11/13/2023 0 Comments Iota tangle speed![]() A node willing to broadcast a new transaction over the network is expected to validate two previous transactions. The Proof-of-Work (PoW) is not meant to be part of the validation process hence to secure the network as in blockchains but only to discourage spam transactions on the Tangle. A transaction is considered valid when it has a reference to a special one called milestone. Transactions on the Tangle require no fees and nodes of the network constantly validate transactions at full speed. When dealing with largely distributed sensor systems producing data with high throughput, the IOTA Tangle in its new Chrysalis’ version is a valuable choice in the Authors’ opinion. Nowadays, Distributed Ledger Technologies (DLTs) are another relevant and viable option to underpin data exchange while leveraging important security features such as data immutability and verifiability . IoT devices are typically resource-constrained and TLS consumes those resources. Any scenario comprising more than one point dedicated to data analysis is deployed with data duplication/exchange at Edge or Cloud level because it is not suitable to open more than one TLS channel from the IoT device. In practice TLS is used to build a point-to-point secure channel between sensor device and the Edge or Cloud device. A secure channel ensures authentication of one of the entities or mutual-authentication, confidentiality and integrity of the data exchanged. (D)TLS is an incredibly powerful and flexible secure protocol to build secure communication channels between devices . The common method of protecting data transmission in sensor systems is the Transport Layer Security (TLS) or its datagram counterpart the Datagram Transport Layer Security (DTLS) . End-to-end security issues are of paramount importance and they often drive the selection of the solution. Such systems have two main additional requirements today ( i) the need for (near) real-time performance to serve their function avoiding offline data analysis and ( ii) end-to-end security with data source authentication, data confidentiality and integrity from sensor to remote site where data is stored and processed. Internet-of-Things (IoT) systems enable the collection of data from an increasing variety of sensors for analysis and evidence-based decision making. The L2Sec source code is released as open source repository on GitHub. The first experimental results evidence the effectiveness of the approach and advocate for the integration of an hardware secure element to improve the overall security of the protocol. This protocol is suitable for implementation on constrained devices, such as common IoT devices, leading to greater scalability. This paper presents L2Sec, a cryptographic protocol which is able to secure data exchanged over the IOTA Tangle. A DLT such as the IOTA Tangle offers great potential to improve sensor data exchange. The most common method of protecting data transmission in sensor systems is Transport Layer Security (TLS) or its datagram counterpart (DTLS) today, but exist an alternative option based on Distributed Ledger Technology (DLT) that promise strong security, ease of use and potential for large scale integration of heterogeneous sensor systems. However, security concerns regarding the source, confidentiality and integrity of the data arise. Internet-of-Things (IoT) and sensor technologies have enabled the collection of data in a distributed fashion for analysis and evidence-based decision making. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |