2020
DOI: 10.1007/s10586-019-03036-7
|View full text |Cite
|
Sign up to set email alerts
|

The limitations in the state-of-the-art counter-measures against the security threats in H-IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 62 publications
0
9
0
Order By: Relevance
“…Existing studies in the network layer have a set of same aspects on the BaaS model to support privacy, authentication, safety, and integrity for all information of the valid transactions in the network layer. In the data layer, all existing studies have discussed the BaaS models for storing and sharing data of blockchain-based applications with high privacy and managed transparency to guarantee ACID 1 with private blockchain technology. In the resource layer of the BaaS model, all existing studies have applied the benefits of cloud-edge resource management and deployment to support the high efficiency and performance of the blockchain ecosystems with relevant services.…”
Section: Statistical Analysis Of Existing Questionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Existing studies in the network layer have a set of same aspects on the BaaS model to support privacy, authentication, safety, and integrity for all information of the valid transactions in the network layer. In the data layer, all existing studies have discussed the BaaS models for storing and sharing data of blockchain-based applications with high privacy and managed transparency to guarantee ACID 1 with private blockchain technology. In the resource layer of the BaaS model, all existing studies have applied the benefits of cloud-edge resource management and deployment to support the high efficiency and performance of the blockchain ecosystems with relevant services.…”
Section: Statistical Analysis Of Existing Questionsmentioning
confidence: 99%
“…All of the Internet of Things (IoT) applications need to create secure with the easy performance. 1 Reliable systems could form a more simple information process and more desirable for users and organizations. As the safety matters increase the more requests appear for systems that could prepare intense safety and ability to extend and develop, therefore blockchain algorithms appeared for such desires.…”
Section: Introductionmentioning
confidence: 99%
“…The main applications of unsupervised ML techniques include anomaly detection and data processing to reduce the number of features in the dataset [15]. Similarly, the effect of ML for securing the data and network information is very profound [27,28].…”
Section: Machine Learning For Iot-based Systemsmentioning
confidence: 99%
“…In [13], the authors discuss the limitations in the state-ofthe-art counter-measures against the security threats in health IoT. They identify internal attacks, where cryptographic keying material can be compromised, as serious threats to the IoT system especially due to the difficulty in detecting such compromised nodes.…”
Section: Related Workmentioning
confidence: 99%