2021
DOI: 10.1109/jiot.2020.3008906
|View full text |Cite
|
Sign up to set email alerts
|

Addressing Security and Privacy Issues of IoT Using Blockchain Technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
69
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 155 publications
(69 citation statements)
references
References 23 publications
0
69
0
Order By: Relevance
“…IoT is mostly modeled through a three-layer architecture, with a physical layer, a network layer, and an application layer. Each of these layers is vulnerable to certain types of attacks that challenge the security of IoT systems [9,10]. Unauthorized access to the network resources, as well as trust management and authentication issues are regarded as some of the most important threats for the network and application layer.…”
Section: Iot Platforms and Blockchain Solutionsmentioning
confidence: 99%
“…IoT is mostly modeled through a three-layer architecture, with a physical layer, a network layer, and an application layer. Each of these layers is vulnerable to certain types of attacks that challenge the security of IoT systems [9,10]. Unauthorized access to the network resources, as well as trust management and authentication issues are regarded as some of the most important threats for the network and application layer.…”
Section: Iot Platforms and Blockchain Solutionsmentioning
confidence: 99%
“…Mohanta et al [116] 2020 Analyzing blockchain for IoT security and privacy; Analyzing IoT security threats; Result-oriented case study analysis for the integration factors.…”
Section: References Year Contributionmentioning
confidence: 99%
“…Among them, the last module Compute R(i) with formula (3); (8) if s i ∈ S, then (9) Update Q-value with formula ( 12); ( 10) else (11) Update Q-value with formula ( 13); (12) endfor ALGORITHM 1: ABR optimization algorithm. 6 Mobile Information Systems can provide the reference for the adolescent physical training directly according to the monitored data.…”
Section: System Implementationmentioning
confidence: 99%
“…To the best of our knowledge, the traditional ABR optimization algorithms cannot obtain the realtime network status to adapt to the dynamic network environment. On the contrary, the AI-based ABR optimization algorithms can adaptively adjust the network parameters and obtain the relatively optimal video transmission [6]. In terms of AI, the Reinforcement Learning (RL) [7] is the most popular representative.…”
Section: Introductionmentioning
confidence: 99%