You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Editor’s Choice
  • Article
  • Open Access

4 February 2021

Identity and Access Management Resilience against Intentional Risk for Blockchain-Based IOT Platforms

,
and
1
Department of Applied Mathematics, International Doctoral School, Rey Juan Carlos University, 28933 Móstoles, Madrid, Spain
2
Department of Applied Mathematics, Rey Juan Carlos University, 28933 Móstoles, Madrid, Spain
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
This article belongs to the Special Issue IoT Security and Privacy through the Blockchain

Abstract

Some Internet of Things (IoT) platforms use blockchain to transport data. The value proposition of IoT is the connection to the Internet of a myriad of devices that provide and exchange data to improve people’s lives and add value to industries. The blockchain technology transfers data and value in an immutable and decentralised fashion. Security, composed of both non-intentional and intentional risk management, is a fundamental design requirement for both IoT and blockchain. We study how blockchain answers some of the IoT security requirements with a focus on intentional risk. The review of a sample of security incidents impacting public blockchains confirm that identity and access management (IAM) is a key security requirement to build resilience against intentional risk. This fact is also applicable to IoT solutions built on a blockchain. We compare the two IoT platforms based on public permissionless distributed ledgers with the highest market capitalisation: IOTA, run on an alternative to a blockchain, which is a directed acyclic graph (DAG); and IoTeX, its contender, built on a blockchain. Our objective is to discover how we can create IAM resilience against intentional risk in these IoT platforms. For that, we turn to complex network theory: a tool to describe and compare systems with many participants. We conclude that IoTeX and possibly IOTA transaction networks are scale-free. As both platforms are vulnerable to attacks, they require resilience against intentional risk. In the case of IoTeX, DIoTA provides a resilient IAM solution. Furthermore, we suggest that resilience against intentional risk requires an IAM concept that transcends a single blockchain. Only with the interplay of edge and global ledgers can we obtain data integrity in a multi-vendor and multi-purpose IoT network.

1. Introduction

1.1. Internet of Things

Since the last years of the past 20th century, the Internet has contributed greatly to the connection between human beings. In October 2020, 59% of the world’s population was active on the Internet, i.e., 4.66 billion people. Ninety-one percent of those Internet users do it via mobile devices []. The former US Vice-President Al Gore referred to the Internet as the information superhighway.
Connecting things with other things and servers via the Internet is the next big step taking place in these first decades of the 21st century. The Internet of Things (IoT) enables the connection to the Internet of a multitude of small electronic devices to facilitate their use, handling, data exchange and management. By the end of 2018, the number of IoT-connected devices surpassed the 20 billion mark [] with a forecast of 30 billion IoT-connected devices for 2030 []. This information superhighway is now being extended with many additional lanes that carry information from, among many other things, sensors, actuators, personal health devices and geolocation trackers. Reference [] defines an IoT device as one having at least one transducer (sensor or actuator) to interact directly with the physical world and at least one network interface (Ethernet, Wi-Fi, Bluetooth) to interface with the digital world.

1.2. Blockchain Can Contribute to a Secure IoT World

Some IoT projects use a blockchain to transport data. We study how blockchain can add security to the IoT world. A blockchain is a type of distributed ledger. The blockchain technology can answer a considerable subset of the cybersecurity requirements for IoT mentioned by ETSI [] and NIST [] (see Section 2.1), i.e., integrity, secure communication and resilience. Simultaneously, a blockchain could add additional security properties such as availability and accessibility together with a reliable micropayment functionality. Given the large number of things connected via the Internet, the blockchain implementation that could fit the needs of the IoT would need to have no or very low transaction fees, real growth possibilities and a scalable identity management process. Blockchain technology transfers data and value in an immutable and decentralised fashion. These two properties are valuable for implementing resilient IoT platforms. However, blockchain does not answer all IoT security requirements: confidentiality and protection of personal data would require encryption on top of the blockchain.

1.3. Complex Networks Analysis: A Useful Tool to Feature Systems

The analysis of systems with many participant nodes via complex networks can provide useful information to better understand the system and draw useful conclusions. Newman (2009) ([] p. 2) defines a network (also named a graph) as a set of vertices (or nodes) and connections (or edges) between them. The complexity comes when the number of elements in the network is high and the use of advanced mathematical and statistical tools enters into play [,,]. The value of this multidisciplinary field comes from the possibility to describe complex interactions [], some of them dynamic ([] p. 177), happening in the real world (social networks, disease spreading, traffic control, etc.) with models based on complex networks ([] p. 179). We study two blockchain-based IoT networks with complex network theory. This complex network analysis provides us with their network profiles.

1.4. Intentional Risk Management Via Complex Networks Analysis

Intentional risk management is one of the two effective pillars in cybersecurity according to Chapela et al. (2016) ([] pp. 2–3). The other pillar is non-intentional (traditional, mostly accidental) risk management. Non-intentional risk has already been the subject of thorough study ([] pp. 27–36). Typically, risk management methodologies were focused on non-intentional risks and were based on an actuarial approach, using the well-known equation risk = probability x impact. The probability is based on observation of the frequency of past events.
Intentional risks are effected by an active agent—a threat agent ([] p. 2) that is looking for a specific profit ([] p. 2) while running a limited risk. Chapela et al. (2016) ([] p. 11) stated that complex-network-based intentional risk management can be applied to any information system if it can be modelled as a complex network, especially when the relations among their nodes are not linear ([] p. 11). Once we obtain the network profiles of the two IoT platforms we study, we apply the equations proposed by [] to increase their resilience against intentional risk.

1.4.1. Intentional Risk Management in IoT

The deployment of IoT devices is taking off exponentially: logistics, health, leisure, mobility and supply chains are just a few use cases where the exchange of sensor and actuator data brings value to society. This value can only materialise long term with a sufficient degree of data security in IoT. Simultaneously, blockchain technology is continuously improving and it can be an appropriate platform to provide data integrity, immutability and scalability to IoT implementations. The high number of IoT devices and related information technology (IT) elements (e.g., edge and cloud servers) compose a complex system subject to be studied as a complex network, where the nodes are IoT devices and other IT elements and the edges the communications between them. This complex-network-based characterisation contributes to explaining the resilience of different IoT implementations against intentional risk and possible improvement paths.

1.4.2. Structure of the Paper

This paper is structured as follows. We first present the current developments on security requirements for IoT devices. Second, we describe how blockchain can answer some of those IoT security requirements. Third, we explain IOTA (a distributed ledger-based IoT implementation) with its present and future design decisions together with its main known security incidents. Fourth, we introduce IoTeX (a blockchain based IoT solution) and a collection of security incidents in public blockchains. Fifth, we link identity and access management (IAM) in IoT with edge and cloud computing and we analyse a data authenticity protection framework for IoT systems. Sixth, we highlight how complex network analysis can contribute to intentional risk management; and finally, we complete this paper with empirical results based on complex network analysis and provide conclusions on how to improve IAM resilience against intentional risk in IoT platforms.

3. Methodology

First, we have highlighted the main IoT security challenges and corresponding requirements [,,,,]. Second, we have introduced current works on IoT implementations that use distributed ledgers such as those related to IOTA [,,,,,,] and IoTex [,,,]. Third, we have presented complex networks as a means to describe complex non-linear systems [,,,,,,] and even to manage intentional risk [,]. Now we describe both IOTA and IoTeX transactions as complex networks as a required step to make their IAM more resilient.

3.1. Transaction Data Collection

Most public blockchain implementations make block explorers available via the Internet. A block explorer is a web tool that queries blocks, addresses, transactions and hashes in a blockchain. There are explorers for Bitcoin [] and Ethereum [] but also for IOTA [] and IoTeX []. These explorer sites publish an open application programming interface (API) to facilitate data collection. Instead of running simulations to collect data, we use these four block explorers to obtain real transaction data. We code a set of Python scripts to extract data from the IOTA and IoTeX public explorers [,]. See Figure 3. First, we download the list of addresses holding the highest amounts of MIOTA and IoTeX tokens respectively: the top 100 richest addresses in the case of IOTA and 500 addresses for IoTeX. Second, we use the mentioned APIs to collect transactions linked to those addresses for the longest computationally feasible time window and within the API public usage limits. Calls to these public APIs are usually data and computational-intensive. Explorers consequently limit public queries in the form of data volume caps per API call and per time unit to avoid misuse. As each API has different calls, we write a Python script for each token using the requests Python library. Table 8 details the transaction data we download per token and per time window.
Figure 3. IOTA and IoTeX ledger explorers.
Table 8. Transaction data downloaded for IOTA and IoTeX complex network analysis.
We perform a similar data collection exercise with the Bitcoin and Ethereum explorers [,] to compare their transaction networks with those coming from IOTA and IoTeX. We use public APIs both for BTC [] and ETH []. In this case, we collect all transaction data within specific time slots in December 2020. Table 9 describes the downloaded data.
Table 9. Transaction data downloaded for BTC and ETH complex network analysis.

3.2. Transaction Data Preparation: Sender, Destination Pairs

Once we collect the transaction data, we extract the sender and destination fields from the JSON-formatted transaction files. The challenge in this phase is that every analysed ledger has a different structure. We therefore need to parse different JSON schemas for MIOTA, IOTX, Bitcoin and Ethereum. We use the pandas Python library to create a text file with a pair of addresses, sender and destination, per line. This file is the input for our complex network analysis.

3.3. Complex Network Analysis

Each address in the input file constitutes a node, and each pair of sender and destination creates an edge of an undirected complex network of transactions per token, i.e., IOTA, IoTeX, BTC and ETH. We use the networkx Python library to calculate the average degree, the average clustering coefficient, the density, the connectivity, the number of components present in the network and finally the degree distribution. We conclude by plotting the degree distribution using a logarithmic axis with the matplotlib Python library. Figure 4, Figure 5 and Figure 6 show the corresponding degree distributions. The outcome of this complex network analysis provides us with the network profiles for IOTA and IoTeX. The network profile of a system shows how its elements connect. This profile will be pivotal to conclude on their IAM resilience against intentional risk.
Figure 4. Degree distribution of 1068 IOTA addresses.
Figure 5. Degree distribution of IoTeX addresses in December 2020.
Figure 6. Tx degree distribution in BTC and ETH.
We carry out this computational analysis in a dual-processor Intel Xeon CPU @ 2.30 GHz with 13 GB RAM memory. Figure 7 summarises the methodology followed to describe IOTA and IoTeX as complex networks.
Figure 7. Steps taken to perform the IOTA and IoTeX transaction network analysis.

