Next Article in Journal
Foreground Detection with Deeply Learned Multi-Scale Spatial-Temporal Features
Previous Article in Journal
Lightweight Workload Fingerprinting Localization Using Affinity Propagation Clustering and Gaussian Process Regression
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Hybrid Blockchain and Internet-of-Things Network for Underground Structure Health Monitoring

Department of Civil and Environmental Engineering, Hanyang University, 222 Wangsimni-ro, Seongdong-gu, Seoul 04763, Korea
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(12), 4268; https://doi.org/10.3390/s18124268
Submission received: 22 October 2018 / Revised: 24 November 2018 / Accepted: 2 December 2018 / Published: 4 December 2018
(This article belongs to the Section Internet of Things)

Abstract

:
The Internet-of-things (IoT) and blockchain are growing realities of modern society, and both are rapidly transforming civilization, either separately or in combination. However, the leverage of both technologies for structural health monitoring (SHM) to enable transparent information sharing among involved parties and autonomous decision making has not yet been achieved. Therefore, this study combines IoT with blockchain-based smart contracts for SHM of underground structures to define a novel, efficient, scalable, and secure distributed network for enhancing operational safety. In this blockchain-IoT network, the characteristics of locally centralized and globally decentralized distribution have been activated by dividing them into core and edge networks. This division enhances the efficiency and scalability of the system. The proposed system was effective in simulation for autonomous monitoring and control of structures. After proper design, the decentralized blockchain networks may effectively be deployed for transparent and efficient information sharing, smart contracts-based autonomous decision making, and data security in SHM.

1. Introduction

The recent explosion of the Internet-of-things (IoT) is delivering innovative services in sectors such as business and industry. It has shown great applicability in fields including intelligent transportation, defense, public safety, smart cities, home automation, construction, and mining sector [1,2,3]. An IoT network is a seamless integration of heterogeneous devices with diverse functions of remote monitoring and communication with other devices. Presently, most of the IoT solutions rely on the centralized server paradigm, either connected to a main or cloud server through the internet. However, the enormous number of connected devices with limited computational power and the massive data volume generation associated with centralized IoT architecture are elevating the challenges of network bottlenecks, data security, and scalability. To solve the challenges of centralized IoT networks, adoption of a decentralized approach can be an interesting solution. Most recently, blockchain technology [4,5] has offered decentralized networks and has attracted the attention of researchers and stakeholders worldwide. Various fields in which blockchain has shown its applications are finance, healthcare, agricultural products, supply chain management, grid monitoring, and the government sector [6,7,8,9,10,11]. Blockchain helps shift the centralized IoT paradigm towards decentralization, with additional benefits of anonymity, trustworthiness, low-maintenance cost, scalability, robustness against attacks, improved user experiences, and intermediaries-free transactions. Several functionalities can easily be attained with the help of blockchain technologies that were never possible in past IoT. Leveraging blockchain with IoT can overcome the significant challenges of future IoT platforms [12].
An important domain of IoT application is structural health monitoring (SHM), in which sensors are attached to structures to sense their physical condition for ensuring operational safety and efficiency [13]. These sensors transmit data to a gateway or the main server running the algorithms for the SHM. Additionally, structures are also equipped with other sorts of sensors (actuators) to automatically respond to an emergency. SHM provides precise real-time information for assessing the health conditions, dynamic characteristics, and behavior of structures [14]. It enables earlier damage detection and eliminates the cost of routine inspections by accurately tracking the critical responses and evaluating the structures for any sign of deterioration without affecting their integrity. Most critically it improves public safety [15]. Moreover, SHM helps in allowing on-the-fly modifications (during construction), as well as improving the service quality of structures, future design considerations, and crucial decision making for maintenance planning [16,17]. IoT is providing efficient, accurate, and low-cost platforms for SHM. Moreover, few studies [18] have combined IoT SHM with cloud services to enable ubiquitous services and data analysis to access the stability of smart structures. Unfortunately, previously developed IoT–SHM systems rely on centralized network architectures, which are more prone to issues, such as data security, single point of failure, and bottleneck bandwidth. Therefore, integration of blockchain with IoT–SHM can contribute strongly to provide promising advantages, such as transparency, data security, and robustness.

1.1. Motivation

Usually, in a SHM program, various trustless parties (monitoring team, client, maintenance squad, and managers) are involved. The data involved is confidential and valuable raising important security issues. Monitoring data can be a lucrative target for other organizations and can be easily accessible and manipulated. Thus, there is no guarantee that the monitoring data provided is real or untampered with. In SHM, interorganizational sharing of SHM data is complex, untrusted, and less-reliable for transparency. Nonetheless, recently, many researchers [19,20] have introduced IoT-cloud based systems for SHM. Still, there is a lack of trust and transparency for interorganizational sharing of data. One reason is because comparable developed IoT-based systems for SHM are centralized (single point of failure). As a result, with the enormous growth in volume of data, these systems are becoming more prone to challenges, such as bandwidth bottlenecks, false authentications, data security and privacy, scalability, and data storage. Therefore, the central server concept should be eliminated and replaced by distributed networking. In this regard, new research horizons can be open by integrating blockchain with IoT–SHM. Maintaining data privacy (shared among all participants) on blockchain is a complicated issue [21]. This shortcoming of blockchain networks can be a key to its adoption in SHM for enabling immutable transparent cross-institution information sharing among the involved untrusted parties (client, maintenance team, and monitoring team).

1.2. Objectives and Our Main Contributions

Generally, in SHM, real-time monitoring and decision making have prime importance, whereas blockchain-based decentralized networks can be less efficient in terms of energy and time [22]. Therefore, this study proposes a novel hybrid architecture for decentralized data processing related to SHM using blockchain and IoT to enhance safety through autonomous decision making, data security, data storage, and cross-institutional transparent information sharing. The proposed hybrid architecture divides the blockchain network into core and edge networks, which help make the system efficient. This study leverages blockchain-based smart contracts with IoT–SHM data to create a distributed ledger of structural events as immutable transactions for a client, monitoring team, and maintenance team. This ledger keeps a full record of events, and trusted information sharing removes any point of conflict as well as automatically triggers an alert for emergency situations. The key contributions of this study are as follows:
  • We first propose blockchain–IoT-based distributed network for transparent and secure information sharing in SHM.
  • We explain the consensus mechanism along with hash function of proposed architecture.
  • We propose the use of blockchain-based smart contracts in SHM for autonomous decision making and control.
  • We place the SHM data of an underground coal mine in a blockchain–IoT network to evaluate the feasibility and performance of the proposed model based on different parameters.
  • We provide a side-by-side comparison in tabular form for state-of-the-art recent technological advancements in SHM with blockchain–IoT-based SHM network.
The rest of the paper is organized as follows. Section 2 emphasizes the applications of blockchain technology and smart contracts, and explains the status of technology adoption in SHM. Section 3 introduces the proposed system design along with the proposed model flow. Section 4 covers the proposed study model and deeply explains the designed smart contract. System analysis comparison with other studies and network performance evaluation are explained in Section 5. Discussions and limitation of the proposed system are discussed in Section 6. Finally, Section 7 concludes the study with future avenues of research.

