Abstract
AbstractThis paper proposes an architecture and a protocol suite for a permissioned blockchain for a local IoT network. The architecture is based on a sealed Sequencer and a Fog Server running (post-quantum) Guy Fawkes protocols. The blocks of the blockchain are stored in networked Content Addressable Storage alongside any user data and validity proofs. We maintain that a typical IoT device can, despite its resource limitations, use our blockchain protocols directly, without a trusted intermediary. This includes posting and monitoring transactions as well as off-chain (post-quantum) emergency communications without an explicit public key.
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Information Systems,Software
Reference19 articles.
1. Anderson, R, Bergadano F, Crispo B, Lee J-H, Manifavas C, Needham R (1998) A new family of authentication protocols. SIGOPS Oper Syst Rev 32(4):9–20. https://doi.org/10.1145/302350.302353.
2. Benet, J (2014) IPFS - Content Addressed, Versioned, P2P File System. arXiv 1407.3561. http://arxiv.org/abs/1407.3561. Accessed 15 Aug 2020.
3. Bernstein, DJ, Hopwood D, Hülsing A, Lange T, Niederhagen R, Papachristodoulou L, Schneider M, Schwabe P, Wilcox-O’Hearn Z (2015) Sphincs: Practical stateless hash-based signatures. In: Oswald E Fischlin M (eds)Advances in Cryptology – EUROCRYPT 2015, 368–397.. Springer, Berlin, Heidelberg.
4. Bonneau, J, Miller A (2014) Fawkescoin. In: Christianson B, Malcolm J, Matyáš V, Švenda P, Stajano F, Anderson J (eds)Security Protocols XXII, 350–358.. Springer, Cham.
5. Crespo, A, Garcia-Molina H (1998) Archival storage for digital libraries In: Proceedings of the Third ACM Conference on Digital Libraries, 69–78.. Association for Computing Machinery, New York. https://doi.org/10.1145/276675.276683.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献