Loading [MathJax]/extensions/MathZoom.js
Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems | IEEE Conference Publication | IEEE Xplore

Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems


Abstract:

Resource -constrained distributed systems such as the Internet of Things (IoT), edge computing and fog computing are deployed for real-time monitoring and evaluation. Cur...Show More

Abstract:

Resource -constrained distributed systems such as the Internet of Things (IoT), edge computing and fog computing are deployed for real-time monitoring and evaluation. Current security solutions are problematic when there is a centralized controlling entity. The blockchain provides decentralized security architectures using proof-of-work (PoW). Proof-of-work is an expensive process for IoT and edge computing due to the deployment of resource-constrained devices. This paper presents a novel consensus algorithm called Proof-of-Authentication (PoAh) to replace Proof-of-Work and introduce authentication in such environments to make the blockchain application-specific. This paper implemented the Proof-of-Authentication system to evaluate its sustainability and applicability for the IoT and edge computing. The evaluation process is conducted in both simulation and real-time testbeds to evaluate performance. Finally, the process of Proof-of-Authentication and its integration with blockchain in resource-constrained distributed systems is discussed. Our proposed PoAh, while running in limited computer resources (e.g. single-board computing devices like the Raspberry Pi) has a latency in the order of 3 secs.
Date of Conference: 11-13 January 2019
Date Added to IEEE Xplore: 07 March 2019
ISBN Information:

ISSN Information:

Conference Location: Las Vegas, NV, USA

Contact IEEE to Subscribe

References

References is not available for this document.