2022
DOI: 10.1016/j.micpro.2022.104455
|View full text |Cite
|
Sign up to set email alerts
|

A blockchain security scheme to support fog-based internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…is the threshold for responding to deployment and security based on the parameters ("send Network data, data confidentiality, accuracy, information integrity, accessibility, and attack detection"). It is clear that 𝑋 𝑖 1 is the best position for deployment, and response is very good, and 𝑋 Μ… 𝑖 1 is the worst position for deployment, and response is very bad. Using the social spider algorithm for the IoT deployment scenario based on the fog environment considering the security problem with the initial parameter 𝑖 to update the probability vector 𝑃(𝑑 + 1) as equation (13).…”
Section: Probabilistic Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…is the threshold for responding to deployment and security based on the parameters ("send Network data, data confidentiality, accuracy, information integrity, accessibility, and attack detection"). It is clear that 𝑋 𝑖 1 is the best position for deployment, and response is very good, and 𝑋 Μ… 𝑖 1 is the worst position for deployment, and response is very bad. Using the social spider algorithm for the IoT deployment scenario based on the fog environment considering the security problem with the initial parameter 𝑖 to update the probability vector 𝑃(𝑑 + 1) as equation (13).…”
Section: Probabilistic Detectionmentioning
confidence: 99%
“…Any computer network needs security and privacy issues due to unauthorized access. System protection against any malicious activity or data information theft, hardware, and software is provided as a definition of computer security [1] and cyber security as protection of data in the network [2]. Three important issues in security should be mentioned, which include the following :…”
Section: Introductionmentioning
confidence: 99%
“…FC and BC were combined to provide a new platform to address these issues. Mohapatra et al [ 229 ] presented a secure data exchange system for IoT devices based on BC with FC integration. The authors proposed two software agents: a BC creation software agent deployed in FC, and a network of IoT device monitoring software agents.…”
Section: Blockchain-fog Computing Purposesmentioning
confidence: 99%
“…As a result, BC is protected by distributing data over a large number of linked fog nodes. Authors proposed several architectural designs to support security in FC environment ([ 81 , 84 , 104 , 120 , 139 ]): to protect against frauds ([ 73 , 147 , 149 , 164 , 168 , 181 , 221 – 223 ]), to enhance and achieve data confidentiality ([ 48 , 123 , 192 , 229 ]), to enhance and achieve data integrity ([ 32 , 58 , 61 , 87 , 94 , 127 , 193 , 227 ]), and to achieve data availability ([ 137 , 192 , 204 ]). The majority of the selected studies under this category reported that BC can help against fraud attacks in FC, followed by data integrity purpose, and the least purpose mentioned was to achieve data availability.…”
Section: Blockchain-fog Computing Purposesmentioning
confidence: 99%
“…[36] is summarized recent research on IoT-enabled smart city applications with a focused on highlighting resource limitations, including restricted processing, limited (energy, storage, and bandwidth). Finally in [37] This study suggested a blockchain-based fog-based secure data exchange framework for Internet of Things devices.…”
Section: Introductionmentioning
confidence: 99%