2020
DOI: 10.5120/ijca2020920660
|View full text |Cite
|
Sign up to set email alerts
|

Challenges of Blockchain Technology in Context Internet of Things: A Survey

Abstract: The Internet of Things (IoT) devices is being implemented in many fields like military, health care, smart environments, etc. where such devices or things may gather, process, and upload a huge amount of data to the internet, which can lead to many challenges in terms of keeping IoT secure, protecting the IoT from disclosure to unauthorized parties, ensuring information integrity and so on. Such challenges can be addressed by BlockChain (BC) technology. This paper provides a comprehensive and high-level techni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…Electronic sensors capture medical data from patients and safely transmit them to the healthcare system. To avoid unwanted access or needless interruptions, trust and data privacy must be ensured from the start sensors [44][45][46].…”
Section: Background and Related Studiesmentioning
confidence: 99%
“…Electronic sensors capture medical data from patients and safely transmit them to the healthcare system. To avoid unwanted access or needless interruptions, trust and data privacy must be ensured from the start sensors [44][45][46].…”
Section: Background and Related Studiesmentioning
confidence: 99%
“…Additionally, investigations are currently underway to remove reliance on cloud service providers (CSPs). In addition, the use of the Data Provider Zone (DPZ) in the DFIM model [42] is proposed to group data collected from sensor nodes into one group.…”
Section: A Rq1: Current Iot Forensic Investigation Frameworkmentioning
confidence: 99%
“…A BC validator/miner is in charge of checking transactions on the network. After collecting a series of transactions, miners can begin the validation process by performing the following steps to ensure they are legal (i.e., no malicious transactions or double spends) [21]:…”
Section: Blockchain Structure and Architecturementioning
confidence: 99%
“…(1) miners decode the digital signature using the sender's public key, resulting in a decrypted hash value; (2) the miners use the same hash function to generate a new hash value from the received address; (3) if the current hash value meets the decrypted hash value, the transaction has not been tampered with, and the integrity, verification, and non-repudiation requirements have been met; (4) each miner creates a block of authenticated transactions, and that the validation process is accordingly finished [21,34].…”
Section: Blockchain Structure and Architecturementioning
confidence: 99%
See 1 more Smart Citation