The Internet of things (IoT) devices’ standard network architecture is based on custom connections to a cloud service. The manufacturer of the IoT devices themselves usually manages the cloud. This centralization introduces a single point of failure of the system. By introducing the use of a blockchain, the entire network architecture becomes decentralized and this makes the network resilient to network failures. In this paper, we describe how to rapid prototype a Blockchain-based IoT network using wide-available technologies as Raspberry Pi and Ethereum.

1.
M. K.
Kebede
and
S. K.
Pani
, “
Reshaping IOT Through Blockchain
,”
2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC
),
Palladam, India
,
2019
, pp.
1
5
, doi:
2.
M.
Singh
,
A.
Singh
and
S.
Kim
, “
Blockchain: A game changer for securing IoT data
,”
2018 IEEE 4th World Forum on Internet of Things (WF-IoT
),
Singapore
,
2018
, pp.
51
55
, doi:
3.
J.
Lockl
,
V.
Schlatt
,
A.
Schweizer
,
N.
Urbach
and
N.
Harth
, “
Toward Trust in Internet of Things Ecosystems: Design Principles for Blockchain-Based IoT Applications
,”
in IEEE Transactions on Engineering Management
, vol.
67
, no.
4
, pp.
1256
1270
, Nov.
2020
, doi:
4.
V.
Buterin
,
A next-generation smart contract and decentralized application platform, white paper
,
2014
.
5.
S. S.
Choi
,
J. W.
Burm
,
W.
Sung
,
J. W.
Jang
and
Y. J.
Reo
, “
A Blockchain-based Secure IoT Control Scheme
,”
2018 International Conference on Advances in Computing and Communication Engineering (ICACCE
), Paris,
2018
, pp.
74
78
, doi:
6.
M.
Lekić
and
G.
Gardašević
, “
IoT sensor integration to Node-RED platform
,”
2018 17th International Symposium INFOTEH-JAHORINA (INFOTEH), East Sarajevo
,
2018
, pp.
1
5
, doi: .
8.
I. G. A. K.
Gemeliarana
and
R. F.
Sari
, “
Evaluation of Proof of Work (POW) Blockchains Security Network on Selfish Mining
,”
2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI
),
Yogyakarta, Indonesia
,
2018
, pp.
126
130
, doi:
9.
N.
Torii
and
M.
Kitakami
, “
A Method for Stable Block Generation Time in Proof of Work
,”
2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC
),
Kyoto, Japan
,
2019
, pp.
53
531
, doi:
10.
K.
Košt’ál
,
T.
Krupa
,
M.
Gembec
,
I.
Vereš
,
M.
Ries
and
I.
Kotuliak
, “
On Transition between PoW and PoS
,”
2018 International Symposium ELMAR
, Zadar,
2018
, pp.
207
210
, doi:
11.
S.
Micali
ALGORAND: the efficient and democratic ledger
” CoRR vol. abs/1607.01341 2016.
12.
F.
Caldarola
and
M.
Maiolo
, “
A mathematical investigation on the invariance problem of some hydraulic indices
”.
Applied Mathematics and Computation
(
2020
),
125726
.
13.
L.
Antoniotti
,
F.
Caldarola
and
M.
Maiolo
, “
Infinite Numerical Computing Applied to Hilbert’s, Peano’s, and Moore’s Curves
”.
Mediterranean Journal of Mathematics
17
(
3
),
99
(
2020
). Doi:
14.
L.
Antoniotti
,
F.
Caldarola
,
G.
d’Atri
and
M.
Pellegrini
, “New Approaches to Basic Calculus: An Experimentation via Numerical Computation”. In
Sergeyev
Y.D.
,
Kvasov
D.E.
(eds.), “
Numerical Computations: Theory and Algorithms - NUMTA 2019
”.
Springer
, LNCS 11973} (
2020
), pp.
329
342
. Doi:
15.
F.
Caldarola
,
D.
