Trusted, Decentralized and Blockchain-Based M2M Application Service Provision

  • Besfort ShalaEmail author
  • Ulrich Trick
  • Armin Lehmann
  • Bogdan Ghita
  • Stavros Shiaeles
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 97)


Decentralized M2M service platforms enable the integration of end-user-based M2M applications and end-user-located M2M resources without the use of central entities or components in the system architecture. Sharing end-user-based M2M applications with other users’ part of an M2M community allows the creation of new and complex M2M applications. However, a fully decentralized system often leads to several trust issues regarding the behavior of end-users and M2M applications. A powerful measure to overcome possible limitations of decentralized M2M service platforms and to replace the missing control authority are trust relationships among the nodes. Therefore, this publication proposes a novel concept for trusted M2M application service provision. Moreover, it introduces the integration of blockchain elements and trust evaluation techniques to optimize the M2M application service provision. A trust consensus protocol is integrated in order to secure the decision-making process among the stakeholders which optimizes several aspects, such as peer joining, service registration and application configuration.


Trust P2P Blockchain M2M Security Service and application 



The research project P2P4M2M providing the basis for this publication is partially funded by the Federal Ministry of Education and Research (BMBF) of the Federal Republic of Germany under grant number 03FH022IX5. The authors of this publication are in charge of its content.


  1. 1.
    Kim, J., Lee, J., Kim, J., Yun, J.: M2M service platforms: survey, issues, and enabling technologies. IEEE Commun. Surv. Tutor. 16(1), 61–76 (2014)CrossRefGoogle Scholar
  2. 2.
    Steinheimer, M., Trick, U., Fuhrmann, W., Ghita, B.: Autonomous decentralised M2M application service provision. In: Proceedings of the Seventh International Conference on Internet Technologies and Applications (ITA 17), Wrexham, UK, pp. 18–23. IEEE (2018)Google Scholar
  3. 3.
    Kim, Y.J., Kim, E.K., Nam, B.W., Chong, I.: Service composition using new DSON platform architecture for M2M service. In: International Conference on Information Networking (lCOIN), pp. 114–119 (2012)Google Scholar
  4. 4.
    Steinheimer, M., Trick, U., Fuhrmann, W., Ghita, B., Frick, G.: M2M application service provision: an autonomous and decentralised approach. J. Commun. 12(9), 489–498 (2017)CrossRefGoogle Scholar
  5. 5.
    Shala, B., Trick, U., Lehmann, A., Ghita, B., Shiaeles, S.: Novel trust consensus protocol and blockchain-based trust evaluation system for M2M application services. IoT – Eng. Cyber Phys. Hum. Syst. 7, 100058 (2019). ISSN: 2542-6605CrossRefGoogle Scholar
  6. 6.
    Shala, B., Trick, U., Lehmann, A., Ghita, B., Shiaeles, S.: Trust-based composition of M2M application services. In: 10th IEEE International Conference on Ubiquitous and Future Networks (ICUFN 2018), Prague, Czech Republic (2018)Google Scholar
  7. 7.
    Shala, B., Trick, U., Lehmann, A., Ghita, B., Shiaeles, S.: Blockchain-based trust communities for decentralized M2M application services. In: Xhafa, F., Leu, F.Y., Ficco, M., Yang, C.T. (eds.) Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2018. Lecture Notes on Data Engineering and Communications Technologies, vol. 24. Springer, Cham (2018)Google Scholar
  8. 8.
    ITU-T, Recommendation Y.3052: Overview of trust provisioning in information and communication technology infrastructures and services (2017)Google Scholar
  9. 9.
    Distributed Ledger Technology: Beyond Blockchain. Government Office for Science (2016). Accessed 10 July 2019
  10. 10.
    Survey on Blockchain Technologies and Related Services FY 2015 Report, Japan (2016). Accessed 22 July 2019

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Besfort Shala
    • 1
    • 2
    Email author
  • Ulrich Trick
    • 1
  • Armin Lehmann
    • 1
  • Bogdan Ghita
    • 2
  • Stavros Shiaeles
    • 2
  1. 1.Research Group for Telecommunication NetworksFrankfurt University of Applied SciencesFrankfurt/M.Germany
  2. 2.Centre for Security, Communications and Network ResearchUniversity of PlymouthPlymouthUK

Personalised recommendations