2020
DOI: 10.1109/tii.2020.2966069
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Storage and Recovery in Industrial Blockchain Network Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
74
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 222 publications
(75 citation statements)
references
References 20 publications
0
74
0
1
Order By: Relevance
“…As future work, we intend to design and assess the configuration parameter’s standard values of MOTP and shorten the length of the OTP while ensuring the same security level [ 27 ], as well as investigate techniques for resource protection and recovery [ 28 , 29 , 30 ].…”
Section: Discussionmentioning
confidence: 99%
“…As future work, we intend to design and assess the configuration parameter’s standard values of MOTP and shorten the length of the OTP while ensuring the same security level [ 27 ], as well as investigate techniques for resource protection and recovery [ 28 , 29 , 30 ].…”
Section: Discussionmentioning
confidence: 99%
“…Meanwhile, a three-stage Stackelberg game was used to investigate the interaction among the users, base stations and video providers. Moreover, the work [113] exploited the merits of blockchain such as antitempering and decentralisation to achieve the fast repairing of data storage nodes in IIoT environment.…”
Section: Computing Layermentioning
confidence: 99%
“…The blockchain network has a tamper-proof environment. The transaction of any digital capital is verified by real participants or miners [12]. The blockchain system can use encryption methods to link the transaction data blocks for retrospective and immutable records.…”
Section: Related Workmentioning
confidence: 99%