LU102556B1 - Blockchain-enhanced open internet of things access architecture - Google Patents

Blockchain-enhanced open internet of things access architecture Download PDF

Info

Publication number
LU102556B1
LU102556B1 LU102556A LU102556A LU102556B1 LU 102556 B1 LU102556 B1 LU 102556B1 LU 102556 A LU102556 A LU 102556A LU 102556 A LU102556 A LU 102556A LU 102556 B1 LU102556 B1 LU 102556B1
Authority
LU
Luxembourg
Prior art keywords
access
blockchain
iot
iot device
smart contract
Prior art date
Application number
LU102556A
Other languages
German (de)
Inventor
Xintong Ling
Bowen Zhang
Jiaheng Wang
Yuwei Le
Original Assignee
Univ Southeast
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Southeast filed Critical Univ Southeast
Application granted granted Critical
Publication of LU102556B1 publication Critical patent/LU102556B1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Computing Systems (AREA)
  • Marketing (AREA)
  • General Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • Medical Informatics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention discloses a blockchain-enhanced open Internet of Things (IoT) access architecture, including an access point, a number of IoT devices, a hash access mechanism, a blockchain mining network, and a blockchain enabling mechanism that manages network access of the IoT device. The blockchain-enhanced open IoT access architecture provided in the present invention provides a safe, reliable, fair, and just short-packet access service for a plurality of devices in an IoT network by using features of a blockchain such as distributed storage, tamper-proofing, and traceability, thereby promoting the trust and cooperation between the devices and ensuring the security and efficiency of the network in the large-scale trustless IoT network. The blockchain- enhanced open IoT access architecture in the present invention can provide safe and reliable IoT access with low latency, and has a high practical application value.

