2018 27th International Conference on Computer Communication and Networks (ICCCN) 2018
DOI: 10.1109/icccn.2018.8487447
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual Design

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…In the proposed method, CHs are pre-selected to detect malicious nodes. In [281], the authors introduce a security layer in IoT to detect and isolate malicious nodes based on clustering techniques. They consider CHs as resource-rich nodes which are simultaneously miners and also keep a copy of nodes' firmware.…”
Section: A Blockchain and Iotmentioning
confidence: 99%
“…In the proposed method, CHs are pre-selected to detect malicious nodes. In [281], the authors introduce a security layer in IoT to detect and isolate malicious nodes based on clustering techniques. They consider CHs as resource-rich nodes which are simultaneously miners and also keep a copy of nodes' firmware.…”
Section: A Blockchain and Iotmentioning
confidence: 99%
“…The development phase of IIoT includes data collection and storage, production management and analysis, business intelligence and decision making, and business model change [26]. For the IIoT implementation, the most critical issues are the security of the data [27], the trust of network [28], and isolation connection [29].…”
Section: Blockchain and Iiot A The Problems Of Iiotmentioning
confidence: 99%
“…Prior research efforts have made significant progress in addressing the scalability concerns of RA protocols. Many have explored the use of blockchain technologies [1], [2], [3], [4], [5], [6], [7], [8] or the integration of proxy verifiers [2]. However, the inherent interactivity of attestation mechanisms and the need for privileged access to confidential data during the attestation finalization process continue to hinder significant scalability improvements.…”
Section: Introductionmentioning
confidence: 99%
“…https://sepolia.etherscan.io/address/0x5a0f87fdfc22523ad72b3ea759abe80 20903bb72 5. https://sepolia.etherscan.io/tx/0xe9725c4b1ff4c5b763a02250e46c95eb0edf e04dee267cc75e4a27040543677b 6 https://sepolia.etherscan.io/tx/0xc120a8ff605280cbe2b971a079649e1ccac 68097b02fde2d63c10a49506f245a 7 https://sepolia.etherscan.io/tx/0x7e0424a2c63a811a1debde708392c5e073 80c256a3b619755ac7071986559278…”
mentioning
confidence: 99%