sensors-logo

Journal Browser

Journal Browser

Special Issue "Blockchain for Trustworthy Internet of Things"

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: 30 June 2021.

Special Issue Editors

Dr. Hong-Ning Dai
E-Mail Website
Guest Editor
Associate professor, Macau University of Science and Technology, Taipa, Macau
Interests: Blockchain; Internet of Things; Wireless Sensor Networks
Dr. Jiajing Wu
E-Mail Website
Guest Editor
Associate Professor, Sun Yat-sen University, Guangzhou, China
Interests: Blockchain; Complex Networks; Cyber-physical Systems
Dr. Hao Wang
E-Mail Website
Guest Editor
Associate Professor, Norwegian University of Science and Technology, Gjøvik, Norway
Interests: Blockchain; industrial IoT; big data
Special Issues and Collections in MDPI journals

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) is reshaping urban informatics due to the proliferation of applications in smart industries, smart grids, smart healthcare, and smart homes, where various sensors and smart meters are deployed. Diverse IoT devices have generated massive data, containing huge value that can be used to identify faults, abnormal behaviors, and performance bottlenecks, consequently allowing proactive actions to enhance system performance and reliability.

However, incumbent IoT systems are also suffering from technical challenges: (i) poor interoperability across diverse IoT systems; (ii) security vulnerabilities; and (iii) privacy exposure of IoT data. The absence of trust across diverse IoT systems is the main root cause of these challenges.

The advent of blockchain brings opportunities to overcome the above IoT challenges. Blockchain possesses key features such as decentralization, immutability, transparency, nonrepudiation, traceability, and has the potential to improve trust in the IoT ecosystem. However, there are still technical issues to be solved before the full adoption of blockchain for IoT systems.

This Special Issue of Sensors invites high-quality original contributions on the integration of blockchain with IoT systems. The potential topics include, but are not limited to, the following:

  • Blockchain for trust management of IoT systems;
  • Blockchain for trusted service computing for IoT systems;
  • Blockchain for trusted edge/cloud computing for IoT systems;
  • Blockchain for trusted software-defined networks for IoT systems;
  • Blockchain for trusted network-slicing mechanisms for IoT systems;
  • Blockchain for big data in trustworthy IoT systems;
  • Blockchain-based solutions for the security, privacy, and trust of IoT systems;
  • Trustworthy machine learning/deep learning approaches for blockchain-enabled IoT systems;
  • Blockchain-based trustworthy IoT applications;
  • Platform development for blockchain-enabled, trustworthy IoT systems;
  • Smart contracts for blockchain-enabled trust management in IoT systems;
  • Scalability and fault tolerance mechanisms for blockchain-enabled IoT systems;
  • Distributed consensus algorithms for blockchain-enabled trustworthy IoT systems;
  • Empirical studies, benchmarking, and industrial best practices for blockchain-enabled IoT systems.
Dr. Hong-Ning Dai
Dr. Jiajing Wu
Dr. Hao Wang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2200 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Internet of Things
  • sensors
  • blockchain
  • security
  • privacy
  • trust

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Open AccessArticle
Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks
Sensors 2021, 21(9), 3257; https://doi.org/10.3390/s21093257 - 08 May 2021
Viewed by 241
Abstract
Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are [...] Read more.
Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the network and manipulate its behavior according to the attacker’s goals, by posing as a majority participant. Depending on the structure of the network, employing Sybil node detection schemes may be difficult, and low powered Internet of Things devices are usually unable to perform impactful amounts of work for proof-of-work based schemes. In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate with intermittent or no Internet connectivity. We introduce a new revocation mechanism for identities, tie them into the concepts of self-sovereign identities, and decentralized identifiers. Case-studies are used to discuss upper- and lower-bounds for the costs of Sybil identities and, therefore, the provided security level. Furthermore, we formalize the protocol using Colored Petri Nets to analyze its correctness and suitability. Proof-of-concept implementations are used to evaluate the performance of our scheme on low powered hardware as it might be found in Internet of Things applications. Full article
(This article belongs to the Special Issue Blockchain for Trustworthy Internet of Things)
Show Figures

