Blockchain in IoT Systems: End-to-End Delay Evaluation

被引:46
|
作者
Alaslani, Maha [1 ]
Nawab, Faisal [2 ]
Shihada, Basem [1 ]
机构
[1] King Abdullah Univ Sci & Technol, Comp Elect & Math Sci & Engn Div, Thuwal 239556900, Saudi Arabia
[2] Univ Calif Santa Cruz, Dept Comp Sci, Santa Cruz, CA 95064 USA
关键词
Blockchain; Byzantine consensus; end-to-end delay; Internet of Things (IoT); queueing; realtime;
D O I
10.1109/JIOT.2019.2917226
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Providing security and privacy for the Internet of Things (IoT) applications while ensuring a minimum level of performance requirements is an open research challenge. Recently, blockchain offers a promising solution to overcome the current peer-to-peer networks limitations. In the context of IoT, Byzantine fault tolerance (BFT)-based consensus protocols are used due to the energy efficiency advantage over other consensus protocols. The consensus process in BFT is done by electing a group of authenticated nodes. The elected nodes will be responsible for ensuring the data blocks' integrity through defining a total order on the blocks and preventing the concurrently appended blocks from containing conflicting data. However, the blockchain consensus layer contributes the most performance overhead. Therefore, a performance study needs to be conducted especially for the IoT applications that are subject to maximum delay constraints. In this paper, we obtain a mathematical expression to calculate the end-to-end delay with different network configurations, i.e., number of network hops and replica machines. We validate the proposed analytical model with simulation. Our results show that the unique characteristics of IoT traffic have an undeniable impact on the end-to-end delay requirement.
引用
收藏
页码:8332 / 8344
页数:13
相关论文
共 50 条
  • [21] An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN
    Nashwan, Shadi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (01): : 607 - 642
  • [22] Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security Enhancement
    Xu, Lei
    Gao, Zhimin
    Fan, Xinxin
    Chen, Lin
    Kim, Hanyee
    Suh, Taeweon
    Shi, Weidong
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1029 - 1036
  • [23] A secure end-to-end communication framework for cooperative IoT networks using hybrid blockchain system
    Erukala, Suresh Babu
    Tokmakov, Dimitar
    Perumalla, Anoosha
    Kaluri, Rajesh
    Bekyarova-Tokmakova, Anna
    Mileva, Nevena
    Lubomirov, Slavi
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [24] Towards an End-to-End IoT Data Privacy-Preserving Framework Using Blockchain Technology
    Loukil, Faiza
    Ghedira-Guegan, Chirine
    Boukadi, Khouloud
    Benharkat, Aicha Nabila
    WEB INFORMATION SYSTEMS ENGINEERING, WISE 2018, PT I, 2018, 11233 : 68 - 78
  • [25] An approximation of the end-to-end delay distribution
    Kim, HS
    Shroff, NB
    QUALITY OF SERVICE - IWQOS 2003, PROCEEDINGS, 2003, 2707 : 59 - 75
  • [26] End-to-end delay distribution on the Internet
    Kato, JY
    Shimizu, A
    Goto, S
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1999, E82D (04) : 762 - 768
  • [27] Study of the characteristics of end-to-end delay
    Zhang, Wei
    He, Jingsha
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 33 - +
  • [28] Adjustment on end-to-end delay distortion
    Huang, LP
    Sezaki, K
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2003, E86B (04) : 1327 - 1335
  • [29] Internet end-to-end delay dynamics
    Zhu Changhua
    Journal of Systems Engineering and Electronics, 2006, (03) : 685 - 691
  • [30] End-to-end delay models with priority
    Osterbo, O
    Performance Challenges for Efficient Next Generation Networks, Vols 6A-6C, 2005, 6A-6C : 1049 - 1058