Description

BLOCKCHAIN-ENHANCED OPEN INTERNET OF THINGS ACCESS "102568
ARCHITECTURE
TECHNICAL FIELD The present invention relates to the field of Internet of Things (IoT) and wireless communication technologies, and in particular, to a blockchain-enhanced open IoT access architecture.
BACKGROUND When the cryptocurrency Bitcoin was invented in 2008, the supporting technology behind the Bitcoin, namely blockchain, officially appeared in public. An electronic cash transaction system based on Bitcoin broke the original pattern in which legal tender is used as a unique transaction token, created a totally new decentralized transaction mechanism in which transactions are recorded in head- to-tail connected blocks and stored in each node of a network through the cryptography theory and the distributed consensus mechanism, and brought a huge value because of its features such as decentralization, security, and tamper-proof. With development in a recent decade, the blockchain technology has experienced several phases, developing from the blockchain 1.0 in which the technology completely serves the cryptocurrency and the blockchain 2.0 represented by smart contracts to the blockchain 3.0 that is represented by cross-domain comprehensive applications.
At the same time of entering the era of blockchain 3.0 of cross-domain applications and integration, the IoT as a frontier technology quickly developed in recent years and arouse a great deal of research interest of the industry and academia. It is promising for combining the blockchain technology with the IoT network as one of core fields for the future IoT study. In Mobile World Congress 2018, Federal Communications Commission has expected the integration of the blockchain technology and future wireless communication network technology.
With the rapid development of the IoT technology, the IoT is to constantly expand in scale and the number of IoT devices is to grow exponentially. In practice, an IoT network usually includes a massive number of trustless devices that may belong to multiple different operators or manufacturers, which means that, in such environment, there is no significant trust and cooperation between the devices. Limitations caused by the existing IoT architecture based on one dominant operator or manufacturer appear increasingly conspicuous. Therefore, a new multi-operator collaboration IoT access architecture in an untrustworthy environment is urgent to break through many bottlenecks of the conventional IoT access architecture including resource sharing, incentive mechanism, and network security. A blockchain-enhanced open IoT access architecture provided in the present invention can provide a feasible and efficient upgraded solution of an IoT access architecture by V102556 making full use of features of the blockchain such as distributed storage, tamper-proof, and traceability and integrating the hash access mechanism proposed recently.
SUMMARY The present invention aims to provide a blockchain-enhanced open IoT access architecture to resolve the aforementioned problem. In the proposed architecture, a safe and reliable short-packet access service can be conducted between an access point and an IoT device in an untrustworthy environment, which can effectively overcome shortcomings of a conventional IoT access architecture, resolve the problem of multi-party trust in distributed IoT access, promote multi-party cooperation in a network, and improve the overall efficiency.
To achieve the above objective, a method used in the present invention is: a blockchain-enhanced open IoT access architecture, including: an access point, a number of IoT devices, a blockchain mining network, and a core network, where the access point provides a short-packet access service to the IoT device, and a process of the service is controlled by a blockchain enabling mechanism that manages network access of the [oT device.
As an improvement of the present invention, control steps of the blockchain enabling mechanism are as follows: 1) depositing, by the IoT device, a certain amount of money into a blockchain online account of the IoT device before accessing an IoT network, where registration information is recorded in a blockchain; 2) filling in and signing, by the IoT device, a smart contract including details of the access service before the service starts, and performing, by the IoT device, a hash operation by using the smart contract, a to-be-transmitted short packet, a device identification code, and a timestamp, where when a hash operation output of the IoT device meets an access requirement set by the access point, the ToT device sends the smart contract, the to-be-transmitted short packet, and the hash operation output that meets the requirement to the access point together to request the access point to provide the corresponding short-packet access service; 3) checking and verifying, by the access point after receiving the short packet and the smart contract from the IoT device, whether the hash operation output of the IoT device has an access qualification required by the current access point, and checking and verifying content and a signature of the smart contract, and an account balance of the IoT device, where after the verification succeeds,
the access point uploads the smart contract and a hash value of the short packet to the blockchain 102556 mining network, and meanwhile directly uploads the short packet sent from the IoT device to the core network to complete the access service; 4) recording, by the blockchain mining network, the smart contract in the blockchain, after checking and verifying the smart contract that includes an access request and that is sent by the IoT device, after a certain number of subsequent blocks confirm the smart contract, a service fee specified in the smart contract being automatically transferred from the IoT device account to an access point account to achieve a final settlement of the service fee, where if the smart contract is not successfully confirmed in the blockchain, the access point uploads the smart contract to the mining network again out of self-benefit until the smart contract is confirmed in the blockchain, that is, ensures that the transaction is completed and the IoT device successfully pays the service fee to the access point.
As an improvement of the present invention, the details of the access service in step 2 include: a fee of the access service, relevant access control information, and digital electronic signatures of the IoT device and the access point.
As an improvement of the present invention, the hash value operated by the IoT device in step 2 plays a role in verifying the access qualification required by the IoT device, and specifically in step 2, the IoT device concatenates head-to-tail the four types of data: the smart contract, the to-be- transmitted short packet, the device identification code, and the timestamp to obtain a data string, and further converts the data string by using the hash function into an easy-to-verify, hard-to-solve, and tamper-proof string of a fixed length.
