iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.3390/s20143965
Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain
Next Article in Journal
A Smartphone Crowdsensing System Enabling Environmental Crowdsourcing for Municipality Resource Allocation with LSTM Stochastic Prediction
Next Article in Special Issue
A Hybrid Dynamic Encryption Scheme for Multi-Factor Verification: A Novel Paradigm for Remote Authentication
Previous Article in Journal
The Impact of the Improved Search Object Detection on the SAR Action Success Probability in Maritime Transport
Previous Article in Special Issue
OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain

1
Shanghai Key Laboratory of Intelligent Information Processing, School of Computer Science, Fudan University, Shanghai 200433, China
2
Turku Intelligent Embedded and Robotic Systems Group (TIERS), Faculty of Science and Engineering, University of Turku, FI-20014 Turku, Finland
3
School of Information Science and Engineering, Fudan Univeristy, Shanghai 200433, China
4
Department of Computing and Mathematics, Manchester Metropolitan University, Manchester M15 6BH, UK
5
Fudan-Zhongan Joint Laboratory of Blockchain and Information Security, Shanghai Engineering Research Center of Blockchain, Shanghai 200433, China
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(14), 3965; https://doi.org/10.3390/s20143965
Submission received: 30 May 2020 / Revised: 8 July 2020 / Accepted: 8 July 2020 / Published: 16 July 2020

Abstract

:
With an increasing penetration of ubiquitous connectivity, the amount of data describing the actions of end-users has been increasing dramatically, both within the domain of the Internet of Things (IoT) and other smart devices. This has led to more awareness of users in terms of protecting personal data. Within the IoT, there is a growing number of peer-to-peer (P2P) transactions, increasing the exposure to security vulnerabilities, and the risk of cyberattacks. Blockchain technology has been explored as middleware in P2P transactions, but existing solutions have mainly focused on providing a safe environment for data trade without considering potential changes in interaction topologies. we present EdgeBoT, a proof-of-concept smart contracts based platform for the IoT built on top of the ethereum blockchain. With the Blockchain of Things (BoT) at the edge of the network, EdgeBoT enables a wider variety of interaction topologies between nodes in the network and external services while guaranteeing ownership of data and end users’ privacy. in EdgeBoT, edge devices trade their data directly with third parties and without the need of intermediaries. This opens the door to new interaction modalities, in which data producers at the edge grant access to batches of their data to different third parties. Leveraging the immutability properties of blockchains, together with the distributed nature of smart contracts, data owners can audit and are aware of all transactions that have occurred with their data. we report initial results demonstrating the potential of EdgeBoT within the IoT. we show that integrating our solutions on top of existing IoT systems has a relatively small footprint in terms of computational resource usage, but a significant impact on the protection of data ownership and management of data trade.

1. Introduction

A wider adoption of the Internet of Things (IoT) devices and systems across different industries and domains come together with an exponential increase in the amount of real-time data being generated and processed) [1]. From the point of view of data privacy and trade between devices at the edge acquiring the data and cloud-based third-parties processing it, multiple challenges remain [2]. While the IoT emerged with the adoption of cloud technology, in recent years more distributed approaches are being adopted and new paradigms are emerging [3]. Among these tendencies, the edge computing paradigm has materialized as those architectures that shift most of the data processing closer to where it is being generated, at the edge of the network. This shift and optimization in computation also lead to better network usage and significant reductions in the network load. However, the change in network topologies also comes with a new set of data privacy and security implications that must be considered [4]. Blockchain technology provides inherent security, proof of ownership, and identification, hence being a potential solution for many of the cybersecurity challenges in the IoT [5]. By taking advantage of the built-in consensus mechanisms, IoT systems can rely on blockchain for managing data integrity and immutability [6].
A recent trend in the IoT is to distribute the data processing and analysis through a series of network layers, extending a traditional cloud-centric architecture [7]. By shifting the computation load towards the edge of the network, applications can benefit from advantages, including lower latency and more optimized network load [8]. Furthermore, in many applications, raw data do not need to be stored and only the result of its analysis is kept [9]. Therefore, it is no longer the best strategy to continuously transmit real-time data to the cloud. In turn, embracing the edge computing paradigm reduces the possibility of data privacy violations [10], but it also raises additional security considerations, including reliability of information and authenticity of the data sources. In some scenarios, such as health-care IoT, edge computing can be leveraged for increasing the security of personal data [11]. Nonetheless, the addition of intermediate layers between IoT devices, cloud servers, and end-users applications increases the exposure to security flaws, injection of malicious code, and cyberattacks [12].
Over the past decade, an amalgamate of IoT products, solutions, and systems have been penetrating both industrial and domestic domains, which has led to a growing number and variety of security vulnerabilities and cyberattacks [13]. Proper security methods gain special significance in environments where personal data is being gathered, such as smart homes [14]. In particular, voice assistants are becoming increasingly accessible in the consumer electronics market, creating a direct risk to end-users privacy [15]. The utilization of current encryption methods is not enough to protect users’ data and privacy [16]. Therefore, the need for a more robust solution for sharing and trading personal data securely and safeguarding privacy is evident.
Since the introduction of Bitcoin in 2008, blockchain technology has become increasingly utilized in various domains, mostly for finance-related applications, or as an immutable distributed data storage solution [17]. it was with the introduction of ethereum and the ability of running short programs within the blockchain, when a vast number of applications emerged, in particular in the IoT field [18]. With proof of ownership and distributed data transactions, blockchain technology provides a natural channel for trade between data producers or sellers (edge devices) and data consumers or buyers (i.e., third-party applications) [19]. Current works integrating blockchain for the IoT focuses on securing individual transactions between applications and edge devices [20], or among devices [21]. We believe that its potential at a system level for integrating edge devices as data producers and applications or third-party services as data consumers is yet to be explored in more detail. Therefore, we put a focus on the problem of data ownership, enabling the integration, validation, control, and audit of third party access to IoT data.
This paper introduces EdgeBoT, an IoT system architecture exploiting edge computing for data processing and the ethereum blockchain as a distributed middleware. EdgeBoT enables direct peer-to-peer data transactions in the Blockchain of Things (BoT). Our proposed model transfer the data trading rights directly to their producers (edge computing devices), which rely on smart gateways to run the blockchain. In particular, we are interested in the ethereum blockchain because of the possibility to run smart contracts, scripts that are validated as part of a transaction in the blockchain. Smart contracts are written in a scripting language designed as part of ethereum and executed and validated in a decentralized manner validation of [22]. We leverage the inherent secure nature of these contracts to secure and control third-party access to IoT data. Furthermore, the immutability of a blockchain transactions’ records permits the audit of past transactions by any node in the network.
The rest of this paper is organized, as follows. Section 2 explores related works in the use of blockchain technology in IoT platforms. Section 3 introduces the EdgeBoT architecture and presents its advantages for secure integration of third-party services with IoT devices. In Section 4, Experimental data, results, and validation of EdgeBoT are presented in Section. Finally, Section 5 concludes the work and describes future research directions.

2. Related Work

Although considerable research has been conducted on security and privacy solutions for IoT devices [14,23,24,25], edge-based solutions for data security were also presented frequently in recent years [26,27,28], and specifically distributed blockchain-based solutions for data privacy. Since its early development, blockchain technology has been seen as a candidate to solve many of the security challenges that centralized data exchange models inherently have, due to its decentralized nature and full end-to-end encryption scheme. Table 1 lists out major challenges and problems in the existing centralized infrastructure and their proposed solutions based on blockchain [18,29,30]. In this section, we review and summarize previous works on exploiting blockchain-based solutions to increment data privacy, data ownership, and secure P2P transfer data within the IoT.
In [31], Li et al. propose an efficient and secure mobile healthcare system, Edgecare, which provides a hierarchical distributed architecture to manage and guarantee healthcare data privacy by leveraging edge computing with stackelberg game-based optimization algorithm to achieve fair data trading. In another study [32], Lin et al. present Edge-AI enabled architecture to make sensory data trade-able as a knowledge. Authors work on a proof-of-trade consensus mechanism and non-cooperative game based optimum knowledge approach to build a knowledge market. In a recent review by Krittanawong et al.  [33] summarizes the potential opportunities and challenges by integrating blockchain with AI to develop personalized medicine for cardiovascular, according to their review this combination can work as a booster for reliable data availability needed for personalized medicines, but still, it is needed to consider the privacy of patients and data producers. Debe et al. [34] proposed an IoT based decentralized trust model that consists of fog nodes to get the reputation of publicly available fog nodes. Trust level is retained by using the feedback from existing users and interactions, by using this approach reputation management system will become more reliable and transparent as compared to existing third party based systems. In another recent research work [35], Mazzei et al. proposed and implemented a trustless industrial solution that acts as a bridge between IoT solutions and the virtual world of digital twins. This proposed blockchain-based solution provides a standalone interoperable tracking system for industrial applications. When compared to this and other solutions available, our proposed architecture is so far generic, and we have focused towards discussing a system-level view rather than on specific integrations, which will be the objective of our future works.
Yuan et al. [36] designed and implemented an emission trading system that is based on hyperledger, another open-source permissioned blockchain-based distributed system. This system can be leveraged for increasing credibility in trading services for polluters by sharing immutable transactions in a chain. In another study by Rehman et al. [37], a quite similar approach is used for sharing economy services. Cognitive edge framework that is based on blockchain technology is proposed to secure smart city services by using smart contracts and off-chain nodes to store immutable records. AI is used to extract informative information from existing records for training datasets need to use for smart contract logic. In addition to academia, Popov et al. [38] proposed iota, a distributed ledger for commercial IoT products and services. When compared to a traditional blockchain architecture, iota replaces the chain for the tangle, a data structure based on a directed acyclic graph that enables better scalability and lower latency for transaction confirmation [39]. Iota solves the main challenge preventing micro-payments being more widely adopted with blockchain in the IoT: the fact that the cost of processing a transaction is higher than the amount of currency involved in the transaction itself. In iota, there are no transaction fees. This is possible, because, in order to make a transaction, nodes need to validate two other transactions. This scenario is quite relevant to the approach we implement in our model. In EdgeBoT, a node does not need to compute existing transactions to save new transactions in the chain while in iota, the node first needs to participate in the validation of two other transactions.
In a comprehensive survey, Yang et al. [40] addressed significant challenges, including security and privacy, self organization, functions integration, scalability, and resource management of integrated blockchain based edge systems. The authors also proposed a comprehensive classification of state of the art solutions by providing use-case based scenarios and attempts to explore the technologies working near the blockchain-based edge computing domain. Cha et al. [41] proposed a robust digital signature scheme for blockchain connected gateway to maintain user privacy preferences for IoT devices securely. Bergquist et al. [42] proposed and implemented blockchain technology and smart contracts as means of building privacy-sensitive applications. The authors used medication plans as a primary use-case but they proposed that results can be shifted to other applications where sensitive data are being shared and a proof of legitimacy or authentication is required.
Another significant challenge of edge computing based on blockchain is scalability. Instead of chain models, researchers come up with different solutions. Poon et al. [43] come with a scalable decentralized autonomous blockchain solution Plasma based on edge computing, which can update billion state updates within a second. They propose blockchain consortium in a MapReduce format, which allows for child chains (sidechains) over a hierarchical tree to come up with the scalability problem. It allows efficient matching of hierarchical ledger topology and provides fixed withdrawal delays to increase its scalability by minimizing the damage. It works in asynchronous mode during transaction handling. A similar approach was proposed by the Zilliqa team [44], where they use the concept of sharding to cope with scalability issues. In this work, they divided the load into smaller shards that can process parallel transactions. Along with sharding, a new scripting language for special propose smart contracts and execution environment as an under-laying architecture was proposed. Which makes a considerable difference in a computation platform for high scale parallel transactions. Another similar work is done by Sompolinsky et al. [45], who proposed a tree-based distributed ledger instead of chain framework. They focused on network delay effects, which lead to double-spend attacks. The GHOST protocol is introduced by modifying the bitcoin protocol, which increases security by reducing the confirmation time of transaction.
Most of the existing applications were focused on securing connectivity between end-users and specific IoT devices, routing connections through a blockchain-based network. However, to the extent of the authors’ knowledge, little to no attention has been put in exploiting blockchain and smart contracts to provide P2P data trade and data ownership rights for data-sensitive environments to its’ producers. Therefore, we propose an EdgeBoT platform that adapts to a wide variety of M2M interaction topologies. At the same time, it is scalable and takes into account the integration of both smart gateways and end-devices at the edge of the network, with a wide range of computing capabilities.

3. EdgeBoT: P2P Data Trade Architecture

Transactions that involve data exchanges strongly rely on third-parties that act as intermediaries. Traditionally, data acquired by end-devices has been analyzed, aggregated and stored by cloud services. Third-party cloud services, in turn, act as a bridge between data producers and consumers. The strong dependency of the digital world on the third-party cloud services opens the door to a wide variety of vulnerabilities in terms of security and data privacy protection. More recently, the rising paradigm of fog/edge computing has broadened the network stack by adding extra layers between end-devices and cloud services or other third parties. These layers, which are closer to both data consumers and producers, are often less secure than cloud services and increase the number of possible vulnerabilities in the overall system [46]. While blockchain was originally designed for data storage security, immutability, and auditability, it also has the advantage of allowing end-users or devices to exchange digital assets directly without any intermediate third parties involved in the process [29,47].
EdgeBoT is a network architecture that consists of manager nodes (arbitrator, regulatory authorities, handlers), edge gateways, sensors, and actuators, as well as end-user applications (data buyers). The overall system divides into the following layers:
  • Sensor layer includes individual sensors, actuators or other light nodes which do not possess any computational or storage capabilities to participate in a network for data processing and trade.
  • Edge layer consists of a local network (BLE, radio access points) and single-board computers (SBC).
  • Fog layer consists of manager nodes which work as an arbitrator, regulatory authorities, transaction and data handlers for the Ethereum blockchain.
  • Cloud layer provides a place for applications and storage.
Figure 1 illustrates the architecture of the deployed EdgeBoT network, with P2P distributed communication and data exchange. Apart from cloud services and applications running on other powerful computing platforms, manager nodes at the Fog layer represent the bulk of the network nodes that work independently in a fully autonomous way (pre-defined smart contracts or scripts). These require higher computational capabilities to handle a large number of parallel operations. The Fog layer is directly connected to the Cloud layer providing the final step in forming the final link between the Sensor and Cloud layers. The Fog layer is responsible to initialize a network, the System initialization process in the sequence diagram that is shown in Figure 2. The Fog layer is also fully responsible for running the Ethereum network and creating smart contracts. Therefore, edge gateways at the Edge layer first request to join the private Ethereum network (the New device registration block in Figure 2) to obtain the cryptographic keys generated at the Fog layer. By private we do not mean a consortium blockchain where certain nodes have higher authority, but only that new nodes will need to request access to a single manager for joining the blockchain (after which the manager is just a normal node). Edge gateways can connect and handle several sensors and actuators located at the Sensor layer. Sensors are responsible to gather data and send them to the upper layer for processing and storage, the Data processing, encryption and storage block Figure 2. Whenever a new node wants to buy or sell data in the EdgeBoT network, it first needs to register in the network, the New buyer registration block in Figure 2. During this operation, a child key derivation (CKD) function generates both private-public keys for the node. At that point, the buyer node becomes a full member of the network by creating its public key derived from network key and has access to the encrypted history of transactions and all previous data batches that have been generated since the establishment of the platform.

3.1. Data Processing and Aggregation at the Edge

Edge gateways are smart gateways at the edge of every sidechain and work with local networks only. Edge gateways consist of SBC’s, such as Raspberry Pi boards or Intel UP boards, which have enough computational capabilities to run AI algorithms that are designed for resource-constrained devices. The sensor layer consists of several actuators or sensors which do not possess any computational capabilities to participate directly in the blockchain network. Therefore, sensor nodes rely on the edge gateway that they are connected to, which acts as an intermediary for them. These edge gateways run sidechains to store data hashes of their previous data batches and transaction validation records. Complete flow of generation of data batch from the data segment, its processing at edge gateways, and storage on cloud layer are described in the data processing, encryption, and storage block of sequence diagram shown in Figure 2.
Sensor nodes are connected to one edge node only, which minimizes the vulnerable channels in which data could be compromised. If one sensor node is compromised, an adversary can only affect that particular edge node. Therefore, single encrypted connection significantly increases the levels of data security, ensures fair access to data and proper ownership, adding the sensor nodes to the backbone chain of the EdgeBoT network. While the manager nodes at the Fog layer can communicate with any other manager node in the network in a completely autonomous way, without any external supervision to its actions or reactions. These nodes can also be used as a custom access control model.

3.2. Data Trade through Ethereum

The backbone of EdgeBoT is the Ethereum blockchain, which records all transactions that occur within the network by using a time-stamp system and cryptographic hashes to prevent alteration retroactively [48]. By using smart contracts, all of the specifications of any particular user, such as limited access time to a network, can be defined, ensured, and recorded.
The complete sequence of data transaction in EdgeBoT is illustrated in the transaction initialization block in Figure 2. Whenever an external buyer (a cloud layer application) wants to acquire data, it joins the network and requests a given data batch while using batch headers that are available publicly on the network. A manager node at the Fog layer replies with the transaction price and conditions. If the buyer accepts the conditions, the manager node validates the transaction and sends the unique secret encryption key (derived from CKD function) of the requested data batch by encrypting it with ECDSA, using the buyer’s public key along with the address of the data batch. The buyer downloads the encrypted data batch from cloud layer (storage) and decrypts it using its public key. After getting the required data, possible scenarios occur which are shown in Figure 3. In a normal case, a buyer is satisfied with the received data. In a dispute case, a buyer is dissatisfied with the received data, or even unable to download or decrypt the data. In this case, the buyer can request for a refund. After getting the refund application, a manager node verifies the request by downloading the required data batch. If the buyer’s request is legitimate, the refund request will be processed. If the buyer was wrong, the manager node sends the encrypted sk again, which finalize the transaction request.

