Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud

Research output: Contribution to journalArticlepeer-review

13 Citations (Scopus)

Abstract

Mobile Ad-hoc Cloud (MAC) is the constellation of nearby mobile devices to serve the heavy computational needs of the resource constrained edge devices. One of the major challenges of MAC is to convince the mobile devices to offer their limited resources for the shared computational pool. Credit based rewarding system is considered as an effective way of incentivizing the arbitrary mobile devices for joining the MAC network and to earn the credits through computational crowdsourcing. The next challenge is to get the reliable computation as incentives attract the malicious devices to submit fake computational results for claiming their reward and we have used the blockchain based reputation system for identifying the malicious participants of MAC. This paper presents a malicious node identification algorithm integrated within the Iroha based permissioned blockchain. Iroha is a project of hyperledger which is focused on mobile devices and thus light-weight in nature. It is used for keeping the track of rewarding and reputation system driven by the malicious node detection algorithm. Experiments are conducted for evaluated the implemented test-bed and results show the effectiveness of algorithm in identifying the malicious devices and conducting the reliable data analysis through the blockchain based computational crowdsourcing in MAC. This is a post-peer-review, pre-copyedit version of an article published in Mobile Networks and Applications. The final authenticated version is available online at: https://link.springer.com/journal/11036
Original languageEnglish
Pages (from-to)153-163
JournalMobile Networks and Applications
DOIs
Publication statusPublished - 1 Feb 2020

Fingerprint

Dive into the research topics of 'Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud'. Together they form a unique fingerprint.

Cite this