版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:HSE Univ Dept Cyber Phys Syst Informat Secur Moscow 123458 Russia Tomsk State Univ Control Syst & Radioelect Dept Complex Informat Secur Comp Syst Tomsk 634050 Russia Tampere Univ Unit Elect Engn Tampere 33720 Finland
出 版 物:《IEEE ACCESS》 (IEEE Access)
年 卷 期:2021年第9卷
页 面:80559-80570页
核心收录:
主 题:Blockchain Consensus algorithm Peer-to-peer computing Internet of Things Authentication Fault tolerant systems Fault tolerance Blockchain consensus algorithm constrained devices Internet of Things practical Byzantine fault tolerance
摘 要:Cyber-physical systems and the Internet of things (IoT) are becoming an integral part of the digital society. The use of IoT services improves human life in many ways. Protection against cyber threats is an utmost important prospect of IoT devices operation. Malicious activities lead to confidential data leakage and incorrect performance of devices becomes critical. Therefore, development of effective solutions that can protect both IoT devices data and data exchange networks turns in to a real challenge. This study provides a critical analysis of the feasibility of using blockchain technology to protect constrained IoT devices data, justifies the choice of Practical Byzantine Fault Tolerance (PBFT) consensus algorithm for implementation on such devices, and simulates the main distributed ledger scenarios using PBFT. In this paper we investigate typical IoT network scenarios that can disrupt system performance. To ensure the adequacy of the models under study, we have analyzed the characteristics of real constrained IoT devices in terms of computing power and data rate. The simulation results demonstrate efficiency of the blockchain technology for constrained devices and make it possible to evaluate applicability limits of the chosen consensus algorithm.