Proceedings of the 14th International Joint Conference on E-Business and Telecommunications 2017
DOI: 10.5220/0006419203110318
|View full text |Cite
|
Sign up to set email alerts
|

PB-PKI: A Privacy-aware Blockchain-based PKI

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
85
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 109 publications
(86 citation statements)
references
References 0 publications
0
85
0
1
Order By: Relevance
“…In contrast, Kasinathan et al [67] proposed an architecture to protect IoT based 6LoWPAN devices against DoS attacks as well as jamming and tampering attacks in the context of the European project called ebbits 11 . The main contribution is twofold: first, the design of Intrusion detection manager that is charged to protect constrained devices against DoS attacks.…”
Section: Iot Dos/ddos Countermeasure Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast, Kasinathan et al [67] proposed an architecture to protect IoT based 6LoWPAN devices against DoS attacks as well as jamming and tampering attacks in the context of the European project called ebbits 11 . The main contribution is twofold: first, the design of Intrusion detection manager that is charged to protect constrained devices against DoS attacks.…”
Section: Iot Dos/ddos Countermeasure Approachesmentioning
confidence: 99%
“…Recently, several attempts have been investigated to address this issue. Mixing protocols [11,15,125] are considered as efficient techniques to fix this problem. The main idea behind these approaches is to provide mechanisms that allow users to send and receive transactions in such a way it's difficult for an attacker to find out the correspondence between input and output addresses of the same user.…”
Section: Recent Trends and Open Security Issues In Iotmentioning
confidence: 99%
“…For instance with the fast certificate revocation, blockchain-based PKIs can instantaneously isolate the infected CA and the corresponding certificates without the need to wait until the next update of Certificate Revocation Lists (CRLs). Also, blockchain-based PKI, as a public append-only log, naturally provides the certificate transparency (CT) property proposed by Google [9].…”
Section: B Blockchain Technologymentioning
confidence: 99%
“…Blockchain-based PKI inspired many studies [8], [9], [10] proposing blockchain technology to build secure PKI systems. Their main argument is that blockchain-based solution can merge the benefits of the Log-based PKIs and the WoT approaches, and solve some of the problems with conventional PKI system.…”
Section: A Pki Issues and Existing Solutionsmentioning
confidence: 99%
“…From this root element, it branches through a hierarchical certificate chain, where any certificate signed by a trusted certificate is consequently trusted. [7] Considering that most of the PKI's basic are directly related to PGP's concepts, one other convectional approach is based on the Web of Trust definition. Unlike the previously mentioned CA-based PKI, the trust becomes decentralized.…”
Section: Public Key Infrastructurementioning
confidence: 99%