sci., 2019, 13(3): 471-488.
[9] Zheng HE, Kunpeng BAI, Dongdai LIN, Chuankun WU. Unification of identifiers in the Sea-Cloud system[J]. Front. Comput. Sci., 2018, 12(4): 749-762.
[10] Wei FAN, Zhengyong CHEN, Zhang XIONG, Hui CHEN. The Internet of data: a new idea to extend the IOT in the digital world[J]. Front Comput Sci, 2012, 6(6): 660-667.
[11] Lei CHEN, Mitchell TSENG, Xiang LIAN, . Development of foundation models for Internet of Things[J]. Front. Comput. Sci., 2010, 4(3): 376-385.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed