Blockchain-Enhanced Sensor-as-a-Service (SEaaS) in IoT: Leveraging Blockchain for Efficient and Secure Sensing Data Transactions
Abstract
:1. Introduction
- How can effective data-sharing methods be developed to enhance SEaaS within a large and decentralized network?
- What procedures can be implemented to enhance accountability among all stakeholders involved in SEaaS, while maintaining cost-effectiveness?
- How can a system model of SEaaS be developed to facilitate practical deployment within an IoT environment?
- Designing a simplified and lightweight IoT architecture that integrates the decentralized operation of blockchain technology with simplified public key encryption;
- Developing a novel SEaaS model featuring exclusive trading operations for sensed data conducted by sellers, buyers, service providers, and blockchain entities;
- Introducing a pioneering blockchain-based data-sharing process encompassing enrollment, sale, request, feedback management, and validation procedures;
- Benchmarking the proposed SEaaS model against recent standard blockchain-based data-sharing methodologies to demonstrate its effectiveness across multiple performance parameters.
2. Related Work
- Architecture-focused methods: These methods aim to develop IoT architectures for managing large volumes of sensing data in real time [18]. Chiti and Gandini [19] focused on enhancing interoperability in IoT architecture through distributed ledger services, which may need further attention to the complexities in maintaining a decentralized environment. Jin and Kim [20] developed a rule-based scheme to integrate devices, IoT services, rule services, and clients within a heterogeneous IoT architecture, addressing complex control issues but lacking comprehensive solutions for security challenges.
- Encryption-focused methods: Secure data-sharing methods in blockchain or non-blockchain environments often rely on encryption-based operations. He et al. [21] introduced a data-sharing mechanism integrating attribute-based encryption with smart contracts, offering nuanced control over data access, but may require enhancements for computational efficiency and scalability due to attribute-based encryption’s complexity. Sun et al. [22] proposed a methodology aiming to enhance user experience in data access but raised concerns about the practicality of homomorphic encryption due to its computational intensity. Researchers like Razzaq et al. [23] and Albualyhi and Alsukayti [24] utilized the Ethereum blockchain to facilitate open frameworks in IoT architectures, facing challenges such as network congestion and scalability. Fukuda et al. [25] presented a modular design for distributed data-sharing using streaming services to enable distributed processing tasks. Various encryption-based and blockchain-based data-sharing models have been proposed, including chaotic RSA encryption (Priyadharshini et al. [26]), attribute-based encryption (Zhang et al. [27]), public key encryption with a ring signature (Wu et al. [28]), software-defined blockchain with a Byzantine algorithm (Shi et al. [29]), and homomorphic encryption with hashing (Zhang et al. [30]). However, this approach’s primary limitation lies in its focus on a centralized operational approach, which may only partially meet the needs of large-scale applications requiring decentralized management.
- Distributed-operation-focused methods: These methods primarily support large-scale data-sharing services in IoT and often incorporate machine-learning, artificial intelligence, and blockchain technologies. Debauche et al. [31] introduced an integrated machine-learning scheme to process blockchain data at the cloud level for improved data streams, while Olaniyi et al. [32] emphasized the need for enhancing blockchain security for real-time applications. However, these models need to comprehensively address the practical implications and computational demands of integrating these complex technologies. Zichichi et al. [33] proposed another decentralized data-sharing mechanism using smart contracts and a distributed hash table for smart query management on a ledger in the blockchain. Despite advancements, this approach’s implementation using a hypercube-distributed hash tree increases the routing complexity with a tree dimension expansion, suggesting the need for more scalable systems. Fallatah et al. [34] discussed personalized data stores for service relaying, highlighting challenges in managing large-scale informatics linked with personal data. Palaiokrassas et al. [35] developed a platform for managing sensory data in smart cities, while Almstedt et al. [36] explored the use of small-scale blockchains. However, these blockchain models operate with latency due to consensus mechanisms, limiting real-time data-sharing applications.
- Data-driven methods: These methods model adversaries to address threats in specific data-processing scenarios. Bentahar et al. [37] and AI Ma-hamid et al. [38] introduced key agreement and middleware schemes for authentication and data management in IoT environments. Despite their contributions, a comprehensive approach to address the security, scalability, and real-time processing challenges in IoT transactions remains necessary. The integration of fog with cloud and IoT offers a wider range of applications, improving service relaying [39]. Various techniques for disseminating information using sensing technologies, such as in public transportation scenarios, have been discussed [40]. Othman et al. [41] proposed a unique sensing-as-a-service model using a search optimization algorithm for a virtual sensing environment. However, the lack of flexible interaction among entities may increase overhead during real-time data-sharing, particularly in virtualized cloud environments.
- Miscellaneous methods: Mathew et al. [42] and Hoque et al. [43] explored novel areas in IoT, including crowdsensing and airborne-based data services. Mathew et al. developed a crowdsourcing model integrated with smart city services to bridge the gap between consumers and data collectors, while Hoque et al. [43] proposed IoT service relaying using drones, particularly in smart agriculture. Woodward [44] proposed a blockchain-based big data transmission model, and Grupac and Negoianu [45] discussed augmented reality applications. Both studies investigated the relationship between multi-sensor fusion, dynamic routing technologies, and blockchain-enhanced Sensor-as-a-Service (SEaaS) in IoT. While these explorations are valuable, further research is needed to ensure the reliable, quality, and secure transmission of diverse data forms. Additionally, these models should provide supportive evidence for managing spatial and temporal data dynamics, which present significant challenges in dynamic environments.
- Lack of accountability: Existing research studies have implemented blockchain (both centralized and distributed, e.g., Ethereum) [24], which offers better fairness while performing data-sharing with high-quality information. However, there must be a dedicated model which supports accountability. Consequently, these models often compromise with privacy and accountability, especially when handling simultaneous transactions between buyers and sellers.
- Less study towards sensing as a service: It should be noted that approaches towards data-sharing can be used for systems towards sensing as a service; however, they are not explicitly meant to carry out this specific task. There are a significantly smaller number of standard research models in which data-sharing methods are integrated with sensing as a service over an IoT environment [26,27,28,29,30].
- Stale IoT architecture: While designing a decentralized blockchain operation [33], it is essential to modify the architecture of the IoT without changing the core layer-based operation. This demands more extensibility and flexibility in authentication, data access, and updating tasks. The currently deployed mechanism in the IoT architecture needs to explore its holistic architectural potential. Our prior work has addressed these issues [46]; however, more extensive modeling is required.
- Complex data/block management: A practical modeling of sensing as a service requires consideration of the buyer and seller with a lightweight, flexible sales management scheme. Only some studies have addressed this issue. Existing problem solutions are witnessed to use a complex key management approach that offers better security but at the cost of the computational burden [21,22]. Hence, lightweight data/block management must be carried out so that data sharing can be performed without degrading computational efficiency.
3. Problem Description
4. Materials and Methods
4.1. Transactional Block for SEaaS
- Data-Sharing Operation (): This is the default operation of the data-sharing process, activated when the blockchain is applied and deployment of is carried out.
- Enrollment Management (/): This operation consists of (i) Store Enrollment Data () and (ii) Acquire Enrollment Data () that carries out storing and acquiring all transactional information about the enrollment process to create clear accountability towards each operation.
- Sale Management (/): This operation consists of (i) Sale-Updating Operation () and (ii) Acquire Sale Data () that are responsible for facilitating and acquiring all the undertaken sales-based information in the SEaaS model.
- Request Management (/): This operation consists of (i) Request-Storing Operation () and (ii) Acquire Request Information () that carry out storing and acquisition of all forms of requests based on a purchase order of sensory services in IoT. It should be noted that Request-Storing Operation () is given more importance as it relates to the allocation of incentive α for providing correct feedback.
- Feedback Management (/): This operation consists of (i) Feedback-Storing Operation () and (ii) Acquire Feedback Information () that carry out storing and acquisition of feedback (or acknowledgment). It should be noted that the study model offers more importance to Feedback-Storing Operation () as the seller (or owner of a service) can acquire a service fee upon invoking Feedback-Storing Operation (), which is underscored for its capability to enable the seller (or service owner) to increase service fees concurrent with the provision of legitimate feedback, also facilitating the withdrawal of service fees by the buyer.
- Validation Operation (): This operation, dedicated solely to verifying the authenticity and accuracy of feedback information provided by various participants, is crucial to maintaining the integrity and reliability of the SEaaS model’s operational framework.
4.2. Algorithm Implementation
Algorithm 1 For Blockchain-Based Data-Sharing in SEaaS. |
Input: (system attributes) Output: (delivery of original data from seller to buyer) Start 1. 2. 3. 4. 5. 6. 7. Reject request 8. else 9. 10. 11. 12. 13. 14. 15. end 16. 17. 18. 19. 20. 21. Validate 22. 23. () End |
- Configuration Stage: This is the first step of operation, which is related to the configuration of the proposed approach towards blockchain-based data-sharing in SEaaS. The implementation initiates by declaring the system attributes. consists of representing public attribute generated by the first step of encryption, first secret key, second secret key, and identity of the smart appliance, respectively (Line 1 and Line 2). It is noted that and are two different hash keys whose key size is restricted to 256 bits and the highest natural number. This means that the proposed scheme is intended to accommodate the secure hashing of any size of data. Apart from this, all the actors involved in the proposed system yield a specific form of private record using the secret token generator (Line 3). This is meant to facilitate transactional information within the blockchain, while a leader security token, , is used for enrollment. To perform validation of the smart appliance’s legitimacy bearing the identity in the blockchain, the service provider further computes a verification key (Line 4).
- Enrollment Process: After the configuration stage is accomplished, the following line of action is directed toward the enrollment process, which is necessary for utilizing the SEaaS model by various actors in the IoT environment. One of the essential steps in the enrollment process is to evaluate some crucial information to ascertain the genuineness of the smart appliances in IoT. For this purpose, the algorithm constructs a method to assess some of the essential information () that represents public information of the actor’s account, the real identity of smart appliances, supporting attribute to prove the genuine identity of smart devices and signatures, respectively (Line 5). The signature attribute is generated as , where the method represents the Elgamal signature. The service provider initially assesses the genuineness of signature attribute by verifying the public key attribute , original identity attribute , supporting attribute , and signature attribute (Line 5). The algorithm authenticates all these attributes, and if they are violated (Line 6), then the algorithm denies the request for data-sharing (Line 7). Otherwise, the algorithm computes the virtual identity attribute (Line 9). During this computation of , the algorithm applies its primary hash key to a matrix using the leader token (Line 9). The variable matrix is formed by concatenating the leader token , public key , and the original identity of smart appliances . Further, the algorithm forwards and information to the smart contract to reposition it using the Store Enrollment Data operation (Line 10). It should be noted that the service provider uses the local database to store all the lists of information that could be used for future reference. Another essential factor towards this enrollment operation of the proposed algorithm is that the system permits the enrollment process, provided and are already indexed in the identity of smart contract I.
- Managing Sensed Information in IoT: Consider that the new seller utilizes its virtual identity, , to initiate the selling process to the enrolled service provider. In such cases, the sensed information from the seller’s smart appliances must be securely forwarded to the new buyer via the service provider. The service provider acquires the seamless transmission of a specific set of information from the smart appliances of the new seller (Line 11). The information captured by the service provider includes (i) the device’s identity , (ii) start time of data collection , (iii) total duration of data collection , (iv) verification code of source information , (v) encrypted data , and (vi) verification information evaluated by the algorithm , where the variable represents the concatenation of user verification key , device identity , , , , and . Further, it should be noted that and represent the key owned by the sensor owner for a long time and the secret key for that particular session, respectively. The computation of is performed by applying the primary hash key to the concatenated value of and the session time . The service provider computes the verification key using primary hash key over the concatenated value of the leader token and the device identity . This computation is performed over to check its validity with verification information (Line 12). The variable bears concatenated information on the service provider verification key , device identity , , , , and . For the matching conditional logic stated in Line 12 of the algorithm, the system stores the following information locally, device identity , , , , and , followed by the Sales-Updating Operation for relaying sales information to the smart contract where represents the identity of the smart contract (Line 13 and Line 14). The sales information will further consist of concatenated information on device identity , , , , , and , where the new variables, and , relate to anticipated service cost by seller and content of data being sold, respectively.
- Request Management: The next part of the algorithmic implementation is associated with the buyer’s request to obtain the sensed information as a service from the buyer. For this purpose, the implementation uses the operation of acquiring sales data to obtain information on the device identity , the virtual identity of the seller , , , td, and utilizing the smart contract with identity I (Line 16). Further, the first step of encryption is implemented to generate the security token as and , representing the buyer’s public and private keys (Line 17). In the following line of operation, the algorithm uses the Request-Storing Operation , where the algorithm obtains information on the device identity , new and prior virtual identity of the seller, instantaneous time, and public key of the buyer that are finally forwarded to (Line 18). Further, the algorithm executes a Request-Storing Operation while allocating α incentive for appropriate transactional information.
- Feedback Management: The algorithm uses Acquire Request Information to obtain requests from the smart contract , where the requested information consists of device identity , the old and new virtual identities of the seller, the instantaneous time of receiving the request, and the public key of the buyer (Line 19). To generate feedback on the newly acquired request, the seller uses the primary session token to create a secondary session key . This operation is carried out as , where the variable represents the concatenation of the primary session token and the total duration of data collection . Further, the public key of the buyer is used to encrypt the secondary session token by the seller, followed by generating feedback (Line 20) using the Feedback-Storing Operation that is forwarded to the smart contract with the identity I.
- Authentication of Service Relaying: This is the final operation of the proposed algorithm, which involves validating the feedback (Line 21). The algorithm uses Acquire Feedback Information , where the buyer verifies the information from the data owned at that time by the smart contract with identity I (Line 22). Finally, the algorithm retrieves the original data using the validation operation (Line 23). In the final stage of the operation, the generated request and compliance using the generated feedback are cross-checked by the service provider from the smart contract. The system indexes the successful transaction as a record upon finding a valid request. Hence, the algorithm completes its operations towards a completely decentralized data-sharing mechanism using a distributed blockchain in the IoT architecture.
5. Result Discussion
5.1. Assessment Environment
5.2. Assessment Strategy
- ●
- SDS (Secure Data-Sharing): The model developed by Priyadharshini and Canessane [26] aims to address existing security challenges in blockchain technology. It presents a notable integration of the Rivest–Shamir–Adleman (RSA) algorithm and a chaotic map, enhancing the security of data sharing within the IoT environment, marked by many devices.
- ○
- Congruence with SEaaS: A significant use of public key encryption is employed to strengthen blockchain-based data-sharing in IoT.
- ○
- Distinctiveness: The SEaaS model introduces a novel approach by orchestrating sales transactions using smart contracts, a functionality that is notably absent in the SDS framework.
- ●
- BaDS (Blockchain-augmented Data-Sharing): Developed by Zhang et al. [27], this exceptional architecture improves data sharing in the IoT framework by utilizing an attribute-based signature encryption combined with a ciphertext policy.
- ○
- Congruence with SEaaS: A shared adherence to using smart contracts as instrumental components in promoting secure data-sharing within IoT architectures.
- ○
- Distinctiveness: The SEaaS ecosystem operates in an environment where equal importance is given to device and user (seller/buyer) identities, growing into a more decentralized setting. This contrasts with BaDS, which prioritizes the device identity through control tables.
- ●
- ADS (Anonymized Data-Sharing): Developed by Wu et al. [28], this model adopts public key encryption to enhance anonymity. This is a popular model for strengthening authenticity, accountability, and privacy in the context of data sharing.
- ○
- Congruence with SEaaS: A unified step towards utilizing blockchain, public key encryption, and signatures, thereby constructing a stronghold of anonymity.
- ○
- Distinctiveness: SEaaS navigates the anonymity landscape through the decentralized management of encrypted device and user (seller) virtual identities. This approach is less cumbersome than the exclusive dependence on signatures, as ADS advocates.
- ●
- SLTA (Secure and Lightweight Trust Architecture): Developed by Shi et al. [29], the SLTA model presents a system of selective data sharing with privileged owners in a distinct, trust-oriented IoT architecture. Oracle is used for facilitating data collection, followed by tamper prevention by edge devices, along with identity management in a distributed manner.
- ○
- Congruence with SEaaS: A collective ode to distributed identity management in the blockchain-empowered data-sharing.
- ○
- Distinctiveness: SEaaS establishes an innovative route through simplified mathematical methodologies enhanced by multilayered security protection without complex orchestrations, a deviation from SLTA’s trust-centric identity management principles.
- ●
- EDS (Efficient Data-Sharing): Developed by Zhang et al. [30], this model introduces an innovative payment channel network within blockchain technology, incorporating hashing and homomorphic encryption. This approach aims to overcome conventional obstacles related to transaction success rates and overhead challenges. The model also claims a decreased overhead while adopting a multi-path routing scheme.
- ○
- Congruence with SEaaS: A mutual commitment to incorporating hashing into the fabric of transaction processes.
- ○
- Distinctiveness: SEaaS was developed by introducing a new IoT architecture with innovative system features, stimulating a dynamic data-sharing ecosystem. This approach contrasts with EDS’s preference for orchestrating multi-hop routing.
5.3. Discussion of Outcomes
6. Discussion and Conclusions
- ●
- RQ1: How can effective data-sharing methods be developed to enhance SEaaS within a large and decentralized network?
- ○
- Solution: The proposed system introduces a highly interconnected and collaborative network system in which the seller’s information is subjected to better exposure by prospective buyers and protected using a simplified encryption operation. A specific attribute has been used for performing data-sharing operations, which is also an integral part of the smart contract system. Apart from this, the adoption of decentralized Ethereum has been shown to use a specific configuration stage using public key attributes. Moreover, the proposed model also involves a particular module for managing sensed information in IoT, which makes the data and its associated computation much easier and faster, even for concurrent buyers.
