Efficient and Secure Communications in Smart Cities using Edge, Caching, and Blockchain

In this work, we propose using edge computing and caching to enhance wireless communications in terms of bandwidth and delay by leveraging concept of mobile 3C systems (communications, computing, and caching). First we argue that without leveraging concepts of edge computing and caching, the huge burden of data transmission and processing necessary for smart city applications and concept is going to exhaust the current wireless infrastructure. Then we demonstrate the need to merge edge computing with caching to enhance wireless communication needed for massive data collection in smart cities. To address the security concerns of using IoT in smart cities, we propose using a blockchain database to secure communication between the smart city and home devices and sensors. This will provide the scalability that is necessary for data transfer between the massive number of nodes in IoT that current security protocols do not provide.

[1]  Guihai Chen,et al.  Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges , 2017, IEEE Communications Magazine.

[2]  Yonggang Wen,et al.  QoE-Driven Cache Management for HTTP Adaptive Bit Rate Streaming Over Wireless Networks , 2012, IEEE Transactions on Multimedia.

[3]  Liang Qian,et al.  The three primary colors of mobile systems , 2016, IEEE Communications Magazine.

[4]  Andrea Zanella,et al.  Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.

[5]  Adi Shamir,et al.  Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.

[6]  Khashayar Kotobi INFORMED COGNITIVE RADIOS , 2017 .

[7]  Khashayar Kotobi,et al.  Spectrum sharing via hybrid cognitive players evaluated by an M/D/1 queuing model , 2017, EURASIP J. Wirel. Commun. Netw..

[8]  Pascal Lorenz,et al.  Wireless communication technologies for ITS applications [Topics in Automotive Networking] , 2010, IEEE Communications Magazine.

[9]  Khashayar Kotobi,et al.  Data-Throughput Enhancement Using Data Mining-Informed Cognitive Radio , 2015 .

[10]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[11]  Stuart Haber,et al.  How to time-stamp a digital document , 1990, Journal of Cryptology.

[12]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[13]  Paolo Bellavista,et al.  Convergence of MANET and WSN in IoT Urban Scenarios , 2013, IEEE Sensors Journal.

[14]  Khashayar Kotobi,et al.  Secure Blockchains for Dynamic Spectrum Access: A Decentralized Database in Moving Cognitive Radio Networks Enhances Security and User Access , 2018, IEEE Vehicular Technology Magazine.

[15]  Judy M. Vance,et al.  Industry use of virtual reality in product design and manufacturing: a survey , 2017, Virtual Reality.

[16]  K. Lauter,et al.  The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.