Cortese
,
G.
d’Atri
and
M.
Maiolo
, “Paradoxes of the infinite and ontological dilemmas between ancient philosophy and modern mathematical solutions”. In
Sergeyev
Y.D.
,
Kvasov
D.E.
(eds.), “
Numerical Computations: Theory and Algorithms - NUMTA 2019
”.
Springer, LNCS
11973 (
2020
), pp.
358
372
. Doi:
16.
F.
Caldarola
and
M.
Maiolo
, “
On the Topological Convergence of Multi-rule Sequences of Sets and Fractal Patterns
”.
Soft Computing
24
(
23
), pp.
17737
17749
(
2020
).
17.
F.
Caldarola
,
M.
Maiolo
and
V.
Solferino
, “
A new approach to the Z-transform through infinite computation
”.
Comm. Nonlinear Sci. Num. Simulat.
82
(
2020
),
105019
. Doi:
18.
F.
Caldarola
,
G.
d’Atri
,
P.
Mercuri
and
V.
Talamanca
, “On the arithmetic of Knuth’s powers and some computational results about their density”. In
Sergeyev
Y.D.
, Kvasov D.E. (eds
.), “
Numerical Computations: Theory and Algorithms - NUMTA 2019
”.
Springer, LNCS
11973
(
2020
), pp.
381
388
. Doi:
19.
A.
Leonardis
,
G.
d’Atri
and
F.
Caldarola
, “
Beyond Knuth’s notation for unimaginable numbers within computational number theory
”.
To appear in International Electronic Journal of Algebra
(
2021
).
20.
F.
Bertacchini
,
E.
Bilotta
,
F.
Caldarola
,
P.
Pantano
and
L. Renteria
Bustamante
, “
Emergence of Linguistic-like Structures in One-dimensional Cellular Automata
”.
AIP Conf. Proc.
1776
,
090044
(
2016
). Doi:
21.
F.
Caldarola
,
G.
d’Atri
,
M.
Maiolo
and
G.
Pirillo
, “The sequence of Carboncettus octagons”. In
Sergeyev
Y.D.
,
Kvasov
D.E.
(eds.), “
Numerical Computations: Theory and Algorithms - NUMTA 2019
”.
Springer, LNCS
11973
(
2020
), pp.
373
380
. Doi:
22.
F.
Caldarola
,
G.
d’Atri
,
M.
Maiolo
and
G.
Pirillo
, “
New Algebraic and Geometric Constructs Arising from Fibonacci Numbers. In honor of Masami Ito
”.
Soft Computing
24
(
23
), pp.
17497
17508
(
2020
).
23.
F.
Caldarola
,
G.
d’Atri
and
M.
Pellegrini
, “Combinatorics on n-sets: Arithmetic Properties and Numerical Results”. In
Sergeyev
Y.D.
,
Kvasov
D.E.
(eds.), “
Numerical Computations: Theory and Algorithms - NUMTA 2019
”.
Springer, LNCS
11973
(
2020
), pp.
389
401
. Doi:
24.
C.
Dwork
and
M.
Naor
, “Pricing via processing or combatting junk mail”. In Brickell E.F. (ed.), “
Advanxes in Cryptology - CRYPTO ’92
”.
Springer, LNCS
740
(
1993
), pp.
139
147
.
25.
M.
Hastings
,
N.
Heninger
and
E.
Wustrow
, “Short Paper: The Proof is in the Pudding”. In:
Goldberg
I.
,
Moore
T.
(eds), “
Financial Cryptography and Data Security - FC 2019
”.
Springer, LNCS
11598
, pp.
396
404
(
2019
). Doi:
26.
E.
Teske
, “Speeding up Pollard’s rho method for computing discrete logarithms”. In:
Buhler
,
J.P.
(ed.), “
ANTS 1998
”.
Springer, LNCS
1423
, pp.
541
554
(
1998
). Doi:
This content is only available via PDF.
You do not currently have access to this content.