3.3. Security Measures

The distributed structure of edge/fog computing brings security and privacy challenges for the system involve heterogeneous edge nodes. Several vital security challenges have been identified in [49,50,51]. Distributed Denial of service (DDoS) and Man in the Middle (MITM) different security measure have been taken into account to overcome these reported attack vulnerabilities like Sybil attacks, which is explained in Table 2. DDoS and Time-delay attacks are handled in our proposed system by limiting the number of requests by the edge node to the sensor node and vice-versa. By using different encryption schemes and system elements, EdgeBoT is resilient enough for network and data security attacks. Elliptic curve integrated encryption scheme (ECIES) [52] has been used to save data securely by using the child key derivation function (CKD) [53] for every data batch, the elliptic curve digital signature algorithm (ECDSA) [54] is used to share the unique key of data and communication. To increase security, double authentication of nodes is required after three frequent requests per minute by the same buyer. When a buyer requests data from a manager node that is stored encrypted in a third-party service, i.e., cloud storage. The Manager node sends the encryption key of the requested data batch with its storage location on the cloud is to the buyer instead of sending the requested data batch itself. This scheme is chosen to save bandwidth and computational resources in edge nodes, as well as avoiding storage limitations at the edge. To transfer child secret key csk, in a secure way to the buyer, asymmetric encryption is used. Suppose that c s k N is the key to the requested data batch N of data. Subsequently, the node encrypts c s k N with the buyer’s public key, which will be, in turn, decrypted at the receiving end with the buyer’s secret key. Information regarding the location of the stored data is also included in the encrypted payload, together with c s k N , if that information is not known by the buyer beforehand.
  • ECIES is used in key encapsulation mechanism which combined with a data encapsulation mechanism, to encrypt data batch by using the public key of edge node and send encrypted data to managerial nodes. As compared to the more widely used Rivest–Shamir–Adleman (RSA) cryptosystem, elliptic curve cryptography (ECC) requires shorter keys to provide the same levels of security. At the same time, ECC usually requires lower computational and memory resources, which makes it stand strong for scarce computing devices. It is used in practice to establish a key in situations where data transfer is unidirectional or data is stored encrypted under the public key.
  • CKD functions are used by hierarchical deterministic wallets to derive children keys from parent keys. This methodology is employed to generate a unique secret key for each data batch in the device to be encrypted. Based on the parent’s public key (private and public keys are both 256 bits), its chain code and the desired child index, and  512-bit hash is generated. The one-way hash function used in the process makes it impossible to obtain the original parent key from the n t h -child key. The additions modulo n in the process generate seemingly random numbers.
  • ECDSA is the first successful standard algorithm based on elliptic curve cryptography, which gained the attention of security researchers due to its robust mathematical structure and smaller key sizes for constrained resource devices. it is used in the communication of buyers and sellers as well as to send unique child secret of required data batch.
Advanced encryption scheme (AES) is used in EdgeBoT to securely store private data, cloud services or other third-party storage solutions. To store the data in a secure, encrypted way is of particular importance to edge nodes or those nodes in the network that do not have enough resources for local storage. AES encryption is chosen due to its high speed and less number of bits required for the encrypted payload as compared to other data encryption standards, like DES. Besides, most newly developed micro-controllers provide hardware modules for AES encryption.

4. Implementation and Results

To test the feasibility and reliability of the EdgeBoT architecture in real-life scenarios, the proposed architecture is implemented  using the Raspberry Pi 3 Model B+ minicomputer as an edge gateways. For the implementation of the different parts of the system, the Go programming language (golang), Solidity for the smart contracts, and a suite of web technologies (Node.js®, HTML5, CSS3, jQuery) for the front-end application are used. We run Raspbian based on Linux kernel version 4.14.52-v7+ in the Raspberry Pi, which has 1GB of RAM and 4-core ARM processor (BCM2837 @ 1.4GHz). A local Wi-Fi network has been used to enable communication between different edge gateways and its sensor nodes. The cloud servers are simulated with a desktop computer, equipped with an Intel Core i5 processor and 8GB of RAM memory. Remix IDE is used to deploy smart contracts. Data requests and transactions to and from third-party cloud services are generated with Metamask, a browser extension enabling us to initiate parallel transactions during the experiments.

4.1. System Implementation

This solution is divided into six processes, as described below. Each process is accompanied by a short pseudo-code algorithm, which describes the different steps. SC is used to refer to smart contracts.
  • System initialization: the generation of encryption parameters, creation of genesis file, and the initialization of the Ethereum blockchain. Define terms of usage, certificates, and policies through smart contracts. A new device/buyer registration process is done through the implementation of smart contracts.
  • Generation of encryption keys: Each connected device generates its key pair of secret and public keys ( s k , p k ) . The secret key is randomly generated, and then the private key and child secret keys are derived from it. Each child secret key is used to encrypt one data batch.
    Process 1:
    Sensors 20 03965 i001
    Process 2:
    Sensors 20 03965 i002
  • Data processing, encryption and storage: Edge gateways divide the acquired data segments into data batches after every time T and implement embedded edge AI algorithms. If edge devices do not have enough resources to process data, data is saved as raw data. After encryption, devices call the smart contract function. NewDataBatch to add a transaction to the blockchain. The transaction includes the data hash, the encrypted AES encryption key, the time-stamp of the storage operation, type, and the size of stored data and price. After encryption and broadcasting the hash and metadata, each batch is sent to a storage.
  • Transaction Initialization: When the Application layer (buyer) requests a data batch from manager nodes (seller), it first looks into the available records calling the smart contract function LookUpBatch. If it finds suitable data and its price is within predefined limits, then it initializes a data trade by depositing the amount. This is done calling the smart contract function Deposit, to which a buyer adds a price, its public encryption key, its address or identifier, and the ID of the requested batch.
    Process 3:
    Sensors 20 03965 i003
    Process 4:
    Sensors 20 03965 i004
  • Transaction Confirmation: Manager nodes run this process periodically, querying available DataBatch requests with a deposit. If any deposit is found meeting the selling conditions in the requested batch, it validates the transaction, and then it encrypts the csk of the requested batch with the buyer’s public key and confirms the Deal.
  • Finalization of data transfer: When a buyer receives an encrypted data batch AES key, it uses the ECIES decryption algorithm to obtain the AES batch key. Subsequently, it queries the storage provider with the batch address and decrypts it to obtain the information. The data transfer, or purchase, is done if a buyer is satisfied. If the buyer is not satisfied with the received data batch, it will ask for a refund. The manager node will respond to a dispute case by cross-checking the batch details. After obtaining the results, a manager node will respond according to the results.
    Process 5:
    Sensors 20 03965 i005
    Process 6:
    Sensors 20 03965 i006

4.2. Performance Analyses

Resource consumption has been analyzed at edge gateways to check the required resources to handle the transaction validation. Figure 4 shows the percentage usage of RAM and CPU along Y-axis. These results are calculated during transaction validation as well as in an idle condition. In the idle condition, the percentage usage of RAM is 17% as an average, and during transaction, an increase of 10% to 15% is shown. Overall, on average, it used about 26% of RAM resources whose impact on overall system memory usage is not significant during a transaction. However, sharp peaks can be seen in the CPU utilization; in the Idle condition, only 8% CPU resources were used as average, while during a transaction it used up-to 45% of the total. The CPU variance at idle time was of about 10% and about 5% at peak usage.
The time that is required to complete a transaction by the edge gateway is measured and subdivided into sections: time required to retrieve metadata (TRD), transaction validation time (VTR), and transaction confirmation time (TCT). The measurements are shown in Figure 5. When considering the available limited resources, it is promising that TRD needs only 34.6 ms on average, VTR 36 ms and TCT 73.6 ms on average. it is worthwhile to note that TCT also relies on the network, which, in this experiment, was affected by our shared Wi-FI network’s slow network response time resulting in increased overall time.
Our second group of experiments focused on the end-to-end delay of concurrent requests: end-to-end delay = request initialization by interested buyer + time to retrieve metadata + response time by manager nodes + time to confirm one transaction. The results in Figure 6 show an increase in the end-to-end delay by the increasing number of concurrent transaction requests. These results from a group of experiments show the efficiency of the proposed model to implement in information critical systems data trade autonomously. This proposed trust-less structure increases reliability and transparency in data trade. it led us to consider that single board computers can work as manager nodes to handle their associated data and transactions without the need for third party cloud services in the future, since the computational resources required leaving room for other edge services and data processing processes to run at the same time. However, increased delay with a parallel number of transactions shows its limitations to be used in mission critical systems where time span comes at first priority.

4.3. Scalability Analysis

Edge/fog computing comes with significant benefits; however, it has an inherent scalability barrier that limits its ability to support a wider range of applications. Specifically, system models require robust block creations, involve millions of edge nodes, and a large number of transactions per second. Several researchers have directed their efforts towards mitigating this issue, with different models to replace chain models. Some of the existing proposals that address this challenge are pegged sidechains [55], hierarchical trees [43], cross-chains [56], and DAG [57]. However, in EdgeBoT, scalability enhancement is not a concerning issue, as it is working in a private P2P network that can subdivide this network as sidechains. Edge gateways are not required to process several requests per minute. After every time T, manager nodes need to check whether there are new requests for data. If it has a request in a queue, it will respond to every request one by one.

5. Conclusions and Future Work

With the increasing usage of connected devices, the Internet of Things (IoT) is generating a vast amount of data, but the protection of personal data, the online privacy of users and organizations is becoming an increasingly challenging task. Intermediaries and dependence on third-parties act as adversaries and opens the door to a wide variety of vulnerabilities.
In recent years, the edge-computing paradigm, together with ethereum, a distributed ledger, has shown great potential to be widely leveraged and adopted for securing IoT applications. We have presented EdgeBoT, a topology for edge computing (actuators, sensors, and end-user applications) that provides P2P data trade without the need for a third party, making clear the vision of data ownership model. It enables the extension of a private ethereum blockchain to resource-constrained edge devices through a hybrid edge-cloud computing architecture that relies on smart gateways to run the blockchain. EdgeBoT is easily adaptable, scalable, and able to accommodate a wide range of applications.
In EdgeBoT, devices are fully autonomous in terms of their P2P interaction topologies, being able to directly trade their data with third parties. All policies of data trade and ownership rights are implemented through smart contracts. Sidechains are used for parallel transactions and they make a system scalable. They also limit the use of bandwidth and energy needed by edge gateways to update blockchain. To securely store data, devices use elliptic curve integrated encryption scheme (ECIES), generating a unique key for every saved data batch by using child key derivation function (CKD), and double authentication for devices sending requests frequently, which makes our solution resilient enough to vulnerable attacks. To share these unique keys, we have implemented an elliptic curve digital signature algorithm (ECDSA) for communication. The proposed EdgeBot architecture serves as a generic model to secure IoT data ownership rights while preserving the privacy of users. It can be implemented in smart home devices, the industrial internet of things (IIoT), smart health applications (including precision medicine, clinical trials, or accuracy diagnosis), knowledge based systems, or in the research and development of different IoT products.
We executed extensive proof-of-concept experiments to evaluate the performance and reliability of the proposed model. The experiments showed that less than 40% of computing resources were used on average. This indicated that our model can be implemented on various low power single board minicomputers available as off-the-shelf products. Promising results of performance analysis lead us to consider the EdgeBoT as a feasible model for edge computing to secure IoT data ownership and trade.
At this stage, our system shows some limitations of response time, which makes it limited to static environments only. Scenarios where a user needs a rapid response in dynamic environments need further study and will be one of the objectives of our next works. Furthermore, we are exploring a tighter integration of AI algorithms towards embedded and secure edge intelligence and extending our other works in this area [10,58]. we aim at defining new frameworks able to deal with heterogeneous data sources and a wide array of application scenarios.

Author Contributions

Conceptualization, A.N.; Data curation, A.N. and J.G.; Methodology, A.N. and J.P.Q.; Supervision, H.K. and T.W.; Writing—original draft, A.N. and J.P.Q.; Writing—review and editing, J.P.Q., M.A., T.N.G., A.K.B., H.K. and T.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by National Natural Science Foundation of China (Grant No. 61672166 and U19A2066) and National Key R & D Program of China (No. 2019YFB2101703).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
  2. Ahmed, S.M.; Rajput, A. Threats to patients’ privacy in smart healthcare environment. In Innovation in Health Informatics; Elsevier: Amsterdam, The Netherlands, 2020; pp. 375–393. [Google Scholar]
  3. Dastjerdi, A.V.; Buyya, R. Fog computing: Helping the Internet of Things realize its potential. Computer 2016, 49, 112–116. [Google Scholar]
  4. Roman, R.; Lopez, J.; Mambo, M. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 2018, 78, 680–698. [Google Scholar]
  5. Huh, S.; Cho, S.; Kim, S. Managing IoT devices using blockchain platform. In Proceedings of the IEEE 19th International Conference on Advanced Communication Technology (ICACT), PyeongChang, Korea, 19–22 February 2017; pp. 464–467. [Google Scholar]
  6. Shafagh, H.; Burkhalter, L.; Hithnawi, A.; Duquennoy, S. Towards Blockchain-based Auditable Storage and Sharing of IoT Data. In Proceedings of the 2017 on Cloud Computing Security Workshop, CCSW ’17, Dallas, TX, USA, 3 November 2017; ACM: New York, NY, USA, 2017; pp. 45–50. [Google Scholar] [CrossRef] [Green Version]
  7. Tang, B.; Chen, Z.; Hefferman, G.; Wei, T.; He, H.; Yang, Q. A hierarchical distributed fog computing architecture for big data analysis in smart cities. In Proceedings of the ASE BigData & SocialInformatics 2015, Kaohsiung, Taiwan, 7–9 October 2015; ACM: New York, NY, USA, 2015; p. 28. [Google Scholar]
  8. Gia, T.N.; Jiang, M. Exploiting Fog Computing in Health Monitoring. In Fog and Edge Computing: Principles and Paradigms; Wiley: Hoboken, NJ, USA, 2019; pp. 291–318. [Google Scholar]
  9. Peña Queralta, J.; Gia, T.N.; Tenhunen, H.; Westerlund, T. Edge-AI in LoRabased healthcare monitoring: A case study on fall detection system with LSTM Recurrent Neural Networks. In Proceedings of the 42nd International Conference on Telecommunications, Signal Processing (TSP), Budapest, Hungary, 1–3 July 2019. [Google Scholar]
  10. Gia, T.N.; Nawaz, A.; Querata, J.P.; Tenhunen, H.; Westerlund, T. Artificial Intelligence at the Edge in the Blockchain of Things. In Proceedings of the International Conference on Wireless Mobile Communication and Healthcare, Dublin, Ireland, 14–15 November 2019; Springer: Berlin, Germany, 2019; pp. 267–280. [Google Scholar]
  11. Al Hamid, H.A.; Rahman, S.M.M.; Hossain, M.S.; Almogren, A.; Alamri, A. A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography. IEEE Access 2017, 5, 22313–22328. [Google Scholar] [CrossRef]
  12. Shi, W.; Dustdar, S. The Promise of Edge Computing. Computer 2016, 49, 78–81. [Google Scholar] [CrossRef]
  13. Fernandes, E.; Jung, J.; Prakash, A. Security Analysis of Emerging Smart Home Applications. In Proceedings of the IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 23–25 May 2016; pp. 636–654. [Google Scholar] [CrossRef]
  14. Risteska Stojkoska, B.L.; Trivodaliev, K.V. A review of Internet of Things for smart home: Challenges and solutions. J. Clean. Prod. 2017, 140, 1454–1464. [Google Scholar] [CrossRef]
  15. Hoy, M.B. Alexa, siri, cortana, and more: An introduction to voice assistants. Med. Ref. Serv. Q. 2018, 37, 81–88. [Google Scholar]
  16. Apthorpe, N.; Reisman, D.; Feamster, N. A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic. arXiv 2017, arXiv:1705.06805. [Google Scholar]
  17. Foroglou, G.; Tsilidou, A.L. Further applications of the blockchain. In Proceedings of the 12th Student Conference on Managerial Science and Technology, Athens, Greece, 14 May 2015; pp. 1–8. [Google Scholar]
  18. Conoscenti, M.; Vetrò, A.; De Martin, J.C. Blockchain for the Internet of Things: A systematic literature review. In Proceedings of the IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 29 November–2 December 2016; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  19. Novo, O. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT. IEEE Internet Things J. 2018, 5, 1184–1195. [Google Scholar] [CrossRef]
  20. Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. Blockchain for IoT security and privacy: The case study of a smart home. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Big Island, HI, USA, 13–17 March 2017; pp. 618–623. [Google Scholar]
  21. Christidis, K.; Devetsikiotis, M. Blockchains and Smart Contracts for the Internet of Things. IEEE Access 2016, 4, 2292–2303. [Google Scholar] [CrossRef]
  22. Buterin, V. A Next-Generation Smart Contract and Decentralized Application Platform. White Paper. 2014. Available online: https://blockchainlab.com/pdf/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf (accessed on 20 May 2020).
  23. Suo, H.; Wan, J.; Zou, C.; Liu, J. Security in the internet of things: A review. In Proceedings of the IEEE International Conference on Computer Science and Electronics Engineering, Zhangjiajie, China, 25–27 May 2012; Volume 3, pp. 648–651. [Google Scholar]
  24. Alaa, M.; Zaidan, A.A.; Zaidan, B.B.; Talal, M.; Kiah, M.L.M. A review of smart home applications based on Internet of Things. J. Netw. Comput. Appl. 2017, 97, 48–65. [Google Scholar]
  25. Zhang, K.; Liang, X.; Lu, R.; Shen, X. Sybil attacks and their defenses in the internet of things. IEEE Internet Things J. 2014, 1, 372–383. [Google Scholar]
  26. Sha, K.; Yang, T.A.; Wei, W.; Davari, S. A survey of edge computing based designs for IoT security. Digit. Commun. Netw. 2020, 6, 195–202. [Google Scholar] [CrossRef]
  27. Hsu, R.H.; Lee, J.; Quek, T.Q.; Chen, J.C. Reconfigurable security: Edge-computing-based framework for IoT. IEEE Netw. 2018, 32, 92–99. [Google Scholar]
  28. Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar]
  29. Lu, Y. The blockchain: State-of-the-art and research challenges. J. Ind. Inf. Integr. 2019, 15, 80–90. [Google Scholar] [CrossRef]
  30. Taylor, P.J.; Dargahi, T.; Dehghantanha, A.; Parizi, R.M.; Choo, K.K.R. A systematic literature review of blockchain cyber security. Digit. Commun. Netw. 2020, 6, 147–156. [Google Scholar] [CrossRef]
  31. Li, X.; Huang, X.; Li, C.; Yu, R.; Shu, L. EdgeCare: Leveraging edge computing for collaborative data management in mobile healthcare systems. IEEE Access 2019, 7, 22011–22025. [Google Scholar]
  32. Lin, X.; Li, J.; Wu, J.; Liang, H.; Yang, W. Making knowledge tradable in edge-AI enabled IoT: A consortium blockchain-based efficient and incentive approach. IEEE Trans. Ind. Inform. 2019, 15, 6367–6378. [Google Scholar]
  33. Krittanawong, C.; Rogers, A.J.; Aydar, M.; Choi, E.; Johnson, K.W.; Wang, Z.; Narayan, S.M. Integrating blockchain technology with artificial intelligence for cardiovascular medicine. Nat. Rev. Cardiol. 2020, 17, 1–3. [Google Scholar]
  34. Debe, M.; Salah, K.; Rehman, M.H.R.; Svetinovic, D. IoT Public Fog Nodes Reputation System: A Decentralized Solution Using Ethereum Blockchain. IEEE Access 2019, 7, 178082–178093. [Google Scholar]
  35. Mazzei, D.; Baldi, G.; Fantoni, G.; Montelisciani, G.; Pitasi, A.; Ricci, L.; Rizzello, L. A Blockchain Tokenizer for Industrial IOT trustless applications. Future Gener. Comput. Syst. 2020, 105, 432–445. [Google Scholar]
  36. Yuan, P.; Xiong, X.; Lei, L.; Zheng, K. Design and Implementation on Hyperledger-Based Emission Trading System. IEEE Access 2018, 7, 6109–6116. [Google Scholar]
  37. Rahman, M.A.; Rashid, M.M.; Hossain, M.S.; Hassanain, E.; Alhamid, M.F.; Guizani, M. Blockchain and IoT-based cognitive edge framework for sharing economy services in a smart city. IEEE Access 2019, 7, 18611–18621. [Google Scholar]
  38. Popov, S. The Tangle. White Paper. 2016. Available online: Iota.org (accessed on 20 May 2020).
  39. Lerner, S.D. DagCoin: A Cryptocurrency without Blocks. 2015. Available online: https://bitslog.com/2015/09/11/dagcoin/ (accessed on 20 May 2020).
  40. Yang, R.; Fe, R.Y.; Pengbo, S.; Zhaoxin, Y.; Yanhua, Z. Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges. IEEE Commun. Surv. Tutorials 2019, 21, 1508–1532. [Google Scholar]
  41. Cha, S.C.; Chen, J.F.; Su, C.; Yeh, K.H. A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things. IEEE Access 2018, 6, 24639–24649. [Google Scholar]
  42. Bergquist, J. Blockchain Technology and Smart Contracts: Privacy-Preserving Tools. Master’s Thesis, Uppsala University, Uppsala, Sweden, 2017. [Google Scholar]
  43. Poon, J.; Buterin, V. Plasma: Scalable Autonomous Smart Contracts. White Paper. 2017, pp. 1–47. Available online: https://www.plasma.io/plasma.pdf (accessed on 23 May 2020).
  44. Zilliqa Team. The ZILLIQA Technical Whitepaper. Retrieved Sept. 2017, 16, 2019. [Google Scholar]
  45. Sompolinsky, Y.; Zohar, A. Accelerating Bitcoin’s Transaction Processing. Fast Money Grows on Trees, Not Chains. Available online: https://eprint.iacr.org/2013/881 (accessed on 13 July 2020).
  46. De Filippi, P.; McCarthy, S. Cloud computing: Centralization and data sovereignty. Eur. J. Law Technol. 2012, 3, 21. [Google Scholar]
  47. Notheisen, B.; Cholewa, J.B.; Shanmugam, A.P. Trading real-world assets on blockchain. Bus. Inf. Syst. Eng. 2017, 59, 425–440. [Google Scholar]
  48. Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 2014, 151, 1–32. [Google Scholar]
  49. Yu, W.; Liang, F.; He, X.; Hatcher, W.G.; Lu, C.; Lin, J.; Yang, X. A survey on the edge computing for the Internet of Things. IEEE Access 2017, 6, 6900–6919. [Google Scholar]
  50. Mukherjee, M.; Matam, R.; Shu, L.; Maglaras, L.; Ferrag, M.A.; Choudhury, N.; Kumar, V. Security and privacy in fog computing: Challenges. IEEE Access 2017, 5, 19293–19304. [Google Scholar]
  51. Yi, S.; Qin, Z.; Li, Q. Security and privacy issues of fog computing: A survey. In Wireless Algorithms, Systems, and Applications; Springer: Berlin/Heidelberg, Germany, 2015; pp. 685–695. [Google Scholar]
  52. Shoup, V. A Proposal for an ISO Standard for Public Key Encryption (Version 2.1). Available online: https://eprint.iacr.org/2001/112 (accessed on 13 July 2020).
  53. Antonopoulos, A.M. Mastering Bitcoin: Programming the Open Blockchain; O’Reilly Media, Inc.: Newton, MA, USA, 2017. [Google Scholar]
  54. Hankerson, D.; Menezes, A.J.; Vanstone, S. Guide to Elliptic Curve Cryptography; Springer Science & Business Media: Berlin, Germany, 2006. [Google Scholar]
  55. Back, A.; Corallo, M.; Dashjr, L.; Friedenbach, M.; Maxwell, G.; Miller, A.; Poelstra, A.; Timón, J.; Wuille, P. Enabling Blockchain Innovations with Pegged Sidechains. 2014, Volume 72. Available online: http://www.Opensciencereview.Com/papers/123/enablingblockchain-Innov. (accessed on 20 May 2020).
  56. Eyal, I.; Gencer, A.E.; Sirer, E.G.; Van Renesse, R. Bitcoin-ng: A scalable blockchain protocol. In Proceedings of the 13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16), Santa Clara, CA, USA, 14–17 March 2016; pp. 45–59. [Google Scholar]
  57. Lee, S. Explaining Directed Acylic Graph (DAG), the Real Blockchain 3.0. 2018. Available online: https://dagcoin.org/explaining-directed-acylic-graph-dag-the-real-blockchain-3-0/ (accessed on 13 July 2020).
  58. Nawaz, A.; Gia, T.M.; Pena, Q.J.; Westerlund, T. Edge AI and Blockchain for Privacy-Critical and Data-Sensitive Applications. In Proceedings of the 12th International Conference on Mobile Computing and Ubiquitous Networking (ICMU), Kathmandu, Nepal, 4–6 November 2019. [Google Scholar]
Figure 1. Architecture of EdgeBoT, a distributed P2P data trade and fair access network model based on the ethereum platform.
Figure 1. Architecture of EdgeBoT, a distributed P2P data trade and fair access network model based on the ethereum platform.
Sensors 20 03965 g001
Figure 2. System sequence diagram depicting sequential picture of complete network.
Figure 2. System sequence diagram depicting sequential picture of complete network.
Sensors 20 03965 g002
Figure 3. Sequential diagram to elaborate possible scenarios to settle down transaction request.
Figure 3. Sequential diagram to elaborate possible scenarios to settle down transaction request.
Sensors 20 03965 g003
Figure 4. Consumption of CPU and RAM during randomly selected transactions and idle time in between. During transaction handling, CPU requires more resources while in the idle condition it’s quite low. For the RAM, it is not a huge difference during the transaction handling.
Figure 4. Consumption of CPU and RAM during randomly selected transactions and idle time in between. During transaction handling, CPU requires more resources while in the idle condition it’s quite low. For the RAM, it is not a huge difference during the transaction handling.
Sensors 20 03965 g004
Figure 5. Latencies to retrieve mata data (TRD), transaction validation time (VTR) needed for single transaction request, and time required to confirm one transaction (TCT).
Figure 5. Latencies to retrieve mata data (TRD), transaction validation time (VTR) needed for single transaction request, and time required to confirm one transaction (TCT).
Sensors 20 03965 g005
Figure 6. Impact of concurrent transactions on end-to-end transaction latency.
Figure 6. Impact of concurrent transactions on end-to-end transaction latency.
Sensors 20 03965 g006
Table 1. Major challenges and problems in existing centralized infrastructure and description of how blockchain aids in overcoming these challenges. The challenges are summarized from the related works listed in this paper, mainly from [18,29,30].
Table 1. Major challenges and problems in existing centralized infrastructure and description of how blockchain aids in overcoming these challenges. The challenges are summarized from the related works listed in this paper, mainly from [18,29,30].
Existing ChallengesProposed Approach
Challenge: Data ownership
Existing client-server models might use personal information without owner’s consent and knowledgein the blockchain model, every node can work as a server and does not need to rely on service providers to store personal information. Besides, data cannot be extracted without the network’s knowledge.
Challenge: Third party access
Vulnerabilities in client server models makes it easy for the attacker to get access of sensitive informationin distributed structure of blockchain, data is distributed over a number of nodes, which removes the threat of data access via single entry point. Adversaries can get a portion of data that are cryptographically hashed and meaningless. Validating all transactions with the consensus of network nodes eliminates the need of third parties and records of transactions processed by the network be tampered with.
Challenge: Unauthorized access
a vulnerability in a third-party service can grant access to all personal data beyond what the third party is storing.Blockchains’ distributed structure and their strong cryptographic algorithms reduces the risk of unauthorized access to private data. An attacker with access to a validated third party can only access data where access was previously granted.
Challenge: Cost
A drastic increase in the amount of IoT devices connected to cloud increased the need of computational capabilitiesthe distributed structure of the blockchain model and edge based computing architectures reduces the computational burden of individual nodes, including external cloud services.
Challenge: Data Manipulation
Data manipulation risk is high for IoT external storages.the blockchain model provides resilience to data compromise, as it cannot be forged because the information in the mined blocks is not allowed to alter.
Challenge: Server unavailability
Centralized architectures that are based on cloud servers can fail if the connection to the server is broken.the peer to peer nature of the blockchain-based transactions ensures that, if a connection between two nodes exists, then data can be transmitted independently of the availability of other nodes.
Table 2. Security Measures.
Table 2. Security Measures.
ParameterImplementation
AuthorizationPublic key cryptography to encrypt CSK
ConfidentialityPublic key cryptography and proof of authority
IntegrityBroadcast hash of each data_batch
AvailabilityAchieved by limiting number of requests
AnonymityDiscard raw data and store only processed information

Share and Cite

MDPI and ACS Style

Nawaz, A.; Peña Queralta, J.; Guan, J.; Awais, M.; Gia, T.N.; Bashir, A.K.; Kan, H.; Westerlund, T. Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain. Sensors 2020, 20, 3965. https://doi.org/10.3390/s20143965

AMA Style

Nawaz A, Peña Queralta J, Guan J, Awais M, Gia TN, Bashir AK, Kan H, Westerlund T. Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain. Sensors. 2020; 20(14):3965. https://doi.org/10.3390/s20143965

Chicago/Turabian Style

Nawaz, Anum, Jorge Peña Queralta, Jixin Guan, Muhammad Awais, Tuan Nguyen Gia, Ali Kashif Bashir, Haibin Kan, and Tomi Westerlund. 2020. "Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain" Sensors 20, no. 14: 3965. https://doi.org/10.3390/s20143965

APA Style

Nawaz, A., Peña Queralta, J., Guan, J., Awais, M., Gia, T. N., Bashir, A. K., Kan, H., & Westerlund, T. (2020). Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain. Sensors, 20(14), 3965. https://doi.org/10.3390/s20143965

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop