2022
DOI: 10.3390/s22041384
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Secure Data Exchange through the IOTA Tangle for IoT Constrained Devices

Abstract: Internet-of-Things (IoT) and sensor technologies have enabled the collection of data in a distributed fashion for analysis and evidence-based decision making. However, security concerns regarding the source, confidentiality and integrity of the data arise. The most common method of protecting data transmission in sensor systems is Transport Layer Security (TLS) or its datagram counterpart (DTLS) today, but exist an alternative option based on Distributed Ledger Technology (DLT) that promise strong security, ea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 30 publications
0
11
0
Order By: Relevance
“…Each transaction on the MAM channel has a reference to the next transaction address, which links all the transactions on that channel. However, each MAM mode has a different way of working to access the new transaction address as illustrated below: [42][43][44]. MAM works mainly in three modes: public, private, and restricted.…”
Section: Iota Tangle: a Dag Blockchainmentioning
confidence: 99%
“…Each transaction on the MAM channel has a reference to the next transaction address, which links all the transactions on that channel. However, each MAM mode has a different way of working to access the new transaction address as illustrated below: [42][43][44]. MAM works mainly in three modes: public, private, and restricted.…”
Section: Iota Tangle: a Dag Blockchainmentioning
confidence: 99%
“…Studying the importance of security on data sharing technologies, the authors of [23] researched available methodologies of data transmission such as Datagram Transport Layer Security (DTLS), and Distributed Ledger Technology (DLT). The proposed solution is based on a combination of the IOTA Tangle and the L2Sec protocol to enhance security during data sharing.…”
Section: Data Sharing Technologiesmentioning
confidence: 99%
“…Although the benefits of DLT for IIoT are highlighted several times in the literature [ 22 , 71 ], DLTs are still not common in today’s factories, as they are often associated with high computational load. Nevertheless, the convergence of DLT and IIoT is to be expected, and research is being conducted on technologies focusing on the constraint resources of IoT and IIoT devices.…”
Section: Comprehensive Overview Over Possible Use Casesmentioning
confidence: 99%
“…Nevertheless, the convergence of DLT and IIoT is to be expected, and research is being conducted on technologies focusing on the constraint resources of IoT and IIoT devices. Especially, DLT IOTA is to be mentioned in this context [ 22 , 71 , 72 ], among others, because of its low computational overhead. IOTA is even in discussion to become a machine-to-machine communication standard, according to [ 73 ].…”
Section: Comprehensive Overview Over Possible Use Casesmentioning
confidence: 99%