Lightweight and Scalable DAG based distributed ledger for verifying IoT data integrity

@article{Cherupally2021LightweightAS,
  title={Lightweight and Scalable DAG based distributed ledger for verifying IoT data integrity},
  author={Sumanth Reddy Cherupally and Srinivas Boga and Prashanth Podili and Kotaro Kataoka},
  journal={2021 International Conference on Information Networking (ICOIN)},
  year={2021},
  pages={267-272}
}
Verifying the integrity of IoT data in cloud-based IoT architectures is crucial for building reliable IoT applications. Traditional data integrity verification methods rely on a Trusted Third Party (TTP) that has issues of risk and operational cost by centralization. Distributed Ledger Technology (DLT) has a high potential to verify IoT data integrity and overcome the problems with TTPs. However, the existing DLTs have low transaction throughput, high computational and storage overhead, and are… 

Figures and Tables from this paper

Multi-Blockchain-Based IoT Data Processing Techniques to Ensure the Integrity of IoT Data in AIoT Edge Computing Environments
TLDR
A blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA) which has a role in auditing the integrity of AIoT data is proposed.

References

SHOWING 1-10 OF 17 REFERENCES
DLedger: An IoT-Friendly Private Distributed Ledger System Based on DAG
TLDR
DLedger is a lightweight and resilient distributed ledger system that is built upon a data-centric network called Named Data Networking (NDN), which facilitates the peer-to-peer data dissemination in heterogeneous IoT networks.
Towards A Scalable DAG-based Distributed Ledger for Smart Communities
TLDR
This paper proposes a scalable transactive smart homes infrastructure by leveraging a Directed Acyclic Graph (DAG) based DLT and following the separation of concerns (SOC) design principle, and concludes that the proposed DAG-based distributed ledger is an effective solution for building an IoT infrastructure for smart communities.
IoT Data Integrity Verification for Cyber-Physical Systems Using Blockchain
TLDR
This work proposes an architecture that can take advantage of blockchain features to allow further integrity verification of data produced by IoT devices even in the realm of CPS, and a performance evaluation of the critical path of data to demonstrate that the architecture respect time-bounded operations demanded by the sense-decide-actuate cycle of CPSs.
Blockchain Based Data Integrity Verification for Large-Scale IoT Data
TLDR
Experimental results based on Hyperledger Fabric demonstrate that the proposed verification scheme significantly improves the efficiency of integrity verification for large-scale IoT data with no need of TPAs.
Blockchain Based Data Integrity Service Framework for IoT Data
TLDR
A blockchain-based framework for Data Integrity Service is proposed, under which a more reliable data integrity verification can be provided for both the Data Owners and the Data Consumers, without relying on any Third Party Auditor (TPA).
IoT security: Review, blockchain solutions, and open challenges
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
TLDR
The task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud is considered, and an elegant verification scheme is constructed for seamless integration of these two salient features in the protocol design.
The Tangle
TLDR
The mathematical foundations of IOTA, a cryptocurrency for the Internet-of-Things (IoT) industry, are analyzed, and a family of Markov Chain Monte Carlo (MCMC) algorithms are contributed.
Nano : A Feeless Distributed Cryptocurrency Network
TLDR
Nano is introduced, a cryptocurrency with a novel block-lattice architecture where each account has its own blockchain, delivering near instantaneous transaction speed and unlimited scalability.
The Coordicide
4 Autopeering 17 4.1 Peer discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 4.2 Neighbor selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 4.3 Network
...
...