2019 2nd International Conference on New Trends in Computing Sciences (ICTCS) 2019
DOI: 10.1109/ictcs.2019.8923080
|View full text |Cite
|
Sign up to set email alerts
|

Framework Architecture for Securing IoT Using Blockchain, Smart Contract and Software Defined Network Technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Blockchain is essentially used as a ledger in their network setup for user authentication as a protection against DDoS attacks. A similar conceptual framework was reported by [58] using SDN controllers imbedded in the smart contract for detection and mitigation. The information sharing is proposed at a global or intra level, similar to [50].…”
Section: Blockchain and Smart Contractsmentioning
confidence: 76%
“…Blockchain is essentially used as a ledger in their network setup for user authentication as a protection against DDoS attacks. A similar conceptual framework was reported by [58] using SDN controllers imbedded in the smart contract for detection and mitigation. The information sharing is proposed at a global or intra level, similar to [50].…”
Section: Blockchain and Smart Contractsmentioning
confidence: 76%
“…Computational Load [30], [32]- [36], [42], [45], [46], [49], [56]- [58], [61], [67] Storage [31], [39], [41]- [43], [45], [46], [49], [56], [61],…”
Section: Bc Disadvantages Proposalsmentioning
confidence: 99%
“…It employs a distributed SDN architecture that removes concerns over a single point of failure in a centralized SDN controller while simultaneously implementing a distributed BC that enables sharing security models among fog nodes. This Early and efficient DDoS detection SDN dynamic rule update based on anomaly detection using BC with fog and edge [30] Early and efficient DDoS detection BC with SDN and fog to eliminate single POF and quickly detect attacks [32] Defense against DDoS attack SDN controllers mitigate attacks; smart contracts to automate [42] Efficiency, Improved identification rate BC integrated with SDN, edge-cloud, and new detection algorithm [43] Evidence integrity for forensics BC logs events in SDN IoT to detect/predict bad data [47] Prevent internal hosts from becoming bots BC with security modules to identify compromised hosts [48] Secure fog computing BC-based distributed cloud arch. with SDN [63] Increasing attack surface BC implements decentralized DDoS collaboration [64] Increasing attack surface BC implements decentralized DDoS collaboration…”
Section: ) Attack Detection and Mitigationmentioning
confidence: 99%
“…Security is another critical aspect of IoT research. Ensuring the dynamic identity and authenticated key settlement approaches for IoT infrastructure is essential to protect against various types of attacks [2]. Blockchain technology has been proposed as a solution for securing IoT networks, as it is a decentralized structure that fits well with the decentralized nature of IoT [3].…”
Section: Introductionmentioning
confidence: 99%