Increasing privacy and security by integrating a Blockchain Secure Interface into an IoT Device Security Gateway Architecture
Reads0
Chats0
TLDR
In this article, the authors proposed a method for introducing a basic interface to an IoT device's security gateway architecture along with blockchain to provide decentralization and authentication, which adds much needed anonymity and versatility to IoT infrastructure, which is currently lacking.About:
This article is published in Energy Reports.The article was published on 2021-11-01 and is currently open access. It has received 22 citations till now. The article focuses on the topics: Authentication & Encryption.read more
Citations
More filters
Journal ArticleDOI
An Empirical Study of Mobile Commerce and Customers Security Perception in Saudi Arabia
Hina Gull,Saqib Saeed,Sardar Zafar Iqbal,Yasser A. Bamarouf,Mohammed A. Alqahtani,Dina A. Alabbad,Madeeha Saqib,Saeed Hussein Al Qahtani,Albandary Alamer +8 more
TL;DR: A model to improve customers’ security perception in Saudi Arabia is presented and different actions for practitioners and policymakers that help in improving security infrastructure, authentication mechanisms, and trustworthiness are outlined.
Journal ArticleDOI
Secure Intelligent Fuzzy Blockchain Framework: Effective Threat Detection in IoT Networks
TL;DR: In this article , the authors proposed a secure, intelligent fuzzy blockchain framework that utilizes a novel fuzzy DL model, optimized adaptive neuro-fuzzy inference system (ANFIS)-based attack detection, fuzzy matching (FM), and fuzzy control system (FCS) for detection of network attacks.
Journal ArticleDOI
Leveraging Blockchain Technology for Ensuring Security and Privacy Aspects in Internet of Things: A Systematic Literature Review
TL;DR: In this paper , the authors provide a review of state-of-the-art approaches of blockchain and IoT integration, specifically in order to solve certain security and privacy related issues.
Book ChapterDOI
Integration of IoT and Blockchain for Smart and Secured Supply Chain Management
TL;DR: The authors examine the current environment of the development, including Chinese government policies and the industry situation, and compare the different characteristics of Industry 4.0 before and after digitization by combining the two digital technologies.
References
More filters
Journal ArticleDOI
Standardized Protocol Stack for the Internet of (Important) Things
Maria Rita Palattella,Nicola Accettura,Xavier Vilajosana,Thomas Watteyne,Luigi Alfredo Grieco,Gennaro Boggia,Mischa Dohler +6 more
TL;DR: The wireless communications stack the industry believes to meet the important criteria of power-efficiency, reliability and Internet connectivity, and the protocol stack proposed in the present work converges towards the standardized notations of the ISO/OSI and TCP/IP stacks is proposed.
Proceedings ArticleDOI
Internet of things (IoT) security: Current status, challenges and prospective measures
TL;DR: An overview of security principles, technological and security challenges, proposed countermeasures, and the future directions for securing the IoT is presented.
Journal ArticleDOI
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks
Mohamed Abomhara,Geir M. Køien +1 more
TL;DR: This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT devices and services, and to comprehensively understand the threats and attacks on IoT infrastructure.
Journal ArticleDOI
Blockchain technology for security issues and challenges in IoT
TL;DR: This paper elaborates the possible security and privacy issues considering the component interaction in IoT and studies how the distributed ledger based blockchain (DL-BC) technology contribute to it.
Book
Computer and Information Security Handbook
TL;DR: This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a PKI to secure existing and future applications and will include discussion of vulnerability scanners to detect security weaknesses and prevention techniques.