2019
DOI: 10.1016/j.jpdc.2019.06.001
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain based privacy-preserving software updates with proof-of-delivery for Internet of Things

Abstract: A large number of IoT devices are connected via the Internet. However, most of these IoT devices are generally not perfect-by-design even have security weaknesses or vulnerabilities. Thus, it is essential to update these IoT devices securely, patching their vulnerabilities and protecting the safety of the involved users. Existing studies deliver secure and reliable updates based on blockchain network which serves as the transmission network. However, these approaches could compromise users privacy when updatin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
16
0
4

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(22 citation statements)
references
References 35 publications
0
16
0
4
Order By: Relevance
“…It is a low-cost, low-overhead tool for compute-resource management. Zhao et al [ 116 ] Software update protocol It is a blockchain based privacy-preserving protocol, which delivers secure and reliable updates for the IoT devices with an incentive mechanism while protects the privacy of involved users. …”
Section: Resource-driven Smart Contract Usagementioning
confidence: 99%
See 1 more Smart Citation
“…It is a low-cost, low-overhead tool for compute-resource management. Zhao et al [ 116 ] Software update protocol It is a blockchain based privacy-preserving protocol, which delivers secure and reliable updates for the IoT devices with an incentive mechanism while protects the privacy of involved users. …”
Section: Resource-driven Smart Contract Usagementioning
confidence: 99%
“…Specifically, smart contracts are chosen to guarantee authentication, synchronization, and data integrity while running on top of a decentralized and transparent network. Table 8 presents some newly proposed device management-centric solutions [ 29 , 45 , 58 , 90 , 96 , 104 , 116 ]. For instance, Ellul and Pace [ 29 ] have proposed a split-virtual machine architecture to enable the integration of resource-constrained devices with blockchain systems, called AlkylVM.…”
Section: Resource-driven Smart Contract Usagementioning
confidence: 99%
“…Therefore, a robust authentication scheme securing this communication is essential. Recently, a lot of works have been conducted to address security and privacy for sensitive information distributed using IoT devices in mobility networks or edge computing networks [11]- [15].…”
Section: Introductionmentioning
confidence: 99%
“…Chen et al [9] proposed a distributed blockchain model to protect the sensitive information of users, and a protocol for maintaining the blockchain ledger were proposed to maintain the good operation of the client system. Zhao et al [10] proposed new privacy protection software which updated protocol based on blockchain, and the delivery certificate of Internet of Things is analyzed.…”
Section: Introductionmentioning
confidence: 99%