BLWN: Blockchain-Based Lightweight Simplified Payment Verification in IoT-Assisted e-Healthcare

Recent advancement of Bitcoin revolution has propelled unlimited opportunities for futuristic digital ecosystem design. Transactions belonging to Bitcoin are being fully supported, realized, and disseminated by a set of innovative hot and cold wallet technologies within the blockchain framework. While deploying smart applications under the niche of Internet of Things (IoT) plethora, such Bitcoin transactions aroused the issue of unsupported resource-constrained tool sets and demanded for a novel architecture. To cater this challenge, this article proposes a novel Bitcoin lightweight IoT node-based system model while incorporating the improved simplified payment verification (SPV) process for e-healthcare application. This article, first formulates necessary models of background arts utilized in the work that include inhomogeneous Poisson point process, block header structure formulation, depth and height relationship, bloom filter mechanism, pay-to-public key hash (P2PKH) base stack process, and transaction management. Second, developed models are deployed through several key algorithms and associated procedures. Finally, analysis and discussions are made that encompass the block confirmation time, appropriateness of the byzantine fault tolerance, smart contract policy, and SPV response in the proposed scenario.

[1]  Chi Zhang,et al.  Protecting Access Privacy for Bitcoin Lightweight Client Using Trusted Hardware , 2019, 2019 IEEE/CIC International Conference on Communications in China (ICCC).

[2]  Chi Zhang,et al.  A Privacy-preserving Ethereum Lightweight Client Using PIR , 2019, 2019 IEEE/CIC International Conference on Communications in China (ICCC).

[3]  Shengli Xie,et al.  Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks , 2019, IEEE Internet of Things Journal.

[4]  Lingbo Wei,et al.  Private Transaction Retrieval for Lightweight Bitcoin Client , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).

[5]  Mubashir Husain Rehmani,et al.  Applications of Blockchains in the Internet of Things: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[6]  Hannes Hartenstein,et al.  Network Layer Aspects of Permissionless Blockchains , 2019, IEEE Communications Surveys & Tutorials.

[7]  Nasir Ghani,et al.  Bitcoin Concepts, Threats, and Machine-Learning Security Solutions , 2018, IEEE Access.

[8]  Tiago M. Fernández-Caramés,et al.  A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.

[9]  Feng Gao,et al.  A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks , 2018, IEEE Network.

[10]  Antônio A. de A. Rocha,et al.  A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack , 2018, Secur. Commun. Networks.

[11]  Oscar Novo,et al.  Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.

[12]  Aashaka Shah,et al.  Empowering Light Nodes in Blockchains with Block Summarization , 2018, 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS).

[13]  Shouhuai Xu,et al.  Efficient Public Blockchain Client for Lightweight Users , 2018, EAI Endorsed Trans. Security Safety.

[14]  Partha Pratim Ray A survey on Internet of Things architectures , 2018, J. King Saud Univ. Comput. Inf. Sci..

[15]  Jamal Hayat Mosakheil Security Threats Classification in Blockchains , 2018 .

[16]  Ghassan O. Karame,et al.  BITE: Bitcoin Lightweight Client Privacy using Trusted Execution , 2018, IACR Cryptol. ePrint Arch..

[17]  Hai Jin,et al.  SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone , 2018, IEEE Access.

[18]  Joel J. P. C. Rodrigues,et al.  Decentralized Consensus for Edge-Centric Internet of Things: A Review, Taxonomy, and Research Issues , 2018, IEEE Access.

[19]  Tomoaki Ohtsuki,et al.  Design of privacy-preserving mobile Bitcoin client based on γ-deniability enabled bloom filter , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[20]  Ashok Kalal,et al.  DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments , 2017 .

[21]  Hajar Mousannif,et al.  Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.

[22]  Partha Pratim Ray,et al.  A survey of IoT cloud platforms , 2016 .

[23]  Anas Abou El Kalam,et al.  FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.

[24]  Ralph Deters,et al.  Blockchain as a Service for IoT , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[25]  Juan Carlos De Martin,et al.  Blockchain for the Internet of Things: A systematic literature review , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[26]  Muneeb Ali,et al.  Blockstack: A Global Naming and Storage System Secured by Blockchains , 2016, USENIX Annual Technical Conference.

[27]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[28]  Yongcai Wang,et al.  On Precision Bound of Distributed Fault-Tolerant Sensor Fusion Algorithms , 2016, ACM Comput. Surv..

[29]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[30]  Maria Gradinariu Potop-Butucaru,et al.  ZeroBlock: Preventing Selfish Mining in Bitcoin , 2016, ArXiv.

[31]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.

[32]  Aviv Zohar,et al.  Optimal Selfish Mining Strategies in Bitcoin , 2015, Financial Cryptography.

[33]  Holger Paul Keeler,et al.  Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay , 2015, Perform. Evaluation.

[34]  Roman Beck,et al.  Blockchain - the Gateway to Trust-Free Cryptographic Transactions , 2016, ECIS.

[35]  Jeffrey S. Rosenschein,et al.  Bitcoin Mining Pools: A Cooperative Game Theoretic Analysis , 2015, AAMAS.

[36]  W. Whitt,et al.  Choosing arrival process models for service systems: Tests of a nonhomogeneous Poisson process , 2014 .

[37]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[38]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[39]  Maurice Herlihy,et al.  Multidimensional approximate agreement in Byzantine asynchronous systems , 2013, STOC '13.

[40]  Avishai Mandelbaum,et al.  Statistical Analysis of a Telephone Call Center , 2005 .

[41]  Helena Handschuh,et al.  Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.

[42]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.