2018 International Conference on Advances in Computing and Communication Engineering (ICACCE) 2018
DOI: 10.1109/icacce.2018.8441717
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-based Secure IoT Control Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…Hossain et al (2020) Survey the Blockchain-based Secure IoT Control Scheme. Mbarek et al (2020) The assessment researches the action towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure Basahel and Yamin (2020) The effect on security issues and open issues in IoT Hamad et al (2020) The investigation to finds the issues of the guide for security challenges in the IoT Berger et al, 2020) The investigation reviews how taxonomy, challenges and practice for IoT security and vulnerabilities Gaikwad et al (2015;Hossain et al, 2015;(Weber and Boban, 2016) Table 4: Continue Sisinni et al, 2018;Chen et al, 2018;Sun et al, 2018;Viriyasitavat et al, 2019;Dai et al, 2019) Sha et al, 2018Atlam et al, 2018;Forsstrom et al, 2018;Ali et al, 2020;Ni et al, 2018;Yu et al, 2018;Das et al, 2018;Singh et al, 2018;Omar and Basir, 2018;Reyna et al, 2018;Jeon et al, 2018;Javed et al, 2018;Banerjee et al, 2018;Li et al, 2018) Availability Mendez Mena et al (2018aChen et al, 2018;Khanna and Kaur (2019;Al-Sharekh and Al-Shqeerat, 2019;Atlam et al, 2018;Mendez Mena et al, 2018b;Nord et al, 2019;Grammatikis et al, 2019) Ali et al, 2020 Non-repudiation Choi et al (2018) Access control…”
Section: Future Iot Security Issuesmentioning
confidence: 99%
“…Hossain et al (2020) Survey the Blockchain-based Secure IoT Control Scheme. Mbarek et al (2020) The assessment researches the action towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure Basahel and Yamin (2020) The effect on security issues and open issues in IoT Hamad et al (2020) The investigation to finds the issues of the guide for security challenges in the IoT Berger et al, 2020) The investigation reviews how taxonomy, challenges and practice for IoT security and vulnerabilities Gaikwad et al (2015;Hossain et al, 2015;(Weber and Boban, 2016) Table 4: Continue Sisinni et al, 2018;Chen et al, 2018;Sun et al, 2018;Viriyasitavat et al, 2019;Dai et al, 2019) Sha et al, 2018Atlam et al, 2018;Forsstrom et al, 2018;Ali et al, 2020;Ni et al, 2018;Yu et al, 2018;Das et al, 2018;Singh et al, 2018;Omar and Basir, 2018;Reyna et al, 2018;Jeon et al, 2018;Javed et al, 2018;Banerjee et al, 2018;Li et al, 2018) Availability Mendez Mena et al (2018aChen et al, 2018;Khanna and Kaur (2019;Al-Sharekh and Al-Shqeerat, 2019;Atlam et al, 2018;Mendez Mena et al, 2018b;Nord et al, 2019;Grammatikis et al, 2019) Ali et al, 2020 Non-repudiation Choi et al (2018) Access control…”
Section: Future Iot Security Issuesmentioning
confidence: 99%
“…An IoT device residing on blockchain uses smart contracts to provide authentication, integrity, and non-repudiation. Due to the problem faced by IoT devices using centralized platform, a decentralized peer-to-peer based blockchain network is implemented in [114], which helps in preventing data-tampering by intruders. The GIDDI solution proposed in [92] is IoT-scaled and IoT-owned.…”
Section: Authenticationmentioning
confidence: 99%
“…Fog nodes provide scalability by carrying out computation related tasks to communicate with blockchain and authenticate devices. The security analysis is also conducted, which shows that the proposed solution achieves security Item Contributions [114] Proposes a decentralized peer-to-peer network to prevent data-tampering by intruders. [92] The blockchain stores metadata related to IoT devices, which provides scalability, authentication, and security.…”
Section: Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…Dorri et al 30 propose a blockchain-based smart home framework in which each smart home is equipped with an always-online device with ample resources, known as a miner, which is responsible for handling all communication within and outside the home, and also preserves a private and secure blockchain used for controlling and auditing communications, and analyzes its security with respect to the fundamental goals of confidentiality, integrity, and availability. Choi et al 31 implement a scheme to securely control IoT devices using smart contracts, which provides guaranteed authentication, nonrepudiation, and integrity without any central administration. The BIFIT 32 is a blockchain-based identity framework that enables a smart home to achieve identity self-management by end users through autonomously extracting appliances' signatures, creating blockchain-based identities for the appliance owners, and correlating appliances' signatures and owners' identities.…”
Section: Related Workmentioning
confidence: 99%