SlideShare ist ein Scribd-Unternehmen logo
1 von 3
A Decentralized Instant Messaging System
of Internet of Things Base on Block Chain
Technology
ABSTRACT
Bitcoin block chain technology architecture is emerging based on
decentralized technology, which is the main innovation of Bitcoin.
There are lots of applications based on block chain technology, such
as Bitcoin, Bitshares and IBM ADEPT systems in the Internet Finance
field. But there is not too many application and literature related to
the block chain on the Internet of Things. Applying the block chain
technology of decentralization on the Internet of Things, which could
work without a centralized server. It has many advantages, such as
high security, anti-counterfeiting, peer nodes, and undeniably digital
signatures.
There are lots of problems with the Internet of Things and instant
messaging system:
1. There are more and more nodes with the development of the
Internet of Things. We need to build a safe, reliable connection and
communication between the nodes and have good robustness and anti-
aggressive.
2. Traditional instant messaging system has the problem of
centralized server architecture, information storage, transmission
possibly leaking, identity forgery and so on.
This paper focuses on two aspects of these problems. The main work
is summarized as follows:
1. Analyzed the advantages and disadvantages of the traditional
star network of centralized network architecture. Proposed to create
a peer to peer network based on block chain technology. This network
has a multi-node communication system, which doesn't need a central
server of administration.
2. Block chain for networking applications in some of the smaller
equipment storage space, this paper proposed the concept of full nodes
and light nodes. Full nodes store all the messages of blocks, and the
light nodes processing the message without store the block chain, which
could meet the growing demand of memory storage. Full nodes include
complete block chain, generate a new block of block chain, receive the
information which is light nodes sending, receiving and forwarding
information. Light nodes have a complete business process logic
functions, but only have a network of reception, as well as a small
amount of computing power and storage space for things some have low
storage capacity and computing device application scenarios.
3. In response to the industry's expectations of Internet of Things
based on the block chain technology. This paper proposed a complete
model based on block chain, and an instant messaging system is built
based on this model. And the system is simulated and verified.
4. To solve the problem of the real-time communication, information
leaking in storage and how to establish a proper trust model and other
issues in peer P2P networks ,the tile-based chain of IOT model
established by this article, is a credible peer P2P network trust model,
to achieve a safe and reliable public key encryption algorithm
asymmetric exchange mechanism. Block chain by way of open public key
technology node and the node name and bind, thus ensuring the data
during transmission and storage confidentiality, as well as the message
sender's repudiation of its signature.
This paper is divided into five chapters: Chapter 1 described the
research background, methods and content; the second chapter analyzed
the main features and technical architecture bitcoin block chain
technology; the third chapter designed the architecture of the Internet
of Things based on block chain; Chapter 4 designed and validated a
decentralized instant messaging system, based on the application of
the Internet of Things of block chain. And Chapter 5 draw the
conclusions and outlook, and summarized the advantages and
disadvantages of the block chain technology.
Keywords Bitcoin, Block chain, Decentralization, the Internet
of Things, Instant messaging

Weitere ähnliche Inhalte

Was ist angesagt?

Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Adz91 Digital Ads Pvt Ltd
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformNexgen Technology
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloudinventionjournals
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityIGEEKS TECHNOLOGIES
 
IRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of TechnologyIRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of TechnologyIRJET Journal
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformredpel dot com
 
Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...JPINFOTECH JAYAPRAKASH
 
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic EncryptionThreat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic Encryptionijcisjournal
 
Towards a Design Philosophy for Interoperable Blockchain Systems
Towards a Design Philosophy for Interoperable Blockchain SystemsTowards a Design Philosophy for Interoperable Blockchain Systems
Towards a Design Philosophy for Interoperable Blockchain Systemseraser Juan José Calderón
 
Strong zero knowledge authentication based on the session keys (sask)
Strong zero knowledge authentication based on the session keys (sask)Strong zero knowledge authentication based on the session keys (sask)
Strong zero knowledge authentication based on the session keys (sask)IJNSA Journal
 
Privacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential DatabasePrivacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential Databaseijdmtaiir
 
Blockchain an introduction
Blockchain an introduction Blockchain an introduction
Blockchain an introduction Kaveen Rodrigo
 
Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...IEEEFINALYEARPROJECTS
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudIJSRD
 
Encryption-Decryption of Email
Encryption-Decryption of EmailEncryption-Decryption of Email
Encryption-Decryption of EmailShashank Singhal
 
Open Source Platforms Integration for the Development of an Architecture of C...
Open Source Platforms Integration for the Development of an Architecture of C...Open Source Platforms Integration for the Development of an Architecture of C...
Open Source Platforms Integration for the Development of an Architecture of C...Eswar Publications
 
eGov2017 Blockchain Technology
eGov2017 Blockchain TechnologyeGov2017 Blockchain Technology
eGov2017 Blockchain TechnologyVestforsk.no
 

