Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems

Resource -constrained distributed systems such as the Internet of Things (IoT), edge computing and fog computing are deployed for real-time monitoring and evaluation. Current security solutions are problematic when there is a centralized controlling entity. The blockchain provides decentralized security architectures using proof-of-work (PoW). Proof-of-work is an expensive process for IoT and edge computing due to the deployment of resource-constrained devices. This paper presents a novel consensus algorithm called Proof-of-Authentication (PoAh) to replace Proof-of-Work and introduce authentication in such environments to make the blockchain application-specific. This paper implemented the Proof-of-Authentication system to evaluate its sustainability and applicability for the IoT and edge computing. The evaluation process is conducted in both simulation and real-time testbeds to evaluate performance. Finally, the process of Proof-of-Authentication and its integration with blockchain in resource-constrained distributed systems is discussed. Our proposed PoAh, while running in limited computer resources (e.g. single-board computing devices like the Raspberry Pi) has a latency in the order of 3 secs.

[1]  Nir Kshetri,et al.  Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.

[2]  Deepak Puthal,et al.  Everything You Wanted to Know About the Blockchain: Its Promise, Components, Processes, and Problems , 2018, IEEE Consumer Electronics Magazine.

[3]  Hyoungshick Kim,et al.  Security and Privacy Challenges in the Internet of Things [Security and Privacy Matters] , 2017, IEEE Consumer Electronics Magazine.

[4]  Daniel Minoli,et al.  IoT security (IoTSec) considerations, requirements, and architectures , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[5]  Zilong Ye,et al.  FOCUS: A fog computing-based security system for the Internet of Things , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[6]  Albert Y. Zomaya,et al.  Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing , 2018, IEEE Communications Magazine.

[7]  Jinjun Chen,et al.  DLSeF , 2016, ACM Trans. Embed. Comput. Syst..

[8]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[9]  Albert Y. Zomaya,et al.  Energy-Efficient Deployment of Edge Dataenters for Mobile Clouds in Sustainable IoT , 2018, IEEE Access.

[10]  Deepak Puthal,et al.  The Blockchain as a Decentralized Security Framework , 2018 .

[11]  Deepak Puthal,et al.  Proof of Authentication: IoT-Friendly Blockchains , 2019, IEEE Potentials.