4.3 Article

The Convergence of IoE and Blockchain: Security Challenges

Journal

IT PROFESSIONAL
Volume 21, Issue 5, Pages 26-32

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/MITP.2019.2923602

Keywords

-

Funding

  1. National Natural Science Foundation [61873166, 61673275, 61473184]

Ask authors/readers for more resources

To build a large-scale distributed Internet of Things (IoT), a feasible prototype for Internet of Everything, blockchain can provide strong support with its excellent characteristics such as traceability and openness. Despite that the blockchain technology ideally enhances the reliability and security of IoT systems, emerging new security challenges remain to be resolved. This article details the security vulnerabilities in the convergence of blockchain and IoT as well as corresponding feasible solutions.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Hardware & Architecture

Reporting Mechanisms for Internet of Things

Chia-Wei Chang, Yi-Bing Lin, Jyh-Cheng Chen

Summary: This paper explores the relationship between energy efficiency and data accuracy for IoT devices, using the example of PM2.5 application. Two reporting mechanisms, based on timer and threshold, were proposed and experimental results showed that the threshold-based reporting achieved over 37% more energy saving compared to the timer-based reporting when accuracies were the same.

MOBILE NETWORKS & APPLICATIONS (2022)

Article Automation & Control Systems

Structural controllability of networked systems with general heterogeneous subsystems

Jianbin Mu, Jing Wu, Ning Li, Xiaohu Zhang, Shaoyuan Li

Summary: This paper investigates the structural controllability of networked systems with high-order and heterogeneous dynamics, and provides a method to find necessary and/or sufficient conditions for structural controllability by simplifying subsystem dynamics. Designing network topology using these criteria can effectively reduce the number of subsystem interconnection links without concerning subsystem dynamics.

ASIAN JOURNAL OF CONTROL (2022)

Letter Computer Science, Information Systems

Cyber topology design guaranteed structural controllability for networked systems

Jianbin Mu, Shaoyuan Li, Jing Wu, Ning Li

SCIENCE CHINA-INFORMATION SCIENCES (2022)

Article Computer Science, Information Systems

Trust Management for Internet of Things: A Comprehensive Study

Lijun Wei, Yuhan Yang, Jing Wu, Chengnian Long, Bo Li

Summary: The rapid development of IoT technology has brought about a growing focus on trust issues, which include not only security and efficiency, but also aspects such as reliability, attack resistance, fairness, flexibility, and incentive. Research in trust management has made significant progress from framework development to quantification methods.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

MobiDIV: A Privacy-Aware Real-Time Driver Identity Verification on Mobile Phone

Yinan Ma, Jing Wu, Chengnian Long, Yi-Bing Lin

Summary: This article introduces a privacy-aware architecture, MobiDIV, for secure driver identity verification. By processing sensitive data locally on the driver's smartphone, a efficient face feature extractor is proposed to achieve real-time and robust driver identification. Experimental results show that MobiDIV achieves similar verification accuracy with fewer parameters and floating-point calculations compared to other deep neural networks. On synthetic test data sets, MobiDIV even achieves a higher average verification accuracy. Integrating MobiDIV into the car-sharing platform ICICV-E100 demonstrates the feasibility of the system.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

A Blockchain-Based Multidomain Authentication Scheme for Conditional Privacy Preserving in Vehicular Ad-Hoc Network

Yuhan Yang, Lijun Wei, Jing Wu, Chengnian Long, Bo Li

Summary: This article proposes a multi-domain vehicular authentication architecture by introducing blockchain technology to establish distributed trust and share cross-domain information among multiple administrative domains. To guarantee anonymity and traceability, a pseudonym-based privacy-preserving authentication method is proposed. The scheme designs a two-phase pseudonym distribution mechanism with the assistance of a roadside unit (RSU) proxy.

IEEE INTERNET OF THINGS JOURNAL (2022)

Review Energy & Fuels

A comprehensive review on energy management, demand response, and coordination schemes utilization in multi-microgrids network

Arshad Nawaz, Min Zhou, Jing Wu, Chengnian Long

Summary: This paper provides a comprehensive review of the multi-microgrids concept and its features, analyzes the challenges to stable operation of power systems posed by various factors, discusses energy management and demand-side management techniques, highlights the importance of cybersecurity, and makes recommendations for future research.

APPLIED ENERGY (2022)

Article Computer Science, Information Systems

Dynamic-Line-Rating-Based Robust Corrective Dispatch Against Load Redistribution Attacks With Unknown Objectives

Min Zhou, Jing Wu, Chengnian Long, Chensheng Liu, Deepa Kundur

Summary: This article explores a cost-effective corrective dispatch scheme for load redistribution attacks, utilizing dynamic line rating technology to enhance power transfer capability and ensure system security and economic performance. A robust corrective dispatch model and column constraint generation algorithm are used to solve the problem, with case studies confirming its effectiveness.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Energy & Fuels

Distributed optimal energy scheduling for grid connected multi-microgrids with architecturized load characteristics

Arshad Nawaz, Jing Wu, Chengnian Long

Summary: This paper proposes a load characteristics-based multiple microgrids architecture and utilizes distributed model predictive control for its day-ahead scheduling in grid-connected mode. The architecture categorizes consumer's load into different groups according to their operational characteristics, improving power utilization economically and optimally. The incorporation of Demand Response Program and distributed network operator facilitates economic energy exchange and supply-demand balance. The results show that the proposed scheme effectively reduces system operation cost and achieves system-wide and local supply-demand balance more economically.

ENERGY REPORTS (2022)

Article Energy & Fuels

Distributed MPC-based energy scheduling for islanded multi-microgrid considering battery degradation and cyclic life deterioration

Arshad Nawaz, Jing Wu, Jun Ye, Yidi Dong, Chengnian Long

Summary: This paper presents a distributed model predictive control (MPC) based energy scheduling problem for islanded multi-microgrids. The objective is to achieve supply-demand balance and reduce battery degradation. A new slack variable and a distributed coordination strategy are introduced to optimize the battery state of charge. The system framework is modeled as a mixed-integer dynamic model and solved using a mixed-integer quadratic programming approach. Comparisons with existing models demonstrate the effectiveness of the proposed scheme, and convergence analysis and fast convergence performance are provided.

APPLIED ENERGY (2023)

Article Automation & Control Systems

Blockchain-Enabled Multiparty Computation for Privacy Preserving and Public Audit in Industrial IoT

Yuhan Yang, Jing Wu, Chengnian Long, Wei Liang, Yi-Bing Lin

Summary: This article proposes a privacy-preserving and publicly auditable multiparty computation scheme for industrial data sharing and computing. By separating the ownership, use, and verification of data, the contradiction between data sharing and privacy preservation is addressed. The use of blockchain technology provides a transparent management platform for identifying and tracing illegal data and computation behavior. Experimental results demonstrate the efficiency and feasibility of the scheme.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Chemistry, Analytical

An Edge Transfer Learning Approach for Calibrating Soil Electrical Conductivity Sensors

Yun-Wei Lin, Yi-Bing Lin, Ted C. -Y. Chang, Bo-Xun Lu

Summary: Smart agriculture utilizes IoT technologies and smart sensors to support farming intelligence. This study proposes SensorTalk3, a combination of machine learning models, to calibrate EC sensors at edge devices. It introduces a dual-sensor detection solution to determine when recalibration is needed.

SENSORS (2023)

Article Computer Science, Artificial Intelligence

FenceTalk: Exploring False Negatives in Moving Object Detection

Yun-Wei Lin, Yuh-Hwan Liu, Yi-Bing Lin, Jian-Chang Hong

Summary: In order to improve accuracy in new fields, we propose FenceTalk, a moving object detection system that automatically selects suspicious images not successfully detected by Yolo model using SSIM measure, reducing labor cost for data selection. FenceTalk can effectively update background image, reducing misjudgment and selecting optimal threshold images, reaching over 99% recall when combined with Yolo and SSIM.

ALGORITHMS (2023)

Article Computer Science, Information Systems

A Bidirectional Trust Model for Service Delegation in Social Internet of Things

Lijun Wei, Yuhan Yang, Jing Wu, Chengnian Long, Yi-Bing Lin

Summary: Social Internet of Things (SIoT), as an emerging paradigm, applies social networking aspects to IoT, allowing objects to establish social relationships without human intervention and enhance interaction efficiency. However, trust remains a crucial issue in SIoT development. Existing literature predominantly focuses on unidirectional solutions, evaluating the trust of service providers solely based on the needs of service requesters. This study proposes a bidirectional trust model and an explicit approach to address the service delegation issue, considering the context of SIoT services or tasks.

FUTURE INTERNET (2022)

No Data Available