A Smart Distributed Multi-Ledger Construction Algorithm for Internet of things (IoT)
The Internet of Objects (IoT) could be a new paradigm for the linked, data-exchanging nature of things and their parts through a network supported by nodes. IoT has risen to the forefront of emerging technologies in a very type of applications, including peer-to-peer networks, smart energy grids, home and building automation, vehicle-to-vehicle communication, and wearable computing devices, because of the widespread use of small devices and embedded sensor frameworks. thanks to its tremendous expansion and widespread use, it's posed security issues that may prevent it from getting used during a style of new applications. The growing number of networked gadgets creates several access points for attackers, also as security issues. due to the fragile nature of IoT applications including health, automation, and energy grids, security concerns can't be tolerated. DLT (Distributed Ledger Technology) is one such technology which will help to mitigate IoT security threats. The vulnerability of a central node, which can compromise the whole system, are often reduced by adopting a distributed ledger to eliminate the necessity for one node. Blockchain, a distributed ledger technology, has sparked plenty of interest and generated real-world value. Here we construct a distributed multi ledger construction algorithm for peer-to-peer data transaction which involves key generation for each transaction.
Reference:-
A. Mohite And A. Acharya, ‘‘Block Chain For Government Fund Tracking Using Hyperledger,’’ In Proc. Int. Conf. Comput. Techn., Electron. Mech. Syst. (Ctems), Dec. 2018, Pp. 231–234.
B. Chen, Z. Tan, And W. Fang, ‘‘Blockchain-Based Implementation For Financial Product Management,’’ In Proc. 28th Int. Telecommun. Netw. Appl. Conf. (Itnac), Nov. 2018, Pp. 1–3.
Y. P. Tsang, K. L. Choy, C. H. Wu, G. T. S. Ho, And H. Y. Lam, ‘‘Blockchain-Driven Iot For Food Traceability With An Integrated Consensus Mechanism,’’ Ieee Access, Vol. 7, Pp. 129000–129017, 2019. Volume 10, 2022 1
T. Song, R. Li, B. Mei, J. Yu, X. Xing, And X. Cheng, ‘‘A Privacy Preserving Communication Protocol For Iot Applications In Smart Homes,’’ Ieee Internet Things J., Vol. 4, No. 6, Pp. 1844–1852, Dec. 2017.
J. H. Jeon, K. Kim, And J. Kim, ‘‘Block Chain Based Data Security Enhanced Iot Server Platform,’’ In Proc. Ieee Int. Conf. Inf. Netw. (Icoin), Jan. 2018, Pp. 941–944.
F. Meneghello, M. Calore, D. Zucchetto, M. Polese, And A. Zanella, ‘‘Iot: Internet Of Threats? A Survey Of Practical Security Vulnerabilities In Real Iot Devices,’’ Ieee Internet Things J., Vol. 6, No. 5, Pp. 8182–8201, Oct. 2019.
M. Ghasemi, M. Saadaat, And O. Ghollasi, ‘‘Threats Of Social Engineering Attacks Against Security Of Internet Of Things (Iot),’’ In Fundamental Research In Electrical Engineering (Lecture Notes In Electrical Engineering), S. M. Kouhsari, Ed. Singapore: Springer, 2019, Pp. 957–968.
S. Nakamoto. (2009). Bitcoin: A Peer-To-Peer Electronic Cash System. [Online]. Available: Https://Bitcoin.Org/Bitcoin.Pdf
X. Qiu, L. Liu, W. Chen, Z. Hong, And Z. Zheng, ‘‘Online Deep Reinforcement Learning For Computation Offloading In Blockchain-Empowered Mobile Edge Computing,’’ Ieee Trans. Veh. Technol., Vol. 68, No. 8, Pp. 8050–8062, Aug. 2019.
N. Mhaisen, N. Fetais, A. Erbad, A. Mohamed, And M. Guizani, ‘‘To Chain Or Not To Chain: A Reinforcement Learning Approach For Blockchain-Enabled Iot Monitoring Applications,’’ Future Gener. Comput. Syst., Vol. 111, Pp. 39–51, Oct. 2020.
S. Popov, ‘‘The Tangle,’’ Apr. 2018.
D. L. Baird, M. Harmon, And P. Madsen. (2020). Hedera: A Public Hashgraph Network & Governing Council. [Online]. Available: Https://Hedera.Com/Hh-Whitepaper
C. Lemahieu. (2017). Nano: A Feeless Distributed Cryptocurrency Network. [Online]. Available: Https://Content.Nano.Org/Whitepaper/ Nano_Whitepaper_En.Pdf
The Coordicide, Iota Foundation, Berlin, Germany, 2019.
G. Bu, W. Hana, And M. Potop-Butucaru, ‘‘Metamorphic Iota,’’ 2019, Arxiv:1907.03628.
Copyright (c) 2022 International Journal of Engineering and Computer Science

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.