2. Preliminaries and Related Work

2.1. Applications of Blockchain and Blockchain–IoT

This section offers a detailed literature review of blockchain applications, including technical reports, industrial applications, and governmental scale implementations. Examples include machine-to-machine (M2M) transactions, supply chain management, management and tracking of assets, IoT, health care, and tourism [23,24,25]. A private project, “Blockchain for Agri-food” [26], was started in 2017 with a special focus on the better understanding of blockchain technology application in agri-food. This project developed the proof-of-concept and established a guideline for the feasible insertion of basic information on smart contracts related to agri-food. Wang et al. [27] investigated the potential of blockchain applications in the construction industry with special attention on contract management, machinery leases, and construction supply chain management. Presently, blockchain-based commercial deployments are increasing rapidly. For instance, IBM incorporated the Hyperledger Fabric platform [28] and introduced a distributed open-source IoT–blockchain business framework. Slock.it [29,30] is part of the infrastructure for a future sharing economy. When using this platform, anything can be rented, sold, or shared with unknown parties trusted over smart contracts. This infrastructure can open and grant access to the devices carrying a suitable token or key. In this case, the owner of property sets a timed permission access after fixing a price for that property. Anyone interested can use the smartphone app to pay Ether and get permission to use an available property. A deep insight into IoT smart contracts for supporting sharing services and autonomous workflow has been explained by Christidis et al. [21]. They examined various potential blockchain–IoT areas such as the energy sector, supply chain management, tracking, billing, and e-trading. In [31], the case for groundbreaking innovations in the construction industry with the integration of IoT and blockchain was made.

2.2. Smart Contracts

In 1994, Nick Szabo first coined the term smart contract with the key objectives of self-executed and self-enforced transactions that follow a set of rules to make a contract [32]. The contractual clauses written in a computer program by the users to execute and upload provide a basis for blockchain smart contracts. Blockchain-based smart contracts are immutable and distributed to all the participant nodes in the network. The potential application areas for smart contracts are endless and hardly limited to cryptocurrency. In fact, smart contracts can revolutionize M2M transactions, supply chain management, asset tracking, ownership, authentication, and digital media records [33]. Comparatively, the commercial deployment of smart contracts is rapidly widening its horizons. Some other application areas of smart contracts are travel booking sites, hotels, airlines, and businesses that involve value exchange. Therefore, blockchain-based smart contracts can easily be deployed for other fields such as SHM.

2.3. Status of Technology in SHM

For the last few decades, SHM has enabled accurate and cost-effective monitoring of inaccessible places and large structures such as tunnels and underground structures. In [34], the authors highlighted the importance of SHM, especially with reference to underground structures. Initially, wired communication was the only reliable way for efficient SHM. In this regard, various researchers have put forward their contributions. For instance, Hisham et al. [35] monitored the strain distribution of an existing tunnel during the boring of 100 m nearby twin-tunnels. Ran et al. [36] contributed to SHM by deploying a comprehensive, long-term monitoring and safety evaluation system for the construction safety of an underground metro station.
A phase shift was observed in SHM with the invention of wireless sensor networks (WSNs). The use of WSNs allowed more reliable, cost-effective, and long-term SHM of underground structures. A hybrid system [37] of WSNs and wired communication was successfully deployed at London Underground Jubilee line for efficient and cost-effective SHM. Bennett et al. [38], reviewed the application of WSN-based SHM at Prague and London underground tunnels and highlighted critical factors, challenges, and issues. Additionally, the authors described a WSN design and well-suited topology for these structures. Another study, [39], utilized WSN for the SHM of underground train tunnels and investigated the feasibility of energy efficient WSN for this purpose. For real-time safety, during the construction of a metro tunnel in China, a web-based system for safety risk early warning was introduced [40]. This system allowed hybrid data fusion to assess safety and issue early warnings.
With the rapid development and innovation in the field of information and technology, traditional SHM was upgraded to IoT-based SHM. In this regard, recently, some studies [41,42] have been introduced focusing on the utilization of IoT and fiber Bragg grating (FBG) for real-time safety and early warnings and to enhance safety conditions at Yangtze Riverbed Metro Tunnel construction. A fiber Bragg grating-based monitoring system [43] was successfully implemented at the Zhuji coal mine. This system is based on IoT to monitor and share information in real-time. Consistently, SHM has been integrating with more and more technological advancements, resulting in the latest form of SHM comprising of WSN, IoT, and cloud computing. An extensive and elaborative review related to the opportunities and challenges of WSN with cloud computing in SHM was presented by Ruoshui and Ian [44]. Mahmud et al. [19] presented a complete IoT platform for the SHM. This system in combination uses IoT and cloud computing to run various analyses related to structural safety. Another SHM study [20] also integrated IoT and cloud computing. However, all these previously developed systems are based on a centralized architecture that makes them prone to bottleneck attacks and data security risks, as well as less reliable for transparent information sharing among all the participants [45]. Combining the blockchain technologies with IoT–SHM systems provides benefits in terms of lower operational cost, scalability, immutability, and transparent decentralized resource management. Therefore, leveraging blockchain with IoT–SHM aims to overcome the significant challenges of realizing the future decentralized SHM platforms.

3. System Design

SHM structures are usually equipped with various sensors (displacement, strain, and temperature) for monitoring any structural changes. In our proposed system, initially, all the monitored data from installed sensors is collected at a local gateway for pre-processing, filtering, and data arrangement. Once the formatting is complete, the data is fed to a blockchain-based smart contract to analyze the state of the structure. In Ethereum, Oracle is the most common trusted-third-party service that runs over the gateway to input blockchain-based smart contracts as well as connect smart contracts with the real world [46]. The blockchain network timestamps the gathered information, and the smart contracts are evaluated against pre-defined limits for autonomous decision making. Upon meeting the warning or alert conditions, smart contracts automatically communicate with attached devices for early warnings and concerned departments.

