IoT Device Integration and Payment via an Autonomic Blockchain-Based Service for IoT Device Sharing.

Sensors (Basel)

School of Computing and Information Systems, Melbourne School of Engineering, The University of Melbourne, Melbourne, VIC 3010, Australia.

Published: February 2022

The Internet of Things (IoT) incorporates billions of IoT devices (e.g., sensors, cameras, wearables, smart phones, as well as other internet-connected machines in homes, vehicles, and industrial plants), and the number of such connected IoT devices is currently growing rapidly. This paper proposes a novel Autonomic Global IoT Device Discovery and Integration Service (which we refer to as aGIDDI) that permits IoT applications to find IoT devices that are owned and managed by other parties in IoT (which we refer to as IoT device providers), integrate them, and pay for using their data observations. aGIDDI incorporates a suite of interacting sub-services supporting IoT device description, query, integration, payment (via a pay-as-you-go payment model), and access control that utilise a special-purpose blockchain to manage all information needed for IoT applications to find, pay and use the IoT devices they need. The paper describes aGIDDI's novel protocol that allows any IoT application to discover and automatically integrate and pay for IoT devices and their data that are provided by other parties. The paper also presents aGIDDI's architecture and proof-of-concept implementation, as well as an experimental evaluation of the performance and scalability of aGIDDI in variety of IoT device integration and payment scenarios.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8963094PMC
http://dx.doi.org/10.3390/s22041344DOI Listing

Publication Analysis

Top Keywords

iot device
24
iot devices
20
iot
16
integration payment
12
device integration
8
iot applications
8
applications find
8
integrate pay
8
pay iot
8
device
5

Similar Publications

Over the past decade, there has been a global increase in the incidence of skin cancers. Skin cancer has serious consequences if left untreated, potentially leading to more advanced cancer stages. In recent years, deep learning based convolutional neural network have emerged as powerful tools for skin cancer detection.

View Article and Find Full Text PDF

The intelligent selenium-enriched tea withering control system.

Sci Rep

January 2025

College of Intelligent Systems Science and Engineering, Hubei Minzu University, Enshi, 445000, China.

This paper addresses the low level of intelligence in tea processing equipment in Enshi Prefecture by designing an intelligent withering control system based on the STMicroelectronics 32-bit Microcontroller (STM32). This control system can achieve real-time monitoring of the withering environment and automate the control of heating and ventilation dehumidification modules. By integrating IoT technology, relevant users can view the tea production process via mobile devices, enabling intelligent and remote production operations.

View Article and Find Full Text PDF

The rapid development of internet of things (IoT) urgently needs edge miniaturized computing devices with high efficiency and low-power consumption. In-sensor computing has emerged as a promising technology to enable in-situ data processing within the sensor array. Here, we report an optoelectronic array for in-sensor computing by integrating photodiodes (PDs) with resistive random-access memories (RRAMs).

View Article and Find Full Text PDF

The Internet of Things (IoT)-based smart solutions have been developed to predict water quality and they are becoming an increasingly important means of providing efficient solutions through communication technologies. IoT systems are used for enabling connection between various devices based on the ability to gather and collect information. Furthermore, IoT systems are designed to address the environment and the automation industry.

View Article and Find Full Text PDF

Smart devices are enabled via the Internet of Things (IoT) and are connected in an uninterrupted world. These connected devices pose a challenge to cybersecurity systems due attacks in network communications. Such attacks have continued to threaten the operation of systems and end-users.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!