4. Analysis and Results

4.1. IOTA Complex Network Analysis

We follow the methodology explained in Figure 7 with the IOTA transaction data presented in Table 8 to generate a complex network. We depict the degree distribution in two-time slots in December 2020 and can see a similar pattern: a weak similarity with a power-law distribution. Although the IOTA dataset used is not sufficient to draw further conclusions, a majority of nodes have low degrees and a small number of nodes (addresses) show high degrees. See Figure 4. Coincidentally, we detect an interesting anomaly looking in both graphs: there are around 100 addresses with a degree also close to 100. The fact that we use the list of the 100 richest addresses to extract transaction data could be a potential explanation for this anomaly.
The very low density and average clustering coefficient in these non-connected graphs described in Figure 8 provide no sign of small-world properties (see Section 2.8). These results are in line with the fact that every IOTA address with a positive balance initiating a transaction requires a new address to keep the remainder. As mentioned in Section 2.3.5, addresses sending a transaction are only used once for security reasons. Consequently, most of the highly connected (high degree) reused addresses are only transaction destinations. Those addresses can remain active for a long time. If we could verify the real-life identities behind those destination addresses holding large amounts of MIOTAs, we could increase the resilience against intentional risk in this IoT platform.
Figure 8. Complex network analysis for IOTA transactions.
The empirical in-degree distributions of IOTA mainnet snapshots calculated by ([] p. 5, Figure 4b) show a power-law distribution in contrast with the Poisson degree distribution extracted from simulated tangles ([] p. 5). Compared to our dataset, Guo et al. [] use a 13 month-long IOTA tangle dataset ranging from November 2016 to April 2019. Unfortunately, the IOTA Foundation has not published mainnet tangle datasets since April 2019.

4.2. IoTeX Complex Network Analysis

Equally, we follow the methodology explained in Figure 7 with the IoTeX transaction data presented in Table 8 to generate a complex network. We select two time-slots: epoch 13,910 and epoch 14,000 happening in December 2020. An epoch in IoTeX in 2020 tended to last less than 30 min. For both epochs we start with the top 500 richest addresses. Once we collect those addresses we gather up to 1000 transactions per address (as per the limit of the public IoTeX explorer API []).
Figure 5 shows the degree distribution of IoTeX addresses present in the analysed transactions. It resembles a power-law function. There is a very high number of addresses with a very low number of connections, and conversely, a very low number of addresses with a very high number of transactions. This is an indication of a scale-free network. The network is composed of non-connected graphs with lesser numbers of components than in the case of IOTA and a lower average degree. This indicates that rich addresses in IoTeX are more connected with other nodes than rich IOTA addresses. Similarly to IOTA, if we could verify the real-life identities behind those high-degree addresses, potentially holding high amounts of IOTXs, we could increase the resilience against intentional risk in this IoT platform. As in IOTA, with such a low average clustering coefficient, we find no sign of small-world network properties based on the data displayed in Figure 9.
Figure 9. Complex network analysis for IoTeX transactions.

4.3. Largest Connected Components in IOTA and IoTeX

We identify the largest connected component (LCC) in both transaction networks and we draw all nodes connected to it without displaying the edges between those nodes and the LCC to ease interpretation. The appearances of the graphs showing nodes connected to the LCC in IOTA and IoTeX are similar. Figure 10 and Figure 11 show that the disassortativity is patent; i.e., nodes do not tend to link with nodes of a similar level. On the contrary, low degree nodes tend to connect with very high degree nodes.
Figure 10. Nodes connected to IOTA LCC. Edges to LCC not displayed.
Figure 11. Nodes connected to IoTeX LCC. Edges to LCC not displayed.
Figure 10 and Figure 11 represent all nodes connected to the largest one in the network with a distance equal to or less than 3. Nodes (addresses) connected to high degree nodes do not tend to connect with each other. If we consider that most of those nodes in the IoT world are sensors or any other IoT devices, it is a plausible scenario that they connect with their assigned data collecting server. Sensors do not tend to transact with each other.

4.4. Comparison with Bitcoin and Ethereum Complex Network Analysis

As mentioned in Section 3.1, we also collect transaction data from Bitcoin and Ethereum to build the degree distributions of their transaction networks and compare them with those obtained with IOTA and IoTeX networks. We use public APIs both for BTC [] and ETH [] and we follow a methodology similar to Figure 7 with the BTC and ETH transaction data presented in Table 9 to generate a complex network.
We identify power-law degree distributions as well. See Figure 6. This indicates that the transaction networks of these two public blockchain implementations display scale-free characteristics. We also obtain clustering coefficients very close to 0 indicating that neither BTC nor ETH display small-world properties. Reference [] reaches a similar conclusion.
Reference [] suggests that successful cryptocurrencies, such as Bitcoin and Ethereum, once they pass their creation phase and reach a stable stage with millions of transaction addresses, show a power-law degree distribution. References [,] reaches a similar conclusion: the Bitcoin network out-degree distribution might be fitted by a power-law. Our empirical results are aligned. Reference [], however, does not reach the same power-law fit as they analyse BTC data during the early days of the BTC network, i.e., from January 2009 up to July 2011.
We also observe a very low density in these two networks. This is due to the very short periods of time observed; i.e., not many addresses are reused within adjacent blocks. Our extracted data for BTC (2 days) covers a longer time than the extracted data for ETH (some minutes). This is the reason why the power-law degree distributions are clearer to identify in the BTC graph than in the ETH graph.

