Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Secure and effective implementation of an IOTA light node using STM32
Stucchi D., Susella R., Fragneto P., Rossi B.  BlockSys 2019 (Proceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor, New York, NY, Nov 10, 2019)28-29.2019.Type:Proceedings
Date Reviewed: Mar 15 2021

Sensor systems and Internet of Things (IoT) environments raise a new major challenge to security. Some of these issues can be solved with blockchain protocols, for example, distributed ledger technologies (DLTs); however, “it is still not clear whether blockchain protocols can be implemented efficiently on resource-constrained IoT devices.”

The paper shows an example of a secure IoT device with IOTA functionalities: an IOTA light node based on STM32, with all communication functions, cryptographic functions, and IOTA operations. ARM Cortex-M controllers allow up to 22 times faster performance. The examined solution uses a new approach based on trits = -1, 0, 1 and trytes. The proposed light node is done with “the STM32 boards Nucleo-F746ZG and Nucleo-F429ZI, both equipped with an Ethernet module.”

The presented solution’s security aspects are given in section 2.2. A noted limitation of this solution: each transaction must contain a computed proof-of-work (PoW) nonce; however, this cannot be done quickly enough, so there is a need to find other possibilities.

Reviewer:  Dominik Strzalka Review #: CR147214 (2106-0158)
Bookmark and Share
  Featured Reviewer  
 
Cryptographic Controls (D.4.6 ... )
 
 
Ethernet (C.2.1 ... )
 
 
Real-Time And Embedded Systems (C.3 ... )
 
 
General (C.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Cryptographic Controls": Date
Cryptology: machines, history and methods
Deavours C., Kahn D., Kruh L., Mellen G. (ed), Winkel B. (ed) Artech House, Inc., Norwood, MA,1989. Type: Divisible Book
Jan 1 1992
Transaction security system
Abraham D., Dolan G., Double G., Stevens J. (ed) IBM Systems Journal 30(2): 206-229, 1991. Type: Article
Mar 1 1992
Cryptography for computer security: making the decision
Fisher W. Computers and Security 3(3): 229-233, 1984. Type: Article
Jun 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy