• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services

    2019-07-18 01:58:42DaeYoungKimSeDongMinandSeokhoonKim
    Computers Materials&Continua 2019年7期

    Dae-Young Kim, Se Dong Min and Seokhoon Kim ,

    Abstract: The importance of Blockchain and IoT technology have been highlighted in various fields.These are not unaccustomed words anymore in our lives.Although the technologies are in the infancy step and are still many remaining technical challenges, there is no doubt that it will be one of the major parts of the future Internet.The efficiency and security of data transmission scheme have always been major issues in the legacy Internet, and a data transmission scheme for the future Internet, including 5G and IoT environment should also provide and support these issues.Consequently, we propose a new data transmission scheme to successfully support the future Internet environment.The proposed scheme, which is named as S-DTS (Secure Data Transmission Scheme), supports a distributed transmission and decentralized access control.The S-DTS utilizes 4 synchronization zones, which are IoT network zone, aggregation zone, mining zone, and management zone, and these zones are operated by the DPN (Delegated Proof of Node) mechanism.Furthermore, all nodes are categorized to the 3 node groups, LDTG (Low Delay Tolerance Group), MDTG (Medium Delay Tolerance Group), HDTG (High Delay Tolerance Group), to provide an efficient data transmission, and the data in each group will be transmitted in accordance with their own traffic attributes.The evaluation results of this scheme show that it is very suitable for massive IoT environment scenarios, and IoT devices can take advantage of safe and efficient transmission by using the delegated proof of node technique.In addition, the S-DTS might be adaptable for various computing and networking environment with big data, edge cloud and cloud computing, and autonomous networking.

    Keywords: Data transmission scheme, blockchain, delegated proof of node, public IoT service, synchronization.

    1 Introduction

    Nowadays, the 4th Industrial Revolution, which is based on various intelligent information technologies such as IoT, Cloud, Bigdata, Mobile, Security, has been an inevitable phenomenon [Mohaisen, Mekky, Zhang et al.(2015); Scriber (2018)].These technologies have been widely deployed to provide various services, and it has been one of the key factors of infrastructures in the various industrial fields, especially the future Internet.Among these technologies, the IoT technologies and its devices are main trigger to lead the new paradigm, because most of data in the future Internet environment will be generated by the IoT devices.As a well-known, the IoT related services have already influenced to the related business, and it has been created new global markets.In addition, the data, which are generated from multitudinous IoT devices, will be fundamental data to apply to creative services [Fang, Yao, Wang et al.(2018); Lin, He, Huang et al.(2018)].Although the IoT technologies have been rapidly evolving in the past years, there are still a lot of technical challenges.Besides that, the network architecture in IoT environment has some important problems in terms of centralization and hierarchy.Generally, the IoT network architecture is very similar to the legacy Internet architecture, because it has been evolved in the expanded form of the existing architecture.It is also analogous in the aspect of the data transmission scheme.However, the legacy network architecture and data transmission scheme are not adequate for the IoT environment, because most of IoT devices with various constraints differ from legacy Internet nodes in computing power, power consumption, and so on.To solve these problems, the architecture and data transmission scheme can have to support a decentralized and distributed accessibility in the IoT environment.Moreover, the architecture and data transmission scheme are more easily to embrace numerous IoT devices, which has various limitations [Kim and Kim (2017); Ryoo, Na and Kim (2015); Kang, Yu, Huang et al.(2017); Zhang, Wang, Wang et al.(2018)].

    In this paper, we propose a new secured data transmission scheme for various IoT services.The proposed scheme is based on a delegated proof of node, which is very similar to the blockchain technology.By adopting delegated proof of node, the proposed scheme not only supports a secure transmission in IoT environment, but also provides an efficient data forwarding by using accurate and precise synchronization within their synchronization zone.By doing this, it can support decentralized access and control, distributed information and authority, secured and efficient data forwarding, and so on.

    The remainder of this paper is organized as follows.In Section 2, related works on IoT architecture and service are described, and the proposed scheme and its performance evaluation are discussed in Section 3 and Section 4, respectively.Finally, finally Section 5 is brought to concluding remarks.

    2 Related works

    2.1 Consensus algorithms

    In the blockchain system, all nodes must keep the same transaction records for the transaction.To do this, the blockchain system uses consensus algorithms, which are consisted of the proving work of the transaction and the selecting policy of the block.Although there are some differences between permissionless and permissioned blockchain, the consensus algorithms are certainly needed to achieve a goal of blockchain technology for providing a decentralized control and distributed information [Yim, Yoo, Kwak et al.(2018); Yu, Arifuzzaman, Wen et al.(2015)].However, these consensus algorithms in the permissionless blockchain system have many limitations in terms of performance, power consumption and so on.There are some works to surmount these limitations in the past a few years, and these are followings.

    2.1.1 PoW (Proof of Work)

    As a well-known, the PoW is a mechanism, which is operated to find a specific hash value to create a new block in the blockchain system [Christidis and Devetsikiotis (2016)].In the mechanism, the miners have to compete to discover the hash value, and then a new block will be created whenever a specific miner finds a defined hash value.In the bitcoin system, the hash value is expressed as followings.

    where hash (Block) is the hash value of the block, D is the difficulty, and Max is the maximum value of difficulty (D, 2256-1).The difficulty of hash value will be periodically adjusted to keep the new block creation cycle in the bitcoin system.Notwithstanding the bitcoin system is using the random block creation mechanism, the fork status, which has 2 or more children blocks concurrently, can be generated.In this case, the bitcoin system will choose the longest chain to solve the discordance of blockchain.

    2.1.2 PoS (Proof of Stake)

    The PoS was proposed one of the alternatives of the PoW to settle a high energy consumption, it is also one of the consensus algorithms to reflect holding asset of participants [Li, Liu, Cheng et al.(2018); Cebe, Erdin, Akkaya et al.(2018)].In the PoS mechanism, miners can create a new block in accordance with their holding asset, and it is different from the PoW in this aspect.The hash function in the PoS mechanism is expressed as followings:

    where Blockprevis the previous block, A is the address, TS is the timestamp, Bal (A) is the balance of address A, and Max and D are the same as the PoW hash.As shown in the expression (2), stakeholders with many holding assets can easily make a new block.In this mechanism, there are some compensation methods of applying the coin age and weight because rich stakeholders have always advantage than the others.Although these compensation methods have been developed to revise a block generation ratio, there are still weak points in the PoS mechanism which cannot quickly make a valid consensus.The DPoS (Delegated Proof of Stake) mechanism was suggested to resolve the weak points.In the DPoS mechanism, a stakeholder delegates their block generation authority to a delegator by using an election system, and then the delegators will generate the new valid block and verify the consensus.Consequently, the DPoS is used to the various recent system because it can reduce cost and time than the other mechanisms [Uriarte and De Nicola (2018); Rosa and Rothenberg (2018)].

    2.1.3 PoET (Proof of Elapsed Time)

    The PoET is a latest mechanism which can reduce energy consumption and guarantee analogous security level to the PoW.The PoET is a kind of consensus algorithm based on the security module (Intel SGX).In the PoET mechanism, many practicable nodes will be participated to elect a leader fairly and efficiently.It uses the CPU commands to provide randomness and security when the nodes elect a leader.Although the PoET can provide a robustness of valid consensus, it has a disadvantage, which has to use an Intel SGX.

    2.2 Pub/Sub communications

    Nowadays, the ICN (Information Centric Networking) has been one of spotlighted networking technology.This networking technology is different from the legacy TCP/IP networking technology in aspect of data handling, and it works routing and forwarding based on the information name.In addition, it is more efficient than TCP/IP networking technology because it utilizes the information caching method in their networks.Therefore, the ICN technology will be a main infrastructure of the future Internet.In these evolution direction, Pub/Sub (Publish/Subscribe) communication scheme is one of main technology, which can improve the efficiency of future Internet [Wan, Yao, Jing et al.(2018); Zali, Hashemi, Cianci et al.(2018)].The Pub/Sub communication mechanism is an asynchronous communication method which the source and destination are divided into the publisher and subscriber, respectively.

    There are 3 conceptual points to divide into spatial side, temporal side, and synchronous side of this mechanism.Firstly, a publisher and a subscriber do not need to recognize each other in the spatial side.Secondly, they don't need to operate concurrently.This is a different feature in temporal side.Finally, in synchronous side, a publisher and subscriber can proceed a publication process and subscription process separately.The communication scheme between publisher and subscriber is shown in Fig.1.As shown in Fig.1, they use an event bus, and it supports an asynchronous event-driven transmission.

    It is very suitable for IoT communications because of these features.As well-known that the data in IoT environment will be commonly generated by designated events such as sensing, recognition, etc.It means that the generated data in IoT nodes need to transmit to their aggregation node by an asynchronous method, and it should work by using an eventdriven method depending on the events.There are some representative Pub/Sub technologies to successfully accomplish to data transmission features for IoT nodes, and it is MQTT (MQ Telemetry Transport), DDS (Data Distribution Service) and so on.Besides these technologies, there are some limelight Pub/Sub researches which are content-based Publish/Subscribe and ICN, COPSS (Content Oriented Publish/Subscribe System), PSync (Partial Synchronization), and notification in CCN (Content Centric Networking), etc.

    Figure 1: Pub/Sub communication scheme

    3 DPN (Delegated Proof of Node) mechanism

    The authority and auditability are very important issues in IoT services, because most of IoT applications will be utilized a decision based on the data from IoT devices.In addition, the aggregated data from IoT nodes can be used raw data to make a decision when they perform various learning algorithms.Hence, a data transmission scheme for IoT services should provide a secure and efficient route from the information publisher node to the information subscriber node.

    As mentioned before, a secure and efficient transmission scheme is very important regardless of legacy Internet and future Internet environment including various IoT services.It is why we propose a new secured transmission scheme.The proposed scheme mainly consists the 2 parts, one is the Delegated Proof of Node (DPoN), the other is the Secure Data Transmission Scheme (SDTS) which includes the DPoN.In this Section 3, we will be focused on the descriptions in terms of the proposed DPoN, the descriptions of SDTS will be discussed in the next Section 4.

    Figure 2: The Delegated proof node concept

    The proposed DPoN is very similar to the DPoS of blockchain technology.It also creates a blockchain using the delegation method from participating nodes.However, there are a few different points.The proposed DPoN does not consider to applying to a public blockchain.It means that the DPoN is focused on a service in a private blockchain.Most of the IoT devices have many limitations in terms of computational power, energy consumption, and their traffic characteristic.These are the main reasons why the IoT devices cannot perform the mining process of blockchain by themselves.A blockchain technology in the DPoN will be only used to verify and to authenticate to each other nodes dues to the fact that the reasons.Furthermore, there is no necessity to use a coin in the blockchain which is generated by DPoN.Although the proposed DPoN has the same problems as the DPoS which are unfair to create to a new block in the aspect of block generation opportunity, it does not important matter because its target is the private blockchain which will be used to support to a specific IoT service from various IoT service providers.

    As shown in Fig.2, the proposed DPoN has several zones, and it is divided into 4 zones, IoT network zone, Aggregation Zone, Mining Zone, and Management Zone, respectively.Each zone has the different roles and functionalities, and the details are as followings.

    3.1 IoT network zone

    The IoT network zone is a kind of networking area where various IoT nodes are existed.In the DPoN, the roles and functionalities of IoT network zone are same as common IoT networks.There are many IoT nodes, and the node types are varied as shown in Fig.2.Accordingly, they can easily join and detach to the IoT networks.The various IoT nodes, however, should be passed the authentication process to communicate with other nodes by using the DPoN mechanism, and this authentication process will be performed whenever they want to join or to detach to the IoT network.The IoT node will send an authentication_request message to a miner node via aggregation node.And then, the miner node will be sent an authentication_reply message to the IoT node with the authentication result.According to the authentication result, the IoT node can start their communications.Henceforth, the communications between IoT node and the aggregation node will be used the CoAP (Constrained Application Protocol).

