Skip to main content

Advertisement

Log in

A private-preserved IoT and blockchain-based system in the cryptocurrency market

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

In recent years, more and more cryptocurrency markets have adopted Internet of things (IoT) technology, with adoption rates steadily increasing since 2020. Industries that have seen significant growth in adoption include manufacturing, transportation, and public spaces. IoT connects all objects to the Internet through information sensing devices, enabling information exchange and intelligent identification and management of things. This has led to a wide range of applications. While blockchain technology addresses the centralization issue of traditional IoT systems, privacy leakage remains a key challenge for implementing smart supply chain management using IoT. We present privacy-preserving techniques to enable secure IoT trading. First, we propose a blockchain architecture based on post-quantum cryptography to securely store data and information. Second, we propose a post-quantum mixed currency mechanism for enhanced privacy protection. Third, we propose a blockchain-based IoT architecture designed for secure trading. By integrating blockchain, mixed currency approaches, and post-quantum techniques, we develop a blockchain-based IoT trading system. We implement this system within cryptocurrency markets. Our implementation and comparison with related solutions demonstrate that the system provides secure services for IoT trading.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data Availability

Enquiries about data availability should be directed to the authors.

References

  • Alfonso P, Nachiket T, Giovanni M et al (2018) Blockchain and IoT integration: a systematic survey[J]. Sensors 18(8):2575

    Google Scholar 

  • Alotaibi B (2019) Utilizing blockchain to overcome cyber security concerns in the internet of things: a review[J]. IEEE Sens J 19(23):10953–10971

    Google Scholar 

  • Ansari N, Sun X (2018) Mobile edge computing empowers internet of things[J]. IEICE Trans Commun 101(3):604–619

    Google Scholar 

  • Barbosa G, Endo PT, Sadok D (2019) An internet of things security system based on grouping of smart cards managed by field programmable gate array[J]. Comput Electr Eng 74:331–348

    Google Scholar 

  • Bhattarai S, Wang Y (2018) End-to-end trust and security for internet of things applications[J]. Computer 51(4):20–27

    Google Scholar 

  • Chu HC, Sung CH, Lee HL (2019) The digital fingerprinting analysis of generic twitter sessions from internet of things security aspect[J]. Mob Netw Appl 24(3):829–838

    Google Scholar 

  • Dae-Man H, Jae-Hyun L (2010) Smart home energy management system using[J]. IEEE Trans Consum Electron 56:1403–1410

    Google Scholar 

  • Dai W, Qiu M, Qiu L et al (2017) Who moved my data? Privacy protection in Smartphones[J]. IEEE Commun Mag 55(1):20–25

    Google Scholar 

  • Dennis M (2018) Blockchain and the internet of things in the industrial sector[J]. IT Profession 20(3):15–18

    MathSciNet  Google Scholar 

  • Ferraz JN, Silva A, Guelfi A et al (2019) IoT6Sec: reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis[J]. Wirel Netw 25(4):1533–1556

    Google Scholar 

  • Fortino G, Messina F, Rosaci D et al (2019) Using blockchain in a reputation-based model for grouping agents in the internet of things[J]. IEEE Trans Eng Manag 67(4):1231–43

    Google Scholar 

  • Gai K, Wu Y, Zhu L et al (2020) Differential privacy-based blockchain for industrial internet-of-things[J]. IEEE Trans Ind Inf 16(6):4156–4165

    Google Scholar 

  • Gao F, Zhu L, Shen M et al (2018) A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks[J]. IEEE Netw 32(6):184–192

    Google Scholar 

  • Gil-Castineira F, Costa-Montenegro E, Gonzalez-Castano F et al (2011) Experiences inside the Ubiquitous Oulu Smart City[J]. Computer 44(6):48–55

    Google Scholar 

  • Hammi MT, Hammi B, Bellot P et al (2018) Bubbles of trust: a decentralized Blockchain-based authentication system for IoT[J]. Comput Secur 78(sep.):126–142

