2021
DOI: 10.1016/j.ipm.2021.102528
|View full text |Cite
|
Sign up to set email alerts
|

Edge-Based Blockchain Architecture for Event-Driven IoT using Hierarchical Identity Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(17 citation statements)
references
References 22 publications
1
16
0
Order By: Relevance
“…The protection of data can be done in many ways [29][30][31][32]. Among them, the academic field widely recognizes blockchain technology for its distributed and multi-copy mechanism that brings the advantage of tamper-proof data on the chain [32][33][34]. Ritzdorf et al [33] proposed an extension to the TLS protocol called TLS-N that provides non-repudiation proofs for each TLS session.…”
Section: The Remote Attestationmentioning
confidence: 99%
See 1 more Smart Citation
“…The protection of data can be done in many ways [29][30][31][32]. Among them, the academic field widely recognizes blockchain technology for its distributed and multi-copy mechanism that brings the advantage of tamper-proof data on the chain [32][33][34]. Ritzdorf et al [33] proposed an extension to the TLS protocol called TLS-N that provides non-repudiation proofs for each TLS session.…”
Section: The Remote Attestationmentioning
confidence: 99%
“…The protocol uses a generator to generate signed evidence that can be verified by any third party via public key infrastructure. Pavithran et al [34] proposed an IoT and blockchain architecture using mobile edge cloud computing. They use decentralization to achieve confidentiality, integrity, and availability of data.…”
Section: The Remote Attestationmentioning
confidence: 99%
“…The use of Consortium BC in conjunction with the Transport Layer Security Protocol (TLSP) maintains security and privacy while reducing the requirement for a third party [ 143 ]. Pavithran et al [ 169 ] proposed a privacy-preserving BC architecture for IoT. The proposed architecture is well-suited to event-driven IoT devices, and it makes use of the edge and cloudlet computing paradigms, as well as Hierarchical Identity Based Encryption (HIBE) for privacy protection, in which the ciphertext comprises only three group components, and decryption needs only two bilinear map calculations.…”
Section: Blockchain-fog Computing Purposesmentioning
confidence: 99%
“…For BC, privacy-preserving strategies based on encryption approaches are evolving, allowing users to become anonymous and have the ability to manage their personal data (e.g., what, whom, and when personal data can be shared in each transaction). Authors proposed several mechanisms to enhance privacy ([ 70 , 88 , 115 , 116 , 162 , 169 , 217 ]); to enable and enhance identification ([ 61 , 129 , 136 , 172 , 174 , 209 , 218 ]), to ensure data privacy ([ 97 , 146 , 188 ]), and to enhance location privacy ([ 83 , 165 , 192 , 198 ]). The majority of the selected studies under this category reported that BC can enhance the level of privacy, in general, followed by identification, and the least purpose mentioned was to achieve data privacy.…”
Section: Blockchain-fog Computing Purposesmentioning
confidence: 99%
“…Multi-blockchain means that multiple blockchains are connected, and the synchronous transmission of messages in each blockchain node is realized through the cross-blockchain mechanism, multi-blockchain consensus mechanism, etc. [ 16 , 17 ]. Applying multi-blockchain to the information management of agricultural products and food supply chains can enhance the performance of blockchains, increase the accounting capabilities of blockchains, and realize the interconnection of multiple links in agricultural and food supply chains.…”
Section: Introductionmentioning
confidence: 99%