    3.2 Aggregation zone

    The aggregation zone is an area where nodes gathering data of IoT nodes such as a sink node in an IoT network environment are congregated.Although there is only shown one type aggregating device in the Fig.2, the aggregation device types are varied depending on the IoT devices, which the aggregating device should manage to.In this area, the aggregation device not only carries out a role of the anchor node of diverse IoT devices, but also it performs aggregation and management of delegation permission from IoT nodes and delivers the delegation information of IoT node to the miner.However, the aggregation node with low computing power does not carry out the management role to provide an efficient transmission performance, it just performs the delivery role same as the legacy anchor node.In this case, the management role will be processed by the upper mining node.

    3.3 Mining zone

    The genesis block and additional block in this mechanism are needed to make a blockchain, like as common blockchain technology, and the genesis block will be created by one of the miners which is designated by a managing node.In this zone, there are many miner nodes which have enough computing power to make a blockchain, we called this area, mining zone.The mining node in this zone fulfills an authentication process of IoT nodes, whenever it receives the authenthication_request message from an IoT node.The miner node, which is received the authentication_request message, the received information is compared with the existing blockchain contents and node list.The blockchain contents have various information of nodes, which are included node ID, MAC address, duration, etc., and the node list contains a registered node information, which is gathered by an aggregating device.Since then, the miner node will create a new block in the blockchain, will send an authentication_reply message to the IoT node if the request information is valid, and will send a blockchain_update_request message to the management node.However, the miner node will send a reset message to the IoT node if not the request information is invalid.The hash function of this DPoN is also used to generate a new block, the expression is as followings.

    where Blockprevis the previous block, A is the address, TS is the timestamp, DnodeSTA (A) is the delegated stake of address A and, Max and D are the same as the PoW hash, respectively.The blockchain in the proposed DPoN is a kind of decentralized authentication and distributed transaction record, and a coin for compensation isn't need since the DPoN uses a private blockchain.In addition, the blockchain can be periodically reset by a management node to improve an efficiency and to save a storage space.Consequently, the DPoN can support very efficient and effective distributed authentication.

    3.4 Management zone

    This area is a supporting area to manage the DPoN.A management node can be a kind of server nodes, group of server nodes, or cloud.This management node or nodes will superintend a node list, crosschecking of the DPoN blockchain, designating a mining node for generating a genesis block, resetting the blockchain, and so on.In addition, the management node will set information for efficient data transmission for supporting a Pub/Sub mechanism and synchronized transmission scheme.

    The Fig.3 shows message processes in the proposed DPoN.As previously mentioned, the DPoN carries out the authentication process based on a blockchain.In these authentication processes, the delegation process of IoT node will be involved.As shown in Fig.3, an IoT node sends an authentication_request message with delegation information of the IoT node, an aggregating node will perform the verification of delegation and permission based on the node list.Since then, the aggregating node will send a SC_confirmation_request message to a miner node.The miner node carries out the verification about the smart contract, which will be supervised by a management node and be synchronized between miner nodes and management nodes, and it will create and update a new block.To this end, the miner node will send a SC_confirmation_reply message to the aggregating node and send a blockchain_update_request message to the management node.The remaining message processes for updating the blockchain and smart contract information, and data transmission of the IoT node are common as a legacy message process.

    Figure 3: Messaging process in the DPoN

    4 Secure data transmission scheme

    As mentioned before, the authority, auditability, and efficiency are very important issue in IoT environment.Although the proposed DPoN can be provided the authority and auditability to IoT nodes, there are still insufficient things in the aspect of efficiency.Consequently, a new data transmission scheme is needed to make up for the efficiency, which can be used with the DPoN, and this is the main reason why we propose the new data transmission scheme.To this end, we proposed an enhanced data transmission scheme which is suitable for various IoT environments, and it is named secured data transmission scheme (S-DTS).The proposed S-DTS basically is synchronized data transmission methods, however, it supports the Pub/Sub operations, which are asynchronized data transmission methods.It means that the starting point of data transmission will be controlled by Pub/Sub mechanism, which is more suitable for IoT environment.However, the S-DTS utilizes a synchronization transmission scheme after the transmission start for providing an efficient data transmission.

    The concept of proposed S-DTS is fundamentally similar to the concept of S-DTA (Safe Data Transmission Architecture) [Kim and Na (2016)], EPC-DFS (Efficient Peer-to-Peer Context awareness Data Forwarding Scheme) [Kim and Suk (2016)], and ESD-DTS (Efficient Software Defined Data Transmission Scheme) [Kim and Kim (2018)].Although the S-DTS will be also operates synchronization zones same as the Kim et al.[Kim and Na (2016); Kim and Suk (2016); Kim and Kim (2018)], there are 3 different points mainly.Firstly, the S-DTS will be operated in synchronization zones which are different from the others.Secondly, the S-DTS utilizes new synchronization formulas when it sets up a synchronization time, as expressed in the equations below.

    where enis an electronic delay of node n, pnis a processing delay of node n, snis a serialization delay of node n, tnis a transmission delay of node n, and TInis a time interval of node n for using the Pub/Sub mechanism.Therefore, the delay of arbitrary node i and the source-to-destination delay of all nodes are expressed as follows.

    Based on these expressions (4), (5), and (6), the value of the synchronization initiation message (SIMset) in the S-DTS can be set as follows.

    where, Rnis the number of repetitions, SCMiis the synchronization calculation message (SCM) of node i, ETiis the error tolerance of node i.

    As previously stated, the basic scheme of S-DTS is almost same as the ESD-DTS, and the detailed procedures are described in Kim et al.[Kim and Kim (2018)].The S-DTS accomplishes the synchronization processes by using SIMs.Although the SDN controller handles these SIMs in the ESD-DTS, the SIMs will be controlled by a management node in the S-DTS.And finally, the S-DTS is based on the DPoN mechanism, it is the most different point than the other schemes.As shown in expression (4), (5), (6) and (7), the value of TInis for utilizing DPoN mechanism in the synchronization processes.Therefore, all nodes, which are utilized the DPoN mechanism and are joined to the networks, can securely transmit to their data.

