2022
DOI: 10.7717/peerj-cs.989
|View full text |Cite
|
Sign up to set email alerts
|

An efficient multilevel security architecture for blockchain-based IoT networks using principles of cellular automata

Abstract: The tremendous increase in the use of Internet of Things (IoT) has made an impact worldwide by changing the mode of day-to-day life. Like any other application, IoT based networks also have to be protected since the data produced consist of sensitive information. Existing algorithms for providing security in such networks do not consider all the security objectives. Starting from the sensing of data from IoT environment, the data have to be protected from several types of attacks. Also, the authentication of i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 54 publications
0
1
0
Order By: Relevance
“…The data need to be protected from different kinds of attacks as soon as they are sensed from the IoT world. Additionally, it needs to be possible to accomplish data integrity, access control, secrecy, and authentication of all concerned parties [64].…”
Section: Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…The data need to be protected from different kinds of attacks as soon as they are sensed from the IoT world. Additionally, it needs to be possible to accomplish data integrity, access control, secrecy, and authentication of all concerned parties [64].…”
Section: Authenticationmentioning
confidence: 99%
“…A novel security design was put forth by Ali and Mathew [64] for distributed IoT apps. The most popular lightweight encryption in the design is ChaCha20.…”
Section: Authenticationmentioning
confidence: 99%
“…The scheme uses cipher ChaCha20 and cellular automata to gain more security and randomness. The same authors claimed that their scheme enhances security and protects against all kinds of attacks by providing multiple levels of encryption; however, their scheme is not flexible and cannot minimize the chances of leakages [ 32 ]. In [ 33 ], the authors proposed a scheme that transmitted the data securely between cloud service and Internet of vehicles (IoV) devices.…”
Section: Literature Reviewmentioning
confidence: 99%