2023
DOI: 10.1109/tcss.2022.3232173
|View full text |Cite
|
Sign up to set email alerts
|

IdenMultiSig: Identity-Based Decentralized Multi-Signature in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…In this paper, an intrusion detection model (RESNETCCN) is proposed that fuses traffic detection requirements. In our future work, we will introduce more new ideas such as blockchain cryptography [8], [18], [9], [19], [16], alliance chain [36], [7], [20], visual Q&A [5], [28], transformer [21], panoramic image [17], reinforcement learning [3], internet of things [23], [24], shared data [6] in our model.We will continue to explore network intrusion detection methods in more areas such as unsupervised and semi-supervised [2] areas for network anomalous traffic data detection. In addition, we also try to introduce new evaluation metrics and establish systematic evaluation methods of intrusion detection.…”
Section: Discussionmentioning
confidence: 99%
“…In this paper, an intrusion detection model (RESNETCCN) is proposed that fuses traffic detection requirements. In our future work, we will introduce more new ideas such as blockchain cryptography [8], [18], [9], [19], [16], alliance chain [36], [7], [20], visual Q&A [5], [28], transformer [21], panoramic image [17], reinforcement learning [3], internet of things [23], [24], shared data [6] in our model.We will continue to explore network intrusion detection methods in more areas such as unsupervised and semi-supervised [2] areas for network anomalous traffic data detection. In addition, we also try to introduce new evaluation metrics and establish systematic evaluation methods of intrusion detection.…”
Section: Discussionmentioning
confidence: 99%
“…The decentralization of the blockchain ensures that smart contracts can be executed transparently and securely, and also makes the execution of smart contracts independent of any central authority or server. Smart contracts can also be used to flexibly embed various data and digital assets, thus achieving secure and decentralized on-chain information exchange and management [ 3 ].…”
Section: Related Workmentioning
confidence: 99%
“…Blockchain is a widely applied distributed database based on cryptography, with advantages such as immutability and decentralization [ 1 , 2 ]. Smart contracts are self-executing codes or protocols deployed on the blockchain [ 3 ]. Access control technology is one of the core techniques in information security.…”
Section: Introductionmentioning
confidence: 99%
“…In the field of data storage, event logs are used to record important events that occur in the storage system, such as accesses, modifications, deletions, etc., for the purpose of auditing. Integrity monitoring is employed to prevent and detect data tampering, verifying the integrity of data through techniques like digital signatures [13]. Real-time monitoring involves ongoing checks on the storage system to promptly identify anomalies.…”
Section: Fundamental Technologies For Building Model Service Systems ...mentioning
confidence: 99%
“…To further enhance the security and efficiency of the system, integrating blockchain with other technologies has become a recent research focus. Common technologies include data encryption [11,12], auditing and monitoring [13,14], access control [15], and the InterPlanetary File System (IPFS) [16]. How to design and integrate specific techniques to create a secure, efficient, and highly applicable system that supports sustainable model services for deep learning is an issue worthy of in-depth research.…”
Section: Introductionmentioning
confidence: 99%