    Google Scholar 

  • Hou J, Qu L, Shi W (2019) A survey on internet of things security from data perspectives[J]. Comput Netw 148(JAN.15):295–306

    Google Scholar 

  • Hu JW, Yeh LY, Liao SW et al (2019) Autonomous and malware-proof blockchain-based firmware update platform with efficient batch verification for internet of things devices[J]. Comput Secur 86:238–252

    Google Scholar 

  • Huang K, Zhang X, Mu Y et al (2019) Building redactable consortium blockchain for industrial internet-of-things[J]. IEEE Trans Ind Inform 15:3670–3679

    Google Scholar 

  • Huang K, Zhang X, Mu Y et al (2020) Achieving intelligent trust-layer for internet-of-things via self-redactable blockchain[J]. IEEE Trans Ind Inf 16(4):2677–2686

    Google Scholar 

  • Khaqqi KN, Sikorski JJ, Hadinoto K et al (2018) Incorporating seller/buyer reputation-based system in blockchain-enabled emission trading application[J]. Appl Energy 209(1):8–19

    Google Scholar 

  • Li X, Niu J, Bhuiyan MZA et al (2017) A Robust ECC based provable secure authentication protocol with privacy protection for industrial internet of things[J]. IEEE Trans Ind Inform 14(8):3599–609

    Google Scholar 

  • Li H, Zhu L, Shen M et al (2018) Blockchain-based data preservation system for medical data[J]. J Med Syst 42(8):1–13

    Google Scholar 

  • Li Z, Wang WM, Liu G et al (2018) Toward open manufacturing: a cross-enterprises knowledge and services exchange framework based on blockchain and edge computing[J]. Ind Manag Data Syst 118(9):303–320

    Google Scholar 

  • Li H, Ota K, Dong M (2018) Learning IoT in edge: deep learning for the internet of things with edge computing[J]. IEEE Netw 32(1):96–101

    Google Scholar 

  • Li K, Tian L, Li W et al (2018) Incorporating social interaction into three-party game towards privacy protection in IoT[J]. Comput Netw 150(26):90–101

    Google Scholar 

  • Li D, Deng L, Cai Z et al (2020) Blockchain as a service models in the Internet of Things management: systematic review[J]. Trans Emerg Telecommun Technol 33:1–14

    Google Scholar 

  • Liu Y, Wang K, Lin Y et al (2019) LightChain: a lightweight blockchain system for industrial internet of things[J]. IEEE Trans Ind Inf 15(6):3571–3581

    Google Scholar 

  • Lockl J, Schlatt V, Schweizer Andre et al (2020) Toward trust in internet of things (IoT) ecosystems: design principles for blockchain-based IoT applications[J]. IEEE Trans Eng Manag 67:1256–1270

    Google Scholar 

  • Mingfeng H, Anfeng L, Tian W et al (2018) Green data gathering under delay differentiated services constraint for internet of things[J]. Wirel Commun Mob Comput 2018:1–23

    Google Scholar 

  • Miorandi D, Sicari S, Pellegrini FD et al (2012) Internet of things[J]. Ad Hoc Netw 10(7):1497–1516

    Google Scholar 

  • Mishra P, Biswal A, Garg S et al (2020) Software defined internet of things security: properties, state of the art, and future research[J]. IEEE Wirel Commun 27(3):10–16

    Google Scholar 

  • Oorschot PCV, Smith SW (2019) The internet of things: security challenges[J]. IEEE Secur Priv 17(5):7–9

    Google Scholar 

  • Ping Z, Mimoza D, Arjan D (2018) Multi-access edge computing aided mobility for privacy protection in Internet of Things[J]. Computing 101:1–14

    MathSciNet  Google Scholar 

  • Qiu T, Qiao R, Wu DO (2018) EABS: an event-aware backpressure scheduling scheme for emergency internet of things[J]. IEEE Trans Mob Comput 1:1–1

