Skip to main content
Log in

The service architecture of Internet of things terminal connection based on blockchain technology

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

This work aims to explore the security convenience of Internet of things (IoT) terminals based on blockchain technology and to enrich the content of IoT terminal applications. The service architecture platform of blockchain technology is proposed for the terminal connection of IoT. First, the characteristics, performance, and fault tolerance of the consensus algorithm are introduced. Then, the construction of blockchain platform is introduced, and the blockchain system and the storage of blockchain data are designed. Next, the consensus algorithm is optimized with the proof of stake equity proof consensus and the improved consensus mechanism of the practical byzantine fault tolerance consensus, to establish a blockchain service architecture platform. Finally, the node connection service architecture and block process are verified and analyzed. The results show that the blockchain-based IoT service architecture constructed under consensus algorithm has high accuracy and safety. The achievements of this study can promote the development of blockchain technology and IoT and play a good role in promoting the combination of blockchain technology and IoT terminal.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Figure. 5
Fig. 6
Figure. 7
Figure. 8
Fig. 9
Fig. 10
Fig. 11
Figure. 12
Figure. 13
Figure. 14
Figure. 15

Similar content being viewed by others

References

  1. Challal Y, Natalizio E, Sen S et al (2015) Internet of Things security and privacy: design methods and optimization. Ad Hoc Netw 32:1–2

    Article  Google Scholar 

  2. Malina L, Hajny J, Fujdiak R et al (2016) On perspective of security and privacy-preserving solutions in the internet of things. Comput Netw 102:83–95

    Article  Google Scholar 

  3. Bertino E, Islam N (2017) Botnets and internet of things security. Computer 50(2):76–79

    Article  Google Scholar 

  4. Alzahrani B, Fotiou N (2020) Enhancing internet of things security using software-defined networking. J Syst Architect 110:101779

    Article  Google Scholar 

  5. Sikorski JJ, Haughton J, Kraft M (2017) Blockchain technology in the chemical industry: machine-to-machine electricity market. Appl Energy 195:234–246

    Article  Google Scholar 

  6. Kumar R, Tripathi R (2020) Blockchain-based framework for data storage in peer-to-peer scheme using inter planetary file system (IPFS) (Handbook of Research on Blockchain Technology 1st Edition- Elsevier). Handbook of Research on Blockchain Technology, 2020, pp. 35–59.

  7. Peck ME (2017) Blockchains: how they work and why they’ll change the world. IEEE Spectr 54(10):26–35

    Article  Google Scholar 

  8. Huh JH, Seo K (2019) Blockchain-based mobile fingerprint verification and automatic log-in platform for future computing. J Supercomput 75(6):3123–3139

    Article  Google Scholar 

  9. Khan MY, Zuhairi MF, Ali T et al (2019) An extended access control model for permissioned blockchain frameworks. Wirel Netw 26:4943–4954

    Article  Google Scholar 

  10. Gao F, Zhu L, Shen M et al (2018) A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. IEEE Network 32(6):184–192

    Article  Google Scholar 

  11. Lee B, Lee JH (2016) Blockchain-based secure firmware update for embedded devices in an Internet of Things environment. J Supercomput 73:1152–1167

    Article  Google Scholar 

  12. Yu J, Bang HC, Lee H et al (2016) Adaptive internet of things and web of things convergence platform for internet of reality services. J Supercomput 72(1):84–102

    Article  Google Scholar 

  13. Lee B, Lee J-H (2017) Blockchain-based secure firmware update for embedded devices in an Internet of Things environment. J Supercomput 73:1152–1167

    Article  Google Scholar 

  14. Aung KM et al (2016) Building a large-scale object-based active storage platform for data analytics in the internet of things. J Supercomput 72(7):2796–2814

    Article  Google Scholar 

  15. Cong K, Bi Y, Jing L et al (2018) Research on agricultural supply chain system with double chain architecture based on blockchain technology. Futur Gener Comput Syst 5(2):81–83

    Google Scholar 

  16. Xiao L, Wan X, Xiaozhen Lu et al (2019) Iot security techniques based on machine learning: how do iot devices use ai to enhance security? IEEE Signal Process Mag 35(5):41–49