4.5. Analysis of Heavy-Tailed Distributions

The identification of power-law fits on a log–log axis and only graphically is biased and inaccurate []. We use the powerlaw Python library developed by Alstott et al. [] with our IOTA degree distribution dataset to assess our results. The plot from the IOTA network shows a good fit by the power-law to the complementary cumulative distribution function (CCDF). See Figure 12a. The probability density function (PDF) is, however, limited and far from a power-law fit. This is in line with our previous IOTA results presented in Section 4.1; i.e., the power-law fit is questionable. In our IoTeX degree distribution dataset, the network displays a good fit by the power-law to the PDF, with a limited range of possible degrees starting at x = 949 though. See Figure 12b. The power-law fit with the CCDF still shows a very heavy tail deviating from the power-law fit, probably due to it being young. This is in line with our previous IoTeX results presented in Section 4.2; i.e., the power-law fit is more present in IoTeX than in IOTA.
Figure 12. Power-law fit using Python powerlaw library by Alstott et al. IOTA and IoTeX datasets.
We also use this powerlaw library by Alstott et al. [] with our BTC and ETH degree distribution datasets to confirm our results and the references mentioned in Section 4.4, i.e., [] for both BTC and ETH and ([,] pp. 23–26) for BTC. The power-law fits in Figure 13a,b are evident, although with a bigger gap in ETH due to the shorter period of analysis.
Figure 13. Power-law fit using Python powerlaw library by Alstott et al. BTC and ETH datasets.

5. Conclusions

5.1. Blockchain Answers a Subset of IoT Security Requirements

The blockchain technology can implement a number of IoT cybersecurity requirements based on its distributed and immutable nature. However, a single blockchain implementation with no additional means to manage complexity, such as smart contracts, edge and cloud computing, cannot fulfil all security requirements that IoT platforms need to implement. See Section 2.7.

5.2. Identity and Access Management is a Key Security Requirement to Build Resilience against Intentional Risk

Intentional risk focuses on attacks performed by actors with a defined intention to obtain a benefit (value). Intentional risks can be static and dynamic. Using the static and dynamic risk formulas proposed by Chapela et al. and presented in Section 2.9, we conclude that in IoT implementations with nodes holding large amounts of value, we can only reduce both static and dynamic risk if we control access to those nodes (mostly IoT devices and IT components). In distributed environments such as IoT, an IAM framework that uses decentralised identifiers (DIDs) and verifiable credentials (VCs), as presented in Section 2.7, can control the accessibility to those devices. DIoTA uses artefacts of this type.

5.3. IoTeX and Possibly IOTA Networks Are Scale-Free. They Require Resilience against Intentional Risk

IOTA and IoTeX are two examples of IoT platforms built on distributed ledgers. They are both in production and they both are actively improving their scalability and security. The IoTeX network displays a power-law degree distribution as scale-free networks do. Our IOTA dataset could not confirm it for the IOTA network as Guo et al. did [], possibly due to the limited time slot analysed. In both networks there is a small set of highly connected-nodes. As mentioned in Section 2.8, in scale-free networks the influence of the large nodes is greater than in small-world networks. Scale-free networks prove to be surprisingly resistant to failures but shockingly sensitive to targeted attacks. A way to make these IoT networks less sensitive to attacks, or in other words, a way to improve their resilience against intentional risk is to implement a distributed IAM concept.

5.4. DIoTA Provides IoTex with Resilient Identity and Access Management

DIoTA, the decentralised ledger-based framework for data authenticity protection in IoT systems proposed by Xinxin Fan et al. in 2020 (see Section 2.7.2) is well-positioned to bring IoTeX into the front line of IoT blockchain-based implementations that manage intentional risk effectively. Both IOTA and IoTeX projects are immersed in promising design improvements. We consider IoTeX a more complex platform, but at the same time, better positioned to implement resilient IAM frameworks such as DIoTA. A key requirement for IoTex to achieve this aspiration is to hold all worth-protecting value in permissioned blockchains.

5.5. Resilience against Intentional Risk Requires an IAM Concept That Transcends a Single Blockchain

Based on our results for IOTA and IoTeX, we conclude that resilience against intentional risk requires an IAM concept that transcends the possibilities of a single blockchain implementation. Only with the interplay of edge and global ledgers running on edge and cloud servers we can obtain data integrity in a multi-vendor and multi-purpose IoT network.

6. Future Work

We see three main lines of future work stemming from this paper:
(a)
Transforming the time series created by IOTA and IoTeX transactions into complex networks to go deeper into their analysis using the visibility graph proposed by Lacasa et al. [].
(b)
Studying whether DIoTA can be further extended using any of the artificial intelligence (AI) solutions to secure IoT services in edge computing surveyed by Xu et al. [].
(c)
Assessing the possibility of applying generative adversarial nets (GANs) to improve the speed and accuracy in consensus protocols based on proof-of-stake (PoS), such as the one used by IoTeX [,].

Author Contributions

These authors (A.P., R.C. and M.R.) contributed equally to this work. All authors have read and agreed to the published version of the manuscript.

Funding

Regino Criado and Miguel Romance have been partially supported by projects PGC2018-101625-B-I00 (Spanish Science and Innovation Ministry, AEI/FEDER, UE) and M1967 (URJC grant).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Number of Internet of Things (IoT) Connected Devices Worldwide in 2018, 2025 and 2030. Available online: https://www.statista.com/statistics/617136/digital-population-worldwide/ (accessed on 21 December 2020).
  2. Sallaba, M.; Siegel, D.; Becker, S. Deloitte Blockchain Institute. IoT Powered by Blockchain. How Blockchains Facilitate the Application of Digital Twins in IoT. May 2018. Available online: https://www2.deloitte.com/content/dam/Deloitte/de/Documents/Innovation/IoT-powered-by-Blockchain-Deloitte.pdf (accessed on 21 December 2020).
  3. Number of Internet of Things (IoT) Connected Devices Worldwide in 2018, 2025 and 2030. Available online: https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/ (accessed on 21 December 2020).
  4. NIST. Creating a Profile Using the IoT Core Baseline and Non-Technical Baseline. NIST Interagency or Internal Report 8259C. December 2020. Available online: https://doi.org/10.6028/NIST.IR.8259C-draft (accessed on 21 December 2020).
  5. ETSI. Technical Specification. Cyber Security for Consumer Internet of Things. ETSI TS 103 645 V1.1.1 (2019-02). February 2019. Available online: https://www.etsi.org/deliver/etsi_ts/103600_103699/103645/01.01.01_60/ts_103645v010101p.pdf (accessed on 21 December 2020).
  6. NIST. Profile Using the IoT Core Baseline and Non-Technical Baseline for the Federal Government. NIST Interagency or Internal Report 8259D. December 2020. Available online: https://doi.org/10.6028/NIST.IR.8259D-draft (accessed on 21 December 2020).
  7. Newman, M.E.J. The Structure and Function of Complex Networks. SIAM Rev. 2003, 45, 167–257. [Google Scholar] [CrossRef]
  8. Newman, M.E.J. The Connected World. Santa Fe Institute, 2011. Available online: https://www.youtube.com/watch?v=yAtsm5xkb5c (accessed on 21 December 2020).
  9. Newman, M.E.J. Using Networks to Make Predictions. Santa Fe Institute. 2011. Available online: https://www.youtube.com/watch?v=rwA-y-XwjuU (accessed on 21 December 2020).
  10. Newman, M.E.J. What Networks Can Tell Us about the World. Santa Fe Institute. 2011. Available online: https://www.youtube.com/watch?v=lETt7IcDWLI (accessed on 21 December 2020).
  11. Chapela, V.; Criado, R.; Moral, S.; Romance, M. Intentional Risk Management through Complex Networks Analysis; Springer: Berlin/Heidelberg, Germany, 2015. [Google Scholar]
  12. Boccaletti, S.; Latora, V.; Moreno, Y.; Chavez, M.; Hwang, D. Complex Networks: Structure and Dynamics. Phys. Rep. 2006, 175–308. [Google Scholar] [CrossRef]
  13. Boccaletti, S.; Buldú, J.; Criado, R.; Flores, J.; Latora, V.; Pello, J.; Romance, M. Multiscale Vulnerability of Complex Networks. Chaos Interdiscip. J. Nonlinear Sci. 2007, 175–308. [Google Scholar] [CrossRef]
  14. Alberto, P. Secure IT Up! In Cyber Insurance Due Diligence; Kroll Inc.: New York, NY, USA, 2012; pp. 6–7. ISBN 9781478314752. [Google Scholar]
  15. Andina, D.; Partida, A. IT Security Management: IT Securiteers—Setting up an IT Security Function. In Lecture Notes in Electrical Engineering; Springer: Berlin/Heidelberg, Germany, 2010; ISBN 9789048188819. [Google Scholar]
  16. ETSI. ETSI Releases First Globally Applicable Standard for Consumer IoT Security. February 2019. Available online: https://www.etsi.org/newsroom/press-releases/1549-2019-02-etsi-releases-first-globally-applicable-standard-for-consumer-iot-security (accessed on 21 December 2020).
  17. Fruhlinger, J. CSO Online. The Mirai Botnet Explained: How Teen Scammers and CCTV Cameras Almost Brought Down the Internet. 2018. Available online: https://www.csoonline.com/article/3258748/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html (accessed on 21 December 2020).
  18. NIST. IoT Device Cybersecurity Guidance for the Federal Government: Establishing IoT Device Cybersecurity Requirements. Draft NIST Special Publication 800-213. December 2020. Available online: https://doi.org/10.6028/NIST.SP.800-213-draft (accessed on 21 December 2020).
  19. Anthony, L. A Gentle Introduction to Blockchain Technology. Bitsonblocks.com. 2015. Available online: http://bitsonblocks.net/2015/09/09/a-gentle-introduction-to-blockchain-technology (accessed on 21 December 2020).
  20. Satoshi, N. Bitcoin: A Peer-to-Peer Electronic Cash System. Nakamotoinstitute.org. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 21 December 2020).
  21. ETH Corporate Site. Available online: https://www.ethereum.org/ (accessed on 21 December 2020).
  22. Coinmarketcap. Cryptocurrencies Market Capitalisation in Real Time. Available online: https://coinmarketcap.com/all/views/all/ (accessed on 21 December 2020).
  23. Papadodimas, G.; Palaiokrasas, G.; Litke, A.; Varvarigou, T. Implementation of Smart Contracts for Blockchain Based IoT Applications. Electrical and Computer Engineering Department National Technical University of Athens. November 2018. Available online: http://bloomen.io/wp-content/uploads/2018/11/ICCS-nof2018.pdf (accessed on 21 December 2020).
  24. Kurt Peker, Y.; Rodriguez, X.; Ericsson, Y.; Lee, S.; Perez, A. A Cost Analysis of Internet of Things Sensor Data Storage on Blockchain via Smart Contracts. Electronics 2020, 9, 244. [Google Scholar] [CrossRef]
  25. Zvi, S. k-Root-n: An Efficient Algorithm for Avoiding Short Term Double-Spending Alongside Distributed Ledger Technologies such as Blockchain. Information 2020, 11, 90. [Google Scholar]
  26. Blockchain.com. Transactions Per Second. Available online: https://www.blockchain.com/charts/transactions-per-second (accessed on 21 December 2020).
  27. Transactions Per Second. Available online: https://etherscan.io/ (accessed on 21 December 2020).
  28. Transactions Per Second in Blockchains. Available online: https://blocktivity.info/ (accessed on 21 December 2020).
  29. EOSIO Reaches a New Transaction Per Second Record: 9656. Available online: https://www.eosgo.io/news/eosio-reaches-new-transaction-per-second-record (accessed on 21 December 2020).
  30. IOT Crypto Coin Market Value. Available online: https://cryptoslate.com/cryptos/iot/ (accessed on 24 December 2020).
  31. IOTA. Introduction. Available online: https://www.iota.org/get-started/what-is-iota (accessed on 21 December 2020).
  32. Sun, F. UTXO vs Account/Balance Model. Available online: https://medium.com/@sunflora98/utxo-vs-account-balance-model-5e6470f4e0cf (accessed on 25 December 2020).
  33. IOTA Tangle Explorer. Available online: https://thetangle.org/ (accessed on 24 December 2020).
  34. IOTA Tangle Explorer. Available online: https://thetangle.org/nodes (accessed on 24 December 2020).
  35. Serguei, P. The Tangle. White Paper. Version 1.4.3. 2018. Available online: https://bit.ly/3e2edXo (accessed on 24 December 2020).
  36. Trifa, Z.; Khemakhem, M. Sybil Nodes as a Mitigation Strategy Against Sybil Attack. Procedia Comput. Sci. 2014, 32, 1135–1140. [Google Scholar] [CrossRef]
  37. Kusmierz, B.; Staupe, P.; Gal, A. Extracting Tangle Properties in Continuous Time via Large-Scale Simulations. 2018. Available online: https://tinyurl.com/yclxej5h (accessed on 26 December 2020).
  38. Popov, S.; Moog, H.; Camargo, D.; Capossele, A.; Dimitrov, V.; Gal, A.; Greve, A.; Kusmierz, B.; Mueller, S.; Penzkofer, A.; et al. The Coordicide. IOTA Foundation. 2020. Available online: https://files.iota.org/papers/20200120_Coordicide_WP.pdf (accessed on 24 December 2020).
  39. Capossele, A.; Mueller, S.; Penzkofer, A. Robustness and Efficiency of Leaderless Probabilistic Consensus Protocols within Byzantine Infrastructures. 2019. Available online: https://arxiv.org/abs/1911.08787 (accessed on 25 December 2020).
  40. Müller, S.; Penzkofer, A.; Kuśmierz, B.; Camargo, D.; Buchanan, W.J. Fast Probabilistic Consensus with Weighted Votes. In Proceedings of the Future Technologies Conference (FTC), Vancouver, BC, Canada, 5–6 November 2020; Arai, K., Kapoor, S., Bhatia, R., Eds.; Springer: Cham, Switzerland, 2020; Volume 1289. [Google Scholar] [CrossRef]
  41. Popov, S.; Buchanan, W.J. FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures. J. Parallel Distrib. Comput. 2021, 147, 77–86. [Google Scholar] [CrossRef]
  42. Chain, L. Learn Me a Bitcoin. Available online: https://bit.ly/38uPTw0 (accessed on 24 December 2020).
  43. Release Strategy for Chrysalis. IOTA 1.5. Available online: https://blog.iota.org/release-strategy-for-chrysalis-iota-1-5-4ea8741ea3a1 (accessed on 24 December 2020).
  44. A Proposal for Reusable Addresses (Part 1). IOTA Blog. Available online: https://blog.iota.org/a-proposal-for-reusable-addresses-part1-bc6dbca84cbf (accessed on 7 July 2020).
  45. A Proposal for Reusable Addresses (Part 2). IOTA Blog. Available online: https://blog.iota.org/a-proposal-for-reusable-addresses-part-2-d83d328ff1b3 (accessed on 7 July 2020).
  46. A Proposal for Reusable Addresses (Part 3). IOTA Blog. Available online: https://blog.iota.org/a-proposal-for-reusable-addresses-part-3-9ec6fa1929d7 (accessed on 7 July 2020).
