A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Towards Secure Industrial IoT: Blockchain System with Credit-Based Consensus Mechanism
2019
IEEE Transactions on Industrial Informatics
In order to protect sensitive data confidentiality, we design a data authority management method to regulate the access to sensor data. ...
However, existing IIoT systems are vulnerable to single point of failure and malicious attacks, which cannot provide stable services. ...
For this reason, this section will not evaluate tangle network and target the new components proposed in our system. ...
doi:10.1109/tii.2019.2903342
fatcat:fzlqs3cz6vbrja6c3vuum2o5fy
Toward Prevention of Parasite Chain Attack in IOTA Blockchain Networks by Using Evolutionary Game Model
2022
Mathematics
IOTA is a new cryptocurrency system designed for the Internet of Things based on directed an acyclic graph structure. ...
In this work, we propose a scheme that can effectively prevent parasite chain attacks to improve the security of the IOTA ledger. ...
for new transactions arriving, and finally listed a variety of possible attack scenarios. ...
doi:10.3390/math10071108
fatcat:ddxmpowzevahjbrku6d4jrl4xm
Secure Access Control for DAG-based Distributed Ledgers
[article]
2021
arXiv
pre-print
Finally, a timestamp component is also introduced to maintain the consistency of the network in the presence of multi-rate attackers. ...
The introduction of a solidification request component is also introduced to ensure the fairness and consistency of network in the presence of attacks. ...
For this reason, we pause the rate setting increase for some time after blacklisting. Remark: The blacklisting method in our work is a local method, requiring no additional global information. ...
arXiv:2107.10238v1
fatcat:7f7qhrdilzg55a724g5skchqg4
A Scalable IoT Protocol via an Efficient DAG-Based Distributed Ledger Consensus
2020
Sustainability
The directed acyclic graph (DAG)-based Tangle model proposed by the IOTA Foundation aims to avoid transaction fees by employing a different protocol from that used in the blockchain. ...
It also provides the same resistance to possible attacks, and for the same reasons, as does the MCMC algorithm. ...
Both methods attempt to minimize the probability of attack by reducing the probability that a malicious node is selected as a tip. ...
doi:10.3390/su12041529
fatcat:gvmbab7tdffelg3vnxy4sui2xm
Security Analysis on Tangle-based Blockchain through Simulation
[article]
2020
arXiv
pre-print
To achieve that, we deconstruct the Tangle-based projects (e.g. IOTA) and abstract the main components to rebuild a simple but flexible network for the simulation. ...
To the best of our knowledge, this is the first study to provide a comprehensive security analysis of Tangle-based blockchains. ...
the number of malicious nodes in a positive correlation. ...
arXiv:2008.04863v2
fatcat:57x4a2mtufc77mwcwge3hmcj3m
A Survey on Consensus Protocols in Blockchain for IoT Networks
[article]
2019
arXiv
pre-print
A blockchain relies on a consensus method for agreeing on any new data. ...
The main advantages of blockchain for its potential use in other domains are its inherent security mechanisms and immunity to different attacks. ...
These methods are discussed in section V.
V. CONSENSUS METHODS There are several well-established methods by which different nodes in a blockchain network can reach consensus over a new block. ...
arXiv:1809.05613v4
fatcat:edz2g3h4snbchofsdxmngsqe3i
A Transparent Distributed Ledger-based Certificate Revocation Scheme for VANETs
[article]
2020
arXiv
pre-print
In this work we propose a Distributed Ledger-based Certificate Revocation Scheme for Vehicular Ad-hoc Networks (VANETs) that harnesses the advantages of the underlying Distributed Ledger Technology (DLT ...
Authentication is an effective process for validating user identity in vehicular netoworks. However, it cannot guarantee the network security by itself. ...
CONCLUSION In this paper we have presented a new revocation method for VANETs that assures the transparency of the revocation process. ...
arXiv:2010.13555v1
fatcat:knwvczc7mngwzf4mevwex4cnzu
Privacy Aware VANET Security:- Sybil Attack Detection in VANET
2017
International Journal of Advanced Research in Computer Science and Software Engineering
In this paper we present a various methods for Sybil attack detection in vehicular networks. ...
Attacker is using them for destructive purpose in the network leading to accidents or causing delay in some services for the driver using only one physical device. ...
Indeed, wireless networks are subject to malicious attacks, such as Sybil node attack : a malicious node creates Sybil entities in the network, able to inject fault and malicious messages. ...
doi:10.23956/ijarcsse/v7i4/0191
fatcat:gzkklsxmyfcrrjnsjzagell4py
Parasite Chain Detection in the IOTA Protocol
[article]
2020
arXiv
pre-print
In order to improve the security of the Tangle, we present a detection mechanism for this type of attack. ...
We initially describe models that predict the distribution that should be expected for a Tangle without any malicious actors. ...
Introduction With the arrival of Bitcoin [1] a new decentralized payment system based on a trust-less peer-to-peer network has established. ...
arXiv:2004.13409v1
fatcat:ng7nlsln6fehxbcixhd4qhuqga
BCEAD: A Blockchain-Empowered Ensemble Anomaly Detection for Wireless Sensor Network via Isolation Forest
2021
Security and Communication Networks
Therefore, we propose a blockchain-based ensemble anomaly detection (BCEAD), which stores the model of a typical anomaly detection algorithm (isolated forest) in the blockchain for distributed anomaly ...
Moreover, the blockchain guarantees the trust environment of the network, making the detection algorithm resistant to internal attacks. ...
Other nodes in the network will review the format and source of the new block, add it to the end of the tangle, and update tips. ...
doi:10.1155/2021/9430132
fatcat:bysh6iqeubarvgm4lhhzxjjzvi
Directed Acyclic Graph-based Distributed Ledgers – An Evolutionary Perspective
2019
International Journal of Engineering and Advanced Technology
It has also become a key issue in the wider adoption of these technologies. ...
These peer to peer network systems allows Internet users to directly transact with each other. However due to the heavy emphasis on decentralization, scalability has taken a back seat. ...
This method allows for fewer storage requirements. ...
doi:10.35940/ijeat.a1970.109119
fatcat:2otqix2g6vg73etqk3leiik7cq
An architecture for distributed ledger-based M2M auditing for Electric Autonomous Vehicles
[article]
2019
arXiv
pre-print
This paper aims at filling this gap and envisions a new charging architecture and a billing framework for EAV which would enable M2M transactions via the use of Distributed Ledger Technology (DLT). ...
For this to be possible, the market should be able to offer appropriate charging services without involving humans. ...
The current attacks that target IOTA are mainly based on the DAG where malicious nodes with enough computational power can create a sub-tangle which will cause the IOTA network to approve this malicious ...
arXiv:1804.00658v2
fatcat:addmnud4i5fchnwoitnbwcynky
Securing Genetic Algorithm enabled SDN Routing for Blockchain based Internet of Things
2021
IEEE Access
There is a minor decrease in the total energy after detection of new malicious node, as seen in Fig. 7a . ...
However, the malicious nodes may exist in the network, even after authentication, because a node can be compromised by an attacker. ...
He is mainly specialized in coordination and management of EU funded projects. He participated in the coordination of multiple EU projects. ...
doi:10.1109/access.2021.3118948
fatcat:avzwkd6ofbclhn2t7swhs7spv4
Multi-layer Attestation for Internet of Things using Blockchain
2020
International Journal of Engineering and Advanced Technology
Sine all such security primitives are either architecture or manufacturer specific it is not possible to build common unified attestation scheme for all constituent IoT devices in a typical IoT network ...
Hence ability to attest IoT devices for its trustworthiness is very important factor in determining trustworthiness of IoT network. ...
Fig. 7 .Fig. 8 . 78 Average time taken to send a data transaction from client to node in a tangle. Average time taken to retrieve hash from tangle ...
doi:10.35940/ijeat.c4719.029320
fatcat:zes3y66cxbd6zftsg6kzcgypna
Efficient Data Communication Using Distributed Ledger Technology and IOTA-Enabled Internet of Things for a Future Machine-to-Machine Economy
2021
Sensors
Data on a blockchain remains immutable however its scalability still remains a challenging issue and thus represents a hindrance for its mass adoption in the IoT. ...
Here a communication system based on IOTA and DLT is discussed with a systematic architecture for IoT devices and a future machine-to-machine (M2M) economy. ...
Presents a method for saving log files of blockchain in the full node that should be send to the IoT devices for synchronization Table 1 . Cont. ...
doi:10.3390/s21134354
pmid:34202173
fatcat:64qsgnmnqrakxmnp7g2m74yslm
« Previous
Showing results 1 — 15 out of 531 results