Performance analysis of lightweight Internet of things devices on blockchain networks

Performance analysis of lightweight Internet of things devices on blockchain networks

Potential integration or cooperation of the Internet of things (IoT) systems and the blockchain technology is nowadays attracting remarkable interest from the researchers. These inter-operating systems often have to rely on lowcost, low-power, and robust IoT devices that can communicate with the blockchain network through smart contracts. In this work, we designed and ran a benchmark study for ESP32-based lightweight IoT devices interacting within the Quorum blockchain. A software library was built for ESP32 devices to enable elliptic-curve digital signing, Keccak-256 hashing, decoding, encoding, and secure private key generation capabilities, which all are the basic functional requirements for running a blockchain client. The running times and power consumption values of these essential operations were analyzed and discussed in detail. We also deployed two smart contract functions on the Quorum network and analyzed the performance of the IoT device while interacting via these methods. Further optimizations were proposed and implemented to speed up the processes and save energy, which resulted in a 2.5x increase in the transaction posting speeds and a 2/3 decrease in the energy costs. Another performance comparison between an ESP32 and a PC client was also provided with.

___

  • [1] Li S, Xu LD, Zhao S. The internet of things: a survey. Information Systems Frontiers 2015; 17 (2) : 243-259. doi: 10.1007/s10796-014-9492-7
  • [2] Kshetri N. Can blockchain strengthen the Internet of things?. IT Professional 2017; 19 (4) : 68-72. doi: 10.1109/mitp.2017.3051335
  • [3] Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. 2008.
  • [4] Yaga D, Mell P, Roby N, Scarfone K. Blockchain technology overview. 2018. doi: 10.6028/nist.ir.8202
  • [5] Buterin V. A next-generation smart contract and decentralized application platform. 2014.
  • [6] Wust K, Gervais A. Do you need a blockchain? In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). 2018. pp. 45-54. doi: 10.1109/cvcbt.2018.00011
  • [7] Sankar LS, Sindhu M, Sethumadhavan M. Survey of consensus protocols on blockchain applications. In: 4th International Conference on Advanced Computing and Communication Systems (ICACCS); 2017. doi:10.1109/icaccs.2017.8014672
  • [8] Huang D, Ma X, Zhang S. Performance analysis of the raft consensus algorithm for private blockchains. IEEE Transactions on Systems, Man, and Cybernetics: Systems 2020; 50 (1) : 172-181. doi: 10.1109/tsmc.2019.2895471
  • [9] H. Moniz. The Istanbul BFT consensus algorithm. 2020. arXiv: 2002.03613 [cs.DC].
  • [10] Nadir RM. Comparative study of permissioned blockchain solutions for enterprises. In: 2019 International Conference on Innovative Computing (ICIC); Pakistan; 2019. pp. 1-6. doi: 10.1109/icic48496.2019.8966735
  • [11] Maier A, Sharp A, Vagapov Y. Comparative analysis and practical implementation of the ESP32 microcontroller module for the Internet of things. In: 2017 Internet Technologies and Applications (ITA); Wrexham; 2017. pp. 143-148. doi: 10.1109/itecha.2017.8101926
  • [12] Lin J, Shen Z, Zhang A, Chai Y. Blockchain and IoT based food traceability for smart agriculture. In: Proceedings of the 3rd International Conference on Crowd Science and Engineering (ICCSE’18); Singapore; 2018. pp. 1-6. doi: 10.1145/3265689.3265692
  • [13] Cha S-C, Chen J-F, Su C, Yeh K-H. A blockchain connected gateway for BLE-Based devices in the Internet of things. IEEE Access 2018; 6 : 24639-24649. doi: 10.1109/access.2018.2799942
  • [14] Nayak S, Narendra NC, Shukla A, Kempf J. Saranyu: Using smart contracts and blockchain for cloud tenant management. In: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD); San Francisco; 2018. doi: 10.1109/cloud.2018.00121
  • [15] Novo O. Blockchain meets IoT: An architecture for scalable access management in IoT. IEEE Internet of Things Journal 2018; 5 (2) : 1184-1195. doi: 10.1109/jiot.2018.2812239
  • [16] Ma M, Shi G, Li F. Privacy-Oriented Blockchain-Based distributed key management architecture for hierarchical access control in the IoT scenario. IEEE Access 2019; 7: 34045-34059. doi: 10.1109/access.2019.2904042
  • [17] Chen J, Micali S. Algorand: A secure and efficient distributed ledger. Theoretical Computer Science 2019; 777: 155-183. doi: 10.1016/j.tcs.2019.02.001
  • [18] Ghosh D, Agrawal A, Prakash N, Goyal P. Smart saline level monitoring system using ESP32 and MQTT-S. In: 2018 IEEE 20th International Conference on e-Health Networking, Applications and Services (Healthcom); Ostrava; 2018. pp. 1-5. doi: 10.1109/healthcom.2018.8531172
  • [19] Abdullah AH, Sudin S, Ajit MIM, et al. Development of ESP32-based Wi-Fi electronic nose system for monitoring LPG leakage at gas cylinder refurbish plant. In: 2018 International Conference on Computational Approach in Smart Systems Design and Applications (ICASSDA); Kuching; 2018. pp. 1-5. doi: 10.1109/icassda.2018.8477594
  • [20] Rai P, Rehman M. ESP32 Based smart surveillance system. In: 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET); Sukkur; 2019. pp. 1-3. doi: 10.1109/icomet.2019.8673463
  • [21] Allafi I, Iqbal T. Design and implementation of a low cost web server using ESP32 for real-time photovoltaic system monitoring. In: 2017 IEEE Electrical Power and Energy Conference (EPEC); Saskatoon; 2017. pp. 1-5. doi: 10.1109/epec.2017.8286184
  • [22] Baliga A, Subhod I, Kamat P, Chatterjee S. Performance evaluation of the Quorum blockchain platform. 2018. arXiv: 1809.03421 [cs.CR].
  • [23] Polge J, Robert J, Le Traon Y. Permissioned blockchain frameworks in the industry: A comparison. ICT Express 2021: 7 (2) : 229-233. doi:10.1016/j.icte.2020.09.002
  • [24] Enterprise Ethereum Alliance: ‘EEA Client Specification v7’, 2021
  • [25] Nasir Q, Qasse IA, Abu Talib M, Nassif AB. Performance analysis of Hyperledger Fabric platforms. Security and Communication Networks 2018; 2018: 1-14. doi: 10.1155/2018/3976093
  • [26] Bertoni G, Daemen J, Peeters M, Assche GV. The making of KECCAK. Cryptologia 2014; 38 (1) : 26-60. doi: 10.1080/01611194.2013.856818
  • [27] Barker E, Roginsky A. Transitioning the use of cryptographic algorithms and key lengths (No. NIST Special Publication (SP) 800-131A Rev. 2). National Institute of Standards and Technology 2019; doi:10.6028/NIST.SP.800- 131Ar2
  • [28] NTT Information Sharing Platform Laboratories, NTT Corporation. Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters. 2010.
  • [29] Johnson D, Menezes A, Vanstone S. The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security 2001; 1 (1) : 36-63. doi: 10.1007/s102070100002
  • [30] Bafandehkar M, Yasin SM, Mahmod R, Hanapi ZM. Comparison of ECC and RSA algorithm in resource constrained devices. In: 2013 International Conference on IT Convergence and Security (ICITCS); Macao; 2013. pp. 1-3. doi: 10.1109/icitcs.2013.6717816
  • [31] Turan MS, Barker E, Kelsey J, McKay KA, Baish ML et al. Recommendation for the entropy sources used for random bit generation. NIST Special Publication 800-90B Second Draft. Gaithersburg, MD, USA: NIST, 2018. doi: 10.6028/NIST.SP.800-90B
  • [32] Kösemen C, Dalkiliç G. Designing a random number generator for secure communication with WISP. In: Proceedings of the International Conference on Compute and Data Analysis (ICCDA’17); New York; 2017. pp. 289-292. doi: 10.1145/3093241.3093285
  • [33] Polge J, Robert J, Le Traon Y. Permissioned blockchain frameworks in the industry: a comparison. ICT Express 2020. doi: 10.1016/j.icte.2020.09.002
  • [34] Pearson B, Luo L, Zhang Y, Dey R, Ling Z et al. On misconception of hardware and cost in IoT security and privacy. In: 2019 IEEE International Conference on Communications (ICC); 2019. doi: 10.1109/icc.2019.8761062
  • [35] Bassham LE, Rukhin AL, Soto J, Nechvatal JR, Smid ME et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Gaithersburg, MD, USA: National Institute of Standards and Technology, 2010.
  • [36] Stipčević M, Koç ÇK. True random number generators. Open Problems in Mathematics and Computational Science 2014, Springer; 275-315. doi: 10.1007/978-3-319-10683-0_12
  • [37] Sarker VK, Gia TN, Tenhunen H, Westerlund T. Lightweight security algorithms for resource-constrained IoT-based sensor nodes. In: ICC 2020 - 2020 IEEE International Conference on Communications (ICC); Ireland; 2020. pp. 1-7. doi: 10.1109/icc40277.2020.9149359
  • [38] Suarez-Albela M, Fernandez-Carames TM, Fraga-Lamas P, Castedo L. A practical performance comparison of ECC and RSA for resource-constrained IoT devices. In: 2018 Global Internet of Things Summit (GIoTS); Spain; 2018. pp. 1-6. doi: 10.1109/giots.2018.8534575
  • [39] Hassanzadeh-Nazarabadi Y, Küpçü A, Özkasap Ö. LightChain: Scalable DHT-based blockchain. IEEE Transactions on Parallel and Distributed Systems 2021; 32 (10) : 2582-2593. doi: 10.1109/TPDS.2021.3071176