2021
DOI: 10.1016/j.ipm.2021.102526
|View full text |Cite
|
Sign up to set email alerts
|

On the design and implementation of a secure blockchain-based hybrid framework for Industrial Internet-of-Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 46 publications
(14 citation statements)
references
References 49 publications
0
14
0
Order By: Relevance
“…However, the study is limited to secure outsources of bilinear pairings of IoT devices. Rathee et al [90] suggested a framework based on a hybrid blockchain approach for securing a multinational level industrial Internet of Things (IIoT) of offices in several countries. The proposed framework has been rigorously tested against different security parameters in comparison to standard mechanisms.…”
Section: Recent Advancesmentioning
confidence: 99%
“…However, the study is limited to secure outsources of bilinear pairings of IoT devices. Rathee et al [90] suggested a framework based on a hybrid blockchain approach for securing a multinational level industrial Internet of Things (IIoT) of offices in several countries. The proposed framework has been rigorously tested against different security parameters in comparison to standard mechanisms.…”
Section: Recent Advancesmentioning
confidence: 99%
“…The term "Industrial IoT" refers to the next stage of smart devices that are capable of managing resources in a more flexible, efficient, and timely manner. Furthermore, these smart devices can monitor complete control systems within industries without human involvement [46]. The major objective of IIoT, as a subset of IoT, is the effective utilization of industrial assets and activities [3].…”
Section: Industrial Internet Of Thingsmentioning
confidence: 99%
“…The code of software components can also be vulnerable because it associates with a virus, trojans, and dynamic programming attacks [12]. On the other side, the communication channels can be compromised to thirdparty, man-in-middle, client-server-based network protocols, which are weak in nature as compared to the distributed network [13]. So, to design manual IoPS, it is harder to maintain complex transaction procedures and is affected by social attacks, for example, spamming, phishing, etc.…”
Section: Introductionmentioning
confidence: 99%