SlideShare a Scribd company logo
Decentralized and
Secure Delivery
Network of IoT
Update Files Based on
Ethereum Smart
Contracts and
Blockchain Technology
Salar Arbabi Mehdi Shajari
Agenda
System
Architecture
Problem Definition, Solution and
Goals
2
1
Proof of Concept
4
3
Protocol
Conclusion
5
Before starting the main
part of the presentation
Blockchain Technology
fundamentals
Smart Contracts
Ethereum Principals
Previous and related works
Part 1.
Problem Definition,
Solution and Goals
Problem Definition
Based on Gartner Inc. 25 billion connected “things” will be in use by the end of 2020.
Control Structure: Centralized Architecture, Trusted Third Parties, Central Controller
Security
Privacy
Availability
Cost
Single Point Of
Failure!
Cascon Decentralized IoT update - Blockchain and Smart Contracts
Ethereum Smart
Contracts to Control
Business Logic
Use of Blockchain as
a Distributed Public
Ledger
Decentralized Control
Mechanism
Micropayment
Incentives to Boost Full
Nodes’ Participation in
File Transfer
P2P File Transfer
Distributed File
Storage
IDEA
Goals
Decentralization Security Privacy Cost Reduction
Eliminate Single
Point of Failure
Transparency
Availability
Authentication
Access Control
Anonymity
Copyright
Provider in Control
of the Content
Maintenance Cost
Security Costs
Part 2.
System
Architecture
Ethereum Contract Accounts
Account Management Layer
Ethereum Externally
Owned Accounts (EOA)
Ethereum Wallets
Presentation Layer
Abstract Binary Interface (ABI)
Web-3 Technology
Abstract Binary Interface (ABI)
GUI
Blockchain Layer (Ethereum)
Cryptocurrency (Ether)
Smart Contracts
Light Client Support
Network Layer
Distributed Storage
Distributed Hash Tables (DHT)
P2P File Transfer
Incentive Mechanism
Part 3.
Proposed Protocol
Limitations
IoT devices are
often limited in
resources
IoT Devices can’t
store the
blockchain
Blockchain has
limited storage and
computation
capability
Roles
IoT Devices with limited
resources and capabilities
Intra-Network connection
Update Receiver
A User who owns a few IoT
devices to use in his own
network
Transacts in Ethereum on
IoT Devices’ behalf
IoT Device Vendor
Update Producer
1 2 3Network Owner
IoT Devices –
End Peers –
Target Nodes
Vendor
Roles (2)
Update Distributor
Registers IoT Devices
Provided by each vendor
4 5
Vendor Registrar
Contract
Full Node
CONTRACT
Registration
CONTRACT
Vendor Vendor Registrar
Contract
Network Owner
Purchase
Registers Device
to enable it and
benefit update
possibilityDeploy
Provide
Protocol - Registration
Registration with
network owner’s
EOA
Protocol
Proposed Protocol
Update provider Super Contract
(Proposed Framework)
Instance 1
(Service 1)
Instance 2
(Service 2)
Network Owner
asks for a service
(update in our
case)
{Full Nodes
(P2P File
Distributors)
Update Provider Injects
new encrypted update
to the P2P Distribution
Network
Many to many
relationship
Each instance
for one service
{
update provider informs our
system of new content release
Contract checks for an
agreement
Auction for
Transferring File
and receiving
reward
Grants
Access
(Ticket) in
Case of
Agreement
Auction winner full node
transfers encrypted
update
(Network Owner) Gets
decryption key from
related service contract
Decrypted
update
Protocol – Content Abstraction and Access
Control
Blockchains are not efficient for data storing due to its distributed architecture and proof of work
mechanisms
How to achieve content authentication?
Remember
this
Symbol?
Content Abstraction
Checksum
How to store?
Recall Hashmaps from OO.
