2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) 2021
DOI: 10.1109/cybersa52016.2021.9478257
|View full text |Cite
|
Sign up to set email alerts
|

Securing IoT-Blockchain Applications Through Honesty-Based Distributed Proof of Authority Consensus Algorithm

Abstract: This is a repository copy of Securing IoT-blockchain applications through honesty-based distributed proof of authority consensus algorithm.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…For this reason, a new blockchain platform, including bespoke transaction and block-header formats, has been designed, developed, and implemented. In terms of the consensus mechanism, we utilized our own consensus protocol called honestybased distributed proof of authority (HDPoA), which we previously published in [22]. The blockchain platform can utilize the resources of all the available IoT devices.…”
Section: B Blockchain Protocolmentioning
confidence: 99%
See 3 more Smart Citations
“…For this reason, a new blockchain platform, including bespoke transaction and block-header formats, has been designed, developed, and implemented. In terms of the consensus mechanism, we utilized our own consensus protocol called honestybased distributed proof of authority (HDPoA), which we previously published in [22]. The blockchain platform can utilize the resources of all the available IoT devices.…”
Section: B Blockchain Protocolmentioning
confidence: 99%
“…All other nodes should make themselves available for the mining tasks. More details can be found in [22] regarding how HDPoA works.…”
Section: B Blockchain Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…Although reducing some decentralization may have an impact on security [12], a consortium chain still reduces the verification burden and transaction cost to improve the handling capacity and providing more flexible blockchain structures. Commonly used consensus strategies include Paxos [13], RAFT [14], PoA (Proof of Authority) [15], Ripple [16], etc. In consortium chain, there are different permission levels to control the access permission of nodes, so that the consortium chain can provide a higher level of privacy protection [17].…”
Section: Introductionmentioning
confidence: 99%