2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2020
DOI: 10.1109/itnec48623.2020.9084997
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-based Security Approach Architecture for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…In CPSs, data can be captured by physical objects or sensors and transmitted to a control system over a network. Physical devices are increasingly equipped with barcodes and RFID tags that can be scanned by smart devices, sending identified information over the Internet to monitor and manage the physical environment [23]. At the same time, computing and processing units can be placed in the cloud, where decisions are generated and sent to physical objects [22].…”
Section: Research On Cpss Security Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…In CPSs, data can be captured by physical objects or sensors and transmitted to a control system over a network. Physical devices are increasingly equipped with barcodes and RFID tags that can be scanned by smart devices, sending identified information over the Internet to monitor and manage the physical environment [23]. At the same time, computing and processing units can be placed in the cloud, where decisions are generated and sent to physical objects [22].…”
Section: Research On Cpss Security Issuesmentioning
confidence: 99%
“…This layer also receives and processes information from the perception layer and then determines the automated actions that need to be performed [22]. Cloud computing and data mining algorithms are used to manage this layer of data [23]. In addition, this layer requires a robust multi-factor authentication process to prevent unauthorized access [24].…”
Section: Introductionmentioning
confidence: 99%
“…According to the topology model constructed above, the connectivity test and network protocol design of the multi-protocol intelligent data exchange node are performed to improve the balance of network output and data exchange [11].…”
Section: Data Exchange Topology Modelmentioning
confidence: 99%