3.1. Architectural Design Overview

The proposed structure of blockchain is private and consortium-led to allow only authorized parties such as managers, monitoring team, client, and maintenance team. This helps in reducing the excessive exposure of data by requiring authentication and allowing access only to the applicants. In consortium blockchain networks, pre-approved members operate blockchain and a valid block must contain signatures from a minimum number of members. This ensures that no rogue node could insert a false transaction in the chain. Moreover, it is impossible to edit an approved smart contract; it cannot be killed but can only be replaced by a new contract.
The present study has been designed to utilize decentralized blockchain smart contracts for efficient SHM and to share information efficiently using IoT technologies. The blockchain network in this proposed study has been divided into two sub-networks: core and edge networks, as shown in Figure 1. This architecture guarantees no confidential data will be stored on the blockchain; instead, it will record the occurrences of structural events on a distributed ledger, which can keep the track record of events in the form of transactions. This architecture has been provided with two types of storage: raw data storage at the local database and structural events storage at the core blockchain network. This architecture creates a new block in the core network of the blockchain upon successful processing of data. All the alerts and responses from smart contracts will be recorded as a completed transaction in the core blockchain network. Authentication of data in the blockchain is provided by linking this network to the SHM record. Figure 1 shows a general blockchain–IoT-based architecture for the SHM.

3.2. Proposed Model Workflow

In our proposed model, the edge nodes have limited storage capacity and computational power. Edge nodes serve as a centralized server for the real-time response of inquiries and offer low latency and bandwidth usage. Edge nodes hold access control mechanisms and contain the signature keys of participants. The core network comprises miner’s nodes with high storage capacity responsible for the generation of new blocks, verification of proof-of-work (PoW), and contain smart contracts for autonomous decision making. Digital signatures and immutable hash functions were deployed to ensure the integrity of data in the core network. Moreover, the core network verifies the authentication of a transaction occurring over a blockchain network. This division of the proposed model into the core network and edge network is helpful in making the system efficient to respond to queries and add resilience to external attacks.

3.3. PoW Scheme Algorithm

The characteristic of private blockchain networks to trust only well-defined and authenticated participants makes them secure against many vague attacks [21]. Even though in private blockchain networks, authenticated participants are not involved in mining or PoW, they are being managed by a consensus mechanism. Therefore, it is of vital importance to define a consensus mechanism for blockchain network.
Recently, the PoW has become an important consensus mechanism for blockchain networks. The PoW ensures data safety in blockchain networks by close integration, managing the trust, and verifying the transactions using hard-to-forge mathematical calculations. The proposed study for SHM based on IoT and blockchain deploys the PoW consensus mechanism along with the SHA-256 hash function. However, one of the major drawbacks of PoW as discussed is the waste of resources (electricity) [47].
To generate a block in the PoW mechanism, a miner node collects all the pending transactions and after hashing them in hashes of the Merkle tree, it iteratively hashes the collected data along with their hashes. This iterative hashing continues until the hash of transactions becomes equal to or less than a pre-determined target value serving as a threshold. This target value is the minimum number of hashes which should be performed to generate a block in the PoW mechanism. Mathematically this can be expressed as:
H ( n H ( b ) ) t
where H is the cryptographic hash function, b is the current block content, and t is the target value.
Usually, the target is the 256-bit number comprising of k special numbers of zeros; this makes PoW difficult and roughly requires 2k attempts to solve the puzzle. In this mechanism, the determination of proof is a linear function and the lower target values demand more hashing efforts. Basically, it works by evaluating the computational forces of the participant nodes and ensures data consistency as well as consensus security [48]. PoW is a probabilistic mechanism as it changes the input of a hash to alter a hash. Ethereum utilizes the Dagger-Hashimoto function to speed up the hash’s computation. The system ensures the generation of a new hash against each iteration by repeatedly changing nNonce and coinbase, which ultimately alter the hash of Merkle tree root in a block header. The probability of finding nNonce of proof H for a given target t is given as:
P ( H t ) = t / 2 256
Upon finding the hash, a successful miner node broadcasts the proof, input transactions, and other associated data helpful to determine H. Another node validates the proof by re-computing and therefore adds a new block to the blockchain. The input (ln) is taken as challenge with complication (c). Output of the mathematical computed algorithm is (N, k, B, M), where k is the index of selected leaves, B is the selected leave, and M is the Merkle tree collected proof. In this algorithm, T is the number of elements in the array and Hs is the variable-size of the hash function. A more detailed description of the PoW mechanism can be found in [49]. Algorithm 1 shows the pseudo-code of PoW.
Algorithm 1. PoW consensus mechanism algorithm.
Input:input (In), complication (c), individual division (d), and division length (dl)
Output: (N, k, B, M)
Begin
Step 1Build input-challenge-dependent memory Al [1 …T] as d individual divisions of length dl
Step 2Compute root φ of the Merkle tree A
Step 3Select Nonce N
Step 4 Compute ɣO = HS (N|| φ || k)
Step 5For 1 1 ≤ jB Do
  ij-1 = ɣj-1 modT
  ɣj = Hs (ɣj-1 || Al [ij-1] ± k)
Step 6 Back sweep in reverse order υ = Hs (ɣL ||...||ɣ1-lmod2 ± k)
Step 7If υ contain c binary leading zeros, Then
Step 8return (N, k, B, M)
Step 9Goto Step 3
End

4. Study Models and Implementation

4.1. SHM Data Adoption

With reference to SHM, the working of smart contracts for autonomous decision making heavily relies on the threshold limit values. In this study, to check the applicability of the proposed blockchain-IoT network, as an example, the SHM data has been taken from our previous work [50] focusing on the utilization of FBG sensing to monitor an underground mine structure and determines the “damage index of mine (DIM)”. The sensed data is initially gathered at a gateway for pre-processing and filtering. Then, the principal component analysis along with the broken stick rule determines the optimum number of components. The normalized Euclidean Ichino-Yaguchi distance measures the symbolic distances between the objects helpful for the determination of DIM. Finally, these distances are compared using cluster analysis with those of the undamaged state. Being an index, DIM has no units. A detailed mathematical explanation for the calculation of DIM is out of the scope of this paper but can be found in our previous work [50]. The following are the major reasons to select this above-mentioned study to check the applicability of the proposed blockchain and IoT based distributed network.
  • The developed system is IoT-based for structural monitoring of an underground coal mine and operates efficiently under the harsh conditions of the mine;
  • it provides an easy opportunity to combine the IoT–SHM system with a blockchain network;
  • DIM has been clearly defined with detailed mathematical steps;
  • DIM values range between 0 (undamaged) and 1 (damaged), which can be further divided into categories representing the mine structural conditions.
Figure 2 shows the complete architecture of the blockchain-based smart contract for the use case of an underground coal mine SHM.
The present study defines four categories of “undamaged, warning, alarming, and damaged” based on the values of DIM. These categories and DIM values are summarized in Table 1.

