Next Article in Journal
Stationary Probability Density Analysis for the Randomly Forced Phytoplankton–Zooplankton Model with Correlated Colored Noises
Previous Article in Journal
Developing a Multicriteria Decision-Making Model Based on a Three-Layer Virtual Internet of Things Algorithm Model to Rank Players’ Value
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Blockchain Empowered Smart Home: A Scalable Architecture for Sustainable Smart Cities

1
Department of Computer Science, College of Computer, Qassim University, Buraydah P.O. Box 52571, Saudi Arabia
2
Prince Faisal bin Mishaal Artificial Intelligence Chair, Qassim University, Buraydah P.O. Box 52571, Saudi Arabia
3
Higher Polytechnic School, Universidad Europea del Atlántico, C/Isabel Torres 21, 39011 Santander, Spain
4
Department of Project Management, Universidad Internacional Iberoamericana, Campeche C.P. 24560, Mexico
*
Authors to whom correspondence should be addressed.
Mathematics 2022, 10(14), 2378; https://doi.org/10.3390/math10142378
Submission received: 27 May 2022 / Revised: 24 June 2022 / Accepted: 27 June 2022 / Published: 7 July 2022
(This article belongs to the Section Mathematics and Computer Science)

Abstract

:
Emerging growth in technology has rapidly changed our homes and cities. Present homes and cities will be upgraded to smart homes and smart cities in the near future. Various solutions used to build the smart-city network demand a scalable and decentralized solution. This study proposes a blockchain-empowered decentralized and scalable solution for a sustainable smart-city network. The Internet of Things (IoT), fog nodes, permissioned trust chain, smart contract, blockchain, and InterPlanetary file system (IPFS) are deployed to construct a scalable and decentralized solution for a sustainable smart city. Three main public sector departments, i.e., electricity, water supply, and health care, are studied over the proposed solution. The proposed solution is implemented over constrained application protocol (CoAP) and Ethereum blockchain. The performance of the proposed model is evaluated for 1500 devices and over 10,000 records. A total 77.44% improvement is registered during performance evaluation over a scalable environment. The performance evaluation of each case study and collaborative performance evaluation concludes the improvised performance of the proposed solution for scalable and distributed applications. Better performance, scalability, and the distributed nature of the presented model make it suitable for the sustainable smart-city network.

1. Introduction

The Internet of Things (IoT) is one of the fastest-growing sectors across the world, with a prediction of 18 billion IoT devices used by 2022 [1]. The IoT footprints can easily be observed in all domains of life, including home, education, finance, health, transportation, agriculture, etc. The contemporary growth in IoT has foreseen the liveliest future of IoT [2]. Gradually, IoT is expanding from sophisticated industrial applications to basic home applications. IoT-based smart homes make cities and countries smarter. Real-time data acquisition, processing, and storage become possible under IoT scenarios. Data monitoring, processing, and management under IoT scenarios are conceivably more dynamic and sustainable [3]. Fog, edge, and cloud computing are the primitive technologies used for data processing and storage in IoT environments [4]. Besides the emerging growth in IoT, the hierarchical structure based on the centralized data process used in most of the IoT applications is becoming a challenge for future scalable IoT applications [5]. The usual occurrence of a bottleneck for real-time scalable IoT applications is another contrary aspect of centralized controlled architecture [6]. Smart cities, smart driverless transportation, smart agriculture, smart healthcare, smart education, and industrial IoT (IIoT) are some of the scalable (IoT application) areas that require some alternative solutions for effective data processing and storage [7]. IoT and IIoT have many security issues due to the low processing and storage capabilities of IoT devices [8]. In this research, we present a novel architecture especially for scalable IoT solutions. The proposed architecture is suitable for all sorts of scalable IoT solutions including smart transport, smart agriculture, smart healthcare, etc. To abridge an understanding of the proposed architecture a case study of future smart cities has been considered. The proposed architecture focuses on blockchain-based decentralized solutions for scalable IoT applications. Further, the distributed IoT devices (wireless sensor networks) installed at various geographical locations of a smart city are accessed, controlled, and processed over a blockchain-based simulated environment. In contrast to the centralized architecture for scalable IoT applications, the proposed blockchain-based decentralized architecture brings the following advantages for future smart cities:
  • The decentralized approach allows the dynamic management of IoT devices over blockchain, which minimizes the occurrence of sleeping patterns.
  • The involvement of blockchain allows effortless cross-platform communication.
  • The IoT devices connected over different smart home networks can be managed by a single blockchain in a distributed manner, which increases the scope of scalability in smart cities.
  • The involvement of public and private blockchain in the proposed architecture makes the overall architecture more transparent and secure.
  • Less modification in smart city IoT infrastructure leads to easy integration of proposed distributed blockchain architecture over present architecture.
  • The real-time multiple access management increases the usability of IoT devices with limited capabilities.
Further, the smart homes and smart cities will be the new face of every country; hence, this study is contributing a lot to designing that will be helpful in the implementation of future smart homes and smart cities. The major contributions of this study are listed below:
  • The IoT-, fog-, and cloud-empowered proposed architecture for smart homes contributes to designing robust and secure future smart homes.
  • The proposed blockchain-inspired decentralized architecture for smart cities contributes to designing a scalable architecture for sustainable smart cities.
  • The use of private trust chain and public blockchain architecture proposed in this study will improve the security and authentication process in future smart cities.
