مشخصات مقاله | |
ترجمه عنوان مقاله | پارادایم بلاک چین دو جهته سبک و مقاوم به حمله برای اینترنت اشیا |
عنوان انگلیسی مقاله | A Lightweight and Attack-Proof Bidirectional Blockchain Paradigm for Internet of Things |
انتشار | مقاله سال 2022 |
تعداد صفحات مقاله انگلیسی | 14 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه IEEE |
نوع نگارش مقاله |
مقاله پژوهشی (Research article) |
مقاله بیس | این مقاله بیس میباشد |
نمایه (index) | JCR – Master Journal List – Scopus |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
10.976 در سال 2020 |
شاخص H_index | 119 در سال 2022 |
شاخص SJR | 3.848 در سال 2020 |
شناسه ISSN | 2327-4662 |
شاخص Quartile (چارک) | Q1 در سال 2020 |
فرضیه | ندارد |
مدل مفهومی | دارد |
پرسشنامه | ندارد |
متغیر | دارد |
رفرنس | دارد |
رشته های مرتبط | مهندسی کامپیوتر – مهندسی فناوری اطلاعات |
گرایش های مرتبط | مهندسی نرم افزار – اینترنت و شبکه های گسترده |
نوع ارائه مقاله |
ژورنال |
مجله / کنفرانس | مجله اینترنت اشیا آی تریپل ای – IEEE Internet of Things Journal |
دانشگاه | School of Information Technology, Deakin University, Australia |
کلمات کلیدی | بلاک چین دو طرفه – حمله دوطرفه – حمله eclipse – اینترنت اشیا (IoT) – حمله دوربرد – مقیاس پذیری |
کلمات کلیدی انگلیسی | Bidirectional blockchain – double-spend attack – eclipse attack – Internet of Things (IoT) – long-range attack – scalability |
شناسه دیجیتال – doi |
https://doi.org/10.1109/JIOT.2021.3103275 |
کد محصول | e16606 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract Introduction Related Works System Model Security Analysis Performance Evaluation Summary and Future Works References |
بخشی از متن مقاله: |
Abstract Diverse technologies, such as machine learning and big data, have been driving the prosperity of the Internet of Things (IoT) and the ubiquitous proliferation of IoT devices. Consequently, it is natural that IoT becomes the driving force to meet the increasing demand for frictionless transactions. To secure transactions in IoT, blockchain is widely deployed since it can remove the necessity of a trusted central authority. However, the mainstream blockchain-based IoT payment platforms, dominated by Proof-of-Work (PoW) and Proof-of-Stake (PoS) consensus algorithms, face several major security and scalability challenges that result in system failures and financial loss. Among the three leading attacks in this scenario, double-spend attacks and long-range attacks threaten the tokens of blockchain users, while eclipse attacks target Denial of Service. To defeat these attacks, a novel bidirectional-linked blockchain (BLB) using chameleon hash functions is proposed, where bidirectional pointers are constructed between blocks. Furthermore, a new committee members auction (CMA) consensus algorithm is designed to improve the security and attack resistance of BLB while guaranteeing high scalability. In CMA, distributed blockchain nodes elect committee members through a verifiable random function. The smart contract uses Shamir’s secret-sharing scheme to distribute the trapdoor keys to committee members. To better investigate BLB’s resistance against double-spend attacks, an improved Nakamoto’s attack analysis is presented. In addition, a modified entropy metric is devised to measure eclipse attack resistance across different consensus algorithms. Extensive evaluation results show the superior resistance against attacks and demonstrate high scalability of BLB compared with current leading paradigms based on PoS and PoW. Introduction I NTERNET of Things (IoT) is experiencing a fast booming in recent years, along with which IoT devices are already ubiquitous, such as mobile devices, car terminals, wearable devices, etc. Not surprisingly, the proliferation of IoT devices meets the increasing demands of contactless payment via IoT devices, which attracts growing attention from both academia and industry [1], [2]. For example, Samsung has launched its IoT payment platform on smart and wearable devices, TVs, fridges, and even more. At the same time, automobile giants such as SAIC Motor have embedded their cars with a comprehensive mobile payment system. On account of the popularization of IoT devices, machine-to-machine (M2M) payment as a paradigm is playing an ever-growing important role in the IoT [3]. In M2M payments, centralized transaction management central has relatively poor performances due to the distributed nature of the IoT. Collecting all the transaction information to a central server causes incredibly massive communication overhead, which leads to delayed transactions and low efficient operation. Moreover, the centralized operation mode is vulnerable to single-point failure, while various man-in-themiddle attacks are unceasingly launched due to the financial value of transaction information. Thus, a decentralized and autonomous payment architecture better meets the needs of the IoT. Blockchain, as an emerging distributed ledger technology (DLT), is decentralized and allows for secure, anonymous, and immutable transactions [4]–[7]. Therefore, it is seen as one of the most promising solutions for M2M IoT payments. Security Analysis Since the security of the Chameleon hash scheme has been proved, including collision-resistant, message hiding, semantic security, and key-exposure-free [17], the security of the Chameleon hash can be guaranteed. While for the distribution of the trapdoor key, the correctness and security of the secretsharing scheme have also been proved based on Lagrange’s interpolation theorem [18]. Therefore, for the rest of this section, the security of the proposed model is analyzed from two aspects: 1) double-spend attack/long-range attack resistance and 2) eclipse attack resistance. Both double-spend attacks and long-range attacks are caused by uncertainty about newly added blocks and the subsequent blocks. However, with the novel reverse pointer design, the subsequent direction of any block can be determined, i.e., starting from the genesis block, the entire chain is undisputed. Long-range attacks are completely ineffective against the proposed model. The only possible stage of the proposed model getting attacked by double spending is when generating the reverse pointers. |