4.2. Smart Contracts

For the SHM data, the changes in the sensed values cause a change in the DIM value, which can be easily compared with pre-defined threshold limit values in smart contracts. The proposed system is comprised of a main smart contract named Monitoring&Control. It calls a function DIM_Monitor () to compare the value of DIM with the DIM-stored threshold values in the smart contract. The function then calls an object Analyze (). The associated sub-contracts and functions serve as a directory instead of reporting back to the main smart contract and control the attached actuators to alert the managers and monitoring teams. Moreover, the sub-contracts write the transactions in the core blockchain network as a permanent record. However, for simplicity and efficient deployment, all the main and sub-contracts should be written and deployed separately in a blockchain network, calling each other using their addresses. The main contracts with their functions are given in Table 2.
Our proposed network registers each participant as Pi ϵ P. This network only accepts the operation from the added participants. Each participant has the authority to either accept or reject the requests and can trace changes in the blockchain network. Participants should have IDs and secret signature keys to join this network and to inquire about the data history. The input algorithm for registering a participant is based on the number of remaining unregistered participants (No.unreg), number of modifications (No.mod), and the hash values of modifications (dH), while the outputs are the participant’s public key (PPK), private key (PPVK), and addresses (PAddr) achieved from secret signature keys and public keys. Pseudo-code for participants’ registration is given as shown in Algorithm 2.
Algorithm 2. Pseudo-code for registering a participant.
Inputs: No. of remaining unregistered participants (No.unreg), No. of modifications (No.mod), Hash value set of modifications (dH);
Output: Participant’s public key (PPK), participant’s private key (PPVK), participant’s addresses (PAddr), participant secret key (PSK)
Step 1Fori = 0; i < No.unreg; i + + do
Step 2 network generates public key PPK and private key PPVK for participant Pi ϵ P
Step 3PPK generates address PAddr for Pi
Step 4 network generates a random number Xiu ϵ Zq* for participant Pi
Step 5 network compute XiS = (XXiu) mod q and sends (XiS, Ui) to TA
Step 6 TA generates a random number yiu ϵ Zq* for participant Pi, computes yiS = (yyiu) mod q and stores yiS
Step 7 Each Pi has its own secret signature key PSK (Xiu, yiu)
Step 8end for
Step 9returnPPK, PPVK, PAddr, and PSK
Figure 3 shows the algorithm of the used smart contract based on threshold values of DIM in an underground coal mine for efficient information sharing among all the participants and to trigger an alert in an emergency. For simplicity, we have included demo smart contracts in one file on GitHub [51]. However, for easy replacement the contracts should be stored distinctly on the blockchain, calling the addresses of each other.

4.3. Logical Flow of Smart Contracts

The logical flow of the proposed smart contract is shown in Figure 4. In this study, smart contracts follow the defined threshold limit values of DIM to respond, control, and generate alerts according to the conditions. The user interface is managed by a decentralized application (DApp) for remote monitoring, and this interface allows the managers to inquire. Managers will have special administrative access to all the data. The information from various sensors is aggregated and formatted in the back-end of the DApp and after pre-processing and proper arrangement it is forwarded to the smart contract connected through Oracle.

5. System Analysis

5.1. Simulation Setup

All the simulation experiments were performed on an Intel Core i5 CPU 3.90 GHz with 16 GB RAM running on Windows 10. Our proposed blockchain scheme was simulated as a private network using go-Ethereum and the installation of Mist browser enabled distributed blockchain network. Genesis block was defined, and the SHA-256 hash function was deployed. Ethereum testnet debugged and tested our proposed model. To activate blockchain as a service, we deployed Mininet to all the miner’s and edge nodes, so that the timestamped SHM data with its hashes could be placed in it.
For comparison, we also executed our proposed blockchain model in Amazon EC2 cloud with secp256k1 signature code from Ripple. A series of experimental trials were performed to evaluate the performance of the proposed SHM system in terms of scalability, efficiency, and throughput. The experiments were performed considering virtual machines for a maximum number of nodes of 20 because (i) the number of participants in an SHM system is always limited, and (ii) the proposed system showed more stability for fewer than 20 nodes. The proposed network was evaluated from a pre-defined pool of transactions, from which random transactions were called for each participant. Blockchain immutably updates and records the datastore state of each transaction. The results of these simulations are based on the user’s perspective. Since we inherited the SHM of an underground coal mine from our previous work [50], we omit further SHM analysis here.
Simulation setup: The throughput trials were performed by sending transactions to the network. These transactions were counted based on the confirmation of receival time. The conditions under which experiments were performed were as follows: number of nodes = 20, acceptance threshold step δ = 0.1, number of requests per s = 1200, and transactions per proposal were set at 1600. Each trial was repeated five times against a varying number of nodes to obtain an average.

