Research Anthology on Convergence of Blockchain, Internet of Things, and Security 2022
DOI: 10.4018/978-1-6684-7132-6.ch012
|View full text |Cite
|
Sign up to set email alerts
|

Towards the Integration of Blockchain and IoT for Security Challenges in IoT

Abstract: Internet of things (IoT) technology plays a vital role in the current technologies because IoT develops a network by integrating different kinds of objects and sensors to create the communication among objects directly without human interaction. With the presence of internet of things technology in our daily comes smart thinking and various advantages. At the same time, secure systems have been a most important concern for the protection of information systems and networks. However, adopting traditional securi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…Data collection for IoT security is difficult. When working with IoT data, it is critical to understand the data collection process [ 62 ]. Statistics that are inaccurate or incomplete, outliers, and other flaws may jeopardize the security of the aging process or insufficient IoT devices [ 122 ].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Data collection for IoT security is difficult. When working with IoT data, it is critical to understand the data collection process [ 62 ]. Statistics that are inaccurate or incomplete, outliers, and other flaws may jeopardize the security of the aging process or insufficient IoT devices [ 122 ].…”
Section: Resultsmentioning
confidence: 99%
“…An IoT device is a piece of hardware with a sensor that can send information to a remote location over the Internet. A complicated system must be built with the least amount of time, money, and effort possible because there are so many sensors involved in its operation [ 61 ]. Patient information is sensitive and valuable, making data security crucial in industries such as healthcare.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Before a device joins a system Device self-protection and selfdefence Hromada et al, 2023;Kamalov et al, 2023;Kumar et al, 2023;Stergiou et al, 2023). They introduce different classifications of IoT security challenges from varying perspectives.…”
Section: Iot Device Life Cycle Mitigation Technique Related Studies A...mentioning
confidence: 99%
“…E-government refers to a variety of factors, including the use of the Internet and equipment like computers, to make government work easier while providing services to residents [33]. Adopting an e-government model can give several benefits to various stakeholders while also improving the functionality of services [34]. Within a perfectly working general pattern, people can use government services directly without going through several providers [35].…”
Section: Establish a Framework For E-governmentmentioning
confidence: 99%