{"title":"A Fundamental Analysis of Caching Data Protection Scheme using Light-weight Blockchain and Hashchain for Information-centric WSNs","authors":"Shintaro Mori","doi":"10.1109/BRAINS49436.2020.9223279","DOIUrl":null,"url":null,"abstract":"This paper explains a novel caching data protection scheme that uses lightweight blockchain and hashchain for information-centric wireless sensor networks. The proposed verification procedure in a Blockchain is conducted based on the proof-of-consensus validation mechanism without using exhaustive mining computations; therefore, our scheme is suitable for resource-shortage wireless and mobile devices. Hashchains are utilized for traceability and signatures that ensure a block’s validity. We make a primitive evaluation of the scheme using computer simulations in familiar low-power wide-area wireless environments.","PeriodicalId":315392,"journal":{"name":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BRAINS49436.2020.9223279","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper explains a novel caching data protection scheme that uses lightweight blockchain and hashchain for information-centric wireless sensor networks. The proposed verification procedure in a Blockchain is conducted based on the proof-of-consensus validation mechanism without using exhaustive mining computations; therefore, our scheme is suitable for resource-shortage wireless and mobile devices. Hashchains are utilized for traceability and signatures that ensure a block’s validity. We make a primitive evaluation of the scheme using computer simulations in familiar low-power wide-area wireless environments.