2022
DOI: 10.1109/jiot.2021.3125190
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Based Shamir’s Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings

Abstract: The Industrial Internet of Things (IIoT), a typical Internet of Things (IoT) application, integrates the global industrial system with other advanced computing, analysis, and sensing technologies through Internet connectivity. Due to the limited storage and computing capacity of edge and IIoT devices, data sensed and collected by these devices are usually stored in the cloud. Encryption is commonly used to ensure privacy and confidentiality of IIoT data. However, the key used for data encryption and decryption… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 92 publications
(29 citation statements)
references
References 37 publications
0
29
0
Order By: Relevance
“…is solution point involves adopting the edge or fog computing architecture in conjunction with the IoT framework. e work of Yu et al [4] has stated this possibility numerous times with considerable arguments and evidence of this notion. It is one of the most notable results in this approach.…”
Section: Parallel Research Outcomes For Detecting Cyber Attacks Using...mentioning
confidence: 97%
“…is solution point involves adopting the edge or fog computing architecture in conjunction with the IoT framework. e work of Yu et al [4] has stated this possibility numerous times with considerable arguments and evidence of this notion. It is one of the most notable results in this approach.…”
Section: Parallel Research Outcomes For Detecting Cyber Attacks Using...mentioning
confidence: 97%
“…The light varies greatly in the enclosure environment. To further test the robustness of HE-Yolo to the luminance of light, the RGB image is converted into an HSV image [ 30 ], and the luminance coefficient α of 10 gradients is set and α ∈ {0.5, 0.6, 0.7 … 1.5}. 10 luminance coefficients are multiplied by the luminance V , respectively, and then converted into RGB images to obtain the testing set with 10 different luminances.…”
Section: Results and Analysismentioning
confidence: 99%
“…e light varies greatly in the enclosure environment. To further test the robustness of HE-Yolo to the luminance of light, the RGB image is converted into an HSV image [30], and the luminance coefficient α of 10 gradients is set and α ∈ 0.5, 0.6, 0.7 . .…”
Section: Analyzing the Influence Of Lighting Condition On The Recogni...mentioning
confidence: 99%
“…At present, food shortage is one of the most important problems faced by many regions in the world ( 1 ). This phenomenon is generally reflected in two aspects ( 2 ). For one thing, there is still room for improvement in current agricultural technology, which makes grain yield fail to meet the expectations ( 3 ).…”
Section: Introductionmentioning
confidence: 99%