| 研究生: |
翁子鈞 Weng, Tzu-Chun |
|---|---|
| 論文名稱: |
基於信任演算法交易機制之可靠物聯網資料經濟體系 A Reliable IoT Data Economic System Based on Trust-based Algorithmic Trading Mechanism |
| 指導教授: |
郭耀煌
Kuo, Yau-Hwang |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Department of Computer Science and Information Engineering |
| 論文出版年: | 2017 |
| 畢業學年度: | 105 |
| 語文別: | 英文 |
| 論文頁數: | 75 |
| 中文關鍵詞: | 物聯網 、資料經濟 、演算法交易 、區塊鏈 |
| 外文關鍵詞: | Internet of Things, Data Economics, Algorithmic Trading, Blockchain |
| 相關次數: | 點閱:81 下載:5 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著物聯網技術的日益成熟,人們開始享受到物聯網服務所帶來的便利生活。一般而言,一個好的物聯網服務需要倚賴大量的資料分析,而隨處可見的物聯網裝置將能提供資料分析時所需的大量資料。在此供需齊備的情況下,物聯網資料經濟體系的建立勢在必行。而一個完整的物聯網資料經濟體系強調交易流程的可靠度、智慧化與自動化。然而,現有的資料交易機制無法滿足全部需求,因此需要設計一套完整的資料交易機制來建立可靠的物聯網資料經濟體系。
本論文所提出的資料交易機制由五個元件所組成:基於區塊鏈金流、安全資料流、紛爭處理、智慧決策以及鏈下資訊管理。首先,為了保證金流的可靠性,我們利用區塊鏈的技術來滿足交易紀錄公開且無法篡改的需求;為了達到資料流的安全性,資料將透過安全資料流模組建立的安全通道進行傳遞;而利用特殊設計的智慧合約,金流和資料流將可進一步整合,藉此保證買方能取得想要的資料而賣方能獲取預期的報酬。另外,本機制特別提供紛爭處理流程來處理可能發生的交易糾紛。在智慧化的部份,買方依據自身的資訊,透過價值評估模組與信任模組購買期望性價比最高的資料。而供應商則透過價值評估模組,估計交易目標價值曲線並進行合理出價,以獲取自身最高收益。為了能真正將本資料經濟系統應用在物聯網服務中,上述機制皆能自動運作。
最後,本論文將所提之系統實際建立在資源受限的裝置上,並進一步設計三種應用情境,包括物聯網自動資料交易、交易紛爭處理以及智慧決策等案例,藉以展示此系統的實際執行流程與結果。由上述應用情境結果顯示,本論文所提之資料交易系統實現了自動化、智慧化和值得信賴的物聯網資料經濟體系。
With the advance of Internet of Things (IoT) technology, we humans start to enjoy our comfortable life provided by various IoT services. Generally, providing good IoT services requires a large scale of data analyses, and the ubiquitous IoT devices can provide numerous data for these services. Since the existence of both demands and supplies, an IoT Data Economic System should be further established. A complete IoT Economic System usually emphasizes the reliability, intelligence, and automation during transactions. However, the existing trading mechanisms fail to satisfy all these requirements and therefore providing a complete trading mechanism to sustain the reliable IoT Data Economic System becomes a necessity.
The proposed trading mechanism is composed of five components including Blockchain-based Financial Flow, Secure Data Flow, Dispute Handling, Smart Decision Making and Off-Chain Information Manager. First, to ensure the reliability of financial flow, the blockchain technology is applied to record transactions transparently without be manipulated. To protect data flow, data will be delivered by secure channels created by Secure Data Flow Component. By utilizing the special-designed smart contract, the procedure of financial flow and data flow can further be integrated. It guarantees that buyers can obtain their expected data while sellers can gain deserved benefit. Moreover, the proposed mechanism provides a dispute handling procedure to deal with the arguments during transactions.
To meet the requirements of intelligence, buyers can apply the Value Evaluation Module and Trust Module to purchase data with the highest C/P ratio based on their personal information. Also, after estimating the pricing model of targets, suppliers can make a reasonable price by employing the Value Evaluation Module and then obtain the maximum revenue. To further perform the proposed IoT Data Economic System in IoT services, the above-mentioned mechanisms can be executed automatically.
Finally, the proposed system has already been implemented in resource-constrained IoT devices. Moreover, three kinds of scenarios including automatic IoT data trading, trading dispute handling, and smart decision making, are proposed to demonstrate the trading processes and their results. According to the execution results of these three scenarios, the proposed IoT data trading mechanism can fulfill the reliability, intelligence, and automation requirements of an IoT Data Economic System.
Luigi Atzoria, Antonio Ierab, Giacomo Morabitoc, Michele Nitti, “The Social Internet of Things (SIoT)” – When Social Networks Meet the Internet of Things: Concept, Architecture and Network Characterization,” Computer Networks, Vol. 56, No. 16, pp. 3594-3608, 2002.
John Martin Currie, John A. Murphy, Andrew Schmitz, “The Concept of Economic Surplus and Its Use in Economic Analysis,” The Economic Journal, Vol. 81, No. 324, pp. 741-799, 1971
Ethereum ”Clique PoA protocol & Rinkeby PoA testnet #225” Available: https://github.com/ethereum/EIPs/issues/225
Ethereum White Paper “A Next-Generation Smart Contract and Decentralized Application Platform” Available: https://github.com/ethereum/wiki/wiki/White-Paper
filecoin.io, “Filecoin: A Cryptocurrency Operated File Storage Network” Available : https://filecoin.io/filecoin.pdf.
Gartner, “8.4 Billion Connected "Things" Will Be in Use in 2017, Up 31 Percent From 2016” Available: http://www.gartner.com/newsroom/id/3598917
Robert Harmon, Haluk Demirkan, Bill Hefley, Nora Auseklis, “Pricing Strategies for Information Technology Services: A Value-Based Approach,” Proceeding of the 42nd Hawaii International Conference on System Sciences, pp.1-10,2009
Sayed Hadi Hashemi, Faraz Faghri, Paul Rausch, Roy H Campbell “World of Empowered IoT Users” 2016 IEEE First International Conference on Internet-of-Things Design and Implementation(IOTDI), 2016.
Christoph Jentzsch “Public vs Private chain” Available: https://blog.slock.it/public-vs-private-chain-7b7ca45044f
Ranko Maric, Tomislav Grgic, Matijasevic, Ignac Lovrek, “Online Charging Based on Machine Context for M2M Communication in LTE,” International Conference on Wired/Wireless Internet Communication(WWIC), pp.18-31, 2015
McKinsey & Company “IoT to add up 11.1 trillion to global economy by 2025” Available: http://www.consultancy.uk/news/2783/iot-to-add-up-to-111-trillion-to-global-economy-by-2025
Satoshi Nakamoto “Bitcoin: A Peer-to-peer Electronic Cash System” Available: https://bitcoin.org/bitcoin.pdf
Giuseppe Nuti, Mahnoosh Mirghaemi, Philip Treleaven, Chaiyakorn Yingsaeree, “Algorithmic Trading” 2011 IEEE Computer, Vol.44, pp.61-69, 2011.
Aiyappa Pasura, Lynette Ryals, “Pricing for value in ICT, ” Journal of Targeting, Measurement and Analysis for Marketing, Vol.14, No.1, pp. 47-61, 2005
Dumitru Roman, Gatti Stefano “Towards a Reference Architecture for Trusted Data Marketplaces: The Credit Scoring Perspective” 2016 International Conference on Open and Big Data(OBD), 2016.
John Rose, Olaf Rehse, Bjorn Rober, “The value of our digital identity”. Boston Consulting Group. Available via http://www.libertyglobal.com/PDF/public-policy/The-Value-of-Our-Digital-Identity.pdf
Wenbo Shi, “A sealed-bid multi-attribute auction protocol with strong bid privacy and bidder privacy,” Security and Communication Networks, Vol. 6, No. 10, pp. 1281–1289, 2013
T. R. Srinath, Samrat Kella, Mamata Jenamani, “A new secure protocol for multi-attribute multi-round e-reverse auction using online trusted third party,” Second International Conference on Emerging Applications of Information Technology, pp. 149-152, 2011
Gavin Wood, “Ethereum:A Secure Dencentralised Generalised Transaction Ledger,” Available: https://ethereum.github.io/yellowpaper/paper.pdf
CCITT X.800, “Security Architecture for Open Systems Interconnection for CCITT Applications,” 1991.
ITU-T X.805, “Security Architecture for System Providing End-to-end Communications,” 2003.
Shusen Yang, Usman Adeel, Julie A. McCann, “Selfish mules: Social profit maximization in sparse sensornets using rationally-selfish human relays,” 2013 IEEE Journal on Selected Areas in Communications, Vol. 31, No. 6, pp.1124-1134 2013.
Zhenzhe Zheng, Yanqing Peng, Shaojie Tang, and Guihai Chen, “Trading Data in the Crowd: Profit-Driven Data Acquisition for Mobile Crowdsensing,” IEEE Journal on Selected Areas in Communications, Vol. 35, No. 2, pp. 486 – 501, 2017