  • The connectivity of the smart home wireless sensor network and smart city network through manageable hub will improve the efficiency of the overall smart city network.
  • The blockchain implementation using the InterPlanetary file system contributes to improving the network communication over the larger geographical area of scalable smart-city networks.
Specifically, the proposed research contributes to designing a novel blockchain-based decentralized architecture for future smart cities. The minimal integration modification increases the usability of the presented architecture. A single smart contract for public blockchain reduces the communication overhead between various blockchain nodes [9]. Manageable smart contracts for public blockchain increase the flexibility and security of personal smart homes [10]. In summary, the integration of a decentralized blockchain in the proposed architecture registers better results in comparison with the current centralized solution for scalable IoT applications, including smart cities, smart healthcare, and smart agriculture, etc. For a basic understanding of various technologies involved in the research, the subsequent portion of this section describes the brief introduction of the following leading technologies involved, including IoT, fog, and cloud computing (IFC); smart cities; and blockchain technology.
  • IoT, Fog, and Cloud Computing (IFC): The IoT, fog computing, and cloud computing are some of the main technological integrations used in many IoT-based commercial solutions [11]. In IFC, IoT is deployed for real-time data acquisition; preprocessing, classification, and predictive algorithms are implemented over the fog nodes; and lastly, for secure storage of data cloud, computing platforms are employed. The use of different technologies for their specific specialized task makes this integration more efficient in contrast with the individual technology used [12]. The proposed architecture uses the IoT and fog integration for data acquisition and preprocessing; instead of the cloud, the proposed model recommends the use of distributed blockchain architecture for data storage. Blockchain-based Internet of Things is a new face of secure IoT [13,14]. The IFC architecture is illustrated in Figure 1.
  • Smart City, a network of smart urban technology: A smart city is a network of smart homes, smart offices and buildings, smart transportation, smart agriculture, and many other smart urban technologies located in a particular geographical area. Under smart cities, digital data and technology are deployed for effective use of resources, economic development of the city, improvement in lifestyle, and enhancing sustainability [15]. London, Singapore, Toronto, San Francisco, Stockholm, and Vienna are the leading smart cities in the world [16]. IoT, artificial intelligence (AI), autonomous vehicles (AV), big data, 5G, robotics, open data, and blockchain are the ultramodern technologies used for smart-city infrastructure [17]. Blockchain-based decentralized IoT empowered smart home and smart city networks are the future of the smart city and smart urban technologies which are prone to cyberattacks [18].
  • Blockchain technology: Satoshi Nakamoto first introduced blockchain as Bitcoin’s public ledger [19]. Bitcoin was the first legally accepted cryptocurrency. Subsequently, many other cryptocurrencies based on similar structures were introduced, including Ethereum, Litecoin, Cardano, Polkadot, Bitcoin Cash, Stellar, Chainlink, Binance Coin, Tether, and Monaro. Grounding blockchain, the other concepts like smart contracts, smart certificates, smart citizenship, smart properties, etc., have evolved over time. Decentralized control, data transparency, auditability, distributed information, decentralized consensus, and security are some of the key advantages of blockchain technology [20]. Numerous efficiency enhancement capabilities including security, transparency, decentralization, scalability, and autonomous capabilities make blockchain a suitable companion for scalable IoT solutions. Typically, a blockchain is a set of blocks where the first block is hardcoded into software and known as the genesis block and the other blocks are connected in a sequence with a unique hash [21]. Proof of work (PoW), proof of stake, proof of storage, proof of burn, and proof of capacity are some of the validity mechanisms used for the validity of a block in blockchain [22]. A brief introduction of widely used blockchain validity mechanisms is presented in Table 1. Only after the validity of a new block is it allowed to hash the current block to become part of a blockchain. Figure 2 illustrates the structure of a blockchain.
Figure 1. Three-layer architecture for IoT–fog–cloud (IFC) ecosystem.
Figure 1. Three-layer architecture for IoT–fog–cloud (IFC) ecosystem.
Mathematics 10 02378 g001
Table 1. Consensus Protocol. PoW—proof of work; PoS—proof of stake; PoET—proof of elapsed time; BFT—Byzantine fault tolerant.
Table 1. Consensus Protocol. PoW—proof of work; PoS—proof of stake; PoET—proof of elapsed time; BFT—Byzantine fault tolerant.
CharacteristicsPoWPoSPoETBFT and VariantsFederated BFT
Blockchain TypePermissionlessBothBothPermissionedPermissionless
Transaction FinalityProbabilisticProbabilisticProbabilisticImmediateImmediate
Transaction RateLowHighMediumHighHigh
TokenYesYesNoNoNo
CostYesYesNoNoNo
ScalabilityHighHighHighLowHigh
TrustUntrustedUntrustedUntrustedSemi-trustedSemi-trusted
Figure 2. Blockchain Structure; PoW—proof of work.
Figure 2. Blockchain Structure; PoW—proof of work.
Mathematics 10 02378 g002
To maintain the security and privacy of a smart home in a smart city, the accumulated data from IoT sensors are classified into two sets: public dataset (PuDS) and private dataset (PvDS). The private dataset (PvDS) is maintained by the homeowner over a trust chain platform, whereas the public dataset (PuDS) is maintained by the smart city authorities over a blockchain platform. The conceptual framework of smart homes and their respective implementation to make a network of smart homes, i.e., a smart city, are illustrated in Figure 3 and Figure 4, respectively. The rest of the paper is organized into four different sections. Section 2 discusses the materials and methods; it also elaborates on the proposed model. The subsequent section, Section 3, illustrates the results of the performance evaluation and the related discussion. The last section of this article, Section 4, concludes the article with its future applications.

2. Materials and Methods

System architecture, system interface, and system interactions are discussed in this section. The conceptual models illustrated in Figure 2 and Figure 3 are elaborated under system architecture utilizing layered structure and its components. System interface defines the smart contracts used by blockchain architecture along with the mathematical acceptance policy of a manageable hub. The detailed elaboration of all the system components is given in the following subsections:

2.1. System Architecture

The proposed architecture for sustainable smart cities introduced a novel decentralized access management system over blockchain technology. The proposed architecture used blockchain technology to store and distribute access control information. The proposed system recommends the IoT, fog, and blockchain integration for sustainable smart-city networks. The acquired data, with the help of various IoT sensors, are managed over the local fog nodes and distributed to the nearest local trust point (LTP). The local trust point(s) are used for the permissioned blockchain architecture or trust chain architecture. Various LTP(s) are used to classify data entities and store the respective data entity in its respective global blockchain. To manage the storage issue of a local trust point, the temporary immutability method is deployed to manage the removable blockchain [23]. The classified information is further stored and managed by their respective departments over blockchain and IPFS. The various components of the proposed system that make the framework concrete are listed below:
  • Smart Home-Wireless Sensor Network (SH-WSN).
  • Manageable Hub (MH)
  • Local Fog Nodes (LFN).
  • Local Trust Point (LTP).
  • Removable Trust Chain (RTC).
  • Blockchain (BC).
  • Smart Contract (SC).
  • InterPlanetary File System (IPFS).
The subsequent portion of this section, explains the detailed illustration of these components, starting from the components associated with smart homes to the components associated with smart cities and smart governance, respectively.
  • Smart home wireless sensor network (SH-WSN): SH-WSN is the component associated with smart home networks. Various smart home IoT-enabled devices, sensors, and actuators together build the smart home wireless sensor network. The real-time information acquired from various sensors and actuators is stored over the local fog nodes (LFN). The IoT devices, sensors, and actuators have small storage capacity and small processing powers in comparison with the local fog nodes (LFN) [24]. One IoT device may be associated or connected with many LFN(s) utilizing a manageable hub (MH). The manageable hub (MH) connects the IoT device to the nearest available LFN. Introducing the manageable hub between SH-WSN and LFN makes the communication faster and avoids unnecessary delays in communication.
  • Manageable hub (MH): MH connects many smart home IoT devices to many nearby LFN(s). This type of relationship forms the m:1:m (many-to-one-to-many) relationship. The manageable hub helps to connect IoT devices to the nearest available LFN and establishes a 1:1 (one-to-one) relationship for communication. The manageable hub stores the information about all the available LFN(s). The IoT devices send the request for connection to a manageable hub. From the available information about the nearest available LFN, the manageable hub checks the nearest available LFN concerning the request and provides the address of the nearest available LFN. To find the nearest available LFN, the manageable hub uses Algorithm 1. The communication and workings of manageable hub (MH) are illustrated in Figure 5.
  • Local fog nodes (LFN): Local fog nodes have comparable large data storage and processing capabilities. LFN are used for data filtering and preprocessing. While receiving data for a smart home wireless sensor network, the chances of falsified-data communication are possible. LFN(s) are deployed to filter such falsified entries. The data received at various local fog nodes are further communicated to the local trust point. Further, the local trust point uses the trust chain, which is the permissioned blockchain. To keep the structure of all blockchain entries identical, the LFN(s) are deployed to preprocess the data. LFN(s) status for availability is stored and updated by MH. As per the availability of LFN, the communication channel for IoT device communication is established through the manageable hub. Algorithm 2 illustrates the process of data filtering and the preprocessing steps executed by the local fog node.
  • Local trust point (LTP): LTP is the first smart-city component associated with the proposed architecture. The local trust point issues the unique crypto user ID to all the smart house owners. Further, the LTP is also responsible for storing the information about all the users and the IoT devices associated with their respective users. This information is further used to identify authorized and suspicious users. The local trust point is also used to classify the data and transmits the same to their respective blockchain. Further, the respective blockchain transmits the data to their respective IPFS block. The IPFS block is connected with the concerned departments. The main objective of the local trust point is to authenticate the users’ requests and to classify and transmit the data to their respective blockchains. Algorithms 3 and 4 illustrate the authentication and classification process followed by the local trust point, respectively.
  • Removable trust chain (RTC): It is a permissioned blockchain working on a temporary immutability mechanism [25]. RTC is connected with LTP; it is the second smart-city component. As all the LFN(s) are connected with LTP and transmit the information over RTC, it needs a huge data storage capacity for populated smart cities. To manage the storage concern, temporary immutability is deployed over the trust chain. It follows the age matrix to remove the old age transaction block from the trust chain. The temporary immutability trust chain manages the storage concerns without loss of information. The RTC is connected with all the departmental blockchains and transmits the data associated with their respective department as per the classification algorithm. Algorithm 4 illustrates the classification algorithm.
  • Blockchain (BC): The various public sector services, including drinking water, food, electricity, health care, education, supply chain, etc., in a smart city are governed by the respective public sector departments. In the proposed architecture, dedicated blockchain is used for dedicated public sector departments. This type of blockchain structure is easily managed and useful for information segregation. The decentralized nature of blockchain makes it useable for scalable smart-city networks. To make this model simple for experimental use, only three public sector services are incorporated in this architecture, i.e., water supply, electricity, and health care. Three different blockchain(s) are used for these departments; WS-BC (water-supply blockchain), E-BC (electricity blockchain), and HC-BC (health care blockchain) are deployed for their respective departments.
  • Smart contract (SC): Smart contract is a unique transaction authentication system. All the possible operations on a dedicated blockchain are defined with the help of a dedicated smart contract and are triggered by the respective blockchain transactions. Whenever any operation performed over a blockchain is triggered through a transaction after being authenticated by a smart contract, the available miners keep the information about the respective transaction [26]. The smart contract, once generated, cannot be deleted from the system and is used to authenticate every transaction. Once the miners authenticate any transaction, it is globally accessible by all the blockchain nodes [27]. The operations mentioned under the smart contract are also globally accessible. The smart contracts are defined by the respective departments. Further, the new policies are also incorporated in the smart contracts only by the respective department. As for experimental work, the proposed study uses three different blockchain(s); hence, concerning each blockchain, three different smart contracts are proposed for this study.
  • InterPlanetary file system (IPFS): For more flexibility and scalability, IPFS is used for the smart city [28]. The geographical locations of different departments may differ in a smart city, therefore the use of IPFS will improve data accessibility. Different departments’ IPFS(s) are connected for necessary information exchange or some collaborative analysis. IPFS allows decentralized access to information [29] if any Department A needs the information about a specific transaction executed in another Department B. However, the distance between Departments A and B is larger than the third Department C, which has a copy of the same transaction. Therefore, instead of accessing the information from Department B, Department A will access that information from Department C. This type of easy access of information makes the proposed model more flexible and scalable. The example illustrated in this section is diagrammatically represented in Figure 6.
Figure 5. Communication through manageable hub (MH) and M:1:M (many-to-one-to-many relationship) between different architectural components.
Figure 5. Communication through manageable hub (MH) and M:1:M (many-to-one-to-many relationship) between different architectural components.
Mathematics 10 02378 g005
Algorithm 1: To find the nearest available LFN through manageable hub.
Mathematics 10 02378 i001
All 8 components discussed so for in this section are integrated into Figure 7. The integration of IoT, manageable hubs, fog nodes, permissioned trust chain, blockchain, and IPFS makes this architecture suitable for the sustainable smart city. The SH-WSN ensures real-time data acquisition from the smart-home network. Further, the MH makes the network communication faster and also helps control traffic over the wireless sensor network. Data filtering and preprocessing are managed by various local fog nodes. The deployment of LTP safeguards the authentication process, consequently RTC manages the storage issues in the smart-city network. Blockchain, smart contract, and IPFS confirm the secure storage and sustainability quality services in smart cities.
Algorithm 2: Local Fog Node Data Filtering and Preprocessing.
Mathematics 10 02378 i002
Figure 6. IPFS communication.
Figure 6. IPFS communication.
Mathematics 10 02378 g006
Algorithm 3: Local Trust Point (LTP) User Authentication Process.
Mathematics 10 02378 i003
Algorithm 4: Local Trust Point (LTP) User Classification Algorithm.
Mathematics 10 02378 i004
Figure 7. Components of proposed layered structure for smart city.
Figure 7. Components of proposed layered structure for smart city.
Mathematics 10 02378 g007

2.2. System Interface

The interfaces used by different smart contracts and manageable hubs are discussed in this section. The detailed explanation of various operations is defined under various smart contracts used by different departments and discussed first, followed by the manageable hub query policies.