programming
Solidity
Mapping
x: Update Provider Address
(msg.sender)
y: Update Name Digest
_Update_abstraction[x][y] :
Checksum
z: Network Owner Address
_access_tickets[x][y][z][w] :
Ticket
How about a mapping
of mappings of
mappings?
O(1)
w: IoT Device ID
Protocol – Content Abstraction and
AuthenticationProposed
Mechanism
Content
provider
Developed Contract
Content Provider
establishes content
checksum in contract
Upon receiving content, consumer
checks received file with the
checksum of the abstraction stored
at contract
Only the one with
access to private key
can trigger this
Recall msg.sender in
Solidity
Checksum checking
Only gets payed if delivers
authentic file
Otherwise, Waste of gas,
Costly!!!
Access Checking done
before all this! Right at
the request
Consumer
Full Node
Protocol - Incentives
Napster, As the first decentralized content delivery system, free riding challenge
Reputation-based
Mechanisms
Micropayment Mechanisms
Reciprocity Mechanism
Capacity
Free Bandwidth
Transfer Duration
Content Size and etc.
Lowest Price Offer wins the
auction
Nash EquilibriumFile Transfer Reverse Auction
Reward := Bid
Protocol – File Transfer Auction
First Price Reverse Auction
N ≥ 2 Participants
Each seller i = 1, · · · , N knows his private cost ci ≥ 0 of
production
Production costs are independent and identically
distributed as a p.d.f. f and c.d.f. F, and have a continuous
support J
bidding strategy β maps a bidder’s cost ci to a
corresponding bid bi
Denote the infimum and the supremum of the support J of
the cost distribution by č and ĉ, allowing the possibility of ĉ
being ∞.
Part 4.
Proof of Concept
Evaluation – Centralized Architectures
Amazon
62%
Microsoft Azure
20%
Google
12%
Other
6%
IoT Market Distribution
3923 $
Monthly
Amazon Web Service
2447 $
Monthly
Microsoft Azure
1443 $
Monthly
Google Cloud Platform
• Node Assignments
• Key Management
• Functional Features
• IoT Core
• Storage
• IoT Hub
• File Transfer
• DDOS Protection
• Functional Features
• Storage
• API
• Azure Firewall
• Automation
• IP Assignment
• IoT Hub
• DDOS Protection
• Storage
• Functional Features
• API
• Bandwidth
• Network Traffic
Management
Storage Cost Analysis
Storage Cost
Finished Updates
Demanded Updates
_updateOwner
Field
Maximum Storage
Space
(Bytes)
_updateFileName
_updateFileHash
_winnerBidderIP
_transferPrice
_bandWidth
20
1024
256
60
64
64
_price 64
Total: 1536
Total: 1536 Bytes
_updateOwner
_updateFileName
_updateFileHash
_timestamp
20
1024
256
256
_initialized 8
Total: 1564
Total: 1564 Bytes
Functional Cost Analysis
Actor Function Gas Price
per
Execution
Cost Per Month
(8K
transactions -
Dollars)
Network
Owner
Instance
Contract
Finalize
Register IoT
Device
Demand Update
Total:
128.874
320000
42000
28223
28351
0.073
76.961
0.006
51.95
Full
Node
Register Full
Node
Bid to Update
28415
28287
0.007
51.833
Total:
51.84
Response Time Analysis
(Mili Seconds)
620.22 584.75 681.38
Number of
Transactions
(Seconds)
8 × 103
4 × 105
6 × 106
3 × 108
4200 6 × 105
8 × 106
16.7916
21.758
74.4197
519.528
15.491
20.58
58.793
382.87
13.41
18.143
51.8362
226.025
Choosing the device to be updated
Update Information
Strengths and Weaknesses
Strengths
Eliminate Single Point of Failure - Availability
Transparency
Content Provider in Control of The Content
Cost Reduction
Weaknesses
Cannot prevent or detect hardcopy distribution of Updates
High average response time and low throughput (Offchain State Channels / Parachains /
Consensus Algorithms)
Scalability
Part 5 – Proof of Concept