  47. IOTA Corporate Site. Explore IOTA Industries. Available online: https://www.iota.org/solutions/industries (accessed on 25 December 2020).
  48. Guo, F.; Xiao, X.; Hecker, A.; Dustdar, S. Characterizing IOTA Tangle with Empirical Data. 2020 IEEE Global Communications Conference. Taiwan Communications for Human and Machine Intelligence. Available online: https://globecom2020.ieee-globecom.org/program/symposia-tuesday (accessed on 26 December 2020).
  49. PSA. Do Not Use Online Seed Generators. Reddit. Available online: https://www.reddit.com/r/Iota/comments/7rmc55/psa_do_not_use_online_seed_generators/ (accessed on 28 December 2020).
  50. IOTA Foundation Suspends Network, Probes Fund Theft in Trinitytrinity Wallet. Coindesk. Available online: https://www.coindesk.com/iota-foundation-suspends-network-probes-fund-theft-in-trinity-wallet (accessed on 28 December 2020).
  51. IoTex Team and Introduction Portal. Available online: https://v1.iotex.io/ (accessed on 24 December 2020).
  52. IoTeX Team. IoTeX. A Decentralised Network for Internet of Things Powered by a Privacy-Centric Blockchain. White Paper. Version 1.5. 12 July 2018. Available online: https://v1.iotex.io/white-paper (accessed on 24 December 2020).
  53. Stafford, B. Decision and Control; Wiley: London, UK, 1966. [Google Scholar]
  54. Fan, X. Scalable Practical Byzantine Fault Tolerance with Short-Lived Signature Schemes. In Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, Markham, ON, Canada, 29–31 October 2018; pp. 245–256. [Google Scholar] [CrossRef]
  55. Fan, X.; Chai, Q. Roll-DPoS: A Randomized Delegated Proof of Stake Scheme for Scalable Blockchain-Based Internet of Things Systems. In Proceedings of the MobiQuitous’18: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, New York City, NY, USA, 5–7 November 2018; pp. 482–484. [Google Scholar] [CrossRef]
  56. Fan, X. Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems. 2018. Available online: https://link.springer.com/chapter/10.1007/978-3-319-94478-4_9 (accessed on 29 December 2020).
  57. Fan, X.; Zhong, Z.; Chai, Q.; Guo, D. Ucam: A User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System. In Security and Privacy in Communication Networks, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Park, N., Sun, K., Foresti, S., Butler, K., Saxena, N., Eds.; Springer: Cham, Switzerland, 2020; Volume 336. [Google Scholar] [CrossRef]
  58. Xu, L.; Chen, L.; Gao, Z.; Carranco, L.; Fan, X.; Shah, N.; Diallo, N.; Shi, W. Supporting Blockchain-Based Cryptocurrency Mobile Payment With Smart Devices. IEEE Consum. Electron. Mag. 2020, 9, 26–33. [Google Scholar] [CrossRef]
  59. Blockchain News Site. Information Related to Incidents. Available online: https://www.coindesk.com (accessed on 28 December 2020).
  60. Nyamtiga, B.W.; Sicato, J.C.S.; Rathore, S.; Sung, Y.; Park, J.H. Blockchain-Based Secure Storage Management with Edge Computing for IoT. Electronics 2019, 8, 828. [Google Scholar] [CrossRef]
  61. Xiao, Z.; Dai, X.; Jiang, H.; Wang, D.; Chen, H.; Yang, L.; Zeng, F. Vehicular Task Offloading via Heat-Aware MEC Cooperation Using Game-Theoretic Method. IEEE Internet Things J. 2020, 7, 2038–2052. [Google Scholar] [CrossRef]
  62. Sittón-Candanedo, I.; Alonso, R.S.; García, Ó.; Gil, A.B.; Rodríguez-González, S. A Review on Edge Computing in Smart Energy by means of a Systematic Mapping Study. Electronics 2020, 9, 48. [Google Scholar] [CrossRef]
  63. Fan, X.; Chai, Q.; Li, Z.; Pan, T. Decentralized IoT Data Authorization with Pebble Tracker. In Proceedings of the 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 2–16 June 2020. [Google Scholar] [CrossRef]
  64. Xu, L.; Chen, L.; Gao, Z.; Fan, X.; Suh, T.; Shi, W. DIoTA: Decentralized-Ledger-Based Framework for Data Authenticity Protection in IoT Systems. IEEE Netw. 2020, 34, 38–46. [Google Scholar] [CrossRef]
  65. Choi, Y.-J.; Kang, H.-J.; Lee, I.-G. Scalable and Secure Internet of Things Connectivity. Electronics 2019, 8, 752. [Google Scholar] [CrossRef]
  66. Putra, G.D.; Dedeoglu, V.; Kanhere, S.S.; Jurdak, R. Trust Management in Decentralized IoT Access Control System. In Proceedings of the 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada, 4–7 May 2020; pp. 1–9. [Google Scholar] [CrossRef]
  67. Huang, Y.; Guan, X.; Chen, H.; Liang, Y.; Yuan, S.; Ohtsuki, T. Risk Assessment of Private Information Inference for Motion Sensor Embedded IoT Devices. IEEE Trans. Emerg. Top. Comput. Intell. 2020, 4, 265–275. [Google Scholar] [CrossRef]
  68. Wang, D.; Fan, J.; Xiao, Z.; Jiang, H.; Chen, H.; Zeng, F.; Li, K. Stop-and-Wait: Discover Aggregation Effect Based on Private Car Trajectory Data. IEEE Trans. Intell. Transp. Syst. 2019, 20, 3623–3633. [Google Scholar] [CrossRef]
  69. Chen, H.; Gao, F.; Martins, M.H.T.; Huang, P.; Liang, J. Accurate and Efficient Node Localization for Mobile Sensor Networks. Mob. Netw. Appl. 2013, 18, 141–147. [Google Scholar] [CrossRef]
  70. Chen, H.; Liu, B.; Huang, P.; Liang, J.; Gu, Y. Mobility-Assisted Node Localization Based on TOA Measurements without Time Synchronization in Wireless Sensor Networks. Mob. Netw. Appl. 2012, 17, 90–99. [Google Scholar] [CrossRef]
  71. Zhang, Z.; Chen, Z.; Hua, M.; Li, C.; Huang, Y.; Yang, L. Double Coded Caching in Ultra Dense Networks: Caching and Multicast Scheduling via Deep Reinforcement Learning. IEEE Trans. Commun. 2020, 68, 1071–1086. [Google Scholar] [CrossRef]
  72. Ding, Z.; Shen, L.; Chen, H.; Yan, F.; Ansari, N. Energy-Efficient Relay-Selection-Based Dynamic Routing Algorithm for IoT-Oriented Software-Defined WSNs. IEEE Internet Things J. 2020, 7, 9050–9065. [Google Scholar] [CrossRef]
  73. da Fontoura Costa, L.; Oliveira, O.N., Jr.; Travieso, G.; Aparecido Rodrigues, F.; Ribeiro Villas Boas, P.; Antiqueira, L.; Palhares Viana, M.; Correa Rocha, L.E. Analyzing and modeling real-world phenomena with complex networks: A survey of applications. Adv. Phys. 2011, 60, 329–412. [Google Scholar] [CrossRef]
  74. Beauguitte, L.; Ducruet, C. Scale-free and small-world networks in geographical research: A critical examination. In Proceedings of the 17th European Colloquium on Theoretical and Quantitative Geography, Athènes, Greece, 15 September 2019; pp. 663–671. Available online: https://halshs.archives-ouvertes.fr/halshs-00623927 (accessed on 21 December 2020).
  75. Barabási, A. Network Science. 2014. Creative Commons: CC BY-NC-SA 2.0. Available online: http://barabasi.com/book/network-science (accessed on 29 December 2020).
  76. Chapela, M.; Sekulic, V.; Ignjatovic, A.; Bertino, E.; Jha, S. Interdependent Security Risk Analysis of Hosts and Flows. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2325–2339. [Google Scholar] [CrossRef]
  77. Bitcoin Blockchain Explorer. Available online: https://www.blockchain.com/explorer (accessed on 28 December 2020).
  78. Ethereum Blockchain Explorer. Available online: https://etherscan.io/ (accessed on 28 December 2020).
  79. IOTA Blockchain Explorer. Available online: https://explorer.iota.org/mainnet (accessed on 28 December 2020).
  80. IoTeX Blockchain Explorer. Available online: https://iotexscan.io/ (accessed on 28 December 2020).
  81. Ethereum Blockchain Explorer API. Available online: https://infura.io/ (accessed on 28 December 2020).
  82. Liang, J.; Li, L.; Zeng, D. Evolutionary dynamics of cryptocurrency transaction networks: An empirical study. PLoS ONE 2018, 13, e0202202. [Google Scholar] [CrossRef]
  83. Javarone, M.A.; Wright, C.S. From Bitcoin to Bitcoin Cash: A network analysis. In Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, Munich, Germany, 15 June 2018; pp. 77–81. [Google Scholar] [CrossRef]
  84. Lischke, M.; Fabian, B. Analyzing the Bitcoin Network: The First Four Years. Future Internet 2016, 8, 7. [Google Scholar] [CrossRef]
  85. Goldstein, M.L.; Morris, S.A.; Yen, G. Problems with Fitting to the Power-Law Distribution. Phys. Condens. Matter 2004, 41. [Google Scholar] [CrossRef]
  86. Alstott, J.; Bullmore, E.; Plenz, D. Powerlaw: A Python Package for Analysis of Heavy-Tailed Distributions. PLoS ONE 2014, 9, e85777. [Google Scholar] [CrossRef]
  87. Lacasa, L.; Luque, B.; Ballesteros, F.; Luque, J.; Nuño, J. From time series to complex networks: The visibility graph. Proc. Natl. Acad. Sci. USA 2008, 105, 4972–4975. [Google Scholar] [CrossRef] [PubMed]
  88. Xu, Z.; Liu, W.; Huang, J.; Yang, C.; Lu, J.; Tan, H. Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey. Hindawi. Secur. Commun. Netw. J. 2020, 8872586. [Google Scholar] [CrossRef]
  89. Wang, K.; Gou, C.; Duan, Y.; Lin, Y.; Zheng, X.; Wang, F. Generative adversarial networks: Introduction and outlook. IEEE/CAA J. Autom. Sin. 2017, 4, 588–598. [Google Scholar] [CrossRef]
  90. Wang, Y. A Mathematical Introduction to Generative Adversarial Nets (GAN). Available online: https://arxiv.org/abs/2009.00169 (accessed on 30 December 2020).
  91. Reid, F.; Harrigan, M. An Analysis of Anonymity in the Bitcoin System. In Proceedings of the IEEE Third International Conference on Privacy, Security, Risk and Trust, Boston, MA, USA, 9–11 October 2011; pp. 1318–1326. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.