IoT Monitoring with Blockchain: Generating Smart Contracts from Service Level Agreements
- URL: http://arxiv.org/abs/2408.15016v1
- Date: Fri, 23 Aug 2024 21:00:45 GMT
- Title: IoT Monitoring with Blockchain: Generating Smart Contracts from Service Level Agreements
- Authors: Adam Booth, Awatif Alqahtani, Ellis Solaiman,
- Abstract summary: The research focuses on the development of a Java library that is capable of generating a smart contract from a given SLA.
A smart contract generated by this library is validated through a mock scenario presented in the form of a Remote Patient Monitoring IoT system.
In this scenario, the findings demonstrate a 100 percent success rate in capturing all emulated violations.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: A Service Level Agreement (SLA) is a commitment between a client and provider that assures the quality of service (QoS) a client can expect to receive when purchasing a service. However, evidence of SLA violations in Internet of Things (IoT) service monitoring data can be manipulated by the provider or consumer, resulting in an issue of trust between contracted parties. The following research aims to explore the use of blockchain technology in monitoring IoT systems using smart contracts so that SLA violations captured are irrefutable amongst service providers and clients. The research focuses on the development of a Java library that is capable of generating a smart contract from a given SLA. A smart contract generated by this library is validated through a mock scenario presented in the form of a Remote Patient Monitoring IoT system. In this scenario, the findings demonstrate a 100 percent success rate in capturing all emulated violations.
Related papers
- Examining the Effectiveness of Transformer-Based Smart Contract Vulnerability Scan [0.0]
We evaluate deep learning-based approaches for vulnerability scanning of smart contracts.<n>We propose VASCOT, a Vulnerability Analyzer for Smart COntracts using Transformers.<n>VASCOT's performance is compared against a state-of-the-art LSTM-based vulnerability detection model.
arXiv Detail & Related papers (2026-01-12T09:00:42Z) - One Signature, Multiple Payments: Demystifying and Detecting Signature Replay Vulnerabilities in Smart Contracts [56.94148977064169]
lacking checks on signature usage conditions can lead to repeated verifications, increasing the risk of permission abuse and threatening contract assets.<n>We define this issue as the Signature Replay Vulnerability (SRV)<n>From 1,419 audit reports across 37 blockchain security companies, we identified 108 with detailed SRV descriptions and classified five types of SRVs.
arXiv Detail & Related papers (2025-11-12T09:17:13Z) - Trace: Securing Smart Contract Repository Against Access Control Vulnerability [58.02691083789239]
GitHub hosts numerous smart contract repositories containing source code, documentation, and configuration files.<n>Third-party developers often reference, reuse, or fork code from these repositories during custom development.<n>Existing tools for detecting smart contract vulnerabilities are limited in their ability to handle complex repositories.
arXiv Detail & Related papers (2025-10-22T05:18:28Z) - Towards Trusted Service Monitoring: Verifiable Service Level Agreements [37.76528129929801]
Service Level Agreement (SLA) monitoring in service-oriented environments suffers from inherent trust conflicts when providers self-report metrics.<n>We introduce a framework for generating verifiable SLA violation claims through trusted hardware monitors and zero-knowledge proofs.
arXiv Detail & Related papers (2025-10-15T10:02:29Z) - A Web-Based Environment for the Specification and Generation of Smart Legal Contracts [3.251499851779181]
This paper introduces a Web-based environment that partly fills a gap between natural language contracts and smart contract implementations.<n>It shows much potential in accelerating the development of smart contracts in a legal compliance context.
arXiv Detail & Related papers (2025-09-14T12:59:12Z) - CoTGuard: Using Chain-of-Thought Triggering for Copyright Protection in Multi-Agent LLM Systems [55.57181090183713]
We introduce CoTGuard, a novel framework for copyright protection that leverages trigger-based detection within Chain-of-Thought reasoning.<n>Specifically, we can activate specific CoT segments and monitor intermediate reasoning steps for unauthorized content reproduction by embedding specific trigger queries into agent prompts.<n>This approach enables fine-grained, interpretable detection of copyright violations in collaborative agent scenarios.
arXiv Detail & Related papers (2025-05-26T01:42:37Z) - An Infrastructure for Systematically Collecting Smart Contract Lineages for Analyses [3.1635449133608486]
Existing platforms lack the capability to trace the predecessor-successor relationships within a smart contract lineage.
We introduce SCLineage, an automated infrastructure that accurately identifies and collects smart contract lineages by leveraging proxy contracts.
We present SCLineageSet, an up-to-date, open-source dataset that facilitates extensive research on smart contract evolution.
arXiv Detail & Related papers (2024-12-30T11:10:22Z) - Blockchain-Based Trust and Transparency in Airline Reservation Systems using Microservices Architecture [1.03590082373586]
The study investigates the major components of blockchain technology such as decentralised databases, permanent records of transactions and transactional clauses executed via codes of programs.
The results show a 30% decrease in booking variations together with greater data synchronization as a result of consensus processes and resistant data formations.
