簡易檢索 / 詳目顯示

研究生: 翁志文
Ryannathan Setiawan
論文名稱: The Design of Blockchain-based Worker Sharing Framework for Mobile Crowdsensing Platforms
The Design of Blockchain-based Worker Sharing Framework for Mobile Crowdsensing Platforms
指導教授: 羅乃維
Nai-Wei Lo
口試委員: 吳宗成
Tzong-Chen Wu
查士朝
Shi-Cho Cha
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理系
Department of Information Management
論文出版年: 2018
畢業學年度: 106
語文別: 英文
論文頁數: 65
中文關鍵詞: mobile crowdsensingworker sharingblockchainsmart contract
外文關鍵詞: mobile crowdsensing, worker sharing, blockchain, smart contract
相關次數: 點閱:350下載:3
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • The widespread adoption of the consumer-centric mobile devices in which various sensors are equipped have enabled the adoption of mobile crowdsensing (MCS). In this thesis, a design of worker sharing framework for MCS platforms using blockchain technology is proposed to enable collaboration between MCS platforms. Collaborating MCS platforms use smart contract on the blockchain as a reference that collaboration happens between them. Furthermore, data sharing protocol which is related to the external worker personal data and the external worker sensed data are also proposed so that information exchange between MCS platforms is secured. A prototype is implemented to show the feasibility of the proposed protocol. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol.


    The widespread adoption of the consumer-centric mobile devices in which various sensors are equipped have enabled the adoption of mobile crowdsensing (MCS). In this thesis, a design of worker sharing framework for MCS platforms using blockchain technology is proposed to enable collaboration between MCS platforms. Collaborating MCS platforms use smart contract on the blockchain as a reference that collaboration happens between them. Furthermore, data sharing protocol which is related to the external worker personal data and the external worker sensed data are also proposed so that information exchange between MCS platforms is secured. A prototype is implemented to show the feasibility of the proposed protocol. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol.

    Abstract IV Acknowledgment V Contents VI List of Figures VIII List of Tables X List of Pseudocode XI Chapter 1 Introduction 1 Chapter 2 Literature Review 7 2.1 Mobile crowdsensing 7 2.2 Blockchain 12 2.1.1. Distributed Ledger 12 2.1.2. Consensus 14 2.1.3. Smart Contract 16 Chapter 3 Proposed System Design 17 3.1 Assumptions 17 3.2 Proposed System Architecture 18 3.3 Applicable Scenario 20 Chapter 4 Proposed Data Sharing Protocol 24 4.1 Personal Data Sharing Protocol for External Workers 25 4.2 External Worker Sensed Data Transfer Protocol 29 Chapter 5 Prototype Design & Implementation 32 5.1 Prototype Design 32 5.2 Prototype Implementation 36 Chapter 6 Security Analysis 45 6.1 Security against attack within the proposed protocol 45 6.2 Other security properties on the proposed framework 47 Chapter 7 Conclusion 49 References 51