The hash function is irreversible, collision resistant, and easy to verify.
Storing the operated hash value into the blockchain can ensure that data uploaded by the access point is safe.
If there is an error in the access point and wrong information is uploaded to the core network, the IoT device can trace back and prosecute the access point according to information recorded in the blockchain.
The checking and verifying, by the access point, the hash operation output of the IoT device in step 3 is checking whether the hash operation output meets the access qualification required by the current access point.
If the hash operation output does not meet the access qualification required by the current access point, the access point immediately terminates the step and refuses to provide the service to the IoT device.
As an improvement of the present invention, after receiving the access request, the access point needs to further check and verify the content of the smart contract sent by the IoT device, and check the balance of the IoT device that initiates the access request, and once the verification succeeds, the access point directly provides the short-packet access service to the IoT device, that is, forwards theV102556 short packet to the core network without waiting for the smart contract to be confirmed in the blockchain. Providing an access service before an IoT device successfully pays a service fee may greatly reduce the latency of a short-packet access service, which 1s particularly applicable to service requirements in an IoT access scenario.
As an improvement of the present invention, the checking the account balance of the IoT device in step 3 is specifically: checking whether the account balance of the IoT device is enough to pay for the service fee, and if the account balance is not enough to pay for the service fee, the access point ignores the access request of the IoT device.
As an improvement of the present invention, a cross-network integrated open IoT specifically indicates that a plurality of operators or manufacturers are connected to form a whole by using the blockchain-enhanced open IoT access architecture. The cross-network integrated open IoT allows fair access of all devices instead of IoT devices belonging to a specific operator or manufacturer, and ensures openness and transparency of the access and payment process through a blockchain.
À hash access is combined with a blockchain architecture. The hash access forces all IoT devices to calculate hash values of relevant data to fairly contend for channel resources. The advantage of combining the hash access and the blockchain architecture is that it can be detected according to the difference between the hash value of data uploaded to the core network and the corresponding value in the blockchain if an access point uploads a packet of the IoT device dishonestly, or an error occurs in uploading. In addition, the service fee of the IoT device is pre-deposited in the blockchain, so that after the access point completes the transaction, the smart contract automatically ensures that the service fee is transferred from the IoT device account to an access point account, thereby avoiding a situation in which the IoT device defaults on the fee. In case the smart contract fails to be uploaded to the blockchain, the access point may repeatedly try to upload the smart contract including the signature of the IoT device to the blockchain until confirmation succeeds to ensure the benefit of the access point.
Advantageous Effect: The blockchain-enhanced open IoT access architecture in the present invention resolves the trust problem of a conventional IoT network access architecture by effectively using features of the blockchain such as distributed storage, tamper-proof, and traceability, and is applicable to a trustless IoT scenario including a plurality of operators or manufacturers. A fair access service transaction between an IoT device and an access point in the network can be conducted in an untrustworthlyY102556 environment. The present invention, by using features of the blockchain, ensures a safe, reliable, fair, and just interaction process between devices and access points in an IoT network, promotes a high- degree cooperation between a plurality of devices in the network, and improves the resource 5 utilization rate, being greatly beneficial to deployment of a large-scale IoT scenario. In addition, the service-before-payment mechanism in the present invention can greatly reduce an access latency of an IoT device, is applicable to an IoT scenario of a low-latency short packet, and has high practical deployment and application values.
BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 shows a blockchain-enhanced open IoT access architecture; FIG. 2 is a schematic diagram of a work process of a blockchain-enhanced IoT architecture in a situation in which there is 1 access point for 3 IoT devices, and the number of confirmation blocks is set to 2; FIG. 3 shows comparisons in an IoT network in which there are two independent operators between throughput performance of a blockchain-enhanced open IoT access architecture and that of an access architecture in a conventional Aloha manner in a balanced network traffic load and in an unbalanced network traffic load; FIG. 4 shows comparisons in an IoT network in which there are two independent operators between a latency of a blockchain-enhanced open IoT access architecture and that of an access architecture in a conventional Aloha manner in a balanced network traffic load and in an unbalanced network traffic load; FIG. 5 shows comparisons in an IoT network in which there are two independent operators between a successful access probability of a blockchain-enhanced open IoT access architecture and that of an access architecture in a conventional Aloha manner in a balanced network traffic load and in an unbalanced network traffic load.
DETAILED DESCRIPTION OF THE EMBODIMENTS To better learn technical content of the present invention, specific examples with reference to the accompanying drawings are used as follows: Referring to FIG. 1, a blockchain-enhanced open IoT access architecture includes an access point, a number of IoT devices, a blockchain mining network that manages composition of miners in a blockchain, and a core network. A fair and open access service transaction can be conducted between the access point and the IoT device.
The access point charges the IoT device for a certain amount cf 102556 service fee and provides a corresponding access service to the IoT device.
The IoT device deposits a certain amount of money into a blockchain online account before accessing an IoT network and its registration information is recorded in a blockchain as a public ledger.
Before the transaction, the IoT device and the access point negotiate service content and details and reach a consensus through a radio channel.
When an access service is required, the IoT device fills in and signs a smart contract including details of the corresponding access service, and performs a hash operation by using the smart contract, a to-be-transmitted short packet, an IoT device identification code, and a current timestamp.
