2019
DOI: 10.1109/mce.2018.2880806
|View full text |Cite
|
Sign up to set email alerts
|

Designing a Blockchain-Based IoT With Ethereum, Swarm, and LoRa: The Software Solution to Create High Availability With Minimal Security Risks

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
51
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 118 publications
(53 citation statements)
references
References 10 publications
0
51
0
2
Order By: Relevance
“…By using technologies such as LoRa (Long Range), a spread spectrum modulation technique derived from chirp spread spectrum (CSS) technology, Swarm, a distributed data storage platform, and Ethereum [41], new paradigms for IoT backend with a combination of Distributed Denial of Service (DDoS) resistant and fault tolerant storage systems can be developed [42]. Blockchain based IoT applications require strong understanding of complex scenarios, and relevant architectural and logical support.…”
Section: Reference Nomentioning
confidence: 99%
“…By using technologies such as LoRa (Long Range), a spread spectrum modulation technique derived from chirp spread spectrum (CSS) technology, Swarm, a distributed data storage platform, and Ethereum [41], new paradigms for IoT backend with a combination of Distributed Denial of Service (DDoS) resistant and fault tolerant storage systems can be developed [42]. Blockchain based IoT applications require strong understanding of complex scenarios, and relevant architectural and logical support.…”
Section: Reference Nomentioning
confidence: 99%
“…Blockchain technology has become an important player in cybersecurity and traditional centralized methods replaced with decentralized techniques. One of the projections of Blockchain applications is presented by Ozyilmaz and Yurdakul [89] which study tells us, LoRa enabled IoT data can be stored in a secure distributed system which will ensure distributed denial of service attacks (DDOS).…”
Section: Securitymentioning
confidence: 99%
“…The miner implements the core function of blockchain, that is, authenticate, authorize, or audit transactions, and mining transactions into blocks. 5,27 Ozyilmaz et al 28 proposed a blockchain-based P2P network of IoT gateways to store data and code fragments. In this network, the data is stored in a torrent-like distributed file system.…”
Section: Baas For Iotmentioning
confidence: 99%