    [1] F. Shrouf, J. Ordieres, and G. Miragliotta, “Smart factories in Industry 4.0: A review of the concept and of energy management approached in production based on the Internet of Things paradigm,” in IEEE International Conference on Industrial Engineering and Engineering Management, 2014, pp. 697–701.
    [2] Y. Liu et al., “Does wireless sensor network scale? A measurement study on GreenOrbs,” 2011 Proc. IEEE INFOCOM, vol. 24, no. 10, pp. 873–881, 2011.
    [3] Statista, “Cell phone sales worldwide 2007-2017.” [Online]. Available: https://www.statista.com/statistics/263437/global-smartphone-sales-to-end-users-since-2007/. [Accessed: 10-Apr-2018].
    [4] Statista, “Wearables sales worldwide by region 2015-2021.” [Online]. Available: https://www.statista.com/statistics/490231/wearable-devices-worldwide-by-region/. [Accessed: 04-May-2018].
    [5] Statista, “Share of new cars sold that are connected to the Internet worldwide from 2015 to 2025.” [Online]. Available: https://www.statista.com/statistics/275849/number-of-vehicles-connected-to-the-internet/. [Accessed: 04-May-2018].
    [6] R. K. Ganti, F. Ye, and H. Lei, “Mobile crowdsensing: Current state and future challenges,” IEEE Commun. Mag., vol. 49, no. 11, pp. 32–39, 2011.
    [7] B. Guo, Z. Yu, X. Zhou, and D. Zhang, “From participatory sensing to Mobile Crowd Sensing,” 2014 IEEE Int. Conf. Pervasive Comput. Commun. Work. PERCOM Work. 2014, pp. 593–598, 2014.
    [8] H. Ma, D. Zhao, and P. Yuan, “Opportunities in mobile crowd sensing,” Infocommunications J., vol. 7, no. 2, pp. 32–38, 2015.
    [9] X. Zhang et al., “Incentives for mobile crowd sensing: A survey,” IEEE Commun. Surv. Tutorials, vol. 18, no. 1, pp. 54–67, 2016.
    [10] P. Bellavista, A. Corradi, L. Foschini, and R. Ianniello, “Scalable and cost-effective assignment of mobile crowdsensing tasks based on profiling trends and prediction: The ParticipAct living lab experience,” Sensors (Switzerland), vol. 15, no. 8, pp. 18613–18640, 2015.
    [11] S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” www.bitcoin.org, p. 9, 2008.
    [12] G. Wood, “Ethereum: a secure decentralised generalised transaction ledger,” Ethereum Proj. Yellow Pap., pp. 1–32, 2014.
    [13] J. Burke et al., “Participatory Sensing,” World Sens. Web Work. ACM Sensys, 2006.
    [14] N. D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. T. Campbell, “A survey of mobile phone sensing,” IEEE Commun. Mag., vol. 48, no. 9, pp. 140–150, 2010.
    [15] W. Z. Khan, Y. Xiang, M. Y. Aalsalem, and Q. Arshad, “Mobile Phone Sensing Systems: A Survey,” IEEE Commun. Surv. Tutorials, vol. 15, no. 1, pp. 402–427, 2013.
    [16] D. Zhang, L. Wang, H. Xiong, and B. Guo, “4W1H in mobile crowd sensing,” IEEE Commun. Mag., vol. 52, no. 8, pp. 42–48, 2014.
    [17] M.-R. Ra, B. Liu, T. F. La Porta, and R. Govindan, “Medusa: a programming framework for crowd-sensing applications,” Proc. 10th Int. Conf. Mob. Syst. Appl. Serv. - MobiSys ’12, p. 337, 2012.
    [18] I. Carreras, D. Miorandi, A. Tamilin, E. R. Ssebaggala, and N. Conci, “Matador: Mobile task detector for context-aware crowd-sensing campaigns,” in 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2013, 2013, pp. 212–217.
    [19] X. Hu, T. H. S. Chu, H. C. B. Chan, and V. C. M. Leung, “Vita: A crowdsensing-oriented mobile cyber-physical system,” IEEE Trans. Emerg. Top. Comput., vol. 1, no. 1, pp. 148–165, 2013.
    [20] G. Cardone, A. Corradi, L. Foschini, and R. Ianniello, “ParticipAct: A Large-Scale Crowdsensing Platform,” IEEE Trans. Emerg. Top. Comput., vol. 4, no. 1, pp. 21–32, 2016.
    [21] M. Li, J. Weng, A. Yang, and W. Lu, “CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing,” IACR Cryptol. ePrint Arch., pp. 1–12, 2017.
    [22] J. Wang, M. Li, Y. He, H. Li, K. Xiao, and C. Wang, “A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications,” IEEE Access, vol. 6, pp. 17545–17556, 2018.
    [23] A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and Cryptocurrency Technologies Introduction to the book. 2016.
    [24] C. Percival, “The scrypt key derivation function and encryption utility.” [Online]. Available: http://www.tarsnap.com/scrypt.html. [Accessed: 14-May-2018].
    [25] J. R. Douceur, “The Sybil Attack,” in Revised Papers from the First International Workshop on Peer-to-Peer Systems, 2002, pp. 251–260.
    [26] M. Castro, M. Castro, B. Liskov, and B. Liskov, “Practical Byzantine fault tolerance,” in OSDI {’}99: Proceedings of the third symposium on Operating systems design and implementation, 1999, pp. 173–186.
    [27] “Hyperledger Fabric v0.6 Consensus - Archive.” [Online]. Available: https://github.com/hyperledger-archives/fabric/wiki/Consensus. [Accessed: 15-May-2018].
    [28] “Introduction to Hyperledger Sawtooth.” [Online]. Available: https://sawtooth.hyperledger.org/docs/core/nightly/0-8/introduction.html#proof-of-elapsed-time-poet. [Accessed: 14-May-2018].
    [29] “Clique PoA protocol & Rinkeby PoA testnet.” [Online]. Available: https://github.com/ethereum/EIPs/issues/225. [Accessed: 14-May-2018].
    [30] “Proof-of-Authority Chains.” [Online]. Available: https://wiki.parity.io/Proof-of-Authority-Chains. [Accessed: 14-May-2018].
    [31] “Raft-based consensus for Ethereum/Quorum.” [Online]. Available: https://github.com/jpmorganchase/quorum/blob/master/raft/doc.md. [Accessed: 14-May-2018].
    [32] “Smart Contracts: Building Blocks for Digital Markets.” [Online]. Available: http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_2.html. [Accessed: 16-May-2018].
    [33] P. McCorry, S. Shahandashti, D. Clarke, and F. Hao, “Authenticated Key Exchange over Bitcoin,” in International Conference on Research in Security Standardisation, 2015, pp. 3–20.
    [34] D. Johnson, A. Menezes, and S. Vanstone, “The Elliptic Curve Digital Signature Algorithm (ECDSA),” Int. J. Inf. Secur., vol. 1, no. 1, pp. 36–63, 2001.
    [35] D. Hankerson, S. Vanstone, and A. Menezes, Guide to elliptic curve cryptography. Springer-Verlag, 2004.
    [36] “TESTNET Rinkeby (ETH) Blockchain Explorer.” [Online]. Available: https://rinkeby.etherscan.io/. [Accessed: 10-Jul-2018].
    [37] M. Palatinus, P. Rusnak, A. Voisine, and S. Bowe, “Mnemonic code for generating deterministic keys,” 2013. [Online]. Available: https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki. [Accessed: 15-Jun-2018].
    [38] A. Joux and K. Nguyen, “Separating decision diffie-hellman from computational diffie-hellman in cryptographic groups,” J. Cryptol., vol. 16, no. 4, pp. 239–247, 2003.

    QR CODE