The architecture of the system has no single point failure with over 98% reliability while measures taken to improve security have led to 85% of the customers expressing trust in the services provided.
arXiv Detail & Related papers (2024-10-18T14:58:22Z) - Secure Ownership Management and Transfer of Consumer Internet of Things Devices with Self-sovereign Identity [1.6872118668817362]
The popularity of the Internet of Things (IoT) has driven its usage in our homes and industries over the past 10-12 years.
There have been some major issues related to identity management and ownership transfer involving IoT devices.
This article presents a Self-sovereign Identity (SSI) based system that facilitates a secure and user-centric ownership management and transfer of consumer IoT devices.
arXiv Detail & Related papers (2024-08-30T10:35:09Z) - Versioned Analysis of Software Quality Indicators and Self-admitted Technical Debt in Ethereum Smart Contracts with Ethstractor [2.052808596154225]
This paper proposes Ethstractor, the first smart contract collection tool for gathering a dataset of versioned smart contracts.
The collected dataset is then used to evaluate the reliability of code metrics as indicators of vulnerabilities in smart contracts.
arXiv Detail & Related papers (2024-07-22T18:27:29Z) - Specification Mining for Smart Contracts with Trace Slicing and Predicate Abstraction [10.723903783651537]
We propose a specification mining approach to infer contract specifications from past transactionhistories.
Our approach derives high-level behavioral automata of function invocations, accompanied byprogram invariants statistically inferred from the transaction histories.
arXiv Detail & Related papers (2024-03-20T03:39:51Z) - Service Level Agreements and Security SLA: A Comprehensive Survey [51.000851088730684]
This survey paper identifies state of the art covering concepts, approaches, and open problems of SLA management.
It contributes by carrying out a comprehensive review and covering the gap between the analyses proposed in existing surveys and the most recent literature on this topic.
It proposes a novel classification criterium to organize the analysis based on SLA life cycle phases.
arXiv Detail & Related papers (2024-01-31T12:33:41Z) - HasTEE+ : Confidential Cloud Computing and Analytics with Haskell [50.994023665559496]
Confidential computing enables the protection of confidential code and data in a co-tenanted cloud deployment using specialized hardware isolation units called Trusted Execution Environments (TEEs)
TEEs offer low-level C/C++-based toolchains that are susceptible to inherent memory safety vulnerabilities and lack language constructs to monitor explicit and implicit information-flow leaks.
We address the above with HasTEE+, a domain-specific language (cla) embedded in Haskell that enables programming TEEs in a high-level language with strong type-safety.
arXiv Detail & Related papers (2024-01-17T00:56:23Z) - Putting a Padlock on Lambda -- Integrating vTPMs into AWS Firecracker [49.1574468325115]
Software services place implicit trust in the cloud provider, without an explicit trust relationship.
There is currently no cloud provider that exposes Trusted Platform Module capabilities.
We improve trust by integrating a virtual TPM device into the Firecracker, originally developed by Amazon Web Services.
arXiv Detail & Related papers (2023-10-05T13:13:55Z) - Semantic Information Marketing in The Metaverse: A Learning-Based
Contract Theory Framework [68.8725783112254]
We address the problem of designing incentive mechanisms by a virtual service provider (VSP) to hire sensing IoT devices to sell their sensing data.
Due to the limited bandwidth, we propose to use semantic extraction algorithms to reduce the delivered data by the sensing IoT devices.
We propose a novel iterative contract design and use a new variant of multi-agent reinforcement learning (MARL) to solve the modelled multi-dimensional contract problem.
arXiv Detail & Related papers (2023-02-22T15:52:37Z) - HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a
Collaborative IoT Intrusion Detection [0.0]
We propose a hierarchical blockchain-based federated learning framework to enable secure and privacy-preserved collaborative IoT intrusion detection.
The proposed ML-based intrusion detection framework follows a hierarchical federated learning architecture to ensure the privacy of the learning process and organisational data.
The outcome is a securely designed ML-based intrusion detection system capable of detecting a wide range of malicious activities while preserving data privacy.
arXiv Detail & Related papers (2022-04-08T19:06:16Z) - Autonomous Maintenance in IoT Networks via AoI-driven Deep Reinforcement
Learning [73.85267769520715]
Internet of Things (IoT) with its growing number of deployed devices and applications raises significant challenges for network maintenance procedures.
We formulate a problem of autonomous maintenance in IoT networks as a Partially Observable Markov Decision Process.
We utilize Deep Reinforcement Learning algorithms (DRL) to train agents that decide if a maintenance procedure is in order or not and, in the former case, the proper type of maintenance needed.
arXiv Detail & Related papers (2020-12-31T11:19:51Z) - Optimal Pricing of Internet of Things: A Machine Learning Approach [105.4312167370975]
Internet of things (IoT) produces massive data from devices embedded with sensors.
Previous research does not address the problem of optimal pricing and bundling of machine learning-based IoT services.
We present an IoT market model which consists of data vendors selling data to service providers, and service providers offering IoT services to customers.
arXiv Detail & Related papers (2020-02-14T09:17:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.