On performance of PBFT for IoT-applications with constrained devices

04/11/2021
by   Yaroslav Meshcheryakov, et al.
0

Cyber-physical systems and the Internet of things (IoT) is becoming an integral part of the digital society. The use of IoT services improves human life in many ways. Protection against cyber threats is an important aspect of the functioning of IoT devices. Malicious activities lead to confidential data leakages and incorrect performance of devices are becoming critical. Therefore, development of effective solutions that can protect both IoT devices data and data exchange networks turns in to a real challenge. This study provides a critical analysis of the feasibility of using blockchain technology to protect constrained IoT devices data, justifies the choice of Practical Byzantine Fault Tolerance (PBFT) consensus algorithm for implementation on such devices, and simulates the main distributed ledger scenarios using PBFT. The simulation results demonstrate the efficiency of the blockchain technology for constrained devices and make it possible to evaluate the applicability limits of the chosen consensus algorithm.

READ FULL TEXT

page 1

page 12

research
02/17/2021

LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices

This paper presents LIRA-V, a lightweight system for performing remote a...
research
08/11/2020

Security should be there by default: Investigating how journalists perceive and respond to risks from the Internet of Things

Journalists have long been the targets of both physical and cyber-attack...
research
04/13/2020

Blockchain in the Internet of Things: Architectures and Implementation

The world is becoming more interconnected every day. With the high techn...
research
04/11/2023

A Novel Two-Layer DAG-based Reactive Protocol for IoT Data Reliability in Metaverse

Many applications, e.g., digital twins, rely on sensing data from Intern...
research
01/14/2020

IoT Network Behavioral Fingerprint Inference with Limited Network Trace for Cyber Investigation: A Meta Learning Approach

The development and adoption of Internet of Things (IoT) devices will gr...
research
09/21/2018

Prospect Theoretic Approach for Data Integrity in IoT Networks under Manipulation Attacks

As Internet of Things (IoT) and Cyber-Physical systems become more ubiqu...
research
05/03/2022

Implementation of an efficient, portable and platform-agnostic cryptocurrency mining algorithm for Internet of Things devices

Recently, there has been a remarkable amount of research being done in b...

Please sign up or login with your details

Forgot password? Click here to reset