More Related Content

PDF
Null talk
PDF
Remote data integrity checking with a third party auditor in public cloud usi...
PPTX
Blockchain solution architecture deliverable
PPTX
Decentralization of internet of things with blockchain architecture
 
PDF
Identity based encryption with outsourced revocation in cloud computing
PPT
PDF
Identity based encryption with cloud revocation authority and its applications
PDF
Lecture 30 cloud mktplace
Null talk
Remote data integrity checking with a third party auditor in public cloud usi...
Blockchain solution architecture deliverable
Decentralization of internet of things with blockchain architecture
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with cloud revocation authority and its applications
Lecture 30 cloud mktplace

What's hot (10)

PDF
Secure data sharing in cloud computing using revocable storage identity-based...
PDF
IS Unit 7_Network Security
PPTX
Architecture blockchain-azure
PPTX
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
PPTX
Kerberos
PPTX
Kerberos
PDF
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
DOC
Privacy Preserving Public Auditing for Data Storage Security in Cloud
DOC
An efficient certificate less encryption for
PPT
Secure data sharing in cloud computing using revocable storage identity-based...
IS Unit 7_Network Security
Architecture blockchain-azure
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Kerberos
Kerberos
Implementation of Secure Cloud data Storage –Data Transaction by Using an Ort...
Privacy Preserving Public Auditing for Data Storage Security in Cloud
An efficient certificate less encryption for
Ad

Similar to Cascon Decentralized IoT update - Blockchain and Smart Contracts (20)

PDF
IBM Blockchain Platform - Architectural Good Practices v1.0
PPTX
Cloud to hybrid edge cloud evolution Jun112020.pptx
PPTX
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
PDF
[Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발
PPTX
Blockchain-based multiple AAA system in edge computing for IoT networks
PDF
apidays LIVE LONDON - Architecting Scalable Software Platforms for IoT Applic...
PPTX
New Design Patterns in Microservice Solutions
PPTX
Taw opening session
PDF
apidays LIVE Australia 2020 - Building a scalable API platform for an IoT eco...
PDF
Hyperledger Fabric & Composer
PDF
Bit taka bangladeshi country owned crypto currency
PDF
Wwc developing hyperledger applications v4
PDF
Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_final
PDF
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
PDF
IRJET- Study of Blockchain and its Concepts
PPTX
Integration of Things (Sam Vanhoutte @Iglooconf 2017)
PPTX
Introduction to FIWARE Open Ecosystem
PPTX
CPaaS.io Y1 Review Meeting - Citizen Empowerment
PDF
Hyperledger Fabric update Meetup 20181101
PDF
IRJET- Proof of Document using Multichain and Ethereum
IBM Blockchain Platform - Architectural Good Practices v1.0
Cloud to hybrid edge cloud evolution Jun112020.pptx
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
[Call for code] IBM 블록체인을 활용하여 투명하게 구호기금 관리하기 - Hyperledger Fabric v1.1 by 맹개발
Blockchain-based multiple AAA system in edge computing for IoT networks
apidays LIVE LONDON - Architecting Scalable Software Platforms for IoT Applic...
New Design Patterns in Microservice Solutions
Taw opening session
apidays LIVE Australia 2020 - Building a scalable API platform for an IoT eco...
Hyperledger Fabric & Composer
Bit taka bangladeshi country owned crypto currency
Wwc developing hyperledger applications v4
Doag 2018 eine_reise_durch_die_blockchain_applikationsentwicklung_final
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
IRJET- Study of Blockchain and its Concepts
Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Introduction to FIWARE Open Ecosystem
CPaaS.io Y1 Review Meeting - Citizen Empowerment
Hyperledger Fabric update Meetup 20181101
IRJET- Proof of Document using Multichain and Ethereum
Ad

Recently uploaded (20)

PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Geodesy 1.pptx...............................................
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Construction Project Organization Group 2.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
composite construction of structures.pdf
PPT
Project quality management in manufacturing
PPTX
web development for engineering and engineering
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Sustainable Sites - Green Building Construction
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
CH1 Production IntroductoryConcepts.pptx
Geodesy 1.pptx...............................................
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Construction Project Organization Group 2.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
composite construction of structures.pdf
Project quality management in manufacturing
web development for engineering and engineering
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Embodied AI: Ushering in the Next Era of Intelligent Systems
Sustainable Sites - Green Building Construction
bas. eng. economics group 4 presentation 1.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk

Cascon Decentralized IoT update - Blockchain and Smart Contracts

  • 1. Decentralized and Secure Delivery Network of IoT Update Files Based on Ethereum Smart Contracts and Blockchain Technology Salar Arbabi Mehdi Shajari
  • 5. Before starting the main part of the presentation Blockchain Technology fundamentals Smart Contracts Ethereum Principals Previous and related works
  • 7. Problem Definition Based on Gartner Inc. 25 billion connected “things” will be in use by the end of 2020. Control Structure: Centralized Architecture, Trusted Third Parties, Central Controller Security Privacy Availability Cost Single Point Of Failure!
  • 9. Ethereum Smart Contracts to Control Business Logic Use of Blockchain as a Distributed Public Ledger Decentralized Control Mechanism Micropayment Incentives to Boost Full Nodes’ Participation in File Transfer P2P File Transfer Distributed File Storage IDEA
  • 10. Goals Decentralization Security Privacy Cost Reduction Eliminate Single Point of Failure Transparency Availability Authentication Access Control Anonymity Copyright Provider in Control of the Content Maintenance Cost Security Costs
  • 12. Ethereum Contract Accounts Account Management Layer Ethereum Externally Owned Accounts (EOA) Ethereum Wallets Presentation Layer Abstract Binary Interface (ABI) Web-3 Technology Abstract Binary Interface (ABI) GUI Blockchain Layer (Ethereum) Cryptocurrency (Ether) Smart Contracts Light Client Support Network Layer Distributed Storage Distributed Hash Tables (DHT) P2P File Transfer Incentive Mechanism
  • 14. Limitations IoT devices are often limited in resources IoT Devices can’t store the blockchain Blockchain has limited storage and computation capability
  • 15. Roles IoT Devices with limited resources and capabilities Intra-Network connection Update Receiver A User who owns a few IoT devices to use in his own network Transacts in Ethereum on IoT Devices’ behalf IoT Device Vendor Update Producer 1 2 3Network Owner IoT Devices – End Peers – Target Nodes Vendor
  • 16. Roles (2) Update Distributor Registers IoT Devices Provided by each vendor 4 5 Vendor Registrar Contract Full Node CONTRACT
  • 17. Registration CONTRACT Vendor Vendor Registrar Contract Network Owner Purchase Registers Device to enable it and benefit update possibilityDeploy Provide Protocol - Registration Registration with network owner’s EOA
  • 18. Protocol Proposed Protocol Update provider Super Contract (Proposed Framework) Instance 1 (Service 1) Instance 2 (Service 2) Network Owner asks for a service (update in our case) {Full Nodes (P2P File Distributors) Update Provider Injects new encrypted update to the P2P Distribution Network Many to many relationship Each instance for one service { update provider informs our system of new content release Contract checks for an agreement Auction for Transferring File and receiving reward Grants Access (Ticket) in Case of Agreement Auction winner full node transfers encrypted update (Network Owner) Gets decryption key from related service contract Decrypted update
  • 19. Protocol – Content Abstraction and Access Control Blockchains are not efficient for data storing due to its distributed architecture and proof of work mechanisms How to achieve content authentication? Remember this Symbol? Content Abstraction Checksum How to store? Recall Hashmaps from OO. programming Solidity Mapping x: Update Provider Address (msg.sender) y: Update Name Digest _Update_abstraction[x][y] : Checksum z: Network Owner Address _access_tickets[x][y][z][w] : Ticket How about a mapping of mappings of mappings? O(1) w: IoT Device ID
  • 20. Protocol – Content Abstraction and AuthenticationProposed Mechanism Content provider Developed Contract Content Provider establishes content checksum in contract Upon receiving content, consumer checks received file with the checksum of the abstraction stored at contract Only the one with access to private key can trigger this Recall msg.sender in Solidity Checksum checking Only gets payed if delivers authentic file Otherwise, Waste of gas, Costly!!! Access Checking done before all this! Right at the request Consumer Full Node
