2023
DOI: 10.5120/ijca2023922529
|View full text |Cite
|
Sign up to set email alerts
|

IoT Device Identity Management and Blockchain for Security and Data Integrity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The rising importance is emphasized by [31], which discusses how blockchain can secure IoT devices. [32] presents Physical Unclonable Function (PUF) for PUF-based Device Identity Management (PUF-DIM), a technique that has potential for repurposing in various avenues of Blockchain and IoT-based applications. PUF-DIM leverages the unique physical characteristics of IoT devices to generate secure and tamper-proof identities, which can be integrated with blockchain technology to enhance security, authenticity, and trust in IoT ecosystems.…”
Section: Literature Review and Existing Workflow In The Insurance Ind...mentioning
confidence: 99%
“…The rising importance is emphasized by [31], which discusses how blockchain can secure IoT devices. [32] presents Physical Unclonable Function (PUF) for PUF-based Device Identity Management (PUF-DIM), a technique that has potential for repurposing in various avenues of Blockchain and IoT-based applications. PUF-DIM leverages the unique physical characteristics of IoT devices to generate secure and tamper-proof identities, which can be integrated with blockchain technology to enhance security, authenticity, and trust in IoT ecosystems.…”
Section: Literature Review and Existing Workflow In The Insurance Ind...mentioning
confidence: 99%
“…According to the above features, a PUF chip provides a lightweight cryptographic primitive that can be used in many security issues and also be resistant to some physical attacks, such as node capture, node cloning, and node tampering attacks. One common application of PUF chips is in authentication and session key agreement between a device and a server [36]. This process usually includes a registration phase where the server (as a trusted party) receives and stores unique CRP information related to the device's PUF chip.…”
Section: B Physically Unclonable Function (Puf)mentioning
confidence: 99%