Unknown

Dataset Information

0

Reliable Task Management Based on a Smart Contract for Runtime Verification of Sensing and Actuating Tasks in IoT Environments.


ABSTRACT: With the gradual popularization of Internet-of-Things (IoT) applications and the development of wireless networking technologies, the use of heterogeneous devices and runtime verification of task fulfillment with different constraints are required in real-world IoT scenarios. As far as IoT systems are concerned, most of them are built on centralized architectures, which reveal various assailable points in data security and privacy threats. Hence, this paper aims to investigate these issues by delegating the responsibility of a verification monitor from a centralized architecture to a decentralized manner using blockchain technology. We present a smart contract-based task management scheme to provide runtime verification of device behaviors and allows trustworthy access control to these devices. The business logic of the proposed system is specified by the smart contract, which automates all time-consuming processes cryptographically and correctly. The usability of the proposed solution is further demonstrated by implementing a prototype application in which the Hyperledger Fabric is utilized to implement the business logic for runtime verification and access control with one desktop and one Raspberry Pi. A comprehensive evaluation experiment is conducted, and the results indicate the effectiveness and efficiency of the proposed system.

SUBMITTER: Hang L 

PROVIDER: S-EPMC7070672 | biostudies-literature | 2020 Feb

REPOSITORIES: biostudies-literature

altmetric image

Publications

Reliable Task Management Based on a Smart Contract for Runtime Verification of Sensing and Actuating Tasks in IoT Environments.

Hang Lei L   Kim Do-Hyeun DH  

Sensors (Basel, Switzerland) 20200222 4


With the gradual popularization of Internet-of-Things (IoT) applications and the development of wireless networking technologies, the use of heterogeneous devices and runtime verification of task fulfillment with different constraints are required in real-world IoT scenarios. As far as IoT systems are concerned, most of them are built on centralized architectures, which reveal various assailable points in data security and privacy threats. Hence, this paper aims to investigate these issues by de  ...[more]

Similar Datasets

| S-EPMC8022535 | biostudies-literature
| S-EPMC6848508 | biostudies-literature
| S-EPMC8271664 | biostudies-literature
| S-EPMC7153130 | biostudies-literature
| S-EPMC7218862 | biostudies-literature
| S-EPMC7436012 | biostudies-literature
| S-EPMC7924455 | biostudies-literature
| S-EPMC7309034 | biostudies-literature
| S-EPMC7038353 | biostudies-literature
| S-EPMC7924448 | biostudies-literature