Disruptive Technologies in Information Sciences VI 2022
DOI: 10.1117/12.2618301
|View full text |Cite
|
Sign up to set email alerts
|

An anomaly detecting blockchain strategy for secure IoT networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…To further reinforce the advantages introduced by a cognitive blockchain application, we expand on the implementation of a cognitive blockchain architecture within the fundamental methodology proposed by Alsadi et al The proposed method detailed in [2] is based on a network of interconnected IoT devices, where data transmission between nodes is validated through the device characteristics, or fingerprint, of each node. The consensus algorithm uses collective network connectivity and computational power to validate data being appended to the chain.…”
Section: Difficultymentioning
confidence: 99%
“…To further reinforce the advantages introduced by a cognitive blockchain application, we expand on the implementation of a cognitive blockchain architecture within the fundamental methodology proposed by Alsadi et al The proposed method detailed in [2] is based on a network of interconnected IoT devices, where data transmission between nodes is validated through the device characteristics, or fingerprint, of each node. The consensus algorithm uses collective network connectivity and computational power to validate data being appended to the chain.…”
Section: Difficultymentioning
confidence: 99%