2019
DOI: 10.3390/s19102310
|View full text |Cite
|
Sign up to set email alerts
|

Packet Key-Based End-to-End Security Management on a Blockchain Control Plane

Abstract: The existing LTE mobile system uses the vertical model to handle the session-based security management. However, the goal of this paper is to propose a packet key-based security management scheme on the blockchain control plane to enhance the existing session key-based security scheme and overcome the limitation that the existing vertical model, as well as the Software-Defined Networking (SDN) based horizontal model, confronts within solving end-to-end security management. The proposed blockchain-based securit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 27 publications
0
13
0
Order By: Relevance
“…As a solution to the Byzantine Generals Problem, PBFT could achieve the final consensus among honest nodes while the number of enemies was no more than 1/3 of the total number of nodes. Jung et al [ 24 ] proposed a new common algorithm: Mixed Byzantine Fault Tolerance (MBFT). Functionally, MBFT partitions the nodes participating in the consensus process and improves scalability and efficiency without sacrificing security.…”
Section: Background and Related Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…As a solution to the Byzantine Generals Problem, PBFT could achieve the final consensus among honest nodes while the number of enemies was no more than 1/3 of the total number of nodes. Jung et al [ 24 ] proposed a new common algorithm: Mixed Byzantine Fault Tolerance (MBFT). Functionally, MBFT partitions the nodes participating in the consensus process and improves scalability and efficiency without sacrificing security.…”
Section: Background and Related Studiesmentioning
confidence: 99%
“…A blockchain and fog network [ 24 ] connects the Internet of Medical Things (IoMT) and fog nodes (FN) (IoMT-Fog). Distributed technology can deliver on-demand services by combining high performance and low latency (LL).…”
Section: Proposed Frameworkmentioning
confidence: 99%
“…The Blockchain operates between two end-to-end peer servers in a distributed or centralized controller. Thus, this idea has advantageous effects on end-to-end security management by reducing the complexity of the system deployment and latency taken for the end-to-end secure session setup [26]. In addition, SDN controllers are expected to handle the control traffic coming from C-RANs.…”
Section: Related Workmentioning
confidence: 99%
“…Since security is considered as one of the fatal points of IoT and recently Block Chain has drawn a lot of attention, research efforts to combine Block Chain into IoT systems have been made. A paper in this Special Issue, titled “Packet Key-Based End-to-End Security Management on a Blockchain Control Plane” [6], proposes such a method to use Block Chain for IoT systems. It proposes a packet key-based security management scheme over the blockchain control plane to improve the current session key-based security system, so that it can overcome the limitation that the existing vertical model confronts in solving end-to-end security management.…”
Section: Contributionsmentioning
confidence: 99%