2021
DOI: 10.3390/fi13120312
|View full text |Cite
|
Sign up to set email alerts
|

Securing Environmental IoT Data Using Masked Authentication Messaging Protocol in a DAG-Based Blockchain: IOTA Tangle

Abstract: The demand for the digital monitoring of environmental ecosystems is high and growing rapidly as a means of protecting the public and managing the environment. However, before data, algorithms, and models can be mobilized at scale, there are considerable concerns associated with privacy and security that can negatively affect the adoption of technology within this domain. In this paper, we propose the advancement of electronic environmental monitoring through the capability provided by the blockchain. The bloc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 41 publications
(9 citation statements)
references
References 49 publications
(46 reference statements)
0
9
0
Order By: Relevance
“…MAM is a lightweight data transmission protocol designed by IOTA foundation. It enables nodes (any IoT device that can send or propagate transactions) to share encrypted data streams to each other node over the IOTA Tangle [38]. MAM is an important method for securing the transfer or accessing of the data stored in the IOTA Tangle.…”
Section: Plos Onementioning
confidence: 99%
“…MAM is a lightweight data transmission protocol designed by IOTA foundation. It enables nodes (any IoT device that can send or propagate transactions) to share encrypted data streams to each other node over the IOTA Tangle [38]. MAM is an important method for securing the transfer or accessing of the data stored in the IOTA Tangle.…”
Section: Plos Onementioning
confidence: 99%
“…Each transaction on the MAM channel has a reference to the next transaction address, which links all the transactions on that channel. However, each MAM mode has a different way of working to access the new transaction address as illustrated below: [42][43][44]. MAM works mainly in three modes: public, private, and restricted.…”
Section: Iota Tangle: a Dag Blockchainmentioning
confidence: 99%
“…Hassija et al [19] introduce a blockchain-based framework for lightweight data sharing and energy trading. Gangwani et al [20] facilitate data sharing among Internet of things devices with the help of IOTAbased blockchain. Abdullah et al [21] emphasize secure sharing of health data in the digital healthcare system by exploring the potential of a IOTA Tangle [30].…”
Section: Related Workmentioning
confidence: 99%
“…Some protocols (e.g., [4,11,17,18]) are constructed on blockchains which provide smart contract functionality. Some protocols (e.g., [19][20][21]) are built based on the Internet of things application-based (IOTA-based) blockchain. Some protocols (e.g., [22][23][24]) are constructed relying on the permissioned blockchain.…”
Section: Introductionmentioning
confidence: 99%