|
|
SMER: a secure method of exchanging resources in heterogeneous internet of things |
Yu ZHANG1, Yuxing HAN2( ), Jiangtao WEN1( ) |
1. Computer Science and Technology Department, Tsinghua University, Beijing 100084, China 2. Engineering College, South China Agricultural University, Guangzhou 510642, China |
|
|
Abstract The number of IoT (internet of things) connected devices increases rapidly. These devices have different operation systems and therefore cannot communicate with each other. As a result, the data they collected is limited within their own platform. Besides, IoT devices have very constrained resources like weak MCU (micro control unit) and limited storage. Therefore, they need direct communication method to cooperate with each other, or with the help of nearby devices with rich resources. In this paper, we propose a secure method to exchange resources (SMER) between heterogeneous IoT devices. In order to exchange resources among devices, SMER adopts a compensable mechanism for resource exchange and a series of security mechanisms to ensure the security of resource exchanges. Besides, SMER uses a smart contract based scheme to supervise resource exchange, which guarantees the safety and benefits of IoT devices. We also introduce a prototype system and make a comprehensive discussion.
|
Keywords
internet of things
P2P resource exchange
blockchain
smart contract
|
Corresponding Author(s):
Yuxing HAN,Jiangtao WEN
|
Just Accepted Date: 25 September 2017
Online First Date: 06 August 2018
Issue Date: 19 July 2019
|
|
1 |
D Wörner, V T Bomhard. When your sensor earns money: exchanging data for cash with bitcoin. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. 2014, 295–298
https://doi.org/10.1145/2638728.2638786
|
2 |
M Shiraz, A Gani, R H Khokhar, R Buyya. A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing. IEEE Communications Surveys & Tutorials, 2013, 15(3): 1294–1313
https://doi.org/10.1109/SURV.2012.111412.00045
|
3 |
X Ma, Y Cui, L Wang, I Stojmenovic. Energy optimizations for mobile terminals via computation offloading. In: Proceedings of the 2nd IEEE International Conference on Parallel Distributed and Grid Computing. 2012, 236–241
https://doi.org/10.1109/PDGC.2012.6449824
|
4 |
E Cuervo, A Balasubramanian, D K Cho, A Wolman, S Saroiu, R Chandra, P Bahl. Maui: making smartphones last longer with code offload. In: Proceedings of the 8th International Conference on Mobile systems, Applications, and Services. 2010, 49–62
https://doi.org/10.1145/1814433.1814441
|
5 |
B G Chun, S Ihm, P Maniatis, M Naik, A Patti. Clonecloud: elastic execution between mobile device and cloud. In: Proceedings of the 6th Conference on Computer Systems. 2011, 301–314
https://doi.org/10.1145/1966445.1966473
|
6 |
R Hasan, M M Hossain, R Khan. Aura: an IoT based cloud infrastructure for localized mobile computation outsourcing. In: Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). 2015, 183–188
https://doi.org/10.1109/MobileCloud.2015.37
|
7 |
S Al Noor, R Hasan, M M Haque. Cellcloud: a novel cost effective formation of mobile cloud based on bidding incentives. In: Proceedings of the 7th IEEE International Conference on Cloud Computing. 2014, 200–207
https://doi.org/10.1109/CLOUD.2014.36
|
8 |
E C Ferrer. The blockchain: a new framework for robotic swarm systems. In: Proceedings of the Future Technologies Conference. 2018, 1037–1058
|
9 |
J J Sikorski, J Haughton, M Kraft. Blockchain technology in the chemical industry: machine-to-machine electricity market. Applied Energy, 2017, 195: 234–246
https://doi.org/10.1016/j.apenergy.2017.03.039
|
10 |
K Christidis, M Devetsikiotis. Blockchains and smart contracts for the internet of things. IEEE Access, 2016, 4: 2292–2303
https://doi.org/10.1109/ACCESS.2016.2566339
|
11 |
D G Lowe. Object recognition from local scale-invariant features. In: Proceedings of the 7th IEEE International Conference on Computer Vision. 1999, 1150–1157
https://doi.org/10.1109/ICCV.1999.790410
|
12 |
M Muja, D G Lowe. Fast approximate nearest neighbors with automatic algorithm configuration. In: Proceedings of UISAPP International Conference on Computer Vision Theory and Application. 2009, 331–340
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|