A Many-Objective Optimization Model of Industrial Internet of Things Based on Private Blockchain | IEEE Journals & Magazine | IEEE Xplore

A Many-Objective Optimization Model of Industrial Internet of Things Based on Private Blockchain


Abstract:

The Industrial Internet of Things (IIoT) has developed rapidly in recent years. Private blockchains with decentralization, flexible rules, and good privacy protection can...Show More

Abstract:

The Industrial Internet of Things (IIoT) has developed rapidly in recent years. Private blockchains with decentralization, flexible rules, and good privacy protection can be applied in the IIoT to process the massive data and tackle the security problem. However, the scalability of blockchain places a restriction on IIoT. Accordingly, this article proposes an improved algorithm based on Two_Arch2 to improve the scalability and decentralization while reducing the latency and cost of the blockchain. By integrating the private blockchain theory to IIoT and simultaneously considering the above four objectives, a many-objective blockchain-enabled IIoT model is constructed. Then an improved Two_Arch2 algorithm is utilized to solve the model. Experimental results show that the improved algorithm can effectively optimize four indicators of the model.
Published in: IEEE Network ( Volume: 34, Issue: 5, September/October 2020)
Page(s): 78 - 83
Date of Publication: 18 September 2020

ISSN Information:

Related Articles are not available for this document.

Introduction

In recent years, the Internet of Things (IoT) has shown great potential in many aspects of life. Among the IoT extensions, the Industrial Internet of Things (IIoT) can be widely used in manufacturing, intelligent transportation, energy, and smart city [1]. However, the IIoT has some shortcomings in the actual application process. First, due to the development of 5G, the number of smart devices will increase rapidly. It is estimated that there will be 20 billion IIoT devices at the end of 2020. These devices will generate large amounts of data at an extremely fast rate [1], so the scalability of IIoT needs to be improved. Second, in terms of security, the IIoT relies on a central server, which increases the risk of being attacked or paralysis. If the data is hijacked during transmission, it will also threaten the security of the entire IIoT system.

Contact IEEE to Subscribe

References

References is not available for this document.