    5 Performance evaluation

    As is well-known, IoT services should consider various service scenarios, because IoT service environment is very dynamic and diverse.Consequently, we have divided the node type into 3 categories to reflect the IoT usage scenarios, and the 3 node types, HDTG (High Delay Tolerance Group), MDTG (Medium Delay Tolerance Group), and LDTG (Low Delay Tolerance Group), are described in the Tab.1.In addition, we have carried out the computer simulations to verify the proposed S-DTS performance in various environments.In this simulation, we perform comparisons with EP-DFS, S-DTA, ESD-DTS in the aspect of throughput, latency, and accessibility.This is because the proposed S-DTS is a kind of the evolved version of these schemes, EP-DFS, S-DTA, and ESD-DTS.Although there are 3 node types as shown in Tab.1, we have only used 2 node types, LDTG and MDTG, to measure the throughput and latency in the simulations.These features are not important issue for HDTG, therefore we don't perform the measurements.Hence, we have performed the measurement of accessibility for HDTG.The accessibility feature is more important than throughput and latency, because the node, which is belong to the HDTG, should effectively utilize the limited resources such as power consumption, waking time.Therefore, we have performed the accessibility measurements for the HDTG in the simulations.There are 50 nodes for each LDTG and MDTG in the source side in the simulation topology and the destination side have included 5 nodes.In addition, there is 1 server for supporting the edge computing in the destination side and the simulation topology of LDTG and MDTG are same.In the throughput and latency measurement simulations, the maximum bandwidth has been set to 15,728,640 bps (15 Mbps) for the nodes of LDTG and has been set to 327,680 bps (320 Kbps) for the nodes of MDTG.In addition, the streaming traffic type, which has high delay sensitivity, has been used the simulations, because we should verify the throughput and latency aspect.

    Table 1: Node Types in the Simulations

    Figure 4: Throughput Comparisons with EP-DFS, S-DTA, and ESD-DTS

    Fig.4 shows average throughput comparisons with EP-DFS, S-DTA, and ESD-DTS.The (a) of Fig.4 shows an average throughput comparison for LDTG, the (b) of Fig.4 demonstrates an average throughput comparison for MDTG.As shown in Fig.4, the average throughput of LDTG and MDTG have not only been slightly increased than the ESD-DTS, but also been reasonably increased than the EP-DFS and S-DTA.Additionally, we have been performed the latency comparisons with other schemes, as shown in Fig.5.It has been demonstrated in the results of these comparisons, which are also similar to the throughput comparisons, and the average latency of LDTG and MDTG have also been improved than the others.

    Figure 5: Latency Comparisons with EP-DFS, S-DTA, and ESD-DTS

    Although the DPN mechanism has been added to the S-DTS, the S-DTS did not degrade than the other schemes in terms of throughput and latency.It means that, the S-DTS has been more efficient mechanism than the others, and the synchronization process and method have been more optimized than the others.

    Contrariwise, the simulation topology for HDTG is differ to LDTG and MDTG.There are 500 nodes for HDTG, these nodes have randomly distributed to the source side by using the Poisson Distribution Model.The detailed reference parameters and variables are shown in the Tab.2.

    Table 2: Reference parameters and variables for HDTG

    In the simulations for HDTG, we did not measure the throughput, because these aren't an important attribute for the nodes of HDTG [Novo (2018)].Therefore, we provided the simulations in the aspect of timeout in place of the throughput.However, we didn't show the results of timeout ratio measurement, because all schemes have been represented almost same results which are around 47%.

    Fig.6 shows a latency comparison with other schemes for HDTG.It is also similar for the LDTG and MDTG, and this figure demonstrates outperform results than the others.Although the S-DTS consists more complex mechanism than the other schemes, it has been performed outstanding results.It also means that the S-DTS can support various traffic conditions, even though the nodes have the very high delay tolerance.Consequently, the S-DTS can provide and support diverse data transmission ways, and it is more suitable for massive future Internet environments including IoT and 5G.

    6 Concluding remarks

    The proposed secured data transmission scheme is mainly consisted 2 parts, one is the delegated proof of node method which is based on a blockchain technology, and the other is the synchronized data transmission mechanism which is supported a Pub/Sub method and operated time synchronization zone.The proposed S-DTS is very suitable for various IoT environments, which is a novel, secure, and scalable.Furthermore, it has not only a decentralized and distributed architecture, but also a secured and efficient data transmission scheme.The superiority of S-DTS has been already demonstrated by various performance evaluations.Consequently, IoT nodes can safely and efficiently transmit their data, and utilize diverse services, through the S-DTS.In addition to this, we will intend to address more efficient and secure data transmission architecture, and we will upgrade a function of management node for supporting more autonomous computing and networking in further researches.Finally, we will proceed the furthermore study for combination of SDN technology and DPoN technology.

    Acknowledgement:This research was supported by the MSIT (Ministry of Science, ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2018-2015-0-00403) supervised by the IITP (Institute for Information & Communications Technology Promotion), and this work was supported by the Soonchunhyang University Research Fund.

    Figure 6: Latency Comparison with EP-DFS, S-DTA, and ESD-DTS for HDTG

    References

    Cebe, M.; Erdin, E.; Akkaya, K.; Aksu, H.; Uluagac, S.(2018): Block4Forensic: an integrated lightweight blockchain framework for forensics applications of connected vehicles.IEEE Communications Magazine, vol.56, no.10, pp.50-57.

    Christidis, K.; Devetsikiotis, M.(2016): Blockchains and smart contracts for the Internet of Things.IEEE Access, vol.4, no.1, pp.2292-2303.

    Fang, C.; Yao, H.; Wang, Z.; Wu, W.; Jin, X.et al.(2018): A survey of mobile information centric networking: research issues and challenges.IEEE Communications Surveys & Tutorials, vol.20, no.3, pp.2353-2371.

    Kang, J.; Yu, R.; Huang, X.; Maharjan, S.; Zhang, Y.et al.(2017): Enabling localized peer-to-peer electricity trading among plug-in hybrid electric vehicles using consortium blockchains.IEEE Transactions on Industrial Informatics, vol.13, no.6, pp.3154-3164.

    Kim, D.Y.; Kim, S.(2017): Dual-channel medium access control of low power wide area networks considering traffic characteristics in IoE.Cluster Computing, vol.20, no.3, pp.2375-2384.

    Kim, E.; Kim, S.(2018): An efficient software defined data transmission scheme based on mobile edge computing for the massive IoT environment.KSII Transactions on Internet and Information Systems, vol.12, no.2, pp.974-987.

