Proof-of-work for securing IoT and autonomous systems
Abstract
A first device in a network issues a proof-of-work challenge to a second device in the network. The second device computes a cryptographic function result to satisfy a criterion indicated in the challenge. The second device returns a challenge response comprising inputs to the cryptographic function that the second device used to compute the cryptographic function result satisfying the criterion. The first device, upon receiving the challenge response, verifies that the inputs to the cryptographic function yield a result satisfying the criterion. Responsive to verifying the challenge response, the first device updates a blockchain based upon the challenge response.
- Inventors:
- Issue Date:
- Research Org.:
- Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
- Sponsoring Org.:
- USDOE National Nuclear Security Administration (NNSA)
- OSTI Identifier:
- 1805367
- Patent Number(s):
- 10887107
- Application Number:
- 15/980,505
- Assignee:
- National Technology & Engineering Solutions of Sandia, LLC (Albuquerque, NM)
- DOE Contract Number:
- NA0003525
- Resource Type:
- Patent
- Resource Relation:
- Patent File Date: 05/15/2018
- Country of Publication:
- United States
- Language:
- English
Citation Formats
Chan, Calvin. Proof-of-work for securing IoT and autonomous systems. United States: N. p., 2021.
Web.
Chan, Calvin. Proof-of-work for securing IoT and autonomous systems. United States.
Chan, Calvin. Tue .
"Proof-of-work for securing IoT and autonomous systems". United States. https://www.osti.gov/servlets/purl/1805367.
@article{osti_1805367,
title = {Proof-of-work for securing IoT and autonomous systems},
author = {Chan, Calvin},
abstractNote = {A first device in a network issues a proof-of-work challenge to a second device in the network. The second device computes a cryptographic function result to satisfy a criterion indicated in the challenge. The second device returns a challenge response comprising inputs to the cryptographic function that the second device used to compute the cryptographic function result satisfying the criterion. The first device, upon receiving the challenge response, verifies that the inputs to the cryptographic function yield a result satisfying the criterion. Responsive to verifying the challenge response, the first device updates a blockchain based upon the challenge response.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2021},
month = {1}
}