论文标题

物联网中分布式分类帐的访问控制:一种网络方法

Access Control for Distributed Ledgers in the Internet of Things: A Networking Approach

论文作者

Cullen, Andrew, Ferraro, Pietro, Sanders, William, Vigneri, Luigi, Shorten, Robert

论文摘要

在物联网(IoT)域中,设备需要一个平台来无缝进行无缝交易,而无需受信任的中介。尽管分布式分类账技术(DLT)可以提供这样一个平台,但诸如比特币之类的区块链并非考虑到IoT网络,因此通常不适合此类应用:它们提供了不良的交易吞吐量和确认时间,对约束计算和存储资源施加压力,并需要高交易费用。在这项工作中,我们考虑了基于定向的无环形图,而不是区块链的一类IoT友好的DLT,并具有在工作证明(POW)的声誉系统。但是,如果没有POW,这些DLT的实现就需要访问控制算法来管理节点可以为LEDGER添加新事务的速率。我们对访问控制问题进行建模,并提出一种公平,高效且安全的算法。我们的算法代表了DLT的新设计范式,其中首次将网络概念应用于DLT设置。例如,我们的算法使用分布式速率设置,该设置本质上与Internet中使用的传输控制相似。但是,我们的解决方案具有新颖的适应性,以应对DLT的对抗环境,在这些DLT中无法信任任何个体代理。我们的算法保证了对攻击者的资源,一致性,公平性和韧性的利用。所有这些都是有效地实现的,并且就IoT设备的局限性而言。我们进行广泛的模拟来验证这些主张。

In the Internet of Things (IoT) domain, devices need a platform to transact seamlessly without a trusted intermediary. Although Distributed Ledger Technologies (DLTs) could provide such a platform, blockchains, such as Bitcoin, were not designed with IoT networks in mind, hence are often unsuitable for such applications: they offer poor transaction throughput and confirmation times, put stress on constrained computing and storage resources, and require high transaction fees. In this work, we consider a class of IoT-friendly DLTs based on directed acyclic graphs, rather than a blockchain, and with a reputation system in the place of Proof of Work (PoW). However, without PoW, implementation of these DLTs requires an access control algorithm to manage the rate at which nodes can add new transactions to the ledger. We model the access control problem and present an algorithm that is fair, efficient and secure. Our algorithm represents a new design paradigm for DLTs in which concepts from networking are applied to the DLT setting for the first time. For example, our algorithm uses distributed rate setting which is similar in nature to transmission control used in the Internet. However, our solution features novel adaptations to cope with the adversarial environment of DLTs in which no individual agent can be trusted. Our algorithm guarantees utilisation of resources, consistency, fairness, and resilience against attackers. All of this is achieved efficiently and with regard for the limitations of IoT devices. We perform extensive simulations to validate these claims.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源