    Kim, S.; Na, W.(2016): Safe data transmission architecture based on cloud for Internet of Things.Wireless Personal Communications, vol.86, no.1, pp.287-300.

    Kim, S.; Suk, J.(2016): Efficient peer-to-peer context awareness data forwarding scheme in emergency situations.Peer-to-Peer Networking and Applications, vol.9, no.3, pp.477-486.

    Li, L.; Liu, J.; Cheng, L.; Qiu, S.; Wang, W.et al.(2018): CreditCoin: a privacypreserving blockchain-based incentive announcement network for communications of smart vehicles.IEEE Transactions on Intelligent Transportation Systems, vol.19, no.7, pp.2204-2220.

    Lin, C.; He, D.; Huang, X.; Khurram-Khan, M.; Choo, K.R.(2018): A new transitively closed undirected graph authentication scheme for blockchain-based identity management systems.IEEE Access, vol.6, no.1, pp.28203-28212.

    Mohaisen, A.; Mekky, H.; Zhang, X.; Xie, H.; Kim, Y.(2015): Timing attacks on access privacy in information centric networks and countermeasures.IEEE Transactions on Dependable and Secure Computing, vol.12, no.6, pp.675-687.

    Novo, O.(2018): Blockchain meets IoT: an architecture for scalable access management in IoT.IEEE Internet of Things Journal, vol.5, no.2, pp.1184-1195.

    Rosa, R.; Rothenberg, C.E.(2018): Blockchain-based decentralized applications for multiple administrative domain networking.IEEE Communications Standards Magazine, vol.2, no.3, pp.29-37.

    Ryoo, I.; Na, W.; Kim, S.(2015): Information exchange architecture based on software defined networking for cooperative intelligent transportation systems.Cluster Computing, vol.18, no.2, pp.771-782.

    Scriber, B.A.(2018): A framework for determining blockchain applicability.IEEE Software, vol.35, no.4, pp.70-77.

    Uriarte, R.B.; De Nicola, R.(2018): Blockchain-based decentralized cloud/fog solutions: challenges, opportunities, and standards.IEEE Communications Standards Magazine, vol.2, no.3, pp.22-28.

    Wan, M.; Yao, J.; Jing, Y.; Jin, X.(2018): Event-based anomaly detection for non-public industrial communication protocols in SDN-based control systems.Computers, Materials & Continua, vol.55, no.3, pp.447-463.

    Yim, J.C.; Yoo, K.H.; Kwak, J.Y.; Kim, S.M.(2018): Blockchain and consensus algorithm.Electronics and Telecommunications Trends, vol.33, no.1, pp.45-56.

    Yu, K.; Arifuzzaman, M.; Wen, Z.; Zhang, D.; Sato, T.(2015): A key management scheme for secure communications of information centric advanced metering infrastructure in smart grid.IEEE Transactions on Instrumentation and Measurement, vol.64, no.8, pp.2072-2085.

    Zali, Z.; Hashemi, M.R.; Cianci, I.; Grieco, A.; Boggia, G.(2018): A controller-based architecture for information centric network construction and topology management.China Communications, vol.15, no.7, pp.131-145.

    Zhang, J.J.; Wang, F.Y.; Wang, X.; Xiong, G.; Zhu, F.et al.(2018): Cyber-physicalsocial systems: the state of the art and perspectives.IEEE Transactions on Computational Social Systems, vol.5, no.3, pp.829-840.

    色综合亚洲欧美另类图片| 久久久久国内视频| 直男gayav资源| 欧美激情在线99| 在线观看免费视频日本深夜| 色视频www国产| 免费看a级黄色片| 亚洲性久久影院| 99久国产av精品国产电影| 亚洲自偷自拍三级| 欧美日韩综合久久久久久| 人妻久久中文字幕网| 日本免费a在线| .国产精品久久| 欧美另类亚洲清纯唯美| 校园人妻丝袜中文字幕| 身体一侧抽搐| 欧美一级a爱片免费观看看| 一本久久中文字幕| av免费在线看不卡| .国产精品久久| 成年av动漫网址| 日本与韩国留学比较| 尤物成人国产欧美一区二区三区| 色哟哟·www| 精品人妻偷拍中文字幕| 亚洲欧美日韩高清在线视频| 99九九线精品视频在线观看视频| 国内精品美女久久久久久| 亚洲成人久久爱视频| 亚洲精品色激情综合| 亚洲三级黄色毛片| 一级毛片我不卡| 菩萨蛮人人尽说江南好唐韦庄 | 国产aⅴ精品一区二区三区波| 国产一区二区三区在线臀色熟女| 国产三级在线视频| 国产午夜精品论理片| 能在线免费观看的黄片| 黑人高潮一二区| 高清午夜精品一区二区三区 | 97超级碰碰碰精品色视频在线观看| 日韩制服骚丝袜av| 国产老妇女一区| 老司机福利观看| 狂野欧美激情性xxxx在线观看| 精品一区二区三区视频在线观看免费| 国产成人aa在线观看| 久久精品综合一区二区三区| 欧美一区二区精品小视频在线| 中文在线观看免费www的网站| 高清毛片免费观看视频网站| 成人毛片a级毛片在线播放| 真实男女啪啪啪动态图| 别揉我奶头~嗯~啊~动态视频| 精品久久国产蜜桃| 一进一出好大好爽视频| 国产成人91sexporn| 成人精品一区二区免费| 一个人免费在线观看电影| 免费看a级黄色片| 天堂av国产一区二区熟女人妻| 亚洲欧美日韩高清专用| 91久久精品电影网| 青春草视频在线免费观看| 老司机福利观看| 最新在线观看一区二区三区| 偷拍熟女少妇极品色| 日韩三级伦理在线观看| 一级黄色大片毛片| 国产精品国产高清国产av| 成年版毛片免费区| 久久鲁丝午夜福利片| 国产亚洲精品av在线| 免费av毛片视频| 精品久久久噜噜| 一个人观看的视频www高清免费观看| 色噜噜av男人的天堂激情| 亚洲中文日韩欧美视频| 禁无遮挡网站| 国产一区二区激情短视频| 日韩一本色道免费dvd| 国产激情偷乱视频一区二区| 性插视频无遮挡在线免费观看| 亚洲成人久久性| 亚洲av中文字字幕乱码综合| 亚洲人与动物交配视频| 我要看日韩黄色一级片| 亚洲激情五月婷婷啪啪| 一区福利在线观看| 中文资源天堂在线| 婷婷亚洲欧美| 熟女人妻精品中文字幕| 韩国av在线不卡| 亚州av有码| 搞女人的毛片| 成人二区视频| 丰满乱子伦码专区| 日日摸夜夜添夜夜爱| 最近手机中文字幕大全| 国产淫片久久久久久久久| 国产单亲对白刺激| 成人性生交大片免费视频hd| 老师上课跳d突然被开到最大视频| av国产免费在线观看| 十八禁国产超污无遮挡网站| 一区福利在线观看| 久久久a久久爽久久v久久| 最近视频中文字幕2019在线8| 成人美女网站在线观看视频| 99热6这里只有精品| 中国美女看黄片| 噜噜噜噜噜久久久久久91| 一进一出好大好爽视频| 一进一出抽搐gif免费好疼| 久久久久久久亚洲中文字幕| 久久鲁丝午夜福利片| 久久国产乱子免费精品| 亚洲精品影视一区二区三区av| 亚洲欧美精品综合久久99| 免费看光身美女| 国产 一区精品| 国产黄色小视频在线观看| 性欧美人与动物交配| 搡老熟女国产l中国老女人| av天堂在线播放| 嫩草影院精品99| 国产日本99.免费观看| 欧美日本视频| 一a级毛片在线观看| 69av精品久久久久久| 中文字幕免费在线视频6| 99热全是精品| 18禁在线无遮挡免费观看视频 | 久久精品91蜜桃| 美女黄网站色视频| 亚洲国产精品sss在线观看| 三级经典国产精品| 亚洲美女黄片视频| 欧美一级a爱片免费观看看| 非洲黑人性xxxx精品又粗又长| 国产精品精品国产色婷婷| 国产三级在线视频| 亚洲中文字幕一区二区三区有码在线看| 特级一级黄色大片| 日韩在线高清观看一区二区三区| 一级毛片aaaaaa免费看小| 91在线观看av| 亚洲丝袜综合中文字幕| 精品久久久久久久久久免费视频| 免费黄网站久久成人精品| 亚洲精品国产av成人精品 | 国产在线精品亚洲第一网站| 国产三级中文精品| а√天堂www在线а√下载| 人妻久久中文字幕网| 久久久久国产网址| 久久久久久久久久黄片| 狂野欧美白嫩少妇大欣赏| 日韩在线高清观看一区二区三区| 男女做爰动态图高潮gif福利片| 97热精品久久久久久| 美女内射精品一级片tv| 嫩草影院新地址| 乱人视频在线观看| 波多野结衣高清无吗| 不卡一级毛片| 亚洲欧美成人精品一区二区| 国产激情偷乱视频一区二区| 亚洲欧美日韩高清在线视频| 亚洲天堂国产精品一区在线| 精品日产1卡2卡| 国产淫片久久久久久久久| 禁无遮挡网站| 一区二区三区四区激情视频 | 亚洲最大成人中文| 国产激情偷乱视频一区二区| 丝袜喷水一区| 尤物成人国产欧美一区二区三区| 女人被狂操c到高潮| 国产中年淑女户外野战色| 99久久无色码亚洲精品果冻| 亚洲av熟女| 天美传媒精品一区二区| 欧美一区二区亚洲| 麻豆国产97在线/欧美| 性色avwww在线观看| 精品久久久噜噜| 日本五十路高清| 欧美zozozo另类| 中文在线观看免费www的网站| 国产免费一级a男人的天堂| 国产一区二区激情短视频| 中文字幕精品亚洲无线码一区| 欧美人与善性xxx| 久久精品久久久久久噜噜老黄 | 国产精品一区二区三区四区久久| 国产亚洲欧美98| 少妇熟女aⅴ在线视频| 男女下面进入的视频免费午夜| 亚洲精品影视一区二区三区av| 乱码一卡2卡4卡精品| 日韩欧美 国产精品| 黄色视频,在线免费观看| 精品日产1卡2卡| 亚洲电影在线观看av| 国产一区二区三区在线臀色熟女| 又爽又黄a免费视频| 