2022
DOI: 10.1109/jiot.2021.3100797
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-SDN-Based Energy-Aware and Distributed Secure Architecture for IoT in Smart Cities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
43
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 85 publications
(43 citation statements)
references
References 52 publications
0
43
0
Order By: Relevance
“…The key idea of solutions in this category is to utilise SDN based traffic control via Blockchain to mitigate DDoS attacks [ 113 , 114 , 115 , 116 , 117 , 118 ]. In order to resist DDoS attacks, these solutions combine the SDN and Blockchain to take advantages of both technologies.…”
Section: Blockchain Based Solutions To Mitigate Ddos Attacks In Iotmentioning
confidence: 99%
See 2 more Smart Citations
“…The key idea of solutions in this category is to utilise SDN based traffic control via Blockchain to mitigate DDoS attacks [ 113 , 114 , 115 , 116 , 117 , 118 ]. In order to resist DDoS attacks, these solutions combine the SDN and Blockchain to take advantages of both technologies.…”
Section: Blockchain Based Solutions To Mitigate Ddos Attacks In Iotmentioning
confidence: 99%
“…SDN enabled switches provide dynamic flow management of traffic, which assists in the detection of DDoS attacks [ 115 ]. Therefore, solutions under this classification are able to track suspicious traffic and detect DDoS attacks, and thus respond to DDoS attacks [ 112 , 113 , 114 , 115 , 116 , 117 , 118 ].…”
Section: Blockchain Based Solutions To Mitigate Ddos Attacks In Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed model consists of an SDN-enabled blockchain-inspired approach for large-scale receptive atmospheres. The performance of the concerned model is evaluated, where favorable results seem to make it an ideal choice for large-scale IoT networks [19]. SDN also shakes hands with convolutional neural networks (CNN) to equip a distinguished safeguard for IoT against the wide variety of legitimate concerns.…”
Section: Background and Existing Literaturementioning
confidence: 99%
“…A connection-based technique is referred to as Credit-Based Threshold Random Walk (CB-TRW). Further, the authors implemented rate limiting in [19] with intrusion detection and prevention systems. For experimentation, network traffic was captured for five minutes.…”
Section: Background and Existing Literaturementioning
confidence: 99%