{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T09:47:42Z","timestamp":1693648062600},"reference-count":48,"publisher":"Association for Computing Machinery (ACM)","issue":"2","funder":[{"name":"Marie Sk\u0142odowska-Curie International Training Network European Joint Doctorate","award":["814177"]},{"name":"Law, Science and Technology Joint Doctorate - Rights of Internet of Everything"},{"name":"SERICS","award":["PE00000014"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Distrib. Ledger Technol."],"published-print":{"date-parts":[[2023,6,30]]},"abstract":"The rise of Internet-of-Things enables the development of smart applications devoted to improving the quality of life in urban and rural areas, thus fostering the creation of smart territories. However, some dislocated areas are underprivileged in providing such services due to the lack, inefficiency, or excessive cost of Internet access. Opportunistic networking techniques might aid in surmounting these problems. In this article, we propose a framework that relies on an untrusted Data Mule to carry data from an offline source to an online destination. In particular, we present a framework that enables the communication between different actors and a reward mechanism using Distributed Ledger Technologies, Smart Contracts, and Decentralized File Storage. The protocol involved in bringing a Client\u2019s message online and getting back a response is thoroughly explained in all its steps and then discussed on the most important trust and security issues. Finally, we evaluate such a protocol and the whole framework through a series of communication latency tests, an analysis of the Smart Contract usage, and simulations in which buses act as Data Mules. Our results suggest the feasibility of our proposal in a smart territory scenario.<\/jats:p>","DOI":"10.1145\/3587696","type":"journal-article","created":{"date-parts":[[2023,3,18]],"date-time":"2023-03-18T10:11:30Z","timestamp":1679134290000},"page":"1-28","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["InDaMul: Incentivized Data Mules for Opportunistic Networking Through Smart Contracts and Decentralized Systems"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4159-4269","authenticated-orcid":false,"given":"Mirko","family":"Zichichi","sequence":"first","affiliation":[{"name":"Ontology Engineering Group, Universidad Polit\u00e9cnica de Madrid"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7951-4682","authenticated-orcid":false,"given":"Luca","family":"Serena","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Bologna"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1911-4708","authenticated-orcid":false,"given":"Stefano","family":"Ferretti","sequence":"additional","affiliation":[{"name":"Department of Pure and Applied Sciences, University of Urbino \u201cCarlo Bo\u201d"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3690-6651","authenticated-orcid":false,"given":"Gabriele","family":"D\u2019angelo","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Bologna"}]}],"member":"320","published-online":{"date-parts":[[2023,6,8]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"2021. Dataset and scripts GitHub repository. Retrieved from https:\/\/github.com\/luca-Serena\/lunes-tdm-islands. Date Accessed December 2022."},{"key":"e_1_3_2_3_2","unstructured":"2021. Polygon - Ethereum.s Internet of Blockchains. Retrieved from https:\/\/polygon.technology. Date Accessed December 2022."},{"key":"e_1_3_2_4_2","unstructured":"2021. TruDaMul. Retrieved from https:\/\/github.com\/AnaNSi-research\/TruDaMul. Date Accessed December 2022."},{"key":"e_1_3_2_5_2","unstructured":"2021. Umbral-rs and tests. Retrieved from https:\/\/github.com\/miker83z\/umbral-rs. Date Accessed December 2022."},{"key":"e_1_3_2_6_2","volume-title":"Introduction to the Hash Function as a Personal Data Pseudonymisation Technique","author":"Datos Agencia Espanola Proteccion","year":"2019","unstructured":"Agencia Espanola Proteccion Datos. 2019. Introduction to the Hash Function as a Personal Data Pseudonymisation Technique. Technical Report. Retrieved from https:\/\/edps.europa.eu\/sites\/edp\/files\/publication\/19-10-30_aepd-edps_paper_hash_final_en.pdf."},{"key":"e_1_3_2_7_2","volume-title":"Proceedings of the 2008 IEEE Symposium on Computers and Communications","author":"Anastasi Giuseppe","year":"2008","unstructured":"Giuseppe Anastasi, Marco Conti, and Mario Di Francesco. 2008. Data collection in sensor networks with data mules: An integrated simulation analysis. In Proceedings of the 2008 IEEE Symposium on Computers and Communications. IEEE."},{"key":"e_1_3_2_8_2","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1007\/978-3-031-18283-9_17","volume-title":"Proceedings of the International Conference on Financial Cryptography and Data Security","author":"Avarikioti Zeta","year":"2022","unstructured":"Zeta Avarikioti, Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Samarth Tiwari, and Michelle Yeo. 2022. Hide & seek: Privacy-preserving rebalancing on payment channel networks. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 358\u2013373."},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2016.7947854"},{"key":"e_1_3_2_10_2","first-page":"1","volume-title":"Proceedings of the 2018 International Joint Conference on Neural Networks","author":"Barbosa Alexandre C.","year":"2018","unstructured":"Alexandre C. Barbosa, Thays A. Oliveira, and Vitor N. Coelho. 2018. Cryptocurrencies for smart territories: An exploratory study. In Proceedings of the 2018 International Joint Conference on Neural Networks. IEEE, 1\u20138."},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-6470-7_3"},{"key":"e_1_3_2_12_2","unstructured":"Juan Benet. 2014. IPFS-content addressed versioned P2P file system. Retrieved from https:\/\/ipfs.io\/ipfs\/QmR7GSQM93Cx5eAg6a6yRzNde1FQv7uL6X1o4k7zrJa3LX\/ipfs.draft3.pdf. Date Accessed December 2022."},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1023\/B:WINE.0000036458.88990.e5"},{"key":"e_1_3_2_14_2","unstructured":"Vitalik Buterin. 2013. Ethereum white paper. Retrieved from https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper. Date Accessed December 2022."},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36978-3_9"},{"key":"e_1_3_2_16_2","doi-asserted-by":"crossref","DOI":"10.5220\/0006270005590566","article-title":"Stealth address and key management techniques in blockchain systems. In","author":"Courtois Nicolas T.","year":"2017","unstructured":"Nicolas T. Courtois and Rebekah Mercer. 2017. Stealth address and key management techniques in blockchain systems. InProceedings of the 3rd International Conference on Information Systems Security and Privacy.","journal-title":"Proceedings of the 3rd International Conference on Information Systems Security and Privacy"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/730760"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2016.10.008"},{"key":"e_1_3_2_19_2","doi-asserted-by":"crossref","unstructured":"Enes Erdin Suat Mercan and Kemal Akkaya. 2021. An evaluation of cryptocurrency payment channel networks and their privacy implications. arXiv:2102.02659. Retrieved from https:\/\/arxiv.org\/abs\/2102.02659","DOI":"10.52953\/CLBL7402"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0921-8890(98)00029-3"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2876766"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.12.006"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2016.7543862"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2016.7543862"},{"key":"e_1_3_2_25_2","volume-title":"Blockchain and the General Data Protection Regulation: Can Distributed Ledgers be Squared with European Data Protection Law?: Study","author":"Finck Mich\u00e8le","year":"2019","unstructured":"Mich\u00e8le Finck. 2019. Blockchain and the General Data Protection Regulation: Can Distributed Ledgers be Squared with European Data Protection Law?: Study. European Parliament."},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8883501"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1111\/tgis.12305"},{"key":"e_1_3_2_28_2","article-title":"The rising importance of the \u201dSmart territory\u201d concept: Definition and implications","volume":"99","author":"Nav\u00edo-Marco Julio","year":"2020","unstructured":"Julio Nav\u00edo-Marco, Beatriz Rodrigo-Moya, and Paolo Gerli. 2020. The rising importance of the \u201dSmart territory\u201d concept: Definition and implications. Land Use Policy 99 (2020), 105003\u2013105007.","journal-title":"Land Use Policy"},{"key":"e_1_3_2_29_2","unstructured":"Joseph Poon and Thaddeus Dryja. 2015. The bitcoin lightning network: Scalable On-Chain Instant Payments. Retrieved from https:\/\/1bitcoin.ca\/s\/lightning-network-paper.pdf. Accessed Date December 2022."},{"key":"e_1_3_2_30_2","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/978-981-15-1078-6_10","volume-title":"Methods and Applications for Modeling and Simulation of Complex Systems. AsiaSim 2019","author":"Rosa Edoardo","year":"2019","unstructured":"Edoardo Rosa, Gabriele D\u2019Angelo, and Stefano Ferretti. 2019. Agent-based simulation of blockchains. In Methods and Applications for Modeling and Simulation of Complex Systems. AsiaSim 2019. G. Tan, A. Lehmann, Y. Teo, and W. Cai (Eds.), Springer, 115\u2013126."},{"key":"e_1_3_2_31_2","article-title":"Security analysis of distributed ledgers and blockchains through agent-based simulation","volume":"114","author":"Serena Luca","year":"2022","unstructured":"Luca Serena, Gabriele D\u2019Angelo, and Stefano Ferretti. 2022. Security analysis of distributed ledgers and blockchains through agent-based simulation. Simulation Modelling Practice and Theory 114 (2022), 102413\u2013102417.","journal-title":"Simulation Modelling Practice and Theory"},{"key":"e_1_3_2_32_2","volume-title":"Proceedings of the 2021 Annual Modeling and Simulation Conference","author":"Serena Luca","year":"2021","unstructured":"Luca Serena, Mirko Zichichi, Gabriele D\u2019Angelo, and Stefano Ferretti. 2021. Simulation of dissemination strategies on temporal networks. In Proceedings of the 2021 Annual Modeling and Simulation Conference. IEEE."},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00003-9"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_35_2","volume-title":"Proceedings of the International Conference on Blockchain Economics, Security and Protocols","author":"Spain Michael","year":"2020","unstructured":"Michael Spain, Sean Foley, and Vincent Gramoli. 2020. The impact of Ethereum throughput and fees on transaction latency during ICOs. In Proceedings of the International Conference on Blockchain Economics, Security and Protocols. Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik."},{"key":"e_1_3_2_36_2","first-page":"1499","volume-title":"Proceedings of the 2018 IEEE International Conference on Internet of Things","author":"Steichen Mathis","year":"2018","unstructured":"Mathis Steichen, Beltran Fiz, Robert Norvill, Wazen Shbair, and Radu State. 2018. Blockchain-based, decentralized access control for IPFS. In Proceedings of the 2018 IEEE International Conference on Internet of Things. IEEE, 1499\u20131506."},{"issue":"1","key":"e_1_3_2_37_2","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1109\/TMC.2009.113","article-title":"Optimal speed control of mobile node for data collection in sensor networks","volume":"9","author":"Sugihara Ryo","year":"2009","unstructured":"Ryo Sugihara and Rajesh K. Gupta. 2009. Optimal speed control of mobile node for data collection in sensor networks. IEEE Transactions on Mobile Computing 9, 1 (2009), 127\u2013139.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3392147"},{"key":"e_1_3_2_39_2","unstructured":"Steffen Hess Katalin Kolosy Eamon O.Hara Veneta Paneva and Paul Soto. 2018. Smart villages: revitalising rural services. EU Rural Review Vol. 26 (2018) 1\u201352."},{"key":"e_1_3_2_40_2","article-title":"ERC-20 Token Standard","author":"Vogelsteller Fabian","year":"2015","unstructured":"Fabian Vogelsteller and Vitalik Buterin. 2015. ERC-20 Token Standard. Ethereum Foundation (Stiftung Ethereum), Zug.","journal-title":"Ethereum Foundation (Stiftung Ethereum), Zug"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2851611"},{"issue":"4","key":"e_1_3_2_42_2","article-title":"Throughput analysis of vehicular internet access via roadside WiFi hotspot","volume":"68","author":"Xu Wenchao","year":"2019","unstructured":"Wenchao Xu, Weisen Shi, Feng Lyu, Haibo Zhou, Nan Cheng, and Xuemin Shen. 2019. Throughput analysis of vehicular internet access via roadside WiFi hotspot. IEEE Transactions on Vehicular Technology 68, 4 (2019), 3980\u20133991.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"e_1_3_2_43_2","volume-title":"Proceedings of the 2021 11th IFIP International Conference on New Technologies, Mobility and Security","author":"Zhang Lin","year":"2021","unstructured":"Lin Zhang, Brian Lee, Yuhang Ye, and Yuansong Qiao. 2021. Evaluation of Ethereum end-to-end transaction latency. In Proceedings of the 2021 11th IFIP International Conference on New Technologies, Mobility and Security. IEEE."},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.5.2.130-143"},{"key":"e_1_3_2_45_2","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1016\/j.future.2019.12.019","article-title":"An overview on smart contracts: Challenges, advances and platforms","volume":"105","author":"Zheng Zibin","year":"2020","unstructured":"Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Weili Chen, Xiangping Chen, Jian Weng, and Muhammad Imran. 2020. An overview on smart contracts: Challenges, advances and platforms. Future Generation Computer Systems 105, C (2020), 475\u2013491.","journal-title":"Future Generation Computer Systems"},{"key":"e_1_3_2_46_2","volume-title":"Proceedings of the 2nd Workshop on Cryptocurrencies and Blockchains for Distributed Systems","author":"Zichichi Mirko","year":"2019","unstructured":"Mirko Zichichi, Michele Contu, Stefano Ferretti, and Gabriele D\u2019Angelo. 2019. LikeStarter: A smart-contract based social DAO for crowdfunding. In Proceedings of the 2nd Workshop on Cryptocurrencies and Blockchains for Distributed Systems."},{"key":"e_1_3_2_47_2","first-page":"1","volume-title":"Proceedings of the 2020 IEEE 17th Annual Consumer Communications & Networking Conference","author":"Zichichi Mirko","year":"2020","unstructured":"Mirko Zichichi, Stefano Ferretti, and Gabriele D\u2019Angelo. 2020. A distributed ledger based infrastructure for smart transportation system and social good. In Proceedings of the 2020 IEEE 17th Annual Consumer Communications & Networking Conference. IEEE, 1\u20136."},{"key":"e_1_3_2_48_2","first-page":"1","volume-title":"Proceedings of the 2020 IEEE 19th International Symposium on Network Computing and Applications","author":"Zichichi Mirko","year":"2020","unstructured":"Mirko Zichichi, Stefano Ferretti, Gabriele D\u2019Angelo, and V\u00edctor Rodr\u00edguez-Doncel. 2020. Personal data access control through distributed authorization. In Proceedings of the 2020 IEEE 19th International Symposium on Network Computing and Applications. IEEE, 1\u20134."},{"key":"e_1_3_2_49_2","article-title":"A framework based on distributed ledger technologies for data management and services in intelligent transportation systems","author":"Zichichi Mirko","year":"2020","unstructured":"Mirko Zichichi, Stefano Ferretti, and Gabriele D\u2019Angelo. 2020. A framework based on distributed ledger technologies for data management and services in intelligent transportation systems. IEEE Access 8 (2020), 100384\u2013100402.","journal-title":"IEEE Access"}],"container-title":["Distributed Ledger Technologies: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3587696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T09:19:15Z","timestamp":1686215955000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587696"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,8]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6,30]]}},"alternative-id":["10.1145\/3587696"],"URL":"https:\/\/doi.org\/10.1145\/3587696","relation":{},"ISSN":["2769-6472","2769-6480"],"issn-type":[{"value":"2769-6472","type":"print"},{"value":"2769-6480","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,8]]},"assertion":[{"value":"2022-07-04","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-05","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}