2.2.1. Smart Contract

In this study, three different departments are considered for experimental work. The case studies elaborated under this section are department oriented. The three case studies are explored as under:
Case Study 1: Under Case Study 1, the electricity department is considered. Electricity is one of the major components of a smart-city network. All 8 components of the proposed architecture discussed in the preceding section are in some way or other dependent upon electricity; therefore, electricity is one of the major components of sustainable smart cities [30]. E-BC is the blockchain dedicated to handling various operations related to the electricity department. To manage the various components concerning the electricity department, the following smart contract definition is used in this case study.
  • E-BC smart contract: E is defined as the set of public keys used by each manager (m) of the electricity department, D is defined as the set of public keys used by IoT devices (i), PE is defined as the set of policies used to access resource r with device i; mathematically it is indicated as P E i i r . This policy is defined as the policy used by device i to device i′ over the resource r. Mathematically, these sets are defined as:
    E = { E ( m ) 1 , E ( m ) 2 , E ( m ) 3 , E ( m ) 4 ,       ,   E ( m ) α }
    where α is total no. of managers for electricity department
    D = { D ( i ) 1 , D ( i ) 2 , D ( i ) 3 , D ( i ) 4 ,       ,   D ( i ) k }
    where k is total no. of devices for all the departments
    P E = { P E 1 i i r , P E 2 i i r , P E 3 i i r , P E 4 i i r ,       ,   P E ϑ i i r }
    where ϑ is the total no. of policies defined under electricity department.
The various operations defined under the E-BC smart contract are listed below:
*   D e p a r t m e n t s   n e w   m a n a g e r   r e g i s t r a t i o n   ( E m ) ;   E   E     E D     d e v i c e s   ( D ) a n d     p o l i c i e s   ( P E )
*   N e w   d e v i c e   r e g i s t r a t i o n   ( E m , D i ) ;   D   D     D i     managers   ( E )   and     plicies   ( PE i )   where   ( PE i )   is   the   allowed   policies   for   device   i     PE ,   Return   the   touple   ( D i , D e p t _ c r y p t o _ i d )   to   LTP
*   Add   new   policy   ( PE ϑ + 1 , D i ) ;   PE j j r   PE δ j j r     PE     devices   ( D l )   where   ( D l )   is   the   set   of   associate   devices   l     D ,   Return   the   touple   ( PE ϑ + 1 ,   D j ,   D e p t _ c r y p t o _ i d )   to   LTP
*   R e m o v e   r e g i s t e r e d   m a n a g e r   ( E m ) ;   E E     E D     d e v i c e s   ( D ) a n d     p o l i c i e s   ( P E )
*   R e m o v e   r e g i s t e r e d   d e v i c e   ( E m ,   D i ) ;   D D     D i     m a n a g e r s   ( E ) a n d     p l i c i e s   ( P E i )
w h e r e   ( P E i )   i s   t h e   a l l o w e d   p o l i c i e s   f o r   d e v i c e   i   P E ,   R e t u r n   t h e   t o u p l e   ( D i ,   D e p t _ c r y p t o _ i d )   t o   L T P
*   Remove   existing   policy   ( PE ϑ 1 , D i ) ;   PE j j r   PE ϑ j j r     PE     devices   ( D l )   where   ( D l )   is   the   set   of   associate   devices   l     D ,   Return   the   touple   ( PE ϑ 1 ,   D j ,   D e p t _ c r y p t o _ i d )   to   LTP
*   A c c e s s   r e q u e s t   ( D i ,   r ) ;   R e t u r n   t h e   t o u p l e   ( D i ,   s )
w h e r e   { s     s e t   o f   s e r v i c e s     r e s o u r c e   ( r ) }
Case Study 2: Under Case Study 2, the water supply department is considered. Water is the most common and necessary commodity for life. Issues in the sustainable water supply are rising with the increasing population in smart cities. Water conservation through emerging technology is one of the main concerns of every smart-city administration. WS-BC is the blockchain dedicated to handling various operations related to the water supply department. To manage the various components concerning the water supply department, the following smart contract definition is used in this case study.
  • WS-BC Smart Contract: W is defined as the set of public keys used by each manager (m) of the water supply department, D is defined as the set of public keys used by IoT devices (i), PW is defined as the set of policies used to access resource r with device i; mathematically it is indicated as P W i i r . This policy is defined as the policy used by device i to device i′ over the resource r. Mathematically, these sets are defined as:
    W = { W ( m ) 1 , W ( m ) 2 , W ( m ) 3 , W ( m ) 4 ,       ,   W ( m ) β }
    where β is total no. of managers for electricity department
    P W = { P W 1 i i r , P W 2 i i r , P W 3 i i r , P W 4 i i r ,       ,   P W δ i i r }
    where δ is the total no. of policies defined under electricity department.
D is already defined under Equation (2)
The various operations defined under the W-BC smart contract are listed below:
*   D e p a r t m e n t s   n e w   m a n a g e r   r e g i s t r a t i o n   ( W m ) ; W W     W D     d e v i c e s   ( D ) a n d     p o l i c i e s   ( P W )
*   N e w   d e v i c e   r e g i s t r a t i o n   ( W m , D i ) ; D D     D i     m a n a g e r s   ( W ) a n d     p l i c i e s   ( P W i )   w h e r e   ( P W i ) i s   t h e   a l l o w e d   p o l i c i e s
f o r   d e v i c e   i   P W ,   R e t u r n   t h e   t o u p l e   ( D i , D e p t _ c r y p t o _ i d   ) t o   L T P
*   A d d   n e w   p o l i c y   ( P W δ + 1 , D j ) ;   P W j j r P W δ j j r     P W     d e v i c e s   ( D l )
w h e r e   ( D l )   i s   t h e   s e t   o f   a s s o c i a t e   d e v i c e s   l D   ,   R e t u r n   t h e   t o u p l e   ( P W δ + 1 , D j , D e p t _ c r y p t o _ i d   ) t o   L T P
*   R e m o v e   r e g i s t e r e d   m a n a g e r   ( W m ) ; W W     W D     d e v i c e s   ( D ) a n d     p o l i c i e s   ( P W )
*   R e m o v e   r e g i s t e r e d   d e v i c e   ( W m , D i ) ; D D     D i     m a n a g e r s   ( W ) a n d     p l i c i e s   ( P W i )
w h e r e   ( P W i ) i s   t h e   a l l o w e d   p o l i c i e s   f o r   d e v i c e   i   P W ,   R e t u r n   t h e   t o u p l e   ( D i , D e p t _ c r y p t o _ i d   ) t o   L T P
*   R e m o v e   e x i s t i n g   p o l i c y ( P W δ 1 , D j ) ;   P W j j r P W δ j j r     P W     d e v i c e s   ( D l )
w h e r e   ( D l )   i s   t h e   s e t   o f   a s s o c i a t e   d e v i c e s   l D ,   R e t u r n   t h e   t o u p l e   ( P W δ 1 , D j , D e p t _ c r y p t o _ i d   ) t o   L T P
*   A c c e s s   r e q u e s t   ( D i , r ) ; R e t u r n   t h e   t o u p l e   ( D i , s )
w h e r e   { s     s e t   o f   s e r v i c e s     r e s o u r c e   ( r ) }
Case Study 3: Under Case Study 3, the health care department is considered. By introducing contemporary technology in the healthcare sector, a robust and sustainable healthcare system is provided in a smart city. HC-BC is the blockchain dedicated to handling various operations related to the health care department. To manage the various components concerning the health care department, the following smart contract definition is used in this case study.
  • HC-BC smart contract: H is defined as the set of public keys used by each manager (m) of the health care department, D is defined as the set of public keys used by IoT devices (i), PH is defined as the set of policies used to access resource r with device i; mathematically it is indicated as P H i i r . This policy is defined as the policy used by device i to device i′ over the resource r. Mathematically, these sets are defined as:
    H = { H ( m ) 1 , H ( m ) 2 , H ( m ) 3 , H ( m ) 4 ,       ,   H ( m ) γ }
    where γ is total no. of managers for electricity department
    P H = { P H 1 i i r , P H 2 i i r , P H 3 i i r , P H 4 i i r ,       ,   P H μ i i r }
    where μ is the total no. of policies defined under the electricity department.
D is already defined under Equation (2)
The various operations defined under the HC-BC smart contract are listed below:
*   D e p a r t m e n t s   n e w   m a n a g e r   r e g i s t r a t i o n   ( H m ) ; H H     H D     d e v i c e s   ( D ) a n d     p o l i c i e s   ( P H )
*   N e w   d e v i c e   r e g i s t r a t i o n   ( H m , D i ) ; D D     D i     m a n a g e r s   ( H )
a n d     p l i c i e s   ( P H i )
w h e r e   ( P H i ) i s   t h e   a l l o w e d   p o l i c i e s   f o r   d e v i c e   i   P H ,   R e t u r n   t h e   t o u p l e   ( D i , D e p t _ c r y p t o _ i d   ) t o   L T P
*   Add   new   policy   ( PH μ + 1 , D j ) ;   PH j j r   PH μ j j r     PH     devices   ( D l )   where   ( D l )   is   the   set   of   associate   devices   l     D ,   Return   the   touple   ( PH μ + 1 ,   D j ,   D e p t _ c r y p t o _ i d )   to   LTP
*   R e m o v e   r e g i s t e r e d   m a n a g e r   ( H m ) ; H H     H D     d e v i c e s   ( H ) a n d     p o l i c i e s   ( P H )
*   R e m o v e   r e g i s t e r e d   d e v i c e   ( H m , D i ) ; D D     D i     m a n a g e r s   ( H ) a n d     p l i c i e s   ( P H i )
w h e r e   ( P H i ) i s   t h e   a l l o w e d   p o l i c i e s   f o r   d e v i c e   i   P H ,   R e t u r n   t h e   t o u p l e   ( D i , D e p t _ c r y p t o _ i d   ) t o   L T P
*   Remove   existing   policy   ( PH μ 1 , D j ) ;   PH j j r   PH μ j j r     PH     devices   ( D l )   where   ( D l )   is   the   set   of   associate   devices   l     D ,   Return   the   touple   ( PH μ 1 ,   D j ,   D e p t _ c r y p t o _ i d )   to   LTP
*   A c c e s s   r e q u e s t   ( D i , r ) ; R e t u r n   t h e   t o u p l e   ( D i , s )
w h e r e   { s     s e t   o f   s e r v i c e s     r e s o u r c e   ( r ) }
All smart contract policies are managed only by the department’s managers; no other blockchain node will alter these policies. However, this smart contract is acquiescently available for all the minors and it is the spin of a blockchain security mechanism. In addition to the above-mentioned policies and operations defined under the smart contract, the authentication process executed by LTP complements some additional authentication permissions and operations. The permissions and operations executed by LTP are defined in the subsequent portion of the section.

2.2.2. Removable Trust Chain (RTC)

D-crypto-id is defined as the set of device crypto ID(s), and U-crypto-id is defined as the set of user crypto ID(s). Access-P is defined as the set of access permissions granted to user u, for access resource r with device i; mathematically it is indicated as A c c e s s P u i r . Dept-crypto-id is defined as the set of department crypto ID(s). Mathematically, these sets are defined as:
D _ c r y p t o _ i d = { D _ c r y p t o _ i d ( c ) 1 , D _ c r y p t o _ i d ( c ) 2 ,       ,   D _ c r y p t o _ i d ( c ) k }
where ∀ divice Da unique D_crypto_id
U _ c r y p t o _ i d = { U _ c r y p t o _ i d ( u ) 1 ,   U _ c r y p t o _ i d ( u ) 2 ,       ,   U _ c r y p t o _ i d ( u ) ω }
A c c e s s _ P = { A c c e s s _ P 1 u 1 i r ,   A c c e s s _ P 2 u 2 i r ,       ,   A c c e s s _ P ω u ω i r }  
where A c c e s s _ P ω u ω i r is a set of access permissions for user ω to access resource r with device i.
D e p t _ c r y p t o _ i d = { D e p t _ c r y p t o _ i d ( d ) 1 ,   D e p t _ c r y p t o _ i d ( d ) 2 ,       ,   D e p t _ c r y p t o _ i d ( d ) ρ }
The access permissions and authentication managed by LTP under the removable trust chain (RTC) are listed below:
*   N e w   d e v i c e   r e g i s t r a t i o n   ( D i , D e p t _ c r y p t o _ i d ( d ) ) ; D D     D i     D e p t _ c r y p t o _ i d ( c ) and     A c c e s s P ( P ) ,
R e t u r n   t h e   t o u p l e   ( D i , D e p t _ c r y p t o _ i d ( d ) ,   D e p t _ c r y p t o _ i d ( c ) ,   A c c e s s P ( P ) )
t o   D D _ D B ,   w h e r e   D D _ D B   i s   d e p a r t m e n t ,   d e v i c e   d a t a b a s e .
*   A d d   n e w   p o l i c y   ( P μ + 1 , D j , D e p t _ c r y p t o _ i d ) ;   P j j r P μ j j r     P     d e v i c e s   ( D l )   D e p t _ c r y p t o _ i d   w h e r e   ( D l )   i s   t h e   s e t   o f   a s s o c i a t e   d e v i c e s ,   l D
*   R e m o v e   r e g i s t e r e d   d e v i c e   ( D i , D e p t _ c r y p t o _ i d ( d ) ) ;   D D     D i D _ c r y p t o _ i d ( c )   a n d     A c c e s s P ( P ) ,
R e m o v e   t h e   t o u p l e   ( D i , D e p t _ c r y p t o _ i d ( d ) ,   D _ c r y p t o _ i d ( c ) ,   A c c e s s P ( P ) ) t o   D D _ D B .
*   R e m o v e   e x i s t i n g   p o l i c y   ( P μ 1 , D j , D e p t _ c r y p t o _ i d ( d ) ) ;   P j j r P μ j j r     P     d e v i c e s   ( D l )   D e p t _ c r y p t o _ i d   w h e r e   ( D l )   i s   t h e   s e t   o f   a s s o c i a t e   d e v i c e s ,   l D
*   A c c e s s   U s e r   D e v i c e   (   U _ c r y p t o _ i d ( d ) ω ,   D _ c r y p t o _ i d ( d ) k ) ;   A c c e s s P ω u ω i r A c c e s s P ω u ω i r A c c e s s P ;   a c c e s s   d e n a y   i f f   t o u p l e   n o t   a v a i l a b l e   i n   U D D B ,
where U D _ D B is the U s e r   D e v i c e   D a t a b a s e .
*   Access   Department   D e v i c e   (   U _ c r y p t o _ i d ( u ) ω ,   D _ c r y p t o _ i d ( c ) k ) ;   A c c e s s _ P ω u ω i r A c c e s s _ P ω u ω i r A c c e s s _ P   and D _ c r y p t o _ i d ( c ) k Dept _ c r y p t o _ i d ;   a c c e s s   d e n a y   i f f   t o u p l e   n o t   a v a i l a b l e   i n   D D _ D B

