Skip to main content
Log in

SMER: a secure method of exchanging resources in heterogeneous internet of things

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

The number of IoT (Internet of things) connected devices increases rapidly. These devices have different operation systems and therefore cannot communicate with each other. As a result, the data they collected is limited within their own platform. Besides, IoT devices have very constrained resources like weak MCU (micro control unit) and limited storage. Therefore, they need direct communication method to cooperate with each other, or with the help of nearby devices with rich resources. In this paper, we propose a secure method to exchange resources (SMER) between heterogeneous IoT devices. In order to exchange resources among devices, SMER adopts a compensable mechanism for resource exchange and a series of security mechanisms to ensure the security of resource exchanges. Besides, SMER uses a smart contract based scheme to supervise resource exchange, which guarantees the safety and benefits of IoT devices. We also introduce a prototype system and make a comprehensive discussion.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Wörner D, Bomhard V T. When your sensor earns money: exchanging data for cash with bitcoin. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. 2014, 295–298

    Google Scholar 

  2. Shiraz M, Gani A, Khokhar R H, Buyya R. A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing. IEEE Communications Surveys & Tutorials, 2013, 15(3): 1294–1313

    Article  Google Scholar 

  3. Ma X, Cui Y, Wang L, Stojmenovic I. Energy optimizations for mobile terminals via computation offloading. In: Proceedings of 2012 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC). 2012, 236–241

    Chapter  Google Scholar 

  4. Cuervo E, Balasubramanian A, Cho D K, Wolman A, Saroiu S, Chandra R, Bahl P. Maui: making smartphones last longer with code offload. In: Proceedings of the 8th international conference on Mobile systems, applications, and services. 2010, 49–62

    Google Scholar 

  5. Chun B G, Ihm S, Maniatis P, Naik M, Patti A. Clonecloud: elastic execution between mobile device and cloud. In: Proceedings of the Sixth Conference on Computer Systems. 2011, 301–314

    Google Scholar 

  6. Hasan R, Hossain M M, Khan R. Aura: an iot based cloud infrastructure for localized mobile computation outsourcing. In: Proceedings of 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). 2015, 183–188

    Chapter  Google Scholar 

  7. Al Noor S, Hasan R, Haque M M. Cellcloud: a novel cost effective formation of mobile cloud based on bidding incentives. In: Proceedings of 2014 IEEE 7th International Conference on Cloud Computing (CLOUD). 2014, 200–207

    Chapter  Google Scholar 

  8. Ferrer E C. The blockchain: a new framework for robotic swarm systems. 2016, arXiv preprint arXiv:1608.00695

    Google Scholar 

  9. Sikorski J J, Haughton J, Kraft M. Blockchain technology in the chemical industry: machine-to-machine electricity market. Applied Energy, 2017, 195: 234–246

    Article  Google Scholar 

  10. Christidis K, Devetsikiotis M. Blockchains and smart contracts for the internet of things. IEEE Access, 2016, 4: 2292–2303

    Article  Google Scholar 

  11. Lowe D G. Object recognition from local scale-invariant features. In: Proceedings of the 7th IEEE international conference on Computer Vision. 1999, 1150–1157

    Google Scholar 

  12. Muja M, Lowe D G. Fast approximate nearest neighbors with automatic algorithm configuration. In: Proceedings of International Conference on Computer Vision Theory and Application (VISAPP), 2009, 331–340

    Google Scholar 

Download references

Acknowledgements

The work was kindly supported by Nanjing Yunyan Information Technology Ltd and Microsoft.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuxing Han.

Additional information

Yu Zhang received the master degree from information and engineering university, China in 2011. He is currently working toward the PhD degree in the department of computer science and technology, Tsinghua University, China. His current research interests include Internet of things, Blockchain, and E-business.

Yuxing Han received her BS from Hong Kong University of Science and Technology, China and PhD from UCLA, both in Electrical Engineering. She is currently a professor in school of engineering at South China Agriculture University, China. Her research area focuses on virtual reality, multimedia communication over challenging networks, and big data analysis.

Jiangtao (Gene) Wen received the BS, MS, and PhD degrees with honors from Tsinghua University, China in 1992, 1994 and 1996 respectively, all in Electrical Engineering.

From 1996 to 1998, he was a staff research fellow at UCLA, where he conducted cutting-edge research on multimedia coding and communications. Many of his inventions there were later adopted by international standards such as H.263, MPEG, and H.264. After UCLA, he served as the Principal Scientist of PacketVideo Corp., the CTO of Morphbius Technology Inc., the Director of Video Codec Technologies of Mobilygen Corp, the Senior Director of Technology of Ortiva Wireless and consulted for Stretch Inc. Since 2009, Dr. Wen has held a Professorship at the Department of Computer Science and Technology of Tsinghua University.

Dr. Wen is a world-renowned expert in multimedia communication over hostile networks, video coding and communications. He has authored many widely referenced papers in related fields. Products deploying technologies that Dr. Wen developed are currently widely used worldwide. Dr. Wen holds over 30 patents with numerous others pending. As Senior Member of IEEE, Dr. Wen is an Associate Editor for IEEE Transactions CSVT.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Y., Han, Y. & Wen, J. SMER: a secure method of exchanging resources in heterogeneous internet of things. Front. Comput. Sci. 13, 1198–1209 (2019). https://doi.org/10.1007/s11704-018-6524-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11704-018-6524-3

Keywords

Navigation