- ●
- RQ2: What procedures can be implemented to enhance accountability among all stakeholders involved in SEaaS, while maintaining cost-effectiveness?
- ○
- Solution: The complete system is developed using a ‘no trust’-based approach where all the actors involved in the system are subjected to an enrollment process. This process uses the public key, original identity, supporting, and signature attributes. Further, the Elgamal signature is used to secure the attributes. When subjected to Ethereum, all these attributes are computationally complex to be unnoticed in case of malicious activity. Hence, it is a robust trapdoor function that offers higher forward/backward secrecy and maintains higher accountability for all the actors involved. It is cost-effective and can be justified by the lower algorithm processing time obtained in the benchmarked outcomes.
- ●
- RQ3: How can a system model of SEaaS be developed to facilitate practical deployment within an IoT environment?
- ○
- Solution: The proposed system has developed an analytical model whose deployment scenario is chosen to work in a distributed and decentralized manner. For this purpose, a practical case study of a manufacturing firm (shown in Figure 1) has been used for modeling, while this architecture offers omnidirectional connectivity to all the actors with robust security rules using Ethereum. Hence, any individual actor or organization can easily use this environment without involving potential re-engineering processes in their existing networks.
- The proposed SEaaS model introduces an explicit operation towards relaying sensing data as a service, considering four prominent actors, viz., the seller, buyer, service provider, and blockchain, in a more comprehensive manner. This architectural deployment can be carried out by various users ranging from personal individuals to corporate service providers or the manufacturing industry.
- The proposed deployment architecture is designed flexibly, which any industry can adopt without demanding a complex re-engineering process. The ideal setting is to follow the data-sharing protocols, and the rest of the internal operations are autonomously carried out by the proposed study model.
- One of the most beneficial consequences and advantages of the proposed model is associated with sale management, request management, feedback management, and the validation operation, which not only enhances the current productivity of sales but also offers potential security against any uncertain threats.
- The proposed model is deployed with a unique configuration process and enrollment management, which is meant to retain a maximum level of accountability for every transaction process suitable for both the buyer and seller, irrespective of any domain of services being offered via IoT.
- The cost-effectiveness of the proposed model can be realized owing to its inclusion of the unique management of sensed information where a multi-level identification of actors and various transaction processes is carried out without inducing any computational burden on resource-constrained sensors.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Ashraf, Q.M.; Tahir, M.; Habaebi, M.H.; Isoaho, J. Toward autonomic internet of things: Recent advances, evaluation criteria, and future research directions. IEEE Internet Things J. 2023, 10, 14725–14748. [Google Scholar] [CrossRef]
- Li, J.; Liang, W.; Xu, W.; Xu, Z.; Li, Y.; Jia, X. Service home identification of multiple-source IoT applications in edge computing. IEEE Trans. Serv. Comput. 2023, 16, 1417–1430. [Google Scholar] [CrossRef]
- Olanrewaju, R.F.; Khan, B.U.I.; Hashim, A.H.A.; Sidek, K.A.; Khan, Z.I.; Daniyal, H. The Internet of Things Vision: A Comprehensive Review of Architecture, Enabling Technologies, Adoption Challenges, Research Open Issues and Contemporary Applications. J. Adv. Res. Appl. Sci. Eng. Technol. 2022, 26, 51–77. [Google Scholar] [CrossRef]
