2023
DOI: 10.1007/s11227-023-05517-4
|View full text |Cite
|
Sign up to set email alerts
|

Smart contracts attribute-based access control model for security & privacy of IoT system using blockchain and edge computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…The telecom industry has been at the forefront of digital transformation [9], and customer onboarding is one area where AI and digital technologies [9] have made a significant impact. There are several gaps in the digital transformation of customer onboarding using AI as follows [10]:  A lack of standardization;  Security concerns;  Technical challenges.…”
Section: Problem Formulationmentioning
confidence: 99%
“…The telecom industry has been at the forefront of digital transformation [9], and customer onboarding is one area where AI and digital technologies [9] have made a significant impact. There are several gaps in the digital transformation of customer onboarding using AI as follows [10]:  A lack of standardization;  Security concerns;  Technical challenges.…”
Section: Problem Formulationmentioning
confidence: 99%
“…The authors discussed ways to ensure the reliability and integrity of IoT systems by implementing robust security measures. Authors in [31] presented IoT engineering applications in the humanitarian context, entailing disaster management, healthcare monitoring, environmental monitoring, and infrastructure development. Multi-level blockchain security architectures were proposed in [32,33] to simplify implementation while bolstering network security.…”
Section: Inclusionmentioning
confidence: 99%
“…[30] Ways that IoT-enabled technologies and sensors can be integrated securely into humanitarian applications are investigated. [31] Managing access control in IoT environments in a decentralized, fine-grained, and dynamic way to help distributed systems reach consensus faster. [32] A multi-level blockchain security architecture to simplify the implementation while strengthening network security is deployed.…”
Section: Inclusionmentioning
confidence: 99%
See 1 more Smart Citation
“…According to [24], the embeddings of a word are d-dimensional vectors that represent semantic information.…”
Section: Word Embeddingsmentioning
confidence: 99%