Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor最新文献

筛选
英文 中文
An experimental framework for investigating hashgraph algorithm transaction speed 研究哈希图算法事务处理速度的实验框架
Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor Pub Date : 2019-11-10 DOI: 10.1145/3362744.3363342
J. James, Daniel Hawthorne-Madell, K. Duncan, A. S. Leger, Joseph Sagisi, Michael Collins
{"title":"An experimental framework for investigating hashgraph algorithm transaction speed","authors":"J. James, Daniel Hawthorne-Madell, K. Duncan, A. S. Leger, Joseph Sagisi, Michael Collins","doi":"10.1145/3362744.3363342","DOIUrl":"https://doi.org/10.1145/3362744.3363342","url":null,"abstract":"Power grids around the world have experienced a growing number of malicious cyber attacks. This paper provides an overview of recent use of the Hyperledger Fabric distributed operating system to prototype use of a permissioned blockchain consensus algorithm to trust shared state estimation and control data and another effort to alter local sensor data to destroy the integrity of the shared data. The paper also provides justification for an experiment to prototype use of Babble, a peer-to-peer network plugin using the hashgraph consensus algorithm, to share the state estimation and control data through transactions recorded in a hashgraph. A key claim of the hashgraph documentation, which is unsubstantiated without a proper academic analysis, is that the algorithm is asynchronous Byzantine fault tolerance (ABFT). Also, while the Hyperledger Fabric implementation supports thousands of transactions per second, the hashgraph algorithm documentation claims orders of magnitude more. Our experiment seeks to measure the hashgraph transaction speed and determine its suitability for improving the resilience of wide area control of the smart grid. The previous resilience research of the Anomaly Detection of Cyber Physical Systems (ADCPS) team includes research into inadvertent cyber and physical failures as well as malicious attacks. We conclude with some speculations concerning the potential impact of fast, fair, and secure sharing of data across a network of blockchains potentially interfaced using hashgraph distributed ledger technology (DLT).","PeriodicalId":193703,"journal":{"name":"Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128487660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EngraveChain
Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor Pub Date : 2019-11-10 DOI: 10.1145/3362744.3363346
L. Shekhtman, Erez Waisbard
{"title":"EngraveChain","authors":"L. Shekhtman, Erez Waisbard","doi":"10.1145/3362744.3363346","DOIUrl":"https://doi.org/10.1145/3362744.3363346","url":null,"abstract":"A reliable log system is a prerequisite for security applications. One of the first actions a hacker takes upon penetrating a system is altering the log files. Maintaining redundant copies in a distributed manner in a Byzantine setting has always been a challenging task, however it has recently become simpler given recent advances in blockchain technologies. In this work, we present a tamper-resistant log system through the use of a blockchain. We leverage the immutable write action and distributed storage provided by the blockchain and add an additional encryption layer to develop a secure log system. We assess the security and privacy aspects of our solution. Finally, we implement our system over Hyperledger Fabric and demonstrate the system's value for several use cases.","PeriodicalId":193703,"journal":{"name":"Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor","volume":"21 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116234597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Node Criticality Assessment in a Blockchain Network 区块链网络中的节点临界性评估
Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor Pub Date : 2019-11-10 DOI: 10.1145/3362744.3363343
Aditya Shyam Bazari, Akash Aggarwal, Waqar Asif, M. Lestas, M. Rajarajan
{"title":"Node Criticality Assessment in a Blockchain Network","authors":"Aditya Shyam Bazari, Akash Aggarwal, Waqar Asif, M. Lestas, M. Rajarajan","doi":"10.1145/3362744.3363343","DOIUrl":"https://doi.org/10.1145/3362744.3363343","url":null,"abstract":"Blockchain systems are being rapidly integrated in various technologies, with limited work on the effect of the underlying network topology on the blockchain performance. In this work, we investigate the significance of each network node on the overall blockchain performance. This is assessed by selecting critical nodes according to different criticality metrics, and investigating, using simulations, the degradation in performance incurred upon removing these nodes. The most critical nodes are the ones that incur the greatest degradation in performance. The considered performance metrics are the blockchain size and the packet drop rate. Criticality metrics such as Betweennes Centrality, Closeness Centrality and Degree Centrality are compared. It is found that the Sign Change Spectral Partitioning approach, enhanced with Blockchain Specific traffic flow information, is able to identify critical nodes better in the sense that higher degradation in performance is reported upon their removal.","PeriodicalId":193703,"journal":{"name":"Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122615029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Conceptualizing Blockchain based Energy Market for Self Sustainable Community 基于区块链的自我可持续社区能源市场概念
Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor Pub Date : 2019-11-10 DOI: 10.1145/3362744.3363345
A. NidhinMahesh, N. Shibu, S. Balamurugan
{"title":"Conceptualizing Blockchain based Energy Market for Self Sustainable Community","authors":"A. NidhinMahesh, N. Shibu, S. Balamurugan","doi":"10.1145/3362744.3363345","DOIUrl":"https://doi.org/10.1145/3362744.3363345","url":null,"abstract":"With a spectacular boom in blockchain technologies at various verticals and with the increase in renewable energy penetration, these could solve one of the major issues in Power Systems - Energy Demand Management by the utilities. Blockchain being a distributed architecture, it could fit into the deregulated energy market to enable energy trading in a self sustainable energy community and manage the power demands among the community members. As proof of concept, the blockchain technology is introduced in a smart community where consumers take part in energy trading among themselves as well as with the utility. In this paper, three use cases for P2P energy trading in a private blockchain network is discussed. The blockchain architecture is developed using the Hyperledger framework and the smart contracts are defined in the chaincode. The performance of the blockchain network on resource constrained IoT system based on Raspberry Pi is also evaluated.","PeriodicalId":193703,"journal":{"name":"Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134089817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Secure and Effective Implementation of an IOTA Light Node using STM32 使用STM32安全有效地实现IOTA轻节点
Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor Pub Date : 2019-11-10 DOI: 10.1145/3362744.3363344
Diego Stucchi, Ruggero Susella, P. Fragneto, B. Rossi
{"title":"Secure and Effective Implementation of an IOTA Light Node using STM32","authors":"Diego Stucchi, Ruggero Susella, P. Fragneto, B. Rossi","doi":"10.1145/3362744.3363344","DOIUrl":"https://doi.org/10.1145/3362744.3363344","url":null,"abstract":"A major challenge in networked sensor systems and other IoT environments is addressing security. Vulnerabilities in those systems arise from poor physical security, unauthenticated devices, insecure firmware updates, insecure communication, and data corruption. In recent times Distributed Ledger Technologies (DLTs), of which Blockchain is an instance, have been identified as a possible solution to some of these issues. The blokchain model genetically ensures decentralized security and privacy, and therefore could provide IoT systems with a trusted infrastructure for securely logging data or exchanging tokens without the necessity, and costs, of central servers. Blockchain is no panacea, either. IoT devices that get connected to a blockchain network must still be secured, in particular they must protect the confidentiality of the keys. This requires the embedded microcontroller to execute only authenticated firmware, with protections against software attacks, such as buffer overflows, and resistance against side-channel attacks. In addition, as confirmed from the scarcity of implementations reported in the literature, it is still not clear whether blockchain protocols can be implemented efficiently on resource-constrained IoT devices. In this work, also supported by a Demo, we show an example of secure IoT device that enables the functionalities of IOTA, a DLT specifically designed for the use in the IoT. In particular, we present a Light Node based on STM32 that implements all the cryptographic functions, IOTA specific operations and communication functions required to successfully publish transactions in the IOTA distributed ledger. Our implementations on microcontrollers (ARM Cortex-M) performs up to 22 times faster in terms of cycles and up to 4 times faster in absolute time with respect to the state-of-the-art implementation on a Raspberry PI 3B. Our Light Node also ensures protection of the stored private data and guarantees secure firmware update thanks to a suitable configuration of some security features provided by STM32 microcontrollers.","PeriodicalId":193703,"journal":{"name":"Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129322957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor 第二届区块链网络传感器研讨会论文集
{"title":"Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor","authors":"","doi":"10.1145/3362744","DOIUrl":"https://doi.org/10.1145/3362744","url":null,"abstract":"","PeriodicalId":193703,"journal":{"name":"Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132004445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信