Was ist angesagt? (20)

Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
 
Preserving Privacy Policy- Preserving public auditing for data in the cloud
	Preserving Privacy Policy- Preserving public auditing for data in the cloud	Preserving Privacy Policy- Preserving public auditing for data in the cloud
Preserving Privacy Policy- Preserving public auditing for data in the cloud
 
2nd rvw
2nd rvw2nd rvw
2nd rvw
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
IRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of TechnologyIRJET-Blockchain the New Era of Technology
IRJET-Blockchain the New Era of Technology
 
Secure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platformSecure sensitive data sharing on a big data platform
Secure sensitive data sharing on a big data platform
 
Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...
 
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic EncryptionThreat Modeling of Cloud based Implementation of Homomorphic Encryption
Threat Modeling of Cloud based Implementation of Homomorphic Encryption
 
Towards a Design Philosophy for Interoperable Blockchain Systems
Towards a Design Philosophy for Interoperable Blockchain SystemsTowards a Design Philosophy for Interoperable Blockchain Systems
Towards a Design Philosophy for Interoperable Blockchain Systems
 
Groupchain
GroupchainGroupchain
Groupchain
 
Strong zero knowledge authentication based on the session keys (sask)
Strong zero knowledge authentication based on the session keys (sask)Strong zero knowledge authentication based on the session keys (sask)
Strong zero knowledge authentication based on the session keys (sask)
 
Privacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential DatabasePrivacy-Preserving Updates to Anonymous and Confidential Database
Privacy-Preserving Updates to Anonymous and Confidential Database
 
Blockchain an introduction
Blockchain an introduction Blockchain an introduction
Blockchain an introduction
 
Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
 
Encryption-Decryption of Email
Encryption-Decryption of EmailEncryption-Decryption of Email
Encryption-Decryption of Email
 
Open Source Platforms Integration for the Development of an Architecture of C...
Open Source Platforms Integration for the Development of an Architecture of C...Open Source Platforms Integration for the Development of an Architecture of C...
Open Source Platforms Integration for the Development of an Architecture of C...
 
eGov2017 Blockchain Technology
eGov2017 Blockchain TechnologyeGov2017 Blockchain Technology
eGov2017 Blockchain Technology
 

Andere mochten auch

تعلم الحب والرومانسية مع سيراميك رويال
تعلم الحب والرومانسية مع سيراميك رويالتعلم الحب والرومانسية مع سيراميك رويال
تعلم الحب والرومانسية مع سيراميك رويالMona Ali
 
ECIS Standards-Based Assessment Pre-Conference
ECIS Standards-Based Assessment Pre-ConferenceECIS Standards-Based Assessment Pre-Conference
ECIS Standards-Based Assessment Pre-ConferenceSue Williams
 
Cibermedios
CibermediosCibermedios
Cibermedioscamiv909
 
Reflecting on Critical Incident 2; Pool Alarm
Reflecting on Critical Incident 2; Pool AlarmReflecting on Critical Incident 2; Pool Alarm
Reflecting on Critical Incident 2; Pool Alarmajones2104
 
CSUSA_Final 2014-2015 Annual Report_web
CSUSA_Final 2014-2015 Annual Report_webCSUSA_Final 2014-2015 Annual Report_web
CSUSA_Final 2014-2015 Annual Report_webJavier Peña
 
alltel 1Q 08_Supplement
alltel  1Q 08_Supplementalltel  1Q 08_Supplement
alltel 1Q 08_Supplementfinance27
 
Алексей СМИРНОВ "Монетизация СМИ через продажу подписки. От привлечения до уд...
Алексей СМИРНОВ "Монетизация СМИ через продажу подписки. От привлечения до уд...Алексей СМИРНОВ "Монетизация СМИ через продажу подписки. От привлечения до уд...
Алексей СМИРНОВ "Монетизация СМИ через продажу подписки. От привлечения до уд...Sergey Sus
 
Presentación1 historia de la penicilina
Presentación1 historia de la penicilinaPresentación1 historia de la penicilina
Presentación1 historia de la penicilinaERIKAMUYULEMA
 
The Legacy of Nobody Smith
The Legacy of Nobody SmithThe Legacy of Nobody Smith
The Legacy of Nobody Smithsharon cosgrove
 
Tecnología educativa
Tecnología educativaTecnología educativa
Tecnología educativamgcalderon12
 
Presentaciones en power point
Presentaciones en power pointPresentaciones en power point
Presentaciones en power pointLizzeth Torres
 
20151110 nme dag-danny-wildemeersch
20151110 nme dag-danny-wildemeersch20151110 nme dag-danny-wildemeersch
20151110 nme dag-danny-wildemeerschNadia Van Dessel
 
Fashion Marketing Week 7
Fashion Marketing Week 7Fashion Marketing Week 7
Fashion Marketing Week 7janemonkey
 

Andere mochten auch (15)

تعلم الحب والرومانسية مع سيراميك رويال
تعلم الحب والرومانسية مع سيراميك رويالتعلم الحب والرومانسية مع سيراميك رويال
تعلم الحب والرومانسية مع سيراميك رويال
 
ECIS Standards-Based Assessment Pre-Conference
ECIS Standards-Based Assessment Pre-ConferenceECIS Standards-Based Assessment Pre-Conference
ECIS Standards-Based Assessment Pre-Conference
 
Cibermedios
CibermediosCibermedios
Cibermedios
 
Reflecting on Critical Incident 2; Pool Alarm
Reflecting on Critical Incident 2; Pool AlarmReflecting on Critical Incident 2; Pool Alarm
Reflecting on Critical Incident 2; Pool Alarm
 
CSUSA_Final 2014-2015 Annual Report_web
CSUSA_Final 2014-2015 Annual Report_webCSUSA_Final 2014-2015 Annual Report_web
CSUSA_Final 2014-2015 Annual Report_web
 
alltel 1Q 08_Supplement
alltel  1Q 08_Supplementalltel  1Q 08_Supplement
alltel 1Q 08_Supplement
 
Quick and Simple Methods to Integrate GRE and GMAT Purchases with your CRM Sy...
Quick and Simple Methods to Integrate GRE and GMAT Purchases with your CRM Sy...Quick and Simple Methods to Integrate GRE and GMAT Purchases with your CRM Sy...
Quick and Simple Methods to Integrate GRE and GMAT Purchases with your CRM Sy...
 
Алексей СМИРНОВ "Монетизация СМИ через продажу подписки. От привлечения до уд...
Алексей СМИРНОВ "Монетизация СМИ через продажу подписки. От привлечения до уд...Алексей СМИРНОВ "Монетизация СМИ через продажу подписки. От привлечения до уд...
Алексей СМИРНОВ "Монетизация СМИ через продажу подписки. От привлечения до уд...
 
Presentación1 historia de la penicilina
Presentación1 historia de la penicilinaPresentación1 historia de la penicilina
Presentación1 historia de la penicilina
 
The Legacy of Nobody Smith
The Legacy of Nobody SmithThe Legacy of Nobody Smith
The Legacy of Nobody Smith
 
Diegobcartelsida
DiegobcartelsidaDiegobcartelsida
Diegobcartelsida
 
Tecnología educativa
Tecnología educativaTecnología educativa
Tecnología educativa
 
Presentaciones en power point
Presentaciones en power pointPresentaciones en power point
Presentaciones en power point
 
20151110 nme dag-danny-wildemeersch
20151110 nme dag-danny-wildemeersch20151110 nme dag-danny-wildemeersch
20151110 nme dag-danny-wildemeersch
 
Fashion Marketing Week 7
Fashion Marketing Week 7Fashion Marketing Week 7
Fashion Marketing Week 7
 

Ähnlich wie A Decentralized Instant Messaging System

IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...IRJET Journal
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBiagio Botticelli
 
Blockchain development security sharpening the cloud security
Blockchain development security  sharpening the cloud securityBlockchain development security  sharpening the cloud security
Blockchain development security sharpening the cloud securityMoon Technolabs Pvt. Ltd.
 
InfiniteChain White Paper
InfiniteChain White Paper InfiniteChain White Paper
InfiniteChain White Paper InfiniteChain
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET Journal
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain ConvergenceAhmed Banafa
 
Internet of Things 10 (2020) 10 0 081 Contents lists avail.docx
Internet of Things 10 (2020) 10 0 081 Contents lists avail.docxInternet of Things 10 (2020) 10 0 081 Contents lists avail.docx
Internet of Things 10 (2020) 10 0 081 Contents lists avail.docxLaticiaGrissomzz
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainAltoros
 
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET Journal
 
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET Journal
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET Journal
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksAhmed Banafa
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET Journal
 
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...AlAtfat
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...AlAtfat
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...AlAtfat
 
jayesh_Blockchain.pptx
jayesh_Blockchain.pptxjayesh_Blockchain.pptx
jayesh_Blockchain.pptxJackTheMan1
 

Ähnlich wie A Decentralized Instant Messaging System (20)

Case Study Layar
Case Study LayarCase Study Layar
Case Study Layar
 
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
IRJET- Probabilistic Stress Distribution in Thick Cylindrical Pipe using Fini...
 
Blockchain for IoT - Smart Home
Blockchain for IoT - Smart HomeBlockchain for IoT - Smart Home
Blockchain for IoT - Smart Home
 
Blockchain development security sharpening the cloud security
Blockchain development security  sharpening the cloud securityBlockchain development security  sharpening the cloud security
Blockchain development security sharpening the cloud security
 
InfiniteChain White Paper
InfiniteChain White Paper InfiniteChain White Paper
InfiniteChain White Paper
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
Internet of Things 10 (2020) 10 0 081 Contents lists avail.docx
Internet of Things 10 (2020) 10 0 081 Contents lists avail.docxInternet of Things 10 (2020) 10 0 081 Contents lists avail.docx
Internet of Things 10 (2020) 10 0 081 Contents lists avail.docx
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using Blockchain
 
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain NetworksIRJET-  	  Consensus Mechanism on Secure Challenges in Blockchain Networks
IRJET- Consensus Mechanism on Secure Challenges in Blockchain Networks
 
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
IRJET- A Survey on IoT Reference Architecture with Block Chain for Automatic ...
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
 
What Web 2.pdf
What Web 2.pdfWhat Web 2.pdf
What Web 2.pdf
 
IoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and RisksIoT and Blockchain Challenges and Risks
IoT and Blockchain Challenges and Risks
 
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum BlockchainIRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
IRJET- Photogroup: Decentralized Web Application using Ethereum Blockchain
 
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
 
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
Blockchain-Based Internet of Things: Review, Current Trends, Applications, an...
 
jayesh_Blockchain.pptx
jayesh_Blockchain.pptxjayesh_Blockchain.pptx
jayesh_Blockchain.pptx
 

A Decentralized Instant Messaging System

  • 1. A Decentralized Instant Messaging System of Internet of Things Base on Block Chain Technology ABSTRACT Bitcoin block chain technology architecture is emerging based on decentralized technology, which is the main innovation of Bitcoin. There are lots of applications based on block chain technology, such as Bitcoin, Bitshares and IBM ADEPT systems in the Internet Finance field. But there is not too many application and literature related to the block chain on the Internet of Things. Applying the block chain technology of decentralization on the Internet of Things, which could work without a centralized server. It has many advantages, such as high security, anti-counterfeiting, peer nodes, and undeniably digital signatures. There are lots of problems with the Internet of Things and instant messaging system: 1. There are more and more nodes with the development of the Internet of Things. We need to build a safe, reliable connection and communication between the nodes and have good robustness and anti- aggressive. 2. Traditional instant messaging system has the problem of centralized server architecture, information storage, transmission possibly leaking, identity forgery and so on. This paper focuses on two aspects of these problems. The main work is summarized as follows: 1. Analyzed the advantages and disadvantages of the traditional star network of centralized network architecture. Proposed to create a peer to peer network based on block chain technology. This network has a multi-node communication system, which doesn't need a central
  • 2. server of administration. 2. Block chain for networking applications in some of the smaller equipment storage space, this paper proposed the concept of full nodes and light nodes. Full nodes store all the messages of blocks, and the light nodes processing the message without store the block chain, which could meet the growing demand of memory storage. Full nodes include complete block chain, generate a new block of block chain, receive the information which is light nodes sending, receiving and forwarding information. Light nodes have a complete business process logic functions, but only have a network of reception, as well as a small amount of computing power and storage space for things some have low storage capacity and computing device application scenarios. 3. In response to the industry's expectations of Internet of Things based on the block chain technology. This paper proposed a complete model based on block chain, and an instant messaging system is built based on this model. And the system is simulated and verified. 4. To solve the problem of the real-time communication, information leaking in storage and how to establish a proper trust model and other issues in peer P2P networks ,the tile-based chain of IOT model established by this article, is a credible peer P2P network trust model, to achieve a safe and reliable public key encryption algorithm asymmetric exchange mechanism. Block chain by way of open public key technology node and the node name and bind, thus ensuring the data during transmission and storage confidentiality, as well as the message sender's repudiation of its signature. This paper is divided into five chapters: Chapter 1 described the research background, methods and content; the second chapter analyzed the main features and technical architecture bitcoin block chain technology; the third chapter designed the architecture of the Internet of Things based on block chain; Chapter 4 designed and validated a decentralized instant messaging system, based on the application of the Internet of Things of block chain. And Chapter 5 draw the conclusions and outlook, and summarized the advantages and disadvantages of the block chain technology.
  • 3. Keywords Bitcoin, Block chain, Decentralization, the Internet of Things, Instant messaging