  • 21. Protocol - Incentives Napster, As the first decentralized content delivery system, free riding challenge Reputation-based Mechanisms Micropayment Mechanisms Reciprocity Mechanism Capacity Free Bandwidth Transfer Duration Content Size and etc. Lowest Price Offer wins the auction Nash EquilibriumFile Transfer Reverse Auction Reward := Bid
  • 22. Protocol – File Transfer Auction First Price Reverse Auction N ≥ 2 Participants Each seller i = 1, · · · , N knows his private cost ci ≥ 0 of production Production costs are independent and identically distributed as a p.d.f. f and c.d.f. F, and have a continuous support J bidding strategy β maps a bidder’s cost ci to a corresponding bid bi Denote the infimum and the supremum of the support J of the cost distribution by č and ĉ, allowing the possibility of ĉ being ∞.
  • 23. Part 4. Proof of Concept
  • 24. Evaluation – Centralized Architectures Amazon 62% Microsoft Azure 20% Google 12% Other 6% IoT Market Distribution 3923 $ Monthly Amazon Web Service 2447 $ Monthly Microsoft Azure 1443 $ Monthly Google Cloud Platform • Node Assignments • Key Management • Functional Features • IoT Core • Storage • IoT Hub • File Transfer • DDOS Protection • Functional Features • Storage • API • Azure Firewall • Automation • IP Assignment • IoT Hub • DDOS Protection • Storage • Functional Features • API • Bandwidth • Network Traffic Management
  • 25. Storage Cost Analysis Storage Cost Finished Updates Demanded Updates _updateOwner Field Maximum Storage Space (Bytes) _updateFileName _updateFileHash _winnerBidderIP _transferPrice _bandWidth 20 1024 256 60 64 64 _price 64 Total: 1536 Total: 1536 Bytes _updateOwner _updateFileName _updateFileHash _timestamp 20 1024 256 256 _initialized 8 Total: 1564 Total: 1564 Bytes
  • 26. Functional Cost Analysis Actor Function Gas Price per Execution Cost Per Month (8K transactions - Dollars) Network Owner Instance Contract Finalize Register IoT Device Demand Update Total: 128.874 320000 42000 28223 28351 0.073 76.961 0.006 51.95 Full Node Register Full Node Bid to Update 28415 28287 0.007 51.833 Total: 51.84
  • 27. Response Time Analysis (Mili Seconds) 620.22 584.75 681.38 Number of Transactions (Seconds) 8 × 103 4 × 105 6 × 106 3 × 108 4200 6 × 105 8 × 106 16.7916 21.758 74.4197 519.528 15.491 20.58 58.793 382.87 13.41 18.143 51.8362 226.025
  • 28. Choosing the device to be updated
  • 30. Strengths and Weaknesses Strengths Eliminate Single Point of Failure - Availability Transparency Content Provider in Control of The Content Cost Reduction Weaknesses Cannot prevent or detect hardcopy distribution of Updates High average response time and low throughput (Offchain State Channels / Parachains / Consensus Algorithms) Scalability
  • 31. Part 5 – Proof of Concept

Editor's Notes

  • #15: Currencies currently used in financial transactions are governed by national governments and in order for blockchain to be widely adopted by financial institutions, agreement has to be reached by the those governments to regulate the use of blockchain, otherwise, its status remains unsettled. Despite the existing security solutions with strong encryption algorithms, cyber security concerns are considered one of the main important factors that affect public’s decisions on sharing personal data using blockchain systems Bugs in software code always exist and poorly written software is especially vulnerable to malicious activity. As software gets more complicated and interconnected, its reliability goes down while the number of bugs goes up. Although we have huge and rapid advancements in technology, software is written by humans and therefore it will always be imperfect. Blockchain is no different. Additionally, the integrity of the software and network are fundamentally important in the evaluation of blockchain as an infrastructure technology. If the technology permeates every major financial system worldwide, the impacts of a glitch or hack could be catastrophic