Frontiers of Computer Science

, Volume 13, Issue 6, pp 1198–1209 | Cite as

SMER: a secure method of exchanging resources in heterogeneous internet of things

  • Yu Zhang
  • Yuxing HanEmail author
  • Jiangtao Wen
Research Article


The number of IoT (Internet of things) connected devices increases rapidly. These devices have different operation systems and therefore cannot communicate with each other. As a result, the data they collected is limited within their own platform. Besides, IoT devices have very constrained resources like weak MCU (micro control unit) and limited storage. Therefore, they need direct communication method to cooperate with each other, or with the help of nearby devices with rich resources. In this paper, we propose a secure method to exchange resources (SMER) between heterogeneous IoT devices. In order to exchange resources among devices, SMER adopts a compensable mechanism for resource exchange and a series of security mechanisms to ensure the security of resource exchanges. Besides, SMER uses a smart contract based scheme to supervise resource exchange, which guarantees the safety and benefits of IoT devices. We also introduce a prototype system and make a comprehensive discussion.


Internet of things P2P resource exchange blockchain smart contract 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.



The work was kindly supported by Nanjing Yunyan Information Technology Ltd and Microsoft.

Supplementary material

11704_2018_6524_MOESM1_ESM.ppt (428 kb)
SMER: A Secure Method of Exchanging Resources in heterogeneous Internet of Things


  1. 1.
    Wörner D, Bomhard V T. When your sensor earns money: exchanging data for cash with bitcoin. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. 2014, 295–298Google Scholar
  2. 2.
    Shiraz M, Gani A, Khokhar R H, Buyya R. A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing. IEEE Communications Surveys & Tutorials, 2013, 15(3): 1294–1313CrossRefGoogle Scholar
  3. 3.
    Ma X, Cui Y, Wang L, Stojmenovic I. Energy optimizations for mobile terminals via computation offloading. In: Proceedings of 2012 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC). 2012, 236–241CrossRefGoogle Scholar
  4. 4.
    Cuervo E, Balasubramanian A, Cho D K, Wolman A, Saroiu S, Chandra R, Bahl P. Maui: making smartphones last longer with code offload. In: Proceedings of the 8th international conference on Mobile systems, applications, and services. 2010, 49–62Google Scholar
  5. 5.
    Chun B G, Ihm S, Maniatis P, Naik M, Patti A. Clonecloud: elastic execution between mobile device and cloud. In: Proceedings of the Sixth Conference on Computer Systems. 2011, 301–314Google Scholar
  6. 6.
    Hasan R, Hossain M M, Khan R. Aura: an iot based cloud infrastructure for localized mobile computation outsourcing. In: Proceedings of 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud). 2015, 183–188CrossRefGoogle Scholar
  7. 7.
    Al Noor S, Hasan R, Haque M M. Cellcloud: a novel cost effective formation of mobile cloud based on bidding incentives. In: Proceedings of 2014 IEEE 7th International Conference on Cloud Computing (CLOUD). 2014, 200–207CrossRefGoogle Scholar
  8. 8.
    Ferrer E C. The blockchain: a new framework for robotic swarm systems. 2016, arXiv preprint arXiv:1608.00695Google Scholar
  9. 9.
    Sikorski J J, Haughton J, Kraft M. Blockchain technology in the chemical industry: machine-to-machine electricity market. Applied Energy, 2017, 195: 234–246CrossRefGoogle Scholar
  10. 10.
    Christidis K, Devetsikiotis M. Blockchains and smart contracts for the internet of things. IEEE Access, 2016, 4: 2292–2303CrossRefGoogle Scholar
  11. 11.
    Lowe D G. Object recognition from local scale-invariant features. In: Proceedings of the 7th IEEE international conference on Computer Vision. 1999, 1150–1157Google Scholar
  12. 12.
    Muja M, Lowe D G. Fast approximate nearest neighbors with automatic algorithm configuration. In: Proceedings of International Conference on Computer Vision Theory and Application (VISAPP), 2009, 331–340Google Scholar

Copyright information

© Higher Education Press and Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Computer Science and Technology DepartmentTsinghua UniversityBeijingChina
  2. 2.Engineering CollegeSouth China Agricultural UniversityGuangzhouChina

Personalised recommendations