2020 IEEE International Conference on Blockchain (Blockchain) 2020
DOI: 10.1109/blockchain50366.2020.00071
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain Solution for Enhancing Cybersecurity Defence of IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(22 citation statements)
references
References 17 publications
0
21
0
1
Order By: Relevance
“…The literature review we present in this piece of literature, also suggest a set of security solutions for cordless sensor networks with respect to IoT [48,49,50]. In par-ticular, in terms of network computing, of decentralized architectures, made up of countless objects [15], such as the Blockchain [25] and cloud computing systems that ease network management and configuration [51,52], ameliorating thus the IoT secu-rity [53], through sensors that optimize the sending of data, avoiding thus the redun-dancy in the wireless channels by systems such as big data that improve networking [18,30,54,55].…”
Section: The Industrial Internet Of Things (Iiot)mentioning
confidence: 99%
See 3 more Smart Citations
“…The literature review we present in this piece of literature, also suggest a set of security solutions for cordless sensor networks with respect to IoT [48,49,50]. In par-ticular, in terms of network computing, of decentralized architectures, made up of countless objects [15], such as the Blockchain [25] and cloud computing systems that ease network management and configuration [51,52], ameliorating thus the IoT secu-rity [53], through sensors that optimize the sending of data, avoiding thus the redun-dancy in the wireless channels by systems such as big data that improve networking [18,30,54,55].…”
Section: The Industrial Internet Of Things (Iiot)mentioning
confidence: 99%
“…The primary concern for cyber security relies thus upon intrusion detection [23], in where physical or cloud computer activi-ties are monitored through analysis of system vulnerabilities and activity patterns [24]. The attacks could assume the form of, for example, Denial-Delay-of-Service (DDoS) [13], malicious IPs [25] and Data Manipulation [26], with ensuing outcomes, such as loss of information, operational losses and health damage [22,27].…”
Section: Cyber Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…Thus, the primary concern for cybersecurity relies upon intrusion detection [23], in which physical or cloud computer activities are monitored through analysis of system vulnerabilities and activity patterns [24]. Attacks may take the form of distributed denial of service (DDoS) [13], malicious IPs [25], and data manipulation [26], for instance, with ensuing outcomes such as loss of information, operational losses, and health damage [22,27].…”
Section: Cybersecuritymentioning
confidence: 99%