When a hash operation output of the IoT device meets an access qualification required by the access point, the IoT device sends the smart contract, the to-be-transmitted short packet, and the hash operation output that meets the access qualification together to the access point.
After performing verification according to the mechanism in the present invention, the access point uploads the smart contract and the hash operation output that meets the access qualification required by the access point to the blockchain mining network, and meanwhile uploads the short packet sent from the IoT device to the core network to complete the transaction.
After the smart contract is verified by the blockchain mining network, uploaded to the blockchain, and confirmed by a certain number of subsequent blocks, a service fee specified in the smart contract is automatically transferred from the IoT device account to an access point account.
Referring to FIG. 2, according to a typical embodiment of the present invention, specific parameters of a blockchain-enhanced open IoT architecture are given as follows: 1 access point that can provide an access service and 3 IoT devices (device numbers are device 1, device 2, and device 3). As shown in FIG. 2, merely three IoT device access services taken place orderly in the typical embodiment of the present invention are shown.
Corresponding smart contracts applying for the access services are respectively marked as smart contract 1, smart contract 2, and smart contract 3. A typical implementation process of the present invention is as follows: 1) Before accessing an IoT network, the 3 IoT devices deposit a certain amount of money into blockchain accounts, which is a part of a registration process.
The account balances of the 3 devices are respectively 150, 180, and 10. The registration information as a public ledger is recorded in a blockchain.
2) Before the services start, the IoT devices and the access point reach a consensus on the servicdsJ102556 In the second slot, the device 1 fills in and signs the smart contract 1 that includes details of the access service. The service fee is 12. Then the device 1 sends the smart contract 1, a to-be-transmitted short packet, and a hash operation output that meets an access qualification required by the access point together to the access point to request the access point to provide the corresponding access service.
3) The access point, after receiving the short packet and the smart contract from the device 1, checks and verifies content and a signature of the smart contract 1, and checks whether the hash operation output of the device 1 actually meets the access qualification required by the access point, and whether the account balance is enough to pay for the service fee. After the check, the account balance of the device 1 is 150 which is enough to pay for the service fee, namely, 12. The access point directly uploads the smart contract 1 and the hash operation output to the blockchain mining network, and meanwhile directly provides the corresponding access service to the IoT device.
4) The smart contract 1 is updated to the blockchain through the blockchain mining network. After the smart contract 1 is confirmed by 2 subsequent blocks, the service fee specified in the smart contract 1 is automatically transferred from the account of the device 1 to an access point account to complete the transaction.
5) In the 7" slot, the device 2 initiates the smart contract 2 according to a process similar to that of step 1 to step 4 and applies for an access service. However, the smart contract 2 is not accepted by the main chain and fails to be confirmed when updated to the blockchain. Therefore, to ensure self- benefit, the access point continues to upload the smart contract 2 to the blockchain mining network. Similarly, after the smart contract 2 is confirmed by 2 subsequent blocks, the service fee specified in the smart contract 2 is automatically transferred from the account of the device 2 to the access point account to complete the transaction.
6) In the 10% slot, the device 3 initiates the smart contract 3 and applies for an access service.
However, the access point, through checking, finds that the balance of the device 3 is not enough to pay for the fee of the access service. Therefore, the access point ignores the access application.
Referring to FIG. 3 to FIG. 5, in an IoT network in which there are two independent operators, emulation of a blockchain-enhanced open IoT access architecture is performed in a balanced network traffic load and an unbalanced network traffic load. Three pieces of performance of throughput, access latency, and successful access probability are analyzed and compared with those of an access architecture in a conventional Aloha manner. The results are as follows:
FIG. 3 reflects that in the whole IoT network, in a situation in which the service flow born bY! 02556 access points of the two independent operators is balanced, the throughput of the blockchain- enhanced open IoT access architecture in the present invention is the same as that of the access architecture in a conventional Aloha manner. However, when the traffic load of the access points in the IoT network is not balanced, the access architecture in the present invention can enable, by using cross-IoT network integration, a safe and reliable short-packet access service transaction to be performed between the access points of different operators and an IoT device, thereby maximizing a resource utilization rate, and keeping the throughput same as that in the balanced flow situation. However, in the conventional access architecture, because there is no trust between the devices, a cross-network cooperation cannot be conducted, leading to unreasonable resource distribution, and finally causing a decreased throughput.
FIG. 4 and FIG. 5 respectively reflect comparisons between two pieces of performance, namely, the access latency and the successful access probability of the architecture in the present invention and those of the conventional architecture in the foregoing situations. Similar to FIG. 3, the performance of the blockchain-enhanced open IoT access architecture in the present invention is almost the same as that of the conventional architecture when the network traffic load is balanced. However, when the traffic load of the access point of the IoT network is unbalanced, the access architecture in the present invention can optimize the resource distribution by using cross-IoT network integration, to ensure network performance, while the performance of the conventional access architecture is reduced relatively significantly.
Although the present invention is described with reference to the above exemplary embodiments, the embodiments are not intended to limit the present invention. A person of ordinary skill in the art may make variations and modifications without departing from the spirit and scope of the present invention. Therefore, the protection scope of the present invention should be subject to the claims.

Claims (7)

CLAIMS LU102556
1. A blockchain-enhanced open Internet of Things (IoT) access architecture, comprising: an access point, a number of IoT devices, a blockchain mining network, and a core network, wherein > the access point provides a short-packet access service to the IoT device, and a process of the service is controlled by a blockchain enabling mechanism that manages network access of the IoT device.
2. The blockchain-enhanced open IoT access architecture according to claim 1, wherein control steps of the blockchain enabling mechanism are as follows: 1) depositing, by the IoT device, a certain amount of money into a blockchain online account of the ToT device before accessing an IoT network, wherein registration information is recorded in a blockchain; 2) filling in and signing, by the IoT device, a smart contract comprising details of the access service before the service starts, and performing, by the IoT device, a hash operation by using the smart contract, a to-be-transmitted short packet, a device identification code, and a timestamp, wherein when a hash operation output of the IoT device meets an access requirement required by the access point, the IoT device sends the smart contract, the to-be-transmitted short packet, and the hash operation output that meets the requirement to the access point together to request the access point to provide the corresponding short-packet access service; 3) checking and verifying, by the access point after receiving the short packet and the smart contract from the IoT device, whether the hash operation output of the IoT device has an access qualification required by the current access point, and checking and verifying content and a signature of the smart contract, and an account balance of the IoT device, wherein after the verification succeeds, the access point uploads the smart contract and a hash value of the short packet to the blockchain mining network, and meanwhile directly uploads the short packet sent from the IoT device to the core network to complete the access service; 4) recording, by the blockchain mining network, the smart contract in the blockchain, after checking and verifying the smart contract that comprises an access request and that is sent by the IoT device, after a certain number of subsequent blocks confirm the smart contract, a service fee specified in the smart contract being automatically transferred from the IoT device account to an access point account to achieve a final settlement of the transaction, wherein if the smart contract is not successfully confirmed in the blockchain, the access point uploads the smart contract to the blockchain mining network again out of self-benefit until the smart contract is confirmed in theV102556 blockchain, that is, ensures that the transaction is completed and the IoT device successfully pays the service fee to the access point.
3. The blockchain-enhanced open IoT access architecture according to claim 2, wherein the details of the access service in step 2 comprise: a fee of the access service, relevant access control information, and digital electronic signatures of the IoT device and the access point.
4. The blockchain-enhanced open IoT access architecture according to claim 2, wherein the hash value operated by the IoT device in step 2 plays a role in verifying the access qualification required by the IoT device, and is an easy-to-verify, hard-to-solve, and tamper-proof string of a fixed length that is calculated by the IoT device by using a hash function to perform bytecode concatenating on the information in step 2.
5. The blockchain-enhanced open IoT access architecture according to claim 2, wherein in step 3, after receiving the access request, the access point checks and verifies relevant content of the smart contract, and checks the balance of the IoT device that initiates the access request, and once the verification succeeds, the access point directly provides the service to the IoT device and uploads the short packet to the core network without waiting for the smart contract to be confirmed in the blockchain, that is, provides the access service before the IoT device pays.
6. The blockchain-enhanced open IoT access architecture according to claim 2, wherein the checking the account balance of the IoT device in step 3 1s specifically: checking whether the account balance of the IoT device is enough to pay for the service fee, and if the account balance is not enough to pay for the service fee, the access point ignores the access request of the IoT device.
7. À cross-network integrated open IoT, wherein a plurality of operators or manufacturers are connected to form a whole by using the blockchain-enhanced open IoT access architecture according to claims 1 to 6, wherein the cross-network integrated open IoT allows fair access of all devices instead of IoT devices belonging to a specific operator or manufacturer, and ensures openness and transparency of the access and payment process through a blockchain.
LU102556A 2019-09-30 2020-06-16 Blockchain-enhanced open internet of things access architecture LU102556B1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910943188.6A CN110602252B (en) 2019-09-30 2019-09-30 Block chain enhanced open Internet of things access architecture

Publications (1)

Publication Number Publication Date
LU102556B1 true LU102556B1 (en) 2021-04-22

Family

ID=68865280

Family Applications (1)

Application Number Title Priority Date Filing Date
LU102556A LU102556B1 (en) 2019-09-30 2020-06-16 Blockchain-enhanced open internet of things access architecture

Country Status (2)

Country Link
CN (1) CN110602252B (en)
LU (1) LU102556B1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11954681B2 (en) 2019-09-30 2024-04-09 Southeast University Blockchain-enhanced open internet of things access architecture
CN111327425B (en) * 2020-01-20 2021-04-27 福州大学 Vehicle information safety broadcasting excitation system based on bitcoin and working method thereof
CN113630846B (en) * 2021-08-06 2023-04-07 东南大学 Fast access method in block chain wireless access network
CN114222375B (en) * 2021-12-16 2024-01-12 东南大学 Random access dynamic control method for block chain wireless network

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105719185B (en) * 2016-01-22 2019-02-15 杭州复杂美科技有限公司 The data comparison and common recognition method of block chain
GB201613144D0 (en) * 2016-07-29 2016-09-14 Eitc Holdings Ltd Computer-implemented method and system
CN107103054B (en) * 2017-04-12 2019-03-26 北京航空航天大学 A kind of intelligent contract asynchronous execution storage system and implementation method of privately owned block chain
CN110035440B (en) * 2019-04-11 2023-04-28 东南大学 Novel distributed access network system based on block chain

Also Published As

Publication number Publication date
CN110602252A (en) 2019-12-20
CN110602252B (en) 2021-06-15

Similar Documents

Publication Publication Date Title
LU102556B1 (en) Blockchain-enhanced open internet of things access architecture
CN109741056B (en) Method and device for uploading electronic certificate
CN108009811B (en) Inter-cloud computing environment value exchange-oriented cross-chain communication method
CN110245186B (en) Service processing method based on block chain and related equipment
US20190172057A1 (en) Blockchain-implemented method and system
CN108881187A (en) A kind of across chain data transferring method and equipment suitable for permitting chain scene
CN110601896B (en) Data processing method and equipment based on block chain nodes
CN110599177A (en) Transaction verification method and related equipment
CN111222841B (en) Block chain-based data distribution method and equipment and storage medium thereof
CN110995448A (en) Block chain-based Internet of things equipment identity authentication method and system
US11954681B2 (en) Blockchain-enhanced open internet of things access architecture
CN107995003A (en) The charging and settlement method of international roaming communication, relevant apparatus and distributed system
CN112700246B (en) Block chain-based data processing method, device, equipment and readable storage medium
CN110659905B (en) Transaction verification method, device, terminal equipment and storage medium
CN109242663A (en) A kind of bookkeeping methods and system based on block chain technology
CN105976177A (en) NFC (near field communication)-oriented cloud payment method
CN110599175A (en) Block processing method and related equipment
CN113628352B (en) Subway ticket business system based on secondary selling and subway ticket secondary selling method
CN116488818A (en) Block chain-based data processing method, device, equipment and readable storage medium
CN108022104B (en) Login method, terminal and system for digital currency wallet
CN104580199B (en) A kind of dynamic password authentication system and authentication method based on wechat
CN111260421B (en) Electronic invoice management and control method and device based on block chain
CN104144394A (en) Method and system for achieving industry application short message sending
CN108197937B (en) Synchronization method, terminal and system for digital currency wallet
CN113362064B (en) Multiple signature method, computer device, and storage medium

Legal Events

Date Code Title Description
FG Patent granted

Effective date: 20210422