2021
DOI: 10.1109/tii.2020.3012508
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Based IIoT Data Sharing Framework for SDN-Enabled Pervasive Edge Computing

Abstract: Pervasive Edge Computing(PEC) is an emerging paradigm for the Industrial Internet of Things(IIoT), and software-defined networks(SDN) offer lower latency services and massive intelligent devices connectivity for the IIoT. However, the PEC has some issues with data security and privacy while PEC devices sharing data among edges. What's more, the centralized SDN suffers from single point of attacks such as DDoS from IIoT devices and has the challenge of data leakage. In this paper, we use blockchain and proxy re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 42 publications
(23 citation statements)
references
References 20 publications
0
23
0
Order By: Relevance
“…Considering Fog and Edge computing, [9] proposes to exploit SDN to deliver and deploy new services in IoT environments in a faster and more cost-effective manner. The SDN approach can be also adopted together with Blockchain, e.g., to deliver a fully-distributed Cloud architecture based on Fog nodes [10] or to improve credibility and authenticity of nodes while addressing the issues associated with the fact that the SDN controller represents a single point of attack [11]. Finally, SDN is fruitfully adopted to support load balancing in Fog environments [12], [13].…”
Section: Related Workmentioning
confidence: 99%
“…Considering Fog and Edge computing, [9] proposes to exploit SDN to deliver and deploy new services in IoT environments in a faster and more cost-effective manner. The SDN approach can be also adopted together with Blockchain, e.g., to deliver a fully-distributed Cloud architecture based on Fog nodes [10] or to improve credibility and authenticity of nodes while addressing the issues associated with the fact that the SDN controller represents a single point of attack [11]. Finally, SDN is fruitfully adopted to support load balancing in Fog environments [12], [13].…”
Section: Related Workmentioning
confidence: 99%
“…Yunlong Liu et al designed a blockchain empowered secure data sharing architecture for distributed multiple parties to solve the privacy issue in federal learning data transmission [14]. In other application scenarios, such as software-defined networks [15], mobileedge computing [16], and smart grid networks [17], blockchain has also been used to protect the security and privacy of data sharing.…”
Section: Blockchain On the Edgementioning
confidence: 99%
“…Endpoint security management is the policy that is developed to guarantee the safety and security of all the endpoint devices in a network [20]. It is part of an extensive cybersecurity program, a modern need for small local companies and big multinationals [21]. There is limited guidance and management of IoT devices for the life cycle, and limited best practice is available for IoT developers.…”
Section: Introductionmentioning
confidence: 99%