SMER: a secure method of exchanging resources in heterogeneous internet of things

Yu ZHANG, Yuxing HAN, Jiangtao WEN

PDF(720 KB)
PDF(720 KB)
Front. Comput. Sci. ›› 2019, Vol. 13 ›› Issue (6) : 1198-1209. DOI: 10.1007/s11704-018-6524-3
RESEARCH ARTICLE

SMER: a secure method of exchanging resources in heterogeneous internet of things

Author information +
History +

Abstract

The number of IoT (internet of things) connected devices increases rapidly. These devices have different operation systems and therefore cannot communicate with each other. As a result, the data they collected is limited within their own platform. Besides, IoT devices have very constrained resources like weak MCU (micro control unit) and limited storage. Therefore, they need direct communication method to cooperate with each other, or with the help of nearby devices with rich resources. In this paper, we propose a secure method to exchange resources (SMER) between heterogeneous IoT devices. In order to exchange resources among devices, SMER adopts a compensable mechanism for resource exchange and a series of security mechanisms to ensure the security of resource exchanges. Besides, SMER uses a smart contract based scheme to supervise resource exchange, which guarantees the safety and benefits of IoT devices. We also introduce a prototype system and make a comprehensive discussion.

Keywords

internet of things / P2P resource exchange / blockchain / smart contract

Cite this article

Download citation ▾
Yu ZHANG, Yuxing HAN, Jiangtao WEN. SMER: a secure method of exchanging resources in heterogeneous internet of things. Front. Comput. Sci., 2019, 13(6): 1198‒1209 https://doi.org/10.1007/s11704-018-6524-3

References

[1]
Wörner D, Bomhard V T. When your sensor earns money: exchanging data for cash with bitcoin. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. 2014, 295–298
CrossRef Google scholar
[2]
Shiraz M, Gani A, Khokhar R H, Buyya R. A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing. IEEE Communications Surveys & Tutorials, 2013, 15(3): 1294–1313
CrossRef Google scholar
[3]
Ma X, Cui Y, Wang L, Stojmenovic I. Energy optimizations for mobile terminals via computation offloading. In: Proceedings of the 2nd IEEE International Conference on Parallel Distributed and Grid Computing. 2012, 236–241
CrossRef Google scholar
[4]
Cuervo E, Balasubramanian A, Cho D K, Wolman A, Saroiu S, Chandra R, Bahl P. Maui: making smartphones last longer with code offload. In: Proceedings of the 8th International Conference on Mobile systems, Applications, and Services. 2010, 49–62
CrossRef Google scholar
[5]
Chun B G, Ihm S, Maniatis P, Naik M, Patti A. Clonecloud: elastic execution between mobile device and cloud. In: Proceedings of the 6th Conference on Computer Systems. 2011, 301–314
CrossRef Google scholar
[6]
Hasan R, Hossain M M, Khan R. Aura: an IoT based cloud infrastructure for localized mobile computation outsourcing. In: Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). 2015, 183–188
CrossRef Google scholar
[7]
Al Noor S, Hasan R, Haque M M. Cellcloud: a novel cost effective formation of mobile cloud based on bidding incentives. In: Proceedings of the 7th IEEE International Conference on Cloud Computing. 2014, 200–207
CrossRef Google scholar
[8]
Ferrer E C. The blockchain: a new framework for robotic swarm systems. In: Proceedings of the Future Technologies Conference. 2018, 1037–1058
[9]
Sikorski J J, Haughton J, Kraft M. Blockchain technology in the chemical industry: machine-to-machine electricity market. Applied Energy, 2017, 195: 234–246
CrossRef Google scholar
[10]
Christidis K, Devetsikiotis M. Blockchains and smart contracts for the internet of things. IEEE Access, 2016, 4: 2292–2303
CrossRef Google scholar
[11]
Lowe D G. Object recognition from local scale-invariant features. In: Proceedings of the 7th IEEE International Conference on Computer Vision. 1999, 1150–1157
CrossRef Google scholar
[12]
Muja M, Lowe D G. Fast approximate nearest neighbors with automatic algorithm configuration. In: Proceedings of UISAPP International Conference on Computer Vision Theory and Application. 2009, 331–340

RIGHTS & PERMISSIONS

2018 Higher Education Press and Springer-Verlag GmbH Germany, part of Springer Nature
AI Summary AI Mindmap
PDF(720 KB)

Accesses

Citations

Detail

Sections
Recommended

/