2.3. Implementation

Proof of concept (PoC) is deployed to test and evaluate the system. This section is dedicated to the implementation of IoT devices, smart contracts, manageable hubs, and blockchain networks.
  • IoT devices: A LibCoAP library is used to simulate SH-WSN. Constrained application protocol (CoAP) RFC 7252 is a special web transfer protocol used for IoT networks [31]. A Tinydtls framework is used over the LibCoAP library to ensure the transport layer security [32]. LibCoAP-generated codes were improved to generate public/private keys for IoT devices. A 20-bytes-long public/private key is used to uniquely identify various IoT devices over the SH-WSN. CoAP used the REST model for the IoT devices [33]. General GET, PUT, POST, and DELETE methods are used for client–server interaction. For secure encryption 3072-bit, RSA Keys are deployed; although, through quantum computing techniques it is even possible to break 4096-bit and 8192-bit RSA Keys. To keep the framework less complex and economical, 3072-bit RSA has been deployed, which may be upgraded in the future by some suitable techniques to counter quantum computing attacks [34,35]. Table 2 illustrates the LibCoAP for IoT Devices.
  • Manageable hub: The CoAP server of the LibCoAP library is used as a manageable hub. CoAP clients at the IoT level are communicated over the CoAP server as a manageable hub. IoT devices connected over the SH-WSN create the CoAP request messages, and the CoAP server as manageable hubs are envisioned to respond over the CoAP request message.
  • Smart contract: Three different smart contracts are used by the three different departments as mentioned in the previous section. Solidity programming language is deployed to implement these smart contracts. Three different data structures are deployed to store the different components of smart contracts such as device information, department information, manager information, permissions, policies, etc. Mapping structures are employed to define various smart contract data structures [36].
  • Blockchain network: The scalable, programmable, decentralized, and secure nature of the Ethereum blockchain makes it usable for blockchain network implementation [37]. Further, the Ethereum blockchain is also suitable for the implementation of trust chain; hence, for the implementation of the blockchain network, Ethereum blockchain is used. To evaluate the proposed system, private Ethereum blockchain is used. The generic genesis block is employed for the prototyping of the private Ethereum blockchain. Initially, a prototype of a private Ethereum blockchain is recommended, however, at the time of actual implementation of the proposed system, public blockchain is necessary. However, the private blockchain provides us with substantially more accurate results in comparison to the public blockchain. However, it is difficult to deploy the real-life application over the private blockchain network because of its dynamicity.

3. Results and Discussion

The performance of the proposed system under three different case studies is presented in this section. Further, the performance of the complete system is also discussed in this section. To simulate the real-life scenario of a smart city, 500 devices under each case study are considered. Initially, 500 devices dedicated to a specific department are evaluated under various performance evaluation parameters. Subsequently, the overall performance of all three proposed departments are together evaluated; a total of 1500 devices are evaluated. Performance evaluations concerned with the proposed case study are presented below:
Case Study 1: A total of 500 devices dedicated to the electricity department were considered for this case study. Initially, only 100 devices were considered, and subsequently, the next group of 100 devices was added for experimental evaluation; similarly, the performance of all the 500 devices was evaluated. The performance evaluation is further branded for device creation, sensor reading, and query processing. Figure 8a illustrates the performance evaluation for device creation, Figure 8b illustrates the sensor reading, and Figure 8c illustrates the performance evaluation of query processing. The three lines in these graphs indicate the minimum, average, and maximum time taken to create a set of devices. These lines also show the best-, average-, and worst-case performance of the proposed model for device creation. During Case Study 1 performed for 500 devices associated with the electricity department, 8.56933 milliseconds is the average time taken by each device for creating, 9.60867 milliseconds is the average time taken to read each sensor, whereas to process an individual query the proposed model takes only 0.109033 milliseconds. The average time taken for complete query processing, including device creation, sensor reading, and query response, is recorded as 18.28703 milliseconds.
Case Study 2: A total of 500 devices dedicated to the water supply department were considered for this case study. Data sets for evaluation are considered similarly as considered under Case Study 1. During Case Study 2, a slight increase in device creation, sensor reading, and query processing is observed. For device creation, sensor reading, and query processing, the average increase is recorded as 0.02 milliseconds, 0.014667 milliseconds, and 0.001033 milliseconds, respectively. The overall time taken to process an individual query for Case Study 2 is recorded as 18.32273 milliseconds, which shows the increment of 0.0357 milliseconds compared with Case Study 1. Figure 9a–c illustrate the performance evaluation for device creation, sensor reading, and query processing, respectively, for Case Study 2.
Case Study 3: A total of 500 devices dedicated to the health care department were considered for this case study. Data sets for evaluation are considered similarly as considered under Case Studies 1 and 2. During Case Study 3, further slight increases in device creation, sensor reading, and query processing are observed. The average time taken for device creating, sensor reading, and query processing is 8.592 milliseconds, 9.632667 milliseconds, and 0.110133 milliseconds, respectively. The average time taken for complete query processing, including device creation, sensor reading, and query response, is recorded as 18.3348 milliseconds. Case Study 3 recorded the maximum time, followed by Case Study 2, which is associated with the water supply department. Case Study 1, which is associated with the electricity department, recorded the minimum time for all the processes. Figure 10 illustrates the performance evaluation for Case Study 3.
The collaborative performance of all three departments’ understudy is illustrated in Figure 11. The three different sections in Figure 11, i.e., sections (a), (b), and (c), illustrate the performance evaluation for device creation, sensor reading, and query processing, respectively. A total of 1500 devices from all three departments are together evaluated during this study. Initially, 100 devices from each department form the first dataset of a total of 300 devices and, subsequently, 100 new devices from each department were added for the next dataset. In the end, all 500 devices from each department were considered to form a dataset of 1500 devices. Sensor reading takes the maximum time, followed by device creation. The query process takes the least time during the entire cycle. During collaborative performance evaluation, 1.45% improvement in device creation and 1.63% improvement in sensor reading are recorded. On the other side, query processing takes 0.16% more time during the collaborative performance. Improvement in device creation and sensor reading results from the improvement of 2.92% in the overall process of query processing. The collaborative effects of all 1500 devices and 10,000 records registered a remarkable improvement: 78.54%, 77.07%, and 76.71% average improvement is registered for device creation, sensor reading, and query processing, respectively.