日韩欧美 国产精品| 精品免费久久久久久久清纯| 亚洲欧美日韩高清在线视频| 一区福利在线观看| 一级黄片播放器| 黄色配什么色好看| 国产精品一二三区在线看| 国产精品国产高清国产av| 免费电影在线观看免费观看| 夜夜夜夜夜久久久久| 欧美不卡视频在线免费观看| 久久久精品94久久精品| 亚洲图色成人| av天堂在线播放| 欧美xxxx黑人xx丫x性爽| 欧美最黄视频在线播放免费| 午夜福利在线在线| 欧美一区二区国产精品久久精品| 欧洲精品卡2卡3卡4卡5卡区| 99视频精品全部免费 在线| 亚洲国产精品sss在线观看| 最近手机中文字幕大全| 国产精品乱码一区二三区的特点| 国产黄a三级三级三级人| 老司机午夜福利在线观看视频| 免费观看在线日韩| 男女之事视频高清在线观看| 国产av麻豆久久久久久久| 久久精品久久久久久噜噜老黄 | 麻豆国产97在线/欧美| 亚洲精品国产av成人精品 | 亚洲精品成人久久久久久| 色综合站精品国产| 午夜免费激情av| 亚洲精品乱码久久久v下载方式| 亚洲性久久影院| 国产av在哪里看| 男女之事视频高清在线观看| 老司机福利观看| 国产黄片美女视频| 男人舔女人下体高潮全视频| 久久韩国三级中文字幕| 人妻久久中文字幕网| 黄色日韩在线| 国产私拍福利视频在线观看| 男人的好看免费观看在线视频| 中文在线观看免费www的网站| 亚洲中文字幕一区二区三区有码在线看| АⅤ资源中文在线天堂| 又爽又黄无遮挡网站| 人妻夜夜爽99麻豆av| av卡一久久| 午夜日韩欧美国产| 五月玫瑰六月丁香| 别揉我奶头 嗯啊视频| 日韩精品青青久久久久久| 久久天躁狠狠躁夜夜2o2o| 亚洲人成网站在线观看播放| 亚洲自偷自拍三级| 久久久久精品国产欧美久久久| 最好的美女福利视频网| 亚洲欧美中文字幕日韩二区| 人人妻人人澡人人爽人人夜夜 | 成人一区二区视频在线观看| 99热网站在线观看| 成熟少妇高潮喷水视频| 2021天堂中文幕一二区在线观| 日本一二三区视频观看| 亚洲av五月六月丁香网| 91久久精品国产一区二区三区| 中文字幕人妻熟人妻熟丝袜美| av中文乱码字幕在线| 亚洲欧美日韩高清专用| 日本黄色视频三级网站网址| 亚洲婷婷狠狠爱综合网| 人妻制服诱惑在线中文字幕| 少妇裸体淫交视频免费看高清| 亚洲三级黄色毛片| 搡女人真爽免费视频火全软件 | 老熟妇仑乱视频hdxx| 最后的刺客免费高清国语| 国产伦在线观看视频一区| 国产一区二区在线av高清观看| 极品教师在线视频| 嫩草影视91久久| 春色校园在线视频观看| 三级男女做爰猛烈吃奶摸视频| 国产av不卡久久| 国内久久婷婷六月综合欲色啪| av国产免费在线观看| 麻豆乱淫一区二区| 久久久久国产网址| 成人午夜高清在线视频| 亚洲国产精品合色在线| 久久久精品欧美日韩精品| 99精品在免费线老司机午夜| 日本精品一区二区三区蜜桃| 99热这里只有是精品在线观看| 国产毛片a区久久久久| 色综合亚洲欧美另类图片| 久久九九热精品免费| 免费一级毛片在线播放高清视频| 亚洲av成人精品一区久久| 99久久九九国产精品国产免费| 亚洲成人中文字幕在线播放| 日本爱情动作片www.在线观看 | 蜜臀久久99精品久久宅男| 日日干狠狠操夜夜爽| 久久精品国产亚洲av天美| 成年女人看的毛片在线观看| 色综合站精品国产| 特大巨黑吊av在线直播| 亚洲欧美精品自产自拍| 成人特级av手机在线观看| 老司机午夜福利在线观看视频| 熟女电影av网| 国产精品三级大全| 干丝袜人妻中文字幕| 精品不卡国产一区二区三区| 国产一区二区亚洲精品在线观看| 色视频www国产| 插逼视频在线观看| 国产黄a三级三级三级人| 久久久国产成人精品二区| 免费无遮挡裸体视频| 免费高清视频大片| 九九爱精品视频在线观看| 五月伊人婷婷丁香| 99久国产av精品| 欧美日韩在线观看h| 午夜激情欧美在线| 国产av在哪里看| 非洲黑人性xxxx精品又粗又长| 国内少妇人妻偷人精品xxx网站| 久久国内精品自在自线图片| 精品一区二区三区人妻视频| 国产精华一区二区三区| 成人特级黄色片久久久久久久| 男女视频在线观看网站免费| 网址你懂的国产日韩在线| 校园人妻丝袜中文字幕| 国产亚洲精品综合一区在线观看| 99久久精品热视频| 热99re8久久精品国产| 看十八女毛片水多多多| 国产一区二区激情短视频| 免费观看精品视频网站| 99在线人妻在线中文字幕| 国产在线精品亚洲第一网站| 久久精品国产清高在天天线| 亚洲在线自拍视频| 十八禁网站免费在线| 国产色爽女视频免费观看| 久久久久久伊人网av| 亚洲不卡免费看| 搡老岳熟女国产| 国产69精品久久久久777片| 国产三级在线视频| 91精品国产九色| 18禁黄网站禁片免费观看直播| 麻豆精品久久久久久蜜桃| 在线免费观看不下载黄p国产| 日韩人妻高清精品专区| 一级黄片播放器| 久久久午夜欧美精品| 欧美xxxx性猛交bbbb| 欧美一区二区精品小视频在线| 男人和女人高潮做爰伦理| 成年女人看的毛片在线观看| 麻豆成人午夜福利视频| 此物有八面人人有两片| 97超级碰碰碰精品色视频在线观看| 22中文网久久字幕| 少妇熟女欧美另类| 婷婷精品国产亚洲av在线| 在线免费观看不下载黄p国产| 97碰自拍视频| 欧美3d第一页| av国产免费在线观看| 久久草成人影院| 村上凉子中文字幕在线| 国产精品久久久久久久久免| 日韩中字成人| 尤物成人国产欧美一区二区三区| 国产精品人妻久久久影院| 亚洲人成网站高清观看| 国产国拍精品亚洲av在线观看| 人妻丰满熟妇av一区二区三区| 哪里可以看免费的av片| 少妇的逼水好多| 日韩强制内射视频| 伦精品一区二区三区| 日韩欧美免费精品| 国产白丝娇喘喷水9色精品| 美女内射精品一级片tv| 永久网站在线| 午夜激情福利司机影院| 亚洲国产精品sss在线观看| 99久国产av精品| 成人国产麻豆网| 亚洲av电影不卡..在线观看| 菩萨蛮人人尽说江南好唐韦庄 | 成人无遮挡网站| 夜夜看夜夜爽夜夜摸| 97热精品久久久久久| 久久精品91蜜桃| 久久久国产成人免费| 又粗又爽又猛毛片免费看| 国产片特级美女逼逼视频| 免费av不卡在线播放| 一边摸一边抽搐一进一小说| 亚洲欧美精品自产自拍| 午夜激情福利司机影院| 18禁黄网站禁片免费观看直播| 蜜桃久久精品国产亚洲av| 91麻豆精品激情在线观看国产| 淫妇啪啪啪对白视频| 天堂√8在线中文| 日韩一区二区视频免费看| 舔av片在线| 天天一区二区日本电影三级| 97热精品久久久久久| 国产一级毛片七仙女欲春2| 99在线视频只有这里精品首页| 欧美一区二区精品小视频在线| 免费在线观看成人毛片| 男女下面进入的视频免费午夜| 国产在视频线在精品| 国产欧美日韩精品亚洲av| 午夜免费男女啪啪视频观看 | 亚洲,欧美,日韩| 日日干狠狠操夜夜爽| 国产高清不卡午夜福利| 国产真实乱freesex| 欧美+亚洲+日韩+国产| 可以在线观看的亚洲视频| 悠悠久久av| 欧美色欧美亚洲另类二区| 91av网一区二区| 亚洲国产精品国产精品| 国产一区亚洲一区在线观看| 国产精品人妻久久久久久| 18禁在线播放成人免费| .国产精品久久| 久久久色成人| 亚洲乱码一区二区免费版| 乱人视频在线观看| 91狼人影院| 国产精品久久久久久av不卡| 人妻夜夜爽99麻豆av| 51国产日韩欧美| 村上凉子中文字幕在线| 亚洲国产精品国产精品| 国产精品三级大全| 亚洲欧美日韩东京热| 性色avwww在线观看| 久久久久久九九精品二区国产| 久久精品夜色国产| 美女免费视频网站| 国产在视频线在精品| 欧美精品国产亚洲| 国产亚洲精品av在线| av在线播放精品| 女同久久另类99精品国产91| 亚洲五月天丁香| 欧美日韩一区二区视频在线观看视频在线 | 大型黄色视频在线免费观看| 老司机午夜福利在线观看视频| 久久久久久久久大av| 啦啦啦观看免费观看视频高清| 黄色视频,在线免费观看| 亚洲av五月六月丁香网| 久久久国产成人免费| 色在线成人网| 国产aⅴ精品一区二区三区波| 久久精品综合一区二区三区| 两性午夜刺激爽爽歪歪视频在线观看| 亚洲va在线va天堂va国产| 日韩欧美 国产精品| 欧美中文日本在线观看视频| 国产成人91sexporn| 99热这里只有是精品50| 深爱激情五月婷婷| 欧美最新免费一区二区三区| 一进一出抽搐动态| 最好的美女福利视频网| 能在线免费观看的黄片| 日本-黄色视频高清免费观看| 亚洲av免费高清在线观看| 日本-黄色视频高清免费观看| 美女cb高潮喷水在线观看| 国产视频一区二区在线看| 嫩草影院入口| 亚洲国产精品合色在线| 校园人妻丝袜中文字幕| 国产亚洲精品av在线| 亚洲最大成人av| 99热精品在线国产| 亚洲自偷自拍三级| 精品久久久久久久久久免费视频| 草草在线视频免费看| 国产91av在线免费观看| 日韩中字成人| 蜜桃亚洲精品一区二区三区| av国产免费在线观看| 免费看日本二区| 一级a爱片免费观看的视频| 在线看三级毛片| 国产av在哪里看| 欧美3d第一页| 久久国产乱子免费精品| 国产v大片淫在线免费观看| 婷婷色综合大香蕉| 99久国产av精品| 一a级毛片在线观看| 精品日产1卡2卡| 无遮挡黄片免费观看| aaaaa片日本免费| 看非洲黑人一级黄片| 精品一区二区三区av网在线观看| 欧美一区二区亚洲| 欧美三级亚洲精品| 麻豆乱淫一区二区| 91麻豆精品激情在线观看国产| 赤兔流量卡办理| 欧美性猛交╳xxx乱大交人| 伊人久久精品亚洲午夜| 亚洲最大成人手机在线| 村上凉子中文字幕在线| 淫妇啪啪啪对白视频| 搡老妇女老女人老熟妇| 精品一区二区三区视频在线观看免费| 色视频www国产| 97超视频在线观看视频| 中国美白少妇内射xxxbb| 一本久久中文字幕| 国产一区二区三区av在线 | 婷婷精品国产亚洲av| 成人性生交大片免费视频hd| 成人国产麻豆网| 小蜜桃在线观看免费完整版高清| 午夜福利在线观看吧| 中文亚洲av片在线观看爽| 国产亚洲av嫩草精品影院| 国产一区二区在线av高清观看| 99久久精品一区二区三区| 国产精品爽爽va在线观看网站| 精品久久久久久久久久免费视频| 国产亚洲91精品色在线| 国产激情偷乱视频一区二区| a级毛片a级免费在线| 欧美日韩国产亚洲二区| 岛国在线免费视频观看| 亚洲国产精品合色在线| 色播亚洲综合网| 伦理电影大哥的女人| 久久天躁狠狠躁夜夜2o2o| 亚洲第一区二区三区不卡| 午夜爱爱视频在线播放| 日韩精品青青久久久久久| 国产单亲对白刺激| 男女下面进入的视频免费午夜| 久久人妻av系列| 床上黄色一级片| 欧美日本视频| av视频在线观看入口| 国产老妇女一区| 亚洲欧美中文字幕日韩二区| 婷婷精品国产亚洲av在线| 国产精品久久久久久久久免| 搡女人真爽免费视频火全软件 | 亚洲国产高清在线一区二区三| 国产真实乱freesex| 日本五十路高清| 成人亚洲精品av一区二区| 亚洲综合色惰| 国产精品电影一区二区三区| 乱人视频在线观看| 成人高潮视频无遮挡免费网站| 嫩草影院入口| 99久久久亚洲精品蜜臀av| 一级黄片播放器| 99热只有精品国产| 欧美激情久久久久久爽电影| 国产中年淑女户外野战色| 久久久久久久久久黄片| 国产精品一区二区三区四区免费观看 | 国内精品一区二区在线观看| 在现免费观看毛片| 97碰自拍视频| 校园春色视频在线观看| 97在线视频观看| 99视频精品全部免费 在线| 女人被狂操c到高潮| АⅤ资源中文在线天堂| av福利片在线观看| 欧美中文日本在线观看视频| 长腿黑丝高跟| 伦精品一区二区三区| 天美传媒精品一区二区| 老熟妇乱子伦视频在线观看| 国产亚洲精品久久久com| 精品一区二区三区视频在线观看免费| 在线观看午夜福利视频| 变态另类成人亚洲欧美熟女| 99在线视频只有这里精品首页| 欧美日韩在线观看h|