- Chen, F.; Xiao, Z.; Xiang, T.; Fan, J.; Truong, H.-L. A full lifecycle authentication scheme for large-scale smart IoT applications. IEEE Trans. Dependable Secur. Comput. 2022, 20, 2221–2237. [Google Scholar] [CrossRef]
- Alobaidy, H.A.H.; Jit Singh, M.; Behjati, M.; Nordin, R.; Abdullah, N.F. Wireless transmissions, propagation and channel modelling for IoT technologies: Applications and challenges. IEEE Access Pract. Innov. Open Solut. 2022, 10, 24095–24131. [Google Scholar] [CrossRef]
- Schrettenbrunner, M.B. Artificial-intelligence-driven management: Autonomous real-time trading and testing of portfolio or inventory strategies. IEEE Eng. Manag. Rev. 2023, 51, 65–76. [Google Scholar] [CrossRef]
- Abeysekara, P.; Dong, H.; Qin, A.K. Edge intelligence for real-time IoT service trust prediction. IEEE Trans. Serv. Comput. 2023, 16, 2606–2619. [Google Scholar] [CrossRef]
- Mazon-Olivo, B.; Pan, A. Internet of things: State-of-the-art, computing paradigms and reference architectures. IEEE Lat. Am. Trans. 2022, 20, 49–63. [Google Scholar] [CrossRef]
- Liu, Y.; Yu, W.; Rahayu, W.; Dillon, T. An evaluative study on IoT ecosystem for smart predictive maintenance (IoT-SPM) in manufacturing: Multiview requirements and data quality. IEEE Internet Things J. 2023, 10, 11160–11184. [Google Scholar] [CrossRef]
- Siddiqui, S.; Hameed, S.; Shah, S.A.; Ahmad, I.; Aneiba, A.; Draheim, D.; Dustdar, S. Toward software-defined networking-based IoT frameworks: A systematic literature review, taxonomy, open challenges and prospects. IEEE Access Pract. Innov. Open Solut. 2022, 10, 70850–70901. [Google Scholar] [CrossRef]
- Martin, S.; Soldatos, J.; Cousin, P.; Maló, P. Internet of things experimentation: Linked-data, sensing-as-a-service, ecosystems and IoT data stores. In Building the Hyperconnected Society-Internet of Things Research and Innovation Value Chains, Ecosystems and Markets; River Publishers: Gistrup, Denmark, 2022; pp. 261–277. [Google Scholar]
- Vermesan, O.; Friess, P. Building the Hyperconnected Society-Internet of Things Research and Innovation Value Chains, Ecosystems and Markets, 1st ed.; River Publishers: New York, NY, USA, 2022. [Google Scholar]
- Ekman, K.; Weilenmann, A. Behind the scenes of planning for public participation: Planning for air-quality monitoring with low-cost sensors. J. Environ. Plan. Manag. 2021, 64, 865–882. [Google Scholar] [CrossRef]
- Symeonaki, E.; Arvanitis, K.; Piromalis, D. A context-aware middleware cloud approach for integrating Precision Farming facilities into the IoT toward Agriculture 4.0. Appl. Sci. 2020, 10, 813. [Google Scholar] [CrossRef]
- Albreem, M.A.; Sheikh, A.M.; Alsharif, M.H.; Jusoh, M.; Mohd Yasin, M.N. Green internet of things (IoT): Applications, practices, awareness, and challenges. IEEE Access Pract. Innov. Open Solut. 2021, 9, 38833–38858. [Google Scholar] [CrossRef]
- Jabbar, R.; Kharbeche, M.; Al-Khalifa, K.; Krichen, M.; Barkaoui, K. Blockchain for the Internet of Vehicles: A decentralized IoT solution for Vehicles communication using Ethereum. Sensors 2020, 20, 3928. [Google Scholar] [CrossRef] [PubMed]
- Arshad, Q.-U.-A.; Khan, W.Z.; Azam, F.; Khan, M.K.; Yu, H.; Zikria, Y.B. Blockchain-based decentralized trust management in IoT: Systems, requirements and challenges. Complex Intell. Syst. 2023, 9, 6155–6176. [Google Scholar] [CrossRef]
- Deniziak, S.; Płaza, M.; Arcab, Ł. Approach for designing real-time IoT systems. Electronics 2022, 11, 4120. [Google Scholar] [CrossRef]
- Chiti, F.; Gandini, G. Distributed ledger as a service: A Web 3.0-oriented architecture. J. Sens. Actuator Netw. 2023, 12, 57. [Google Scholar] [CrossRef]
- Jin, W.; Kim, D. Distributed rule-enabled interworking architecture based on the transparent rule proxy in heterogeneous IoT networks. Sensors 2023, 23, 1893. [Google Scholar] [CrossRef] [PubMed]
- He, Q.; Liu, Y.; Jiang, L.; Zhang, Z.; Wu, M.; Zhao, M. Data sharing mechanism and strategy for multi-service integration for smart grid. Energies 2023, 16, 5294. [Google Scholar] [CrossRef]
- Sun, S.; Du, R.; Chen, S. A secure and computable blockchain-based data sharing scheme in IoT system. Information 2021, 12, 47. [Google Scholar] [CrossRef]
- Razzaq, A.; Altamimi, A.B.; Alreshidi, A.; Ghayyur, S.A.K.; Khan, W.; Alsaffar, M. IoT data sharing platform in web 3.0 using blockchain technology. Electronics 2023, 12, 1233. [Google Scholar] [CrossRef]
- Albulayhi, A.S.; Alsukayti, I.S. A blockchain-centric IoT architecture for effective smart contract-based management of IoT data communications. Electronics 2023, 12, 2564. [Google Scholar] [CrossRef]
- Fukuda, H.; Gunji, R.; Hasegawa, T.; Leger, P.; Figueroa, I. DSSM: Distributed Streaming data Sharing Manager. Sensors 2021, 21, 1344. [Google Scholar] [CrossRef] [PubMed]
- Priyadharshini, K.; Canessane, A. Security in data sharing for blockchain-intersected IoT using novel chaotic-RSA encryption. Int. J. Inf. Secur. Priv. 2022, 16, 1–15. [Google Scholar] [CrossRef]
- Zhang, Y.; He, D.; Choo, K.-K.R. BaDS: Blockchain-based architecture for data sharing with ABS and CP-ABE in IoT. Wirel. Commun. Mob. Comput. 2018, 2018, 2783658. [Google Scholar] [CrossRef]
- Wu, T.; Wang, W.; Zhang, C.; Zhang, W.; Zhu, L.; Gai, K.; Wang, H. Blockchain-based anonymous data sharing with accountability for internet of things. IEEE Internet Things J. 2023, 10, 5461–5475. [Google Scholar] [CrossRef]
- Shi, P.; Wang, H.; Yang, S.; Chen, C.; Yang, W. Blockchain-based trusted data sharing among trusted stakeholders in IoT. Softw. Pract. Exp. 2021, 51, 2051–2064. [Google Scholar] [CrossRef]
- Zhang Yue Gai, K.; Xiao, J.; Zhu, L.; Choo, K.-K.R. Blockchain-empowered efficient data sharing in Internet of Things settings. IEEE J. Sel. Areas Commun. 2022, 40, 3422–3436. [Google Scholar] [CrossRef]
- Debauche, O.; Nkamla Penka, J.B.; Hani, M.; Guttadauria, A.; Ait Abdelouahid, R.; Gasmi, K.; Ben Hardouz, O.; Lebeau, F.; Bindelle, J.; Soyeurt, H.; et al. Towards a unified architecture powering scalable learning models with IoT data streams, blockchain, and open data. Information 2023, 14, 345. [Google Scholar] [CrossRef]
- Olaniyi, O.M.; Alfa, A.A.; Umar, B.U. Artificial intelligence for demystifying blockchain technology challenges: A survey of recent advances. Front. Blockchain 2022, 5, 927006. [Google Scholar] [CrossRef]
- Zichichi, M.; Ferretti, S.; Rodríguez-Doncel, V. Decentralized personal data marketplaces: How participation in a DAO can support the production of citizen-generated data. Sensors 2022, 22, 6260. [Google Scholar] [CrossRef] [PubMed]
- Fallatah, K.U.; Barhamgi, M.; Perera, C. Personal Data Stores (PDS): A review. Sensors 2023, 23, 1477. [Google Scholar] [CrossRef] [PubMed]
- Palaiokrassas, G.; Skoufis, P.; Voutyras, O.; Kawasaki, T.; Gallissot, M.; Azzabi, R.; Tsuge, A.; Litke, A.; Okoshi, T.; Nakazawa, J.; et al. Combining blockchains, smart contracts, and complex sensors management platform for hyper-connected SmartCities: An IoT data marketplace use case. Computers 2021, 10, 133. [Google Scholar] [CrossRef]
- Almstedt, L.; Bleeke, K.; Mahhouk, M.; Jehl, L.; Kapitza, R.; Wolf, L. ContractBox: Realizing accountable data sharing on the edge using a small scale blockchain. Comput. Netw. 2023, 229, 109768. [Google Scholar] [CrossRef]
- Bentahar, A.; Meraoumia, A.; Bradji, L.; Bendjenna, H. Sensing as a service in Internet of Things: Efficient authentication and key agreement scheme. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 5493–5509. [Google Scholar] [CrossRef]
- Al Mahamid, F.; Lutfiyya, H.; Grolinger, K. Virtual sensor middleware: Managing IoT data for the fog-cloud platform. In Proceedings of the 2022 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Halifax, NS, Canada, 18–20 September 2022. [Google Scholar] [CrossRef]