Figure 1

Open AccessArticle
Two-Level Blockchain System for Digital Crime Evidence Management
Sensors 2021, 21(9), 3051; https://doi.org/10.3390/s21093051 - 27 Apr 2021
Viewed by 304
Abstract
Digital evidence, such as evidence from CCTV and event data recorders, is highly valuable in criminal investigations, and is used as definitive evidence in trials. However, there are risks when digital evidence obtained during the investigation of a case is managed through a [...] Read more.
Digital evidence, such as evidence from CCTV and event data recorders, is highly valuable in criminal investigations, and is used as definitive evidence in trials. However, there are risks when digital evidence obtained during the investigation of a case is managed through a physical hard disk drive until it is submitted to the court. Previous studies have focused on the integrated management of digital evidence in a centralized system, but if a centralized system server is attacked, major operations and investigation information may be leaked. Therefore, there is a need to reliably manage digital evidence and investigation information using blockchain technology in a distributed system environment. However, when large amounts of data—such as evidence videos—are stored in a blockchain, the data that must be processed only within one block before being created increase, causing performance degradation. Therefore, we propose a two-level blockchain system that separates digital evidence into hot and cold blockchains. In the criminal investigation process, information that frequently changes is stored in the hot blockchain, and unchanging data such as videos are stored in the cold blockchain. To evaluate the system, we measured the storage and inquiry processing performance of digital crime evidence videos according to the different capacities in the two-level blockchain system. Full article
(This article belongs to the Special Issue Blockchain for Trustworthy Internet of Things)
Show Figures

Figure 1

Open AccessArticle
A Blockchain-Based Trusted Edge Platform in Edge Computing Environment
Sensors 2021, 21(6), 2126; https://doi.org/10.3390/s21062126 - 18 Mar 2021
Viewed by 528
Abstract
Edge computing is a product of the evolution of IoT and the development of cloud computing technology, providing computing, storage, network, and other infrastructure close to users. Compared with the centralized deployment model of traditional cloud computing, edge computing solves the problems of [...] Read more.
Edge computing is a product of the evolution of IoT and the development of cloud computing technology, providing computing, storage, network, and other infrastructure close to users. Compared with the centralized deployment model of traditional cloud computing, edge computing solves the problems of extended communication time and high convergence traffic, providing better support for low latency and high bandwidth services. With the increasing amount of data generated by users and devices in IoT, security and privacy issues in the edge computing environment have become concerns. Blockchain, a security technology developed rapidly in recent years, has been adopted by many industries, such as finance and insurance. With the edge computing capability, deploying blockchain platforms/applications on edge computing platforms can provide security services for network edge environments. Although there are already solutions for integrating edge computing with blockchain in many IoT application scenarios, they slightly lack scalability, portability, and heterogeneous data processing. In this paper, we propose a trusted edge platform to integrate the edge computing framework and blockchain network for building an edge security environment. The proposed platform aims to preserve the data privacy of the edge computing client. The design based on the microservice architecture makes the platform lighter. To improve the portability of the platform, we introduce the Edgex Foundry framework and design an edge application module on the platform to improve the business capability of Edgex. Simultaneously, we designed a series of well-defined security authentication microservices. These microservices use the Hyperledger Fabric blockchain network to build a reliable security mechanism in the edge environment. Finally, we build an edge computing network using different hardware devices and deploy the trusted edge platform on multiple network nodes. The usability of the proposed platform is demonstrated by testing the round-trip time (RTT) of several important workflows. The experimental results demonstrate that the platform can meet the availability requirements in real-world usage scenarios. Full article
(This article belongs to the Special Issue Blockchain for Trustworthy Internet of Things)
Show Figures

Figure 1

Open AccessArticle
FarpScusn: Fully Anonymous Routing Protocol with Self-Healing Capability in Unstable Sensor Networks
Sensors 2020, 20(22), 6683; https://doi.org/10.3390/s20226683 - 22 Nov 2020
Viewed by 611
Abstract
Anonymous technology is an effective way for protecting users’ privacy. Anonymity in sensor networks is to prevent the unauthorized third party from revealing the identities of the communication parties. While, in unstable wireless sensor networks, frequent topology changes often lead to route-failure in [...] Read more.
Anonymous technology is an effective way for protecting users’ privacy. Anonymity in sensor networks is to prevent the unauthorized third party from revealing the identities of the communication parties. While, in unstable wireless sensor networks, frequent topology changes often lead to route-failure in anonymous communication. To deal with the problems of anonymous route-failure in unstable sensor networks, in this paper we propose a fully anonymous routing protocol with self-healing capability in unstable sensor networks by constructing a new key agreement scheme and proposing an anonymous identity scheme. The proposed protocol maintains full anonymity of sensor nodes with the self-healing capability of anonymous routes. The results from the performance analysis show that the proposed self-healing anonymity-focused protocol achieves full anonymity of source nodes, destination nodes, and communication association. Full article
(This article belongs to the Special Issue Blockchain for Trustworthy Internet of Things)
Show Figures

Figure 1

Back to TopTop