    Google Scholar 

  • Qiu C, Yao H, Yu FR et al (2020) A service-oriented permissioned blockchain for the internet of things[J]. IEEE Trans Serv Comput 13(2):203–215

    Google Scholar 

  • Reka SS, Dragicevic T (2018) Future effectual role of energy delivery: a comprehensive review of Internet of Things and smart grid[J]. Renew Sustain Energy Rev 91(aug.):90–108

    Google Scholar 

  • Ruinian L, Tianyi S, Bo M et al (2018) Blockchain For large-scale internet of things data storage and protection[J]. IEEE Trans Serv Comput 12:1–1

    Google Scholar 

  • Siboni S, Sachidananda V, Meidan Y et al (2019) Security testbed for internet-of-things devices[J]. IEEE Trans Reliab 68(1):23–44

    Google Scholar 

  • Subramanian H (2017) Decentralized blockchain-based electronic marketplaces[J]. Commun ACM 61(1):78–84

    Google Scholar 

  • Tschofenig H, Baccelli E (2019) Cyberphysical security for the masses: a survey of the internet protocol suite for internet of things security[J]. IEEE Secur Priv 17(99):47–57

    Google Scholar 

  • Tseng L, Wong L, Otoum S et al (2020) Blockchain for managing heterogeneous internet of things: a perspective architecture[J]. IEEE Netw 34(1):16-23

    Google Scholar 

  • Wang W, Lu Z (2013) Cyber security in the smart grid: survey and challenges[J]. Comput Netw 57(5):1344-C1371

    Google Scholar 

  • Yang H, Kumara S, Bukkapatnam STS et al (2019) The internet of things for smart manufacturing: a review[J]. IIE Trans 51(11):1190–1216

    Google Scholar 

  • Yang W, Wang S, Zheng G et al (2019) A privacy-preserving lightweight biometric system for internet of things security[J]. IEEE Commun Mag 57(3):84–89

    Google Scholar 

  • Yin C, Xi J, Sun R et al (2017) Location privacy protection based on differential privacy strategy for big data in industrial internet-of-things[J]. IEEE Trans Ind Inform 14:1–1

    Google Scholar 

  • Yuwen C, Jose-Fernan M, Pedro C et al (2017) A privacy protection user authentication and key agreement scheme tailored for the internet of things environment: PriAuth[J]. Wirel Commun Mob Comput 2017:1–17

    Google Scholar 

  • Zhang D, Lindholm G, Ratnaweera H (2018) Use long short-term memory to enhance Internet of Things for combined sewer overflow monitoring[J]. J Hydrol 556:409–418

    Google Scholar 

  • Zhang P, Durresi M, Durresi A (2019) Multi-access edge computing aided mobility for privacy protection in Internet of Things[J]. Computing 101(7):729–742

    MathSciNet  Google Scholar 

  • Zhu F, Lv Y, Chen Y et al (2019) Parallel transportation systems: toward iot-enabled smart urban traffic control and management[J]. IEEE Trans Intell Transp Syst 21(10):4063–71

    Google Scholar 

Download references

Funding

This study was funded by the National Natural Science Foundation of China (No. 62202316), Special Innovation Projects for Universities in Guangdong Province (No. 2022KTSCX308), Research Projects of Shenzhen Polytechnic (No. 6022310037K), High-level Talents Research Initiation Projects of Shenzhen Polytechnic (No. 6021310026K), and Shenzhen Natural Science Foundation (No. 20200821082500001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haibo Yi.

Ethics declarations

Conflict of interest

Haibo Yi declares that he has no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yi, H. A private-preserved IoT and blockchain-based system in the cryptocurrency market. Soft Comput 28, 13797–13807 (2024). https://doi.org/10.1007/s00500-024-09773-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-024-09773-1

Keywords

Navigation