- Mohamed, N.; Al-Jaroodi, J.; Lazarova-Molnar, S.; Jawhar, I. Applications of integrated IoT-fog-cloud systems to smart cities: A survey. Electronics 2021, 10, 2918. [Google Scholar] [CrossRef]
- Darsena, D.; Gelli, G.; Iudice, I.; Verde, F. Sensing technologies for crowd management, adaptation, and information dissemination in public transportation systems: A review. IEEE Sens. J. 2023, 23, 68–87. [Google Scholar] [CrossRef]
- Othman, R.A.; Darwish, S.M.; Abd El-Moghith, I.A. A multi-objective crowding optimization solution for efficient sensing as a service in virtualized wireless sensor networks. Mathematics 2023, 11, 1128. [Google Scholar] [CrossRef]
- Mathew, S.S.; El Barachi, M.; Kuhail, M.A. CrowdPower: A novel crowdsensing-as-a-service platform for real-time incident reporting. Appl. Sci. 2022, 12, 11156. [Google Scholar] [CrossRef]
- Hoque, M.A.; Hossain, M.; Noor, S.; Islam, S.M.R.; Hasan, R. IoTaaS: Drone-based internet of things as a service framework for smart cities. IEEE Internet Things J. 2022, 9, 12425–12439. [Google Scholar] [CrossRef]
- Woodward, B. Remote big data management and visual imagery tools, multisensor fusion and dynamic routing technologies, and 3D space mapping and object recognition algorithms on blockchain-based metaverse platforms. Linguist. Philos. Investig. 2023, 22, 60–76. [Google Scholar] [CrossRef]
- Grupac, M.; Negoianu, A.E. Immersive extended reality and sensor-based object recognition technologies, socially-oriented location tracking and simulation modeling tools, and artificial vision and haptic augmented reality systems in the metaverse interactive environment. Rev. Contemp. Philos. 2023, 22, 226–243. [Google Scholar] [CrossRef]
- Olanrewaju, R.F.; Khan, B.U.I.; Goh, K.W.; Hashim, A.H.A.; Sidek, K.A.B.; Khan, Z.I.; Daniyal, H. A holistic architecture for a sales enablement sensing-as-a-service model in the IoT environment. Information 2022, 13, 514. [Google Scholar] [CrossRef]
Parameters | Values |
---|---|
Total sensors/smart appliances | 200 |
Number of sellers | 5–10 |
Number of buyers | 10 |
Number of service provider | 2 |
Data packets | 50 gigabytes |
Size of control message | 10 bits |
Bandwidth | 5 gigabytes per second |
Initialized energy of nodes | 10 J |
Approaches | Energy Used | Throughput | Latency | Processing Time |
---|---|---|---|---|
Proposed | 3.188 | 8.529 | 0.917 | 1.087 |
SDS | 8.271 | 5.615 | 3.19 | 5.096 |
BaDS | 8.022 | 7.188 | 2.09 | 3.817 |
ADS | 7.912 | 6.672 | 2.89 | 3.588 |
SLTA | 6.193 | 6.987 | 2.61 | 3.118 |
EDS | 6.025 | 6.996 | 2.26 | 2.671 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Khan, B.U.I.; Goh, K.W.; Mir, M.S.; Mohd Rosely, N.F.L.; Mir, A.A.; Chaimanee, M. Blockchain-Enhanced Sensor-as-a-Service (SEaaS) in IoT: Leveraging Blockchain for Efficient and Secure Sensing Data Transactions. Information 2024, 15, 212. https://doi.org/10.3390/info15040212
Khan BUI, Goh KW, Mir MS, Mohd Rosely NFL, Mir AA, Chaimanee M. Blockchain-Enhanced Sensor-as-a-Service (SEaaS) in IoT: Leveraging Blockchain for Efficient and Secure Sensing Data Transactions. Information. 2024; 15(4):212. https://doi.org/10.3390/info15040212
Chicago/Turabian StyleKhan, Burhan Ul Islam, Khang Wen Goh, Mohammad Shuaib Mir, Nur Fatin Liyana Mohd Rosely, Aabid Ahmad Mir, and Mesith Chaimanee. 2024. "Blockchain-Enhanced Sensor-as-a-Service (SEaaS) in IoT: Leveraging Blockchain for Efficient and Secure Sensing Data Transactions" Information 15, no. 4: 212. https://doi.org/10.3390/info15040212
APA StyleKhan, B. U. I., Goh, K. W., Mir, M. S., Mohd Rosely, N. F. L., Mir, A. A., & Chaimanee, M. (2024). Blockchain-Enhanced Sensor-as-a-Service (SEaaS) in IoT: Leveraging Blockchain for Efficient and Secure Sensing Data Transactions. Information, 15(4), 212. https://doi.org/10.3390/info15040212