Author: |
翁志文 Ryannathan Setiawan |
---|---|
Thesis Title: |
The Design of Blockchain-based Worker Sharing Framework for Mobile Crowdsensing Platforms The Design of Blockchain-based Worker Sharing Framework for Mobile Crowdsensing Platforms |
Advisor: |
羅乃維
Nai-Wei Lo |
Committee: |
吳宗成
Tzong-Chen Wu 查士朝 Shi-Cho Cha |
Degree: |
碩士 Master |
Department: |
管理學院 - 資訊管理系 Department of Information Management |
Thesis Publication Year: | 2018 |
Graduation Academic Year: | 106 |
Language: | 英文 |
Pages: | 65 |
Keywords (in Chinese): | mobile crowdsensing 、worker sharing 、blockchain 、smart contract |
Keywords (in other languages): | mobile crowdsensing, worker sharing, blockchain, smart contract |
Reference times: | Clicks: 631 Downloads: 3 |
Share: |
School Collection Retrieve National Library Collection Retrieve Error Report |
The widespread adoption of the consumer-centric mobile devices in which various sensors are equipped have enabled the adoption of mobile crowdsensing (MCS). In this thesis, a design of worker sharing framework for MCS platforms using blockchain technology is proposed to enable collaboration between MCS platforms. Collaborating MCS platforms use smart contract on the blockchain as a reference that collaboration happens between them. Furthermore, data sharing protocol which is related to the external worker personal data and the external worker sensed data are also proposed so that information exchange between MCS platforms is secured. A prototype is implemented to show the feasibility of the proposed protocol. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol.
The widespread adoption of the consumer-centric mobile devices in which various sensors are equipped have enabled the adoption of mobile crowdsensing (MCS). In this thesis, a design of worker sharing framework for MCS platforms using blockchain technology is proposed to enable collaboration between MCS platforms. Collaborating MCS platforms use smart contract on the blockchain as a reference that collaboration happens between them. Furthermore, data sharing protocol which is related to the external worker personal data and the external worker sensed data are also proposed so that information exchange between MCS platforms is secured. A prototype is implemented to show the feasibility of the proposed protocol. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol.
[1] F. Shrouf, J. Ordieres, and G. Miragliotta, “Smart factories in Industry 4.0: A review of the concept and of energy management approached in production based on the Internet of Things paradigm,” in IEEE International Conference on Industrial Engineering and Engineering Management, 2014, pp. 697–701.
[2] Y. Liu et al., “Does wireless sensor network scale? A measurement study on GreenOrbs,” 2011 Proc. IEEE INFOCOM, vol. 24, no. 10, pp. 873–881, 2011.
[3] Statista, “Cell phone sales worldwide 2007-2017.” [Online]. Available: https://www.statista.com/statistics/263437/global-smartphone-sales-to-end-users-since-2007/. [Accessed: 10-Apr-2018].
[4] Statista, “Wearables sales worldwide by region 2015-2021.” [Online]. Available: https://www.statista.com/statistics/490231/wearable-devices-worldwide-by-region/. [Accessed: 04-May-2018].
[5] Statista, “Share of new cars sold that are connected to the Internet worldwide from 2015 to 2025.” [Online]. Available: https://www.statista.com/statistics/275849/number-of-vehicles-connected-to-the-internet/. [Accessed: 04-May-2018].
[6] R. K. Ganti, F. Ye, and H. Lei, “Mobile crowdsensing: Current state and future challenges,” IEEE Commun. Mag., vol. 49, no. 11, pp. 32–39, 2011.
[7] B. Guo, Z. Yu, X. Zhou, and D. Zhang, “From participatory sensing to Mobile Crowd Sensing,” 2014 IEEE Int. Conf. Pervasive Comput. Commun. Work. PERCOM Work. 2014, pp. 593–598, 2014.
[8] H. Ma, D. Zhao, and P. Yuan, “Opportunities in mobile crowd sensing,” Infocommunications J., vol. 7, no. 2, pp. 32–38, 2015.
[9] X. Zhang et al., “Incentives for mobile crowd sensing: A survey,” IEEE Commun. Surv. Tutorials, vol. 18, no. 1, pp. 54–67, 2016.
[10] P. Bellavista, A. Corradi, L. Foschini, and R. Ianniello, “Scalable and cost-effective assignment of mobile crowdsensing tasks based on profiling trends and prediction: The ParticipAct living lab experience,” Sensors (Switzerland), vol. 15, no. 8, pp. 18613–18640, 2015.
[11] S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” www.bitcoin.org, p. 9, 2008.
[12] G. Wood, “Ethereum: a secure decentralised generalised transaction ledger,” Ethereum Proj. Yellow Pap., pp. 1–32, 2014.
[13] J. Burke et al., “Participatory Sensing,” World Sens. Web Work. ACM Sensys, 2006.
[14] N. D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. T. Campbell, “A survey of mobile phone sensing,” IEEE Commun. Mag., vol. 48, no. 9, pp. 140–150, 2010.