5.2. Network Performance Evaluation

Throughput: The throughput of the proposed system was determined by varying the number of nodes from 3 to 18 with each increment of 3. Throughput was observed as the number of transactions per second to the number of nodes. Results are shown in Figure 5a. The throughput of the proposed network is comparable with that of Ripple, i.e., 1075 transactions per s. A minute decrease in the throughput of the system was observed with the increase in network size for both Ripple and the proposed system. Decrease in throughput happened when the number of nodes was increased from 15. Therefore, the optimum number of nodes for this proposed network is 15. Overall, compared to Ripple, the proposed system shows greater consistency. It should be noted here that, unlike Ripple, the proposed network is more flexible as it does not deal with financial transactions.
In the second set of experiments, the proposal size was increased to check its effect on the throughput of the network. For these experimental trials, the number of nodes was fixed to 15 and the number of transactions per proposal were varied from 100 to 1800. The results are shown in Figure 5b. The throughput of the proposed network increases until it reaches a peak value of 1050 transactions per second at 1200 transactions per proposal. When the transactions per proposal increased to more than 1200, transaction per second decreased, or the throughput deteriorates. The transactions per proposal dropped to 810 at 1800 transactions per second. Thus, the optimum number of transactions per proposal can be defined as 1200 in the case of our proposed network.
Effect of block size: By changing the size of a block, the number of transactions of our proposed system (double layer), proposed system (single blockchain layer), and bitcoin were observed. The results are shown in Figure 6a. These results clearly demonstrate the effect of block size on the number of transactions per second. The data of our simulation is based on the actual values of the bitcoin blockchain [52]. In comparison to bitcoin and the simple blockchain model, our proposed architecture is more efficient (Figure 6a).
Convergence: The convergence rate for the proposed system was determined by fixing the number of transactions per second to 1050, the number of nodes to 15, and requests per second to 1200. Figure 6b shows the convergence rate of the proposed system. The least time for convergence was achieved for δ = 0.1. As the values varied from 0.1, the convergence time increased.
Difficulty value: In the blockchain network, PoW consensus mechanism has vital importance, as it applies hard-to-forge computations to solve tasks. Basically, PoW is a tiresome process to solve the puzzle such as a hash collision. Figure 7a depicts the difficulty values against the number of blocks for our proposed network. As the number of blocks increases in a network, the difficulty level increases linearly. Moreover, with the increase of difficulty values, the miner’s nodes need more computation power, and mining time also increases significantly. Therefore, it is imperative to find a compromise between difficulty value and target response time of the system.
Latency: Delay in the confirmation of a transaction is known as the latency. Along with throughput, it represents the performance overhead of the architecture. Figure 7b demonstrates the results of latency in milliseconds with the increase of requests per second for 15 nodes. It increases linearly with the increase in the number of requests per second. It also increases with the increase of the number of nodes, as they provide more communication to the network. The overall response of the model remains stable for 15 nodes.

5.3. Comparison to Traditional Systems

As a young technology, blockchain is providing society with decentralized solutions. Its applications, such as that proposed in the present study, are quite different from the previously developed centralized SHM systems. Table 3 compares the proposed study with current SHM systems. Most of the previously developed systems are limited to only monitoring and to conventional means of communication and data storage. Few studies have considered cloud computing for SHM, and the architectures of those comparable systems are centralized causing problems with bottlenecks, data security, single point failures, and less reliability for inter-organizational transparent information sharing.

5.4. Data Security Analysis

The proposed private and consortium-based blockchain network provides data security in the following ways:
(i)
The generation and verification of a new block always requires most numbers of signatures from the authenticated members of networks. Signatures from authenticated members prevent the entrance of an unwanted member in the network and any change or manipulation of SHM data. Thus, such blockchain networks ensure data security.
(ii)
As in SHM, the data itself is nothing, but the valuable information extracted from the data has prime importance. Therefore, the present study has been designed to utilize threshold limit value smart contracts. The proposed system provides another layer of data security by simply deploying DIM-based smart contracts for autonomous decision making, instead of placing entire monitoring data in a decentralized network.
(iii)
The proposed system only stores the transactions in the form of a ledger. This provides data security for both SHM service providers and the client. A detail record of transactions can be recalled at any time for settling disputes and new design considerations upon the approval of participants.
(iv)
Our system provides security against external attacks, as any rogue node can attack the system by submitting an invalid change request. A smart contract will only accept the requests from the pre-identified and authorized participants. All the other requests are simply rejected by the system.
In this case, if an internal advisory submits defective changes, the changes should have a minimum number of approved signatures. Such as attack can then only succeed if the internal advisory controls more than half of the nodes. Moreover, such attacks leave traceable footprints on the blockchain, which are helpful to identify attacks.

6. Discussions and Limitations

Our system provides the authenticated and immutable records of SHM with distributed networks. Such blockchain-IoT networks can easily be deployed for the SHM of civil structures. The smart contracts for the SHM of civil structures should follow detailed specifications and standards. However, there are some limitations of the proposed systems:
  • The SHM data adopted in this study is from an underground coal mine, taken as an example to demonstrate the feasibility of blockchain-IoT networks and smart contracts for SHM. The smart contract presented here is only for the defined conditions, so it should not be considered as general for all types of structures. For its application in various domains of SHM, smart contracts should first be defined according to the required conditions of structures, which may cause changes in the overall flow of the smart contract.
  • In the case of public blockchain networks, the efficiency of PoW is a big question, as it takes too long to place data in a blockchain, which is not acceptable for SHM applications. Therefore, further studies are needed to check the efficiency in the case of public networks.
  • For a private blockchain network, it is advisable not to use the same block for all transactions.
  • There is no mechanism that can ensure that all the data placed in a blockchain is secure.
Before full-fledged application of distributed blockchain networks for SHM, the network should be properly designed for efficient and autonomous data analysis and decision making according to the requirements.
The proposed network demands that a minimum number of nodes must remain online to verify the blocks’ generation and new transactions. As our proposed architecture is based on Ethereum, the block-time in Ethereum is much faster than bitcoin, and faster block-time may hamper the security of the network by adding numerous stale blocks which are not a part of the main chain but compete in the mining process. For applications such as that proposed in this study, real-time monitoring demands the faster block-time and thus become more open to security risks. In addition to these issues, software vulnerabilities of smart contracts can be exploited by hackers resulting in high risk to organizations, miners, and blockchain network.

7. Conclusions

Cross-institutional transparent information sharing and data security with autonomous data analysis and decision making are the big challenges in IoT–SHM. In this context, we have focused on these limitations and proposed a blockchain-based distributed architecture for sustainable SHM. In this work, the PoW consensus mechanism was used to ensure transparency, data security, and data storage. A permissioned and consortium-based blockchain network was established to execute smart contracts. The smart contracts would trigger alerts by following the pre-defined threshold limit values to analyze the streamed data. Ethereum-based simulations were run by placing SHM data. Results showed the proposed network performs well for 15 nodes, 1200 transactions per proposal, and for acceptance threshold step of 0.1. The experimental analysis results showed the effectiveness of the proposed blockchain model for SHM in terms of data security, storage, efficiency, and transparent information sharing among the involved parties.
Blockchain is a young technology and its integration with the IoT domain will revolutionize the world by speeding up the interactions of companies, organizations, governments, and citizens. Leveraging blockchain with conventional IoT–SHM will not only bring closer untrusted parties but also open new business and research horizons. Based on some of the limitations of the proposed network, there is still the room for improvement. Future studies related to adoption of blockchain distributed networks in IoT–SHM should address multiple confirmations along with faster block-time for newly mined blocks to avoid double-spending. Moreover, our future work will include exploring the more detailed implementation of smart contracts integrated with artificial intelligence to enhance confidence in autonomous decision making for SHM.