4. Conclusions

The proposed blockchain-inspired smart city solution and three departmental-based case studies concluded that the proposed model is suitable for scalable decentralized applications. All three case studies considered for this research concluded that with the increase in scale the performance of the proposed model is improving. The collaborative performance evaluation of all three case studies concluded with a 78.54% improvement in device creation, 77.07% improvement in sensor reading, and 76.71% improvement in query processing. The overall improvement of 77.44% makes the proposed model suitable for scalable applications. The combined use of permissioned trust chain and permissionless blockchain in the model makes it secure and robust for smart cities. The security, scalability, and distributed nature of the proposed model make it suitable for many other sustainable applications, including sustainable supply chain management, sustainable banking, sustainable e-governance, sustainable education, sustainable agriculture and irrigation, sustainable health care system, and many more. Scalable applications such as banking, education, e-governance, etc., will deploy this model for secure and distributed management. The security of smart contracts and permissioned trust chain also make it suitable for sensitive applications such as defense, external affairs, and policymaking.

Author Contributions

Conceptualization, A.A. and A.S.; methodology, A.A. and A.S.; validation, A.A. and A.S.; writing—original draft preparation, A.A. and A.S.; Writing—review and editing, A.S. All authors have read and agreed to the published version of the manuscript.

Funding

The authors would like to thank the research chair of Prince Faisal for Artificial Intelligence (CPFAI) for supporting this research work.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to thank the research chair of Prince Faisal for Artificial Intelligence (CPFAI) for supporting this research work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Muhammad, N.; Mohamad Zain, J. Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices. Malays. J. Comput. 2019, 4, 237–245. [Google Scholar] [CrossRef]
  2. Botta, A.; De Donato, W.; Persico, V.; Pescapé, A. Integration of cloud computing and internet of things: A survey. Future Gener. Comput. Syst. 2016, 56, 684–700. [Google Scholar]
  3. Bonilla, S.H.; Silva, H.R.; Terra da Silva, M.; Franco Gonçalves, R.; Sacomano, J.B. Industry 4.0 and sustainability implications: A scenario-based analysis of the impacts and challenges. Sustainability 2018, 10, 3740. [Google Scholar] [CrossRef] [Green Version]
  4. Verma, P.; Sood, S.K. Fog assisted-IoT enabled patient health monitoring in smart homes. IEEE Internet Things J. 2018, 5, 1789–1796. [Google Scholar]
  5. Pan, J.; McElhannon, J. Future edge cloud and edge computing for internet of things applications. IEEE Internet Things J. 2017, 5, 439–449. [Google Scholar] [CrossRef]
  6. M’hand, M.A.; Boulmakoul, A.; Badir, H.; Lbath, A. A scalable real-time tracking and monitoring architecture for logistics and transport in RoRo terminals. Procedia Comput. Sci. 2019, 151, 218–225. [Google Scholar] [CrossRef]
  7. Sarkar, C.; SN, A.U.N.; Prasad, R.V.; Rahim, A.; Neisse, R.; Baldini, G. DIAT: A scalable distributed architecture for IoT. IEEE Internet Things J. 2014, 2, 230–239. [Google Scholar] [CrossRef]
  8. Wang, Q.; Zhu, X.; Ni, Y.; Gu, L.; Zhu, H. Blockchain for the IoT and industrial IoT: A review. Internet Things 2020, 10, 100081. [Google Scholar] [CrossRef]
  9. Xu, R.; Chen, Y.; Blasch, E. Decentralized Access Control for IoT Based on Blockchain and Smart Contract. Modeling Des. Secur. Internet Things 2020, 15, 505–528. [Google Scholar]
  10. Nguyen, D.C.; Pathirana, P.N.; Ding, M.; Seneviratne, A. Blockchain for secure ehrs sharing of mobile cloud based e-health systems. IEEE Access 2019, 7, 66792–66806. [Google Scholar]
  11. Loffi, L.; Westphall, C.M.; Grüdtner, L.D.; Westphall, C.B. Mutual authentication with multi-factor in IoT-Fog-Cloud environment. J. Netw. Comput. Appl. 2021, 176, 102932. [Google Scholar] [CrossRef]
  12. Bittencourt, L.; Immich, R.; Sakellariou, R.; Fonseca, N.; Madeira, E.; Curado, M.; Villas, L.; DaSilva, L.; Lee, C.; Rana, O. The internet of things, fog and cloud continuum: Integration and challenges. Internet Things 2018, 3, 134–155. [Google Scholar] [CrossRef] [Green Version]
  13. Pavithran, D.; Shaalan, K.; Al-Karaki, J.N.; Gawanmeh, A. Towards building a blockchain framework for IoT. Clust. Comput. 2020, 23, 2089–2103. [Google Scholar] [CrossRef]
  14. Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar] [CrossRef]
  15. Ahad, M.A.; Paiva, S.; Tripathi, G.; Feroz, N. Enabling technologies and sustainable smart cities. Sustain. Cities Soc. 2020, 61, 102301. [Google Scholar] [CrossRef]
  16. Yigitcanlar, T.; Kankanamge, N.; Vella, K. How are smart city concepts and technologies perceived and utilized? A systematic geo-twitter analysis of smart cities in Australia. J. Urban Technol. 2020, 28, 135–154. [Google Scholar] [CrossRef]
  17. Yigitcanlar, T.; Kankanamge, N.; Regona, M.; Maldonado, A.; Rowan, B.; Ryu, A.; Desouza, K.C.; Corchado, J.M.; Mehmood, R.; Li, R.Y. Artificial intelligence technologies and related urban planning and development concepts: How are they perceived and utilized in Australia? J. Open Innov. Technol. Mark. Complex. 2020, 6, 187. [Google Scholar] [CrossRef]
  18. Giannoutakis, K.M.; Spathoulas, G.; Filelis-Papadopoulos, C.K.; Collen, A.; Anagnostopoulos, M.; Votis, K.; Nijdam, N.A. A Blockchain Solution for Enhancing Cybersecurity Defence of IoT. In Proceedings of the 2020 IEEE International Conference on Blockchain (Blockchain), Rhodes, Greece, 2–6 November 2020; pp. 490–495. [Google Scholar] [CrossRef]
  19. Rahouti, M.; Xiong, K.; Ghani, N. Bitcoin concepts, threats, and machine-learning security solutions. IEEE Access 2018, 6, 67189–67205. [Google Scholar] [CrossRef]
  20. Niranjanamurthy, M.; Nithya, B.N.; Jagannatha, S. Analysis of Blockchain technology: Pros, cons and SWOT. Clust. Comput. 2019, 22, 14743–14757. [Google Scholar] [CrossRef]
  21. Srivastava, G.; Parizi, R.M.; Dehghantanha, A. The future of blockchain technology in healthcare internet of things security. Blockchain Cybersecur. Trust. Priv. 2020, 1, 161–184. [Google Scholar]
  22. Ortega, V.; Bouchmal, F.; Monserrat, J.F. Trusted 5G vehicular networks: Blockchains and content-centric networking. IEEE Veh. Technol. Mag. 2018, 13, 121–127. [Google Scholar] [CrossRef]
  23. Dorri, A.; Luo, F.; Karumba, S.; Kanhere, S.; Jurdak, R.; Dong, Z.Y. Temporary immutability: A removable blockchain solution for prosumer-side energy trading. J. Netw. Comput. Appl. 2021, 180, 103018. [Google Scholar] [CrossRef]
  24. Ullah, I.; Ahmad, S.; Mehmood, F.; Kim, D. Cloud based IoT network virtualization for supporting dynamic connectivity among connected devices. Electronics 2019, 8, 742. [Google Scholar] [CrossRef] [Green Version]
  25. Puthal, D.; Malik, N.; Mohanty, S.P.; Kougianos, E.; Das, G. Everything you wanted to know about the blockchain: Its promise, components, processes, and problems. IEEE Consum. Electron. Mag. 2018, 7, 6–14. [Google Scholar] [CrossRef]
  26. Shahriar Hazari, S.; Mahmoud, Q.H. Improving Transaction Speed and Scalability of Blockchain Systems via Parallel Proof of Work. Future Internet 2020, 12, 125. [Google Scholar] [CrossRef]
  27. Nesarani, A.; Ramar, R.; Pandian, S. An efficient approach for rice prediction from authenticated Block chain node using machine learning technique. Environ. Technol. Innov. 2020, 20, 101064. [Google Scholar] [CrossRef]
  28. Naz, M.; Al-zahrani, F.A.; Khalid, R.; Javaid, N.; Qamar, A.M.; Afzal, M.K.; Shafiq, M. A secure data sharing platform using blockchain and interplanetary file system. Sustainability 2019, 11, 7054. [Google Scholar] [CrossRef] [Green Version]
  29. Patsakis, C.; Casino, F. Hydras and IPFS: A decentralised playground for malware. Int. J. Inf. Secur. 2019, 18, 787–799. [Google Scholar] [CrossRef] [Green Version]
  30. Masera, M.; Bompard, E.F.; Profumo, F.; Hadjsaid, N. Smart (electricity) grids for smart cities: Assessing roles and societal impacts. Proc. IEEE 2018, 106, 613–625. [Google Scholar] [CrossRef]
  31. CoRE Working Group. Constrained Application Protocol (CoAP) RFC 7252. Retrieved 2014, 20, 1–9. [Google Scholar]
  32. Basu, S.S.; Tripathy, S. Securing multicast group communication in IoT-enabled systems. IETE Tech. Rev. 2019, 36, 83–93. [Google Scholar] [CrossRef]
  33. Rahman, W.U.; Choi, Y.S.; Chung, K. Performance evaluation of video streaming application over CoAP in IoT. IEEE Access 2019, 7, 39852–39861. [Google Scholar] [CrossRef]
  34. Sharma, M.; Choudhary, V.; Bhatia, R.S.; Malik, S.; Raina, A.; Khandelwal, H. Leveraging the power of quantum computing for breaking RSA encryption. Cyber-Phys. Syst. 2021, 7, 73–92. [Google Scholar] [CrossRef]
  35. Zhu, Y.; Liu, Y.; Wu, M.; Li, J.; Liu, S.; Zhao, J. Research on Secure Communication on In-Vehicle Ethernet Based on Post-Quantum Algorithm NTRUEncrypt. Electron 2022, 11, 856. [Google Scholar] [CrossRef]
  36. Bhagavan, S.; Rao, P.; Njilla, L. A Primer on Smart Contracts and Blockchains for Smart Cities. In Handbook of Smart Cities; Springer: Cham, Switzerland, 2020; pp. 1–31. [Google Scholar]
  37. Ferretti, S.; D’Angelo, G. On the ethereum blockchain structure: A complex networks theory perspective. Concurr. Comput. Pract. Exp. 2020, 32, 5493. [Google Scholar] [CrossRef] [Green Version]
Figure 3. A conceptual framework for IoT and blockchain-empowered smart home.
Figure 3. A conceptual framework for IoT and blockchain-empowered smart home.
Mathematics 10 02378 g003
Figure 4. A conceptual framework for IoT and blockchain-empowered smart city.
Figure 4. A conceptual framework for IoT and blockchain-empowered smart city.
Mathematics 10 02378 g004
Figure 8. Performance evaluation for electricity department: (a) performance evaluation for device creation; (b) performance evaluation for sensor reading; (c) performance evaluation for query processing.
Figure 8. Performance evaluation for electricity department: (a) performance evaluation for device creation; (b) performance evaluation for sensor reading; (c) performance evaluation for query processing.
Mathematics 10 02378 g008
Figure 9. Performance evaluation for water supply department: (a) performance evaluation for device creation; (b) performance evaluation for sensor reading; (c) performance evaluation for query processing.
Figure 9. Performance evaluation for water supply department: (a) performance evaluation for device creation; (b) performance evaluation for sensor reading; (c) performance evaluation for query processing.
Mathematics 10 02378 g009
Figure 10. Performance evaluation for health care department: (a) performance evaluation for device creation; (b) performance evaluation for sensor reading; (c) performance evaluation for query processing.
Figure 10. Performance evaluation for health care department: (a) performance evaluation for device creation; (b) performance evaluation for sensor reading; (c) performance evaluation for query processing.
Mathematics 10 02378 g010
Figure 11. Collaborative performance evaluation: (a) performance evaluation for device creation; (b) performance evaluation for sensor reading; (c) performance evaluation for query processing.
Figure 11. Collaborative performance evaluation: (a) performance evaluation for device creation; (b) performance evaluation for sensor reading; (c) performance evaluation for query processing.
Mathematics 10 02378 g011
Table 2. Consensus.
Table 2. Consensus.
ComponentDescription
ProtocolCoAP RFC 7252
ModelREST
MethodsGET, PUT, POST, and DELETE, etc.
IntegrationApplication-agnostic-cross-protocol proxies
Data FormatXML, JSON, CBOR, or any custom data format
Inexpensive IoT nodes (microcontrollers)Minimum 10 KiB of RAM and 100 KiB of code space
Client/ServerCoAP Client/CoAP Server
SecureDTLS parameters (3072-bit RSA Keys)
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Aldribi, A.; Singh, A. Blockchain Empowered Smart Home: A Scalable Architecture for Sustainable Smart Cities. Mathematics 2022, 10, 2378. https://doi.org/10.3390/math10142378

AMA Style

Aldribi A, Singh A. Blockchain Empowered Smart Home: A Scalable Architecture for Sustainable Smart Cities. Mathematics. 2022; 10(14):2378. https://doi.org/10.3390/math10142378

Chicago/Turabian Style

Aldribi, Abdulaziz, and Aman Singh. 2022. "Blockchain Empowered Smart Home: A Scalable Architecture for Sustainable Smart Cities" Mathematics 10, no. 14: 2378. https://doi.org/10.3390/math10142378

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop