Blockchain Technology in Internet of Things 1st ed. 2019 [Kietas viršelis]

  • Formatas: Hardback, 143 pages, aukštis x plotis: 235x155 mm, weight: 424 g, 42 Tables, color; 42 Illustrations, color; 17 Illustrations, black and white; XXII, 143 p. 59 illus., 42 illus. in color., 1 Hardback
  • Išleidimo metai: 08-Aug-2019
  • Leidėjas: Springer Nature Switzerland AG
  • ISBN-10: 3030217655
  • ISBN-13: 9783030217655
Kitos knygos pagal šią temą:
  • Formatas: Hardback, 143 pages, aukštis x plotis: 235x155 mm, weight: 424 g, 42 Tables, color; 42 Illustrations, color; 17 Illustrations, black and white; XXII, 143 p. 59 illus., 42 illus. in color., 1 Hardback
  • Išleidimo metai: 08-Aug-2019
  • Leidėjas: Springer Nature Switzerland AG
  • ISBN-10: 3030217655
  • ISBN-13: 9783030217655
Kitos knygos pagal šią temą:
This book focuses on picturing B-IoT techniques from a few perspectives, which are architecture, key technologies, security and privacy, service models and framework, practical use cases and more. Main contents of this book derive from most updated technical achievements or breakthroughs in the field. A number of representative IoT service offerings will be covered by this book, such as vehicular networks, document sharing system, and telehealth. Both theoretical and practical contents will be involved in this book in order to assist readers to have a comprehensive and deep understanding the mechanism of using blockchain for powering up IoT systems. 

The blockchain-enabled Internet of Things (B-IoT) is deemed to be a novel technical alternative that provides network-based services with additional functionalities, benefits, and implementations in terms of decentralization, immutability, and auditability. Towards the enhanced secure and privacy-preserving Internet of Things (IoT), this book introduces a few significant aspects of B-IoT, which includes fundamental knowledge of both blockchain and IoT, state-of-the-art reviews of B-IoT applications, crucial components in the B-IoT system and the model design, and future development potentials and trends.

IoT technologies and services, e.g. cloud data storage technologies and vehicular services, play important roles in wireless technology developments. On the other side, blockchain technologies are being adopted in a variety of academic societies and professional realms due to its promising characteristics. It is observable that the research and development on integrating these two technologies will provide critical thinking and solid references for contemporary and future network-relevant solutions. 

This book targets researchers and advanced level students in computer science, who are focused on cryptography, cloud computing and internet of things, as well as electrical engineering students and researchers focused on vehicular networks and more. Professionals working in these fields will also find this book to be a valuable resource.
Part I Basic Concepts and Mechanisms of Blockchain in Internet of Things
1 Introduction
3(6)
1.1 Overview
3(1)
1.2 Blockchain
4(1)
1.3 Internet of Things
5(1)
1.4 Blockchain Applications in Internet of Things
5(1)
1.5 Security and Privacy in Internet of Things
6(3)
2 Blockchain and Internet of Things
9(20)
2.1 Overview
9(1)
2.2 Technical Dimensions of Blockchain
10(10)
2.2.1 Blockchain
10(6)
2.2.2 Consensus Mechanisms
16(2)
2.2.3 Key Characteristics
18(1)
2.2.4 Applications of Blockchain
19(1)
2.3 Key Issues in Internet of Things
20(8)
2.3.1 Fundamental Concepts in Internet of Things
20(2)
2.3.2 Architecture of Internet of Things
22(1)
2.3.3 Evaluation Metrics of Internet of Things
23(1)
2.3.4 Function Enhancement
24(3)
2.3.5 Applications of Internet of Things
27(1)
2.4 Summary
28(1)
3 Security and Privacy Issues in Internet of Things
29(14)
3.1 Overview
29(1)
3.2 Security Issues in Internet of Things
30(5)
3.2.1 Confidentiality
30(2)
3.2.2 Integrity
32(2)
3.2.3 Authentication
34(1)
3.3 Privacy Concerns in Internet of Things
35(4)
3.3.1 Identity
35(1)
3.3.2 Location
36(2)
3.3.3 Trajectory
38(1)
3.3.4 Report and Query
38(1)
3.4 Summary
39(4)
Part II Blockchain in Privacy-Preserving Cloud Data Storage Services
4 Blockchain-Enabled Cloud Data Preservation Services
43(10)
4.1 Overview
43(1)
4.2 Technical Dimensions in Cloud Data Preservation Services
44(2)
4.2.1 Essential Components
44(1)
4.2.2 Threat Model
44(1)
4.2.3 Design Goals
45(1)
4.3 Basic Techniques in Cloud Data Preservation Services
46(3)
4.3.1 Preservation Submission
46(1)
4.3.2 Primitiveness Verification
47(2)
4.4 Solution
49(2)
4.4.1 Data Submission
50(1)
4.4.2 Primitiveness Identification
50(1)
4.5 Use Case
51(1)
4.6 Summary
52(1)
5 Blockchain-Enabled Controllable Data Management
53(14)
5.1 Overview
53(1)
5.2 Technical Dimensions in Blockchain-Based Controllable Data Management
54(2)
5.2.1 Essential Components
54(1)
5.2.2 Threat Model
55(1)
5.2.3 Design Goals
56(1)
5.3 Bridging Blockchain with Data Management
56(1)
5.4 Solution
56(3)
5.4.1 System Initialization
56(1)
5.4.2 Document Modification
57(1)
5.4.3 Document Management
57(1)
5.4.4 User Registration
58(1)
5.4.5 Voting and Counting
58(1)
5.5 Use Case
59(1)
5.5.1 Experiment Evaluation
59(1)
5.6 Summary
59(8)
Part III Privacy-Preserving Blockchain Technology in Internet of Things
6 Blockchain-Enabled Vehicle Electricity Transaction Services
67(8)
6.1 Overview
67(2)
6.2 Technical Dimensions in Vehicle Electricity Transactions Services
69(2)
6.2.1 System Model
69(1)
6.2.2 Threat Model
70(1)
6.2.3 Design Objectives
71(1)
6.3 Solution
71(1)
6.4 Implementation Scenario
72(1)
6.5 Summary
73(2)
7 Blockchain-Enabled Carpooling Services
75(18)
7.1 Overview
75(1)
7.2 Technical Dimensions in Carpooling Services
76(3)
7.2.1 Essential Components in Carpooling Services
76(2)
7.2.2 Cognize Threat Model
78(1)
7.2.3 Anticipated Performance Matrix
78(1)
7.3 Basic Techniques of Carpooling Services
79(2)
7.3.1 Anonymous Authentication
79(1)
7.3.2 Private Proximity Test with Location Tags
80(1)
7.3.3 Privacy-Preserving Range Query
80(1)
7.3.4 Fog Computing
81(1)
7.4 Solution
81(6)
7.4.1 System Initialization
82(1)
7.4.2 Entity Registration
82(1)
7.4.3 Carpooling Requesting
83(1)
7.4.4 Carpooling Responding
84(1)
7.4.5 Carpooling Matching and Uploading
84(3)
7.4.6 Carpooling Termination and Cancellation
87(1)
7.4.7 User Tracking
87(1)
7.5 Use Case of Blockchain-Assisted Carpooling in Vehicular Networks
87(3)
7.5.1 Computational Cost in Carpooling
87(2)
7.5.2 Communication Overhead in Carpooling
89(1)
7.5.3 Experiments on Private Blockchain
89(1)
7.6 Summary
90(3)
8 Blockchain-Enabled Ride-Hailing Services
93(16)
8.1 Overview
93(2)
8.2 Technical Dimensions in Ride-Hailing Services
95(2)
8.2.1 Crucial Components in Ride-Hailing Services
95(1)
8.2.2 Comprehend Threat Model
96(1)
8.2.3 Expected Performance Objectives
96(1)
8.3 Basic Techniques of Ride-Hailing Services
97(1)
8.3.1 Conjunctive Query Processing
97(1)
8.3.2 Anonymous Payment
97(1)
8.4 Solution
98(5)
8.4.1 System Initialization
98(1)
8.4.2 Entity Registration
99(1)
8.4.3 Ride Requesting
99(2)
8.4.4 Ride Responding
101(1)
8.4.5 Ride Termination
101(2)
8.4.6 User Tracking
103(1)
8.5 Use Case of Blockchain-Assisted Ride-Hailing in Vehicular Networks
103(1)
8.5.1 Implementation Details
103(1)
8.5.2 Computational Costs
103(1)
8.6 Summary
104(5)
Part IV Future Research Directions and Discussions
9 Exploring Topics in Blockchain-Enabled Internet of Things
109(6)
9.1 Overview
109(1)
9.2 Future Research Directions
110(4)
9.2.1 A Further Integration
110(1)
9.2.2 Managing Trust
111(1)
9.2.3 Providing Efficient and High-Capacity Data Storage
112(1)
9.2.4 Enabling Data Analysis
112(1)
9.2.5 Enhancing Data Security and User Privacy
113(1)
9.3 Summary
114(1)
A Setup for a Local Ethereum Platform
115(6)
B A Sample Examination Paper
121(4)
C Project 1: Blockchain for Supply Chain
125(2)
D Project 2: Blockchain for Collaborative Trade Management
127(2)
References 129
Liehuang Zhu is a Professor and the Vice Dean in the School of Computer Science and Technology at Beijing Institute of Technology. He is selected into the Program for New Century Excellent Talents in University from Ministry of Education, P. R. China. Liehuang Zhu has published 50+ jour-nal papers and 40+ conference papers in recent years, including (including IEEE TDSC, IEEE TIFS, IEEE Communications Magazine, IEEE Wireless Communica-tions, IEEE IoT, IEEE Network, IEEE TSG, IEEE TVT, IEEE Access, Information Sciences, IEEE/ACM IWQoS, IEEE IPCCC, IEEE GLOBECOM). He has served as the Chair in SmartBlock 2018, and the program committee chair in BcADS 2019, MSN 2017, InTrust 2014, and InTrust 2011. He was a Guest Editor for the IEEE Wireless Communications Magazine in 2018. He has been granted three best paper awards in IEEE/ACM conferences, including IEEE TrustCom 2018, IEEE/ACM I-WQoS 2017, and IEEE IPCCC 2014. He has been awarded as an Excellent Advisor in China Institute of Communications Excellent Doctoral Dissertation and China National College Student Information Security Contest. His research interests include cryptographic algorithms and secure protocols, Internet of Things security, cloud computing security, big data privacy, mobile and Internet security, and trusted computing. Keke Gai received a Ph.D. degree in Computer Science from the Department of Computer Science at Pace University, New York, USA. He also holds degrees from Nanjing University of Science and Technology (BEng), The University of British Columbia (MET) and Lawrence Technological University (MBA and MS). He is currently an Associate Professor in the School of Computer Science and Technology at Beijing Institute of Technology, Beijing, China. Keke Gai has published more than 90 peer-reviewed journals or conference papers in re-cent years, including 30+ journal papers (including ACM/IEEE Transactions) and 50+ conference papers. He has been granted five IEEE Best Paper Awards (IEEE TrustCom18, IEEE HPCC18, IEEE SSC16, IEEE CSCloud15, IEEE BigDataSe-curity'15) and two IEEE Best Student Paper Awards (SmartCloud16, HPCC16) by IEEE conferences in recent years. His paper about cloud computing has been ranked as the Most Downloaded Articles" of Journal of Network and Computer Applica-tions (JNCA). He is involved in a number of professional/academic associations, including ACM and IEEE. His research interests include cyber security, cloud com-puting, blockchain, combinatorial optimization, and edge computing. Meng Li is currently working towards the Ph.D. degree with the School of Computer Science and Technology, Beijing Institute of Tech-nology and he is a visiting Ph.D. student in Wilfrid Laurier University. He has re-ceived the National Graduate Student Scholarship in 2011. He has been sponsored by China Scholarship Council High-level University Graduate Student Government-Sponsored Program and Beijing Institute of Technology High Level Ph.D. Disser-tation Nursery Funding in 2017. His research interests are applied cryptography, security and privacy, vehicular networks, fog computing and blockchain.