Author Contributions

B.W.J. conceived the idea and technically supported the study. R.M.A.K. defined methodology, manuscript writing, literature review, and prepared original draft. Y.-S.L. helped in literature review and manuscript writing.

Funding

This research received no external funding.

Acknowledgment

R.M.A.K. is thankful to Higher Education commission, Pakistan for providing the funding for pursuing Ph.D. studies in Korea.

Conflicts of Interest

The authors declare no conflict of interest regarding the publication of this manuscript.

References

  1. Miorandi, D.; Sicari, S.; De Pellegrini, F.; Chlamtac, I. Internet of things: Vision, applications and research challenges. Ad Hoc Netw. 2012, 10, 1497–1516. [Google Scholar] [CrossRef]
  2. Suárez-Albela, M.; Fraga-Lamas, P.; Fernández-Caramés, T.M.; Dapena, A.; González-López, M. Home automation system based on intelligent transducer enablers. Sensors 2016, 16, 1595. [Google Scholar] [CrossRef] [PubMed]
  3. Fraga-Lamas, P.; Fernández-Caramés, T.M.; Suárez-Albela, M.; Castedo, L.; González-López, M. A review on internet of things for defense and public safety. Sensors 2016, 16, 1644. [Google Scholar] [CrossRef] [PubMed]
  4. Swan, M. Blockchain: Blueprint for a New Economy; O’Reilly Media, Inc.: Newton, MA, USA, 2015. [Google Scholar]
  5. Tschorsch, F.; Scheuermann, B. Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 2016, 18, 2084–2123. [Google Scholar] [CrossRef]
  6. Ølnes, S.; Ubacht, J.; Janssen, M. Blockchain in Government: Benefits and Implications of Distributed Ledger Technology for Information Sharing; Elsevier: New York, NY, USA, 2017. [Google Scholar]
  7. Saberi, S.; Kouhizadeh, M.; Sarkis, J.; Shen, L. Blockchain technology and its relationships to sustainable supply chain management. Int. J. Prod. Res. 2018, 1–19. [Google Scholar] [CrossRef]
  8. Yli-Huumo, J.; Ko, D.; Choi, S.; Park, S.; Smolander, K. Where is current research on blockchain technology?—A systematic review. PLoS ONE 2016, 11, e0163477. [Google Scholar] [CrossRef]
  9. Mettler, M. Blockchain technology in healthcare: The revolution starts here. In Proceedings of the 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), Incheon, Korea, 14–16 September 2016; IEEE: New York, NY, USA, 2016; pp. 1–3. [Google Scholar]
  10. Crosby, M.; Pattanayak, P.; Verma, S.; Kalyanaraman, V. Blockchain technology: Beyond bitcoin. Appl. Innov. 2016, 2, 6–10. [Google Scholar]
  11. Gao, J.; Asamoah, K.O.; Sifah, E.B.; Smahi, A.; Xia, Q.; Xia, H.; Zhang, X.; Dong, G. Gridmonitoring: Secured sovereign blockchain based monitoring on smart grid. IEEE Access 2018, 6, 9917–9925. [Google Scholar] [CrossRef]
  12. Reyna, A.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 2018, 88, 173–190. [Google Scholar] [CrossRef]
  13. Hu, X.; Wang, B.; Ji, H. A wireless sensor network-based structural health monitoring system for highway bridges. Comput. Aided Civ. Infrastruct. Eng. 2013, 28, 193–209. [Google Scholar] [CrossRef]
  14. Amezquita-Sanchez, J.P.; Adeli, H. Signal processing techniques for vibration-based health monitoring of smart structures. Arch. Comput. Methods Eng. 2016, 23, 1–15. [Google Scholar] [CrossRef]
  15. Noel, A.B.; Abdaoui, A.; Elfouly, T.; Ahmed, M.H.; Badawy, A.; Shehata, M.S. Structural health monitoring using wireless sensor networks: A comprehensive survey. IEEE Commun. Surv. Tutor. 2017, 19, 1403–1423. [Google Scholar] [CrossRef]
  16. Phares, B. Benefits of Structural Health Monitoring of Bridges. Available online: https://pdfs.semanticscholar.org/presentation/58e7/1b1e0175bcd1edbc03d4a4adba2839f2fb4c.pdf (accessed on 3 October 2018).
  17. Ko, J.; Ni, Y. Technology developments in structural health monitoring of large-scale bridges. Eng. Struct. 2005, 27, 1715–1725. [Google Scholar] [CrossRef]
  18. Abdelgawad, A.; Yelamarthi, K. Internet of things (IoT) platform for structure health monitoring. Wirel. Commun. Mob. Comput. 2017, 2017, 6560797. [Google Scholar] [CrossRef]
  19. Mahmud, M.A.; Bates, K.; Wood, T.; Abdelgawad, A.; Yelamarthi, K. A complete internet of things (IoT) platform for structural health monitoring (shm). In Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 5–8 February 2018; IEEE: New York, NY, USA, 2018; pp. 275–279. [Google Scholar]
  20. Myers, A.; Mahmud, M.A.; Abdelgawad, A.; Yelamarthi, K. Toward integrating structural health monitoring with internet of things (IoT). In Proceedings of the 2016 IEEE International Conference on Electro Information Technology (EIT), Grand Forks, ND, USA, 19–21 May 2016; IEEE: New York, NY, USA, 2016; pp. 0438–0441. [Google Scholar]
  21. Christidis, K.; Devetsikiotis, M. Blockchains and smart contracts for the internet of things. IEEE Access 2016, 4, 2292–2303. [Google Scholar] [CrossRef]
  22. Xiong, Z.; Zhang, Y.; Niyato, D.; Wang, P.; Han, Z. When mobile blockchain meets edge computing: Challenges and applications. arXiv, 2017; arXiv:1711.05938. [Google Scholar]
  23. Kar, I. Estonian Citizens Will Soon Have the World’s Most Hack-Proof Health-Care Records. Available online: https://qz.com/628889/this-eastern-european-country-is-moving-its-health-records-to-the-blockchain/ (accessed on 3 December 2018).
  24. Ekblaw, A.; Azaria, A.; Halamka, J.D.; Lippman, A. A case study for blockchain in healthcare: “Medrec” prototype for electronic health records and medical research data. In Proceedings of the IEEE Open & Big Data Conference, Washington, DC, USA, 5–8 December 2016; p. 13. [Google Scholar]
  25. Korpela, K.; Hallikas, J.; Dahlberg, T. Digital supply chain transformation toward blockchain integration. In Proceedings of the 50th Hawaii International Conference on System Sciences, Big Island, HI, USA, 3–6 January 2017. [Google Scholar]
