Blockchain Technologies and Applications for IoT

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (15 December 2020) | Viewed by 3070

Special Issue Editors


E-Mail Website
Guest Editor
Big Data Lab, Engineering Division, The Pennsylvania State University, Malvern, PA 19355, USA
Interests: Internet of Things; reusable and self adaptable devices; blockchain-based identity and access controls; applied machine learning; reinforcement learning

E-Mail Website
Guest Editor
Autonomic Computing Laboratory, University of Arizona, Tucson, AZ, 85719, USA
Interests: autonomic computing; cyber security; anomaly behavior analysis; cluster computing; blockchain-based resilient systems

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) is a global infrastructure for the information society. In the past few decades, the IoT has emerged, grown, and gradually affected the daily lives of human beings with new applications and services, ranging from wearable devices, smart manufacturing, smart girds, to smart homes, self-driving cars and ambient intelligence, to mention a few.

Unconventional characteristics in the IoT such as scalability, heterogeneity, mobility, limited resources, and security raise scientific and technical challenges, and render existing information and technology solutions inadequate.

The emergence of blockchain technologies opens new business opportunities in Fintech and distributed applications. They have developed into game changers due to their unique capabilities and benefits. Blockchain-based IoT will be nothing less than a paradigm shift and has potential to help address some of the IoT challenges.

By using blockchains as a back-end technology, it becomes possible to build large scale, peer-to-peer IoT systems in trustless environments by which all things and people self-manage their systems without relying on any third parties.

This Special Issue invites researchers to contribute with original contributions and reviews that address shortcomings and constraints of both IoT and blockchain technologies, address challenges in recent trends in IoT blockchain-based applications, and provide innovative solutions on the convergence of blockchain and IoT.

Dr. Youakim Badr
Prof. Dr. Salim Hariri
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Blockchain technology for IoT
  • New consensus protocols for IoT Applications
  • Frameworks and software platforms for blockchains in IoT
  • Scalability, interoperability and blockchain for IoT applications
  • New emerging architectures for security and privacy in IoT applications
  • Evaluation and experimental analysis of blockchain IoT applications
  • Machine Learning for blockchain-based IoT applications
  • Artificial intelligence and blockchain for IoT applications
  • Blockchain-as-a-service
  • IoT applications based on blockchain technology
  • Blockchain identity management and security
  • Blockchain 3.0 and Blockchain 4.0

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 7199 KiB  
Article
HyperLedger Fabric-Based Proactive Defense against Inside Attackers in the WSN With Trust Mechanism
by Kyeongsun Cho and Youngho Cho
Electronics 2020, 9(10), 1659; https://doi.org/10.3390/electronics9101659 - 12 Oct 2020
Cited by 11 | Viewed by 2509
Abstract
In Wireless Sensor Networks (WSNs), the Trust Mechanism (TM) is used to defend against insider attacks by measuring the trustworthiness of all inside sensor nodes in the network. Thus, each sensor node with TM observes its neighbor nodes’ behaviors, evaluates their trustworthiness as [...] Read more.
In Wireless Sensor Networks (WSNs), the Trust Mechanism (TM) is used to defend against insider attacks by measuring the trustworthiness of all inside sensor nodes in the network. Thus, each sensor node with TM observes its neighbor nodes’ behaviors, evaluates their trustworthiness as numeric trust values, and captures untrustworthy nodes as inside attackers. Although the defense performance of trust mechanisms can be further improved by sharing the information about inside attackers detected by TM with all sensor nodes, the detected inside attacker list must be securely shared with and stored in all sensor nodes in the WSN. However, according to our survey, we observed that most existing studies simply assume that the communication channel for sharing the attacker detection list is reliable and trusted even in the presence of inside attackers in the WSN. In this paper, we propose and implement a proactive defense model that integrates the HyperLedger Fabric and trust mechanism to defend against inside attackers by securely sharing the detected inside attacker list with all sensor nodes in the WSN. In addition, we conduct comparative experiments to show that our proposed model can better defend against inside attackers than an existing trust mechanism. According to our experimental results, our proposed model could lower the attack damage (the number of packet drops) caused by an inside packet drop attacker by 59 to 67% compared to an existing trust mechanism. Full article
(This article belongs to the Special Issue Blockchain Technologies and Applications for IoT)
Show Figures

Figure 1

Back to TopTop