2022
DOI: 10.3390/app12147143
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving, Scalable Blockchain-Based Solution for Monitoring Industrial Infrastructure in the Near Real-Time

Abstract: This paper proposes an improved monitoring and measuring system dedicated to industrial infrastructure. Our model achieves security of data by incorporating cryptographical methods and near real-time access by the use of virtual tree structure over records. The currently available blockchain networks are not very well adapted to tasks related to the continuous monitoring of theparameters of industrial installations. In the database systems delivered by default (the so-called world state), only the resultant or… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 42 publications
(39 reference statements)
0
5
0
Order By: Relevance
“…On an operational level, frameworks suggest various supportive strategies, such as encouraging the use of shared information, adopting sharing practices at the managerial level, and fostering trusted relationships based on mutual needs and joint responsibilities [19]. Technical issues also exist, such as the need for secure, immutable systems [27] that control access and prevent data manipulation [22]. In addition, the heterogeneity of systems across different institutions complicates integration [21,22].…”
Section: Literature Review 21 Digital Government and Information Sharingmentioning
confidence: 99%
“…On an operational level, frameworks suggest various supportive strategies, such as encouraging the use of shared information, adopting sharing practices at the managerial level, and fostering trusted relationships based on mutual needs and joint responsibilities [19]. Technical issues also exist, such as the need for secure, immutable systems [27] that control access and prevent data manipulation [22]. In addition, the heterogeneity of systems across different institutions complicates integration [21,22].…”
Section: Literature Review 21 Digital Government and Information Sharingmentioning
confidence: 99%
“…Applying the row and column operations, we can reduce M to a normalized form. Then the system (11), simplifies and reduces to the normalized form…”
Section: Quadratic Equation Attacksmentioning
confidence: 99%
“…Reject the query, keep the matrix unchanged. Let D be a database with the set of MVQ queries answered so far stored in matrix form (11) with the normalized form (16). Then the following conditions are equivalent.…”
Section: Quadratic Equation Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, IoT nodes may be attacked in several different ways. Hence, developing a reliable reputation evaluation scheme is important in establishing a secure and trustworthy IoT ecosystem for specific applications [7][8][9].…”
Section: Introductionmentioning
confidence: 99%