  26. Ge, L.; Brewster, C.; Spek, J.; Smeenk, A.; Top, J.; van Diepen, F.; Klaase, B.; Graumans, C.; de Wildt, M.d.R. Blockchain for Agriculture and Food; Wageningen Economic Research: Wageningen, The Netherlands, 2017. [Google Scholar]
  27. Jun, W.; Peng, W.; Xiangyu, W.; Wenchi, S. The outlook of blockchain technology for construction engineering management. Front. Eng. Manag. 2017, 4, 67–75. [Google Scholar]
  28. IBM. IBM Blockchain Based on Hyperledger Fabric from the Linux Foundation. 2017. Available online: https://www.ibm.com/blockchain/hyperledger.html (accessed on 11 August 2018).
  29. Slock.it. Rent, Sell or Share Anything. Available online: https://slock.it/ (accessed on 12 August 2018).
  30. Jentzsch, C. Decentralized Autonomous Organization to Automate Governance. Available online: https://download.slock.it/public/DAO/WhitePaper.pdf (accessed on 3 December 2018).
  31. Heiskanen, A. The technology of trust: How the internet of things and blockchain could usher in a new era of construction productivity. Constr. Res. Innov. 2017, 8, 66–70. [Google Scholar] [CrossRef]
  32. Gupta, M. Blockchain for Dummies; Wiley: Hoboken, NJ, USA, 2017. [Google Scholar]
  33. Mattila, J. The Blockchain Phenomenon—The Disruptive Potential of Distributed Consensus Architectures; The Research Institute of the Finnish Economy: Helsinki, Finland, 2016. [Google Scholar]
  34. Bhalla, S.; Yang, Y.; Zhao, J.; Soh, C. Structural health monitoring of underground facilities–technological issues and challenges. Tunn. Undergr. Space Technol. 2005, 20, 487–500. [Google Scholar] [CrossRef]
  35. Mohamad, H.; Bennett, P.J.; Soga, K.; Mair, R.J.; Lim, C.-S.; Knight-Hassell, C.K.; Ow, C.N. Monitoring tunnel deformation induced by close-proximity bored tunneling using distributed optical fiber strain measurements. In Proceedings of the 7th International Symposium on Field Measurements in Geomechanics, Boston, MA, USA, 24–27 September 2007; pp. 1–13. [Google Scholar]
  36. Ran, L.; Ye, X.; Zhu, H. Long-term monitoring and safety evaluation of a metro station during deep excavation. Procedia Eng. 2011, 14, 785–792. [Google Scholar] [CrossRef]
  37. Bennett, P.J.; Kobayashi, Y.; Soga, K.; Wright, P. Wireless sensor network for monitoring transport tunnels. Proc. Inst. Civ. Eng. Geotech. Eng. 2010, 163, 147–156. [Google Scholar] [CrossRef]
  38. Bennett, P.J.; Soga, K.; Wassell, I.; Fidler, P.; Abe, K.; Kobayashi, Y.; Vanicek, M. Wireless sensor networks for underground railway applications: Case studies in prague and london. Smart Struct. Syst. 2010, 6, 619–639. [Google Scholar] [CrossRef]
  39. Cammarano, A.; Spenza, D.; Petrioli, C. Energy-harvesting wsns for structural health monitoring of underground train tunnels. In Proceedings of the 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Turin, Italy, 14–19 April 2013; IEEE: New York, NY, USA, 2013; pp. 75–76. [Google Scholar]
  40. Ding, L.; Zhou, C. Development of web-based system for safety risk early warning in urban metro construction. Autom. Constr. 2013, 34, 45–55. [Google Scholar] [CrossRef]
  41. Ding, L.; Zhou, C.; Deng, Q.; Luo, H.; Ye, X.; Ni, Y.; Guo, P. Real-time safety early warning system for cross passage construction in yangtze riverbed metro tunnel based on the internet of things. Autom. Constr. 2013, 36, 25–37. [Google Scholar] [CrossRef]
  42. Zhou, C.; Ding, L. Safety Barrier Warning System for Underground Construction Sites Using Internet-of-Things Technologies. Autom. Constr. 2017, 83, 372–389. [Google Scholar] [CrossRef]
  43. Zhao, Y.; Zhang, N.; Si, G. A fiber bragg grating-based monitoring system for roof safety control in underground coal mining. Sensors 2016, 16, 1759. [Google Scholar] [CrossRef]
  44. Liu, R.; Wassell, I.J. Opportunities and challenges of wireless sensor networks using cloud services. In Proceedings of the workshop on Internet of Things and Service Platforms, Tokyo, Japan, 6–9 December 2011; ACM: New York, NY, USA, 2011; p. 4. [Google Scholar]
  45. Ferrag, M.A.; Derdour, M.; Mukherjee, M.; Derhab, A.; Maglaras, L.; Janicke, H. Blockchain technologies for the internet of things: Research issues and challenges. arXiv, 2018; arXiv:1806.09099. [Google Scholar] [CrossRef]
  46. CONSENSYS. A Visit to Oracle. Available online: https://media.consensys.net/a-visit-to-the-oracle-de9097d38b2f (accessed on 23 September 2018).
  47. He, P.; Yu, G.; Zhang, Y.-F.; Bao, Y.-B. Survey on blockchain technology and its application prospect. Comput. Sci. 2017, 44, 1–7. [Google Scholar]
  48. Ren, Y.; Liu, Y.; Ji, S.; Sangaiah, A.K.; Wang, J. Incentive mechanism of data storage based on blockchain for wireless sensor networks. Mob. Inf. Syst. 2018, 2018, 6874158. [Google Scholar] [CrossRef]
  49. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 3 December 2018).
  50. Jo, B.W.; Khan, R.M.A.; Lee, Y.S.; Jo, J.H.; Saleem, N. A fiber bragg grating-based condition monitoring and early damage detection system for the structural safety of underground coal mines using the internet of things. J. Sens. 2018, 2018, 9801873. [Google Scholar] [CrossRef]
  51. AsadKhan87. Hello-World. Available online: https://github.com/AsadKhan87/Hello-world/blob/master/monitor%20and%20control.txt (accessed on 3 December 2018).
  52. Bitcoin Historical Data. Available online: https://www.kaggle.com/mczielinski/bitcoin-historical-data (accessed on 8 October 2018).
  53. Yuan, Y.; Jiang, X.; Liu, X. Predictive maintenance of shield tunnels. Tunn. Undergr. Space Technol. 2013, 38, 69–86. [Google Scholar] [CrossRef]
  54. Stajano, F.; Hoult, N.; Wassell, I.; Bennett, P.; Middleton, C.; Soga, K. Smart bridges, smart tunnels: Transforming wireless sensor networks from research prototypes into robust engineering infrastructure. Ad Hoc Netw. 2010, 8, 872–888. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Proposed blockchain–Internet of thing (IoT) network architecture for structural health monitoring (SHM).