[15] W. Z. Khan, Y. Xiang, M. Y. Aalsalem, and Q. Arshad, “Mobile Phone Sensing Systems: A Survey,” IEEE Commun. Surv. Tutorials, vol. 15, no. 1, pp. 402–427, 2013.
[16] D. Zhang, L. Wang, H. Xiong, and B. Guo, “4W1H in mobile crowd sensing,” IEEE Commun. Mag., vol. 52, no. 8, pp. 42–48, 2014.
[17] M.-R. Ra, B. Liu, T. F. La Porta, and R. Govindan, “Medusa: a programming framework for crowd-sensing applications,” Proc. 10th Int. Conf. Mob. Syst. Appl. Serv. - MobiSys ’12, p. 337, 2012.
[18] I. Carreras, D. Miorandi, A. Tamilin, E. R. Ssebaggala, and N. Conci, “Matador: Mobile task detector for context-aware crowd-sensing campaigns,” in 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2013, 2013, pp. 212–217.
[19] X. Hu, T. H. S. Chu, H. C. B. Chan, and V. C. M. Leung, “Vita: A crowdsensing-oriented mobile cyber-physical system,” IEEE Trans. Emerg. Top. Comput., vol. 1, no. 1, pp. 148–165, 2013.
[20] G. Cardone, A. Corradi, L. Foschini, and R. Ianniello, “ParticipAct: A Large-Scale Crowdsensing Platform,” IEEE Trans. Emerg. Top. Comput., vol. 4, no. 1, pp. 21–32, 2016.
[21] M. Li, J. Weng, A. Yang, and W. Lu, “CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing,” IACR Cryptol. ePrint Arch., pp. 1–12, 2017.
[22] J. Wang, M. Li, Y. He, H. Li, K. Xiao, and C. Wang, “A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications,” IEEE Access, vol. 6, pp. 17545–17556, 2018.
[23] A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and Cryptocurrency Technologies Introduction to the book. 2016.
[24] C. Percival, “The scrypt key derivation function and encryption utility.” [Online]. Available: http://www.tarsnap.com/scrypt.html. [Accessed: 14-May-2018].
[25] J. R. Douceur, “The Sybil Attack,” in Revised Papers from the First International Workshop on Peer-to-Peer Systems, 2002, pp. 251–260.
[26] M. Castro, M. Castro, B. Liskov, and B. Liskov, “Practical Byzantine fault tolerance,” in OSDI {’}99: Proceedings of the third symposium on Operating systems design and implementation, 1999, pp. 173–186.
[27] “Hyperledger Fabric v0.6 Consensus - Archive.” [Online]. Available: https://github.com/hyperledger-archives/fabric/wiki/Consensus. [Accessed: 15-May-2018].
[28] “Introduction to Hyperledger Sawtooth.” [Online]. Available: https://sawtooth.hyperledger.org/docs/core/nightly/0-8/introduction.html#proof-of-elapsed-time-poet. [Accessed: 14-May-2018].
[29] “Clique PoA protocol & Rinkeby PoA testnet.” [Online]. Available: https://github.com/ethereum/EIPs/issues/225. [Accessed: 14-May-2018].
[30] “Proof-of-Authority Chains.” [Online]. Available: https://wiki.parity.io/Proof-of-Authority-Chains. [Accessed: 14-May-2018].
[31] “Raft-based consensus for Ethereum/Quorum.” [Online]. Available: https://github.com/jpmorganchase/quorum/blob/master/raft/doc.md. [Accessed: 14-May-2018].
[32] “Smart Contracts: Building Blocks for Digital Markets.” [Online]. Available: http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_2.html. [Accessed: 16-May-2018].
[33] P. McCorry, S. Shahandashti, D. Clarke, and F. Hao, “Authenticated Key Exchange over Bitcoin,” in International Conference on Research in Security Standardisation, 2015, pp. 3–20.
[34] D. Johnson, A. Menezes, and S. Vanstone, “The Elliptic Curve Digital Signature Algorithm (ECDSA),” Int. J. Inf. Secur., vol. 1, no. 1, pp. 36–63, 2001.
[35] D. Hankerson, S. Vanstone, and A. Menezes, Guide to elliptic curve cryptography. Springer-Verlag, 2004.
[36] “TESTNET Rinkeby (ETH) Blockchain Explorer.” [Online]. Available: https://rinkeby.etherscan.io/. [Accessed: 10-Jul-2018].
[37] M. Palatinus, P. Rusnak, A. Voisine, and S. Bowe, “Mnemonic code for generating deterministic keys,” 2013. [Online]. Available: https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki. [Accessed: 15-Jun-2018].
[38] A. Joux and K. Nguyen, “Separating decision diffie-hellman from computational diffie-hellman in cryptographic groups,” J. Cryptol., vol. 16, no. 4, pp. 239–247, 2003.