    Article  Google Scholar 

  17. Kudithi T, Sakthivel R (2019) High-performance ecc processor architecture design for iot security applications. J Supercomput 75(1):447–474

    Article  Google Scholar 

  18. He D, Ye R, Chan S et al (2018) Privacy in the internet of things for smart healthcare. IEEE Commun Mag 56(4):38–44

    Article  Google Scholar 

  19. Chikouche N, Cayrel PL, Mboup EHM et al (2019) A privacy-preserving code-based authentication protocol for internet of things. J Supercomput 75(12):8231–8261

    Article  Google Scholar 

  20. Zhao W, Wei L, Fu Q et al (2019) High-performance, flexible, solid-state micro-supercapacitors based on printed asymmetric interdigital electrodes and bio-hydrogel for on-chip electronics. J Power Sources 422:73–83

    Article  Google Scholar 

  21. Dorri A, Kanhere S S, Jurdak R (2017) Towards an optimized blockchain for IoT. In: International conference on internet-of-things design & implementation. ACM, 2017, pp 18–21

  22. Cinque M, Esposito C, Russo S et al (2020) Blockchain-empowered decentralised trust management for the Internet of Vehicles security. Comput Electr Eng 86:106722

    Article  Google Scholar 

  23. Bartoletti M, Carta S, Cimoli T et al (2020) Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact. Futur Gener Comput Syst 102:259–277

    Article  Google Scholar 

  24. Li C, Dong W, Ding L et al (2020) Transfer characteristics of the nonlinear parity-time-symmetric wireless power transfer system at detuning. Energies 13(19):5175

    Article  Google Scholar 

  25. Sumpter DJT, Pratt SC (2019) Quorum responses and consensus decision making. Philos Trans R Soc Lond Ser B Biol Sci 364(1518):743–753

    Article  Google Scholar 

  26. Jiang Y, Wang C, Wang Y et al (2019) A cross-chain solution to integrating multiple blockchains for IoT data management. Sensors 19(9):2042

    Article  Google Scholar 

  27. Kokkonis G, Psannis KE, Roumeliotis M et al (2017) Real-time wireless multisensory smart surveillance with 3D-HEVC streams for internet-of-things (IoT). J Supercomput 73(3):1044–1062

    Article  Google Scholar 

  28. Ryu JH, Sharma PK, Jo JH et al (2019) A blockchain-based decentralized efficient investigation framework for IoT digital forensics. J Supercomput 75:4372–4387

    Article  Google Scholar 

  29. García-Magario I, Nasralla MM, Nazir S (2020) Real-time analysis of online sources for supporting business intelligence illustrated with bitcoin investments and iot smart-meter sensors in smart cities. Electronics 9(7):1101

    Article  Google Scholar 

  30. Malomo OO, Rawat DB, Garuba M (2018) Next-generation cybersecurity through a blockchain-enabled federated cloud framework. J Supercomput 74(10):5099–5126

    Article  Google Scholar 

  31. Homoliak I, Venugopalan S, Hum Q, Szalachowski P. A security reference architecture for blockchains. In: 2019 IEEE International Conference on Blockchain (Blockchain), pp 390–397

  32. Lv Z, Hu B, Lv H (2020) Infrastructure monitoring and operation for smart cities based on iot system. IEEE Trans Industr Inf 16(3):1957–1962

    Article  Google Scholar 

  33. Yu B, Liu J, Nepal S et al (2019) Proof-of-qps: qps based blockchain consensus protocoll. Comput Secur 87:101580.1-101580.13

    Article  Google Scholar 

  34. Hu T, Liu X, Niu W et al (2020) Securing the private key in your blockchain wallet: a continuous authentication approach based on behavioral biometric. J Phys Conf Ser 1631:012104

    Article  Google Scholar 

  35. Mabrouk L, Huet S, Houzet D et al (2019) Efficient adaptive load balancing approach for compressive background subtraction algorithm on heterogeneous CPU–GPU platforms. J Real-Time Image Proc 17(1):1567–1583

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhongyang Yu.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, T., Yuan, Y. & Yu, Z. The service architecture of Internet of things terminal connection based on blockchain technology. J Supercomput 77, 12690–12710 (2021). https://doi.org/10.1007/s11227-021-03774-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-03774-9

Keywords

Navigation