M2MHub: A Blockchain-based Approach for Tracking M2M Message Provenance

被引:0
|
作者
Saguil, Darren [1 ]
Xue, Qiao [1 ]
Mahmoud, Qusay H. [1 ]
机构
[1] Ontario Tech Univ, Dept Elect Comp & Software Engn, Oshawa, ON, Canada
关键词
machine-to-machine communication; blockchain; ethereum; internet of things; provenance;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is a fast growing and popular subset of technology. One of the main features of IoT is device autonomy, the ability for the machines embedded in the devices to function without human intervention. This includes communications with other devices through Machine-to-Machine (M2M) communication. Unfortunately, M2M communications are only stored with what behaviours they have observed, without the causal relationship as to how or why they observed those behaviours. Since M2M messages can trigger more M2M messages, the provenance of issues inside an IoT system can be hidden behind a long chain of messages, so finding the root source of any problem, such as malicious or defective devices, is almost impossible to detect. To solve this problem, in this paper we introduce M2MHub, a centralized auditing system which collects M2M messages in an IoT system and stores them in a blockchain. Devices in the system can tell the hub if they wish to open, continue, or end transactions, allowing the hub to keep track of who is the provenance of the transaction and how their transaction affects other devices. A proof-of-concept simulation has been constructed, demonstrating how M2MHub may function in a real-world implementation. The current implementation is not scalable enough to be deployed to actual IoT networks, so several ideas for future work are offered.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Present and future of M2M
    Infomation Processing Center, Hamamatsu University School of Medicine, 1-20-1, Handayama, Higashi-ku, Hamamatsu, Shizuoka 431-3192, Japan
    不详
    IEEJ Trans. Electron. Inf. Syst., 5 (626-631):
  • [42] M2M: We do that
    Hoske, MT
    CONTROL ENGINEERING, 2005, 52 (09) : 33 - 33
  • [43] Management in M2M networks
    Cackovic, V.
    Popovic, Z.
    2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 501 - 506
  • [44] TRUST IN M2M COMMUNICATION
    Cha, Inhyok
    Shah, Yogendra
    Schmidt, Andreas U.
    Leicher, Andreas
    Meyerstein, Michael Victor
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2009, 4 (03): : 69 - 75
  • [45] A Feasiblity Study on Developing IoT/M2M Applications over ETSI M2M Architecture
    Lin, Fuchun Joseph
    Ren, Yi
    Cerritos, Eduardo
    2013 19TH IEEE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2013), 2013, : 558 - 563
  • [46] Efficient Multi-Receiver Message Aggregation for Short Message Delivery in M2M Networks
    Zheng, Lei
    Lin, Siyu
    Cai, Lin
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 274 - 279
  • [47] Extended group-based verification approach for secure M2M communications
    Prabhakara Rao T.
    Satyanarayana Murthy B.
    International Journal of Information Technology, 2023, 15 (5) : 2479 - 2488
  • [48] M2M Security Technology of CPS Based on Blockchains
    Yin, Shiyong
    Bao, Jinsong
    Zhang, Yiming
    Huang, Xiaodi
    SYMMETRY-BASEL, 2017, 9 (09):
  • [49] Semantic-based Publish/Subscribe for M2M
    Antunes, Mario
    Gomes, Diogo
    Aguiar, Rui
    2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 256 - 263
  • [50] HBMON: A HIP Based M2M Overlay Network
    Dhraief, Amine
    Ghorbali, Amine
    Bouali, Tarak
    Belghith, Abdelfettah
    Drira, Khalil
    2012 THIRD INTERNATIONAL CONFERENCE ON THE NETWORK OF THE FUTURE (NOF), 2012, : 20 - 27