531 Hits in 3.4 sec

Towards Secure Industrial IoT: Blockchain System with Credit-Based Consensus Mechanism

Junqin Huang, Linghe Kong, Guihai Chen, Min-You Wu, Xue Liu, Peng Zeng
2019 IEEE Transactions on Industrial Informatics  
In order to protect sensitive data confidentiality, we design a data authority management method to regulate the access to sensor data.  ...  However, existing IIoT systems are vulnerable to single point of failure and malicious attacks, which cannot provide stable services.  ...  For this reason, this section will not evaluate tangle network and target the new components proposed in our system.  ... 
doi:10.1109/tii.2019.2903342 fatcat:fzlqs3cz6vbrja6c3vuum2o5fy

Toward Prevention of Parasite Chain Attack in IOTA Blockchain Networks by Using Evolutionary Game Model

Yinfeng Chen, Yu Guo, Yaofei Wang, Rongfang Bie
2022 Mathematics  
IOTA is a new cryptocurrency system designed for the Internet of Things based on directed an acyclic graph structure.  ...  In this work, we propose a scheme that can effectively prevent parasite chain attacks to improve the security of the IOTA ledger.  ...  for new transactions arriving, and finally listed a variety of possible attack scenarios.  ... 
doi:10.3390/math10071108 fatcat:ddxmpowzevahjbrku6d4jrl4xm

Secure Access Control for DAG-based Distributed Ledgers [article]

Lianna Zhao, Luigi Vigneri, Andrew Cullen, William Sanders, Pietro Ferraro, Robert Shorten
2021 arXiv   pre-print
Finally, a timestamp component is also introduced to maintain the consistency of the network in the presence of multi-rate attackers.  ...  The introduction of a solidification request component is also introduced to ensure the fairness and consistency of network in the presence of attacks.  ...  For this reason, we pause the rate setting increase for some time after blacklisting. Remark: The blacklisting method in our work is a local method, requiring no additional global information.  ... 
arXiv:2107.10238v1 fatcat:7f7qhrdilzg55a724g5skchqg4

A Scalable IoT Protocol via an Efficient DAG-Based Distributed Ledger Consensus

Bumho Son, Jaewook Lee, Huisu Jang
2020 Sustainability  
The directed acyclic graph (DAG)-based Tangle model proposed by the IOTA Foundation aims to avoid transaction fees by employing a different protocol from that used in the blockchain.  ...  It also provides the same resistance to possible attacks, and for the same reasons, as does the MCMC algorithm.  ...  Both methods attempt to minimize the probability of attack by reducing the probability that a malicious node is selected as a tip.  ... 
doi:10.3390/su12041529 fatcat:gvmbab7tdffelg3vnxy4sui2xm

Security Analysis on Tangle-based Blockchain through Simulation [article]

Bozhi Wang and Qin Wang and Shiping Chen and Yang Xiang
2020 arXiv   pre-print
To achieve that, we deconstruct the Tangle-based projects (e.g. IOTA) and abstract the main components to rebuild a simple but flexible network for the simulation.  ...  To the best of our knowledge, this is the first study to provide a comprehensive security analysis of Tangle-based blockchains.  ...  the number of malicious nodes in a positive correlation.  ... 
arXiv:2008.04863v2 fatcat:57x4a2mtufc77mwcwge3hmcj3m

A Survey on Consensus Protocols in Blockchain for IoT Networks [article]

Mehrdad Salimitari, Mainak Chatterjee
2019 arXiv   pre-print
A blockchain relies on a consensus method for agreeing on any new data.  ...  The main advantages of blockchain for its potential use in other domains are its inherent security mechanisms and immunity to different attacks.  ...  These methods are discussed in section V. V. CONSENSUS METHODS There are several well-established methods by which different nodes in a blockchain network can reach consensus over a new block.  ... 
arXiv:1809.05613v4 fatcat:edz2g3h4snbchofsdxmngsqe3i

A Transparent Distributed Ledger-based Certificate Revocation Scheme for VANETs [article]

Andrea Tesei, Domenico Lattuca, Paolo Pagano, Marco Luise, Joaquim Ferreira, Paulo C. Bartolomeu
2020 arXiv   pre-print
In this work we propose a Distributed Ledger-based Certificate Revocation Scheme for Vehicular Ad-hoc Networks (VANETs) that harnesses the advantages of the underlying Distributed Ledger Technology (DLT  ...  Authentication is an effective process for validating user identity in vehicular netoworks. However, it cannot guarantee the network security by itself.  ...  CONCLUSION In this paper we have presented a new revocation method for VANETs that assures the transparency of the revocation process.  ... 
arXiv:2010.13555v1 fatcat:knwvczc7mngwzf4mevwex4cnzu

Privacy Aware VANET Security:- Sybil Attack Detection in VANET

Amit Mane
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
In this paper we present a various methods for Sybil attack detection in vehicular networks.  ...  Attacker is using them for destructive purpose in the network leading to accidents or causing delay in some services for the driver using only one physical device.  ...  Indeed, wireless networks are subject to malicious attacks, such as Sybil node attack : a malicious node creates Sybil entities in the network, able to inject fault and malicious messages.  ... 
doi:10.23956/ijarcsse/v7i4/0191 fatcat:gzkklsxmyfcrrjnsjzagell4py

Parasite Chain Detection in the IOTA Protocol [article]

Andreas Penzkofer, Bartosz Kusmierz, Angelo Capossele, William Sanders, Olivia Saa
2020 arXiv   pre-print
In order to improve the security of the Tangle, we present a detection mechanism for this type of attack.  ...  We initially describe models that predict the distribution that should be expected for a Tangle without any malicious actors.  ...  Introduction With the arrival of Bitcoin [1] a new decentralized payment system based on a trust-less peer-to-peer network has established.  ... 
arXiv:2004.13409v1 fatcat:ng7nlsln6fehxbcixhd4qhuqga

BCEAD: A Blockchain-Empowered Ensemble Anomaly Detection for Wireless Sensor Network via Isolation Forest

Xiong Yang, Yuling Chen, Xiaobin Qian, Tao Li, Xiao Lv, Weizhi Meng
2021 Security and Communication Networks  
Therefore, we propose a blockchain-based ensemble anomaly detection (BCEAD), which stores the model of a typical anomaly detection algorithm (isolated forest) in the blockchain for distributed anomaly  ...  Moreover, the blockchain guarantees the trust environment of the network, making the detection algorithm resistant to internal attacks.  ...  Other nodes in the network will review the format and source of the new block, add it to the end of the tangle, and update tips.  ... 
doi:10.1155/2021/9430132 fatcat:bysh6iqeubarvgm4lhhzxjjzvi

Directed Acyclic Graph-based Distributed Ledgers – An Evolutionary Perspective

2019 International Journal of Engineering and Advanced Technology  
It has also become a key issue in the wider adoption of these technologies.  ...  These peer to peer network systems allows Internet users to directly transact with each other. However due to the heavy emphasis on decentralization, scalability has taken a back seat.  ...  This method allows for fewer storage requirements.  ... 
doi:10.35940/ijeat.a1970.109119 fatcat:2otqix2g6vg73etqk3leiik7cq

An architecture for distributed ledger-based M2M auditing for Electric Autonomous Vehicles [article]

Dragos Strugar, Rasheed Hussain, Manuel Mazzara, Victor Rivera, Ilya Afanasyev, JooYoung Lee
2019 arXiv   pre-print
This paper aims at filling this gap and envisions a new charging architecture and a billing framework for EAV which would enable M2M transactions via the use of Distributed Ledger Technology (DLT).  ...  For this to be possible, the market should be able to offer appropriate charging services without involving humans.  ...  The current attacks that target IOTA are mainly based on the DAG where malicious nodes with enough computational power can create a sub-tangle which will cause the IOTA network to approve this malicious  ... 
arXiv:1804.00658v2 fatcat:addmnud4i5fchnwoitnbwcynky

Securing Genetic Algorithm enabled SDN Routing for Blockchain based Internet of Things

Shahid Abbas, Nadeem Javaid, Ahmad Almogren, Sardar Muhammad Gulfam, Abrar Ahmed, Ayman Radwan
2021 IEEE Access  
There is a minor decrease in the total energy after detection of new malicious node, as seen in Fig. 7a .  ...  However, the malicious nodes may exist in the network, even after authentication, because a node can be compromised by an attacker.  ...  He is mainly specialized in coordination and management of EU funded projects. He participated in the coordination of multiple EU projects.  ... 
doi:10.1109/access.2021.3118948 fatcat:avzwkd6ofbclhn2t7swhs7spv4

Multi-layer Attestation for Internet of Things using Blockchain

2020 International Journal of Engineering and Advanced Technology  
Sine all such security primitives are either architecture or manufacturer specific it is not possible to build common unified attestation scheme for all constituent IoT devices in a typical IoT network  ...  Hence ability to attest IoT devices for its trustworthiness is very important factor in determining trustworthiness of IoT network.  ...  Fig. 7 .Fig. 8 . 78 Average time taken to send a data transaction from client to node in a tangle. Average time taken to retrieve hash from tangle  ... 
doi:10.35940/ijeat.c4719.029320 fatcat:zes3y66cxbd6zftsg6kzcgypna

Efficient Data Communication Using Distributed Ledger Technology and IOTA-Enabled Internet of Things for a Future Machine-to-Machine Economy

Mohd Majid Akhtar, Danish Raza Rizvi, Mohd Abdul Ahad, Salil S. Kanhere, Mohammad Amjad, Giuseppe Coviello
2021 Sensors  
Data on a blockchain remains immutable however its scalability still remains a challenging issue and thus represents a hindrance for its mass adoption in the IoT.  ...  Here a communication system based on IOTA and DLT is discussed with a systematic architecture for IoT devices and a future machine-to-machine (M2M) economy.  ...  Presents a method for saving log files of blockchain in the full node that should be send to the IoT devices for synchronization Table 1 . Cont.  ... 
doi:10.3390/s21134354 pmid:34202173 fatcat:64qsgnmnqrakxmnp7g2m74yslm
« Previous Showing results 1 — 15 out of 531 results