Figure 1. Proposed blockchain–Internet of thing (IoT) network architecture for structural health monitoring (SHM).
Sensors 18 04268 g001
Figure 2. Complete framework of blockchain-IoT network for the use case of an underground coal mine-SHM.
Figure 2. Complete framework of blockchain-IoT network for the use case of an underground coal mine-SHM.
Sensors 18 04268 g002
Figure 3. Flow chart of the smart contract and IoT network for transparent information sharing for the selected data of an underground coal mine.
Figure 3. Flow chart of the smart contract and IoT network for transparent information sharing for the selected data of an underground coal mine.
Sensors 18 04268 g003
Figure 4. Logical execution flow of proposed system: sensors data is sent to interrogator, and gateway running with Oracle, the gateway implements pre-processingData (), formatData (), and DIM_Data () functions to determine the DIM of the underground mine structure. The DIM determined from sensed data is read by the smart contract to compare with the stored threshold DIM values. Upon meeting the smart contract conditions for the various classes of DIM, the smart contract generates necessary alerts and a transaction will be written to the blockchain.
Figure 4. Logical execution flow of proposed system: sensors data is sent to interrogator, and gateway running with Oracle, the gateway implements pre-processingData (), formatData (), and DIM_Data () functions to determine the DIM of the underground mine structure. The DIM determined from sensed data is read by the smart contract to compare with the stored threshold DIM values. Upon meeting the smart contract conditions for the various classes of DIM, the smart contract generates necessary alerts and a transaction will be written to the blockchain.
Sensors 18 04268 g004
Figure 5. (a) Throughput of the proposed blockchain distributed network in comparison to Ripple, and (b) Throughput of proposed blockchain architecture for 15 nodes to check the scalability.
Figure 5. (a) Throughput of the proposed blockchain distributed network in comparison to Ripple, and (b) Throughput of proposed blockchain architecture for 15 nodes to check the scalability.
Sensors 18 04268 g005
Figure 6. (a) Block size against transactions/s of proposed blockchain architecture in comparison with bitcoin and the proposed single layer architecture, and (b) convergence time of proposed blockchain architecture against acceptance step δ.
Figure 6. (a) Block size against transactions/s of proposed blockchain architecture in comparison with bitcoin and the proposed single layer architecture, and (b) convergence time of proposed blockchain architecture against acceptance step δ.
Sensors 18 04268 g006
Figure 7. (a) Difficulty variation vs number of blocks, and (b) mean latency vs. number of user’s requests.
Figure 7. (a) Difficulty variation vs number of blocks, and (b) mean latency vs. number of user’s requests.
Sensors 18 04268 g007
Table 1. Categories of the structural states of an underground coal mine with respect to the damage index of mine (DIM) values.
Table 1. Categories of the structural states of an underground coal mine with respect to the damage index of mine (DIM) values.
DIM Value RangeMine Condition
0–0.3Undamaged
0.3–0.6Warning
0.6–0.8Alarming
0.8–1.0Damaged
Table 2. Types of smart contracts and their functions.
Table 2. Types of smart contracts and their functions.
Smart ContractsFunctions
ParticipantsAddParticipant
DeleteParticipant
SearchParticipant
VerifyParticipant
Monitoring&ControlDIM_Monitor
Analyze
Generate_Alert
Autonomous_IP_communication
Table 3. Comparison of functions of the proposed blockchain-IoT network with traditional structural health monitoring (SHM) systems.
Table 3. Comparison of functions of the proposed blockchain-IoT network with traditional structural health monitoring (SHM) systems.
Functions and PropertiesSHM Studies
Simple [53]WSN [38,54]IoT [41,42]IoT-Cloud [19,20]Proposed
DecentralizeFully centralizedFully centralizedFully centralizedPartially centralizedFully decentralized
ReliabilityHighly unreliableHigh data temperingData can be tempered easilyEasy data temperingTransparent and trustworthy inter-organizational information sharing (No tempering, original data)
Data storage, privacy, security, and confidentialityLowLow Medium MediumHigh (access control for participants)
ImmutabilityNoNoNoPartiallyYes
Real-timeNear-real timeYesYesYesNear-real time
Communication and transparent information sharingOnly limited to monitoringLimited to monitoringMonitoring and data processingMonitoring, data processing, and participant-to-participant (P2P) information sharingSmart contract-based data analysis for autonomous decision making, participant-to-machine (P2M) and machine-to-machine (M2M) communication
InteroperabilityLowLowMediumMediumHigh
On-demand maintenanceLowLowMediumMediumEfficiently high

Share and Cite

MDPI and ACS Style

Jo, B.W.; Khan, R.M.A.; Lee, Y.-S. Hybrid Blockchain and Internet-of-Things Network for Underground Structure Health Monitoring. Sensors 2018, 18, 4268. https://doi.org/10.3390/s18124268

AMA Style

Jo BW, Khan RMA, Lee Y-S. Hybrid Blockchain and Internet-of-Things Network for Underground Structure Health Monitoring. Sensors. 2018; 18(12):4268. https://doi.org/10.3390/s18124268

Chicago/Turabian Style

Jo, Byung Wan, Rana Muhammad Asad Khan, and Yun-Sung Lee. 2018. "Hybrid Blockchain and Internet-of-Things Network for Underground Structure Health Monitoring" Sensors 18, no. 12: 4268. https://doi.org/10.3390/s18124268

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop