120 Hits in 4.6 sec

A blockchain-based smart home gateway architecture for preventing data forgery

Younghun Lee, Shailendra Rathore, Jin Ho Park, Jong Hyuk Park
2020 Human-Centric Computing and Information Sciences  
Acknowledgements The authors thank everyone for their support and review for this study. Authors' contributions YL and SR conceived of the presented idea.  ...  Related work Core technologies In this section, we will discuss core technologies that are employed to provide smart home gateway architecture for preventing data forgery.  ...  "Blockchain-based smart home gateway network" section presents the network architecture of the proposed blockchain-based smart home gateway.  ... 
doi:10.1186/s13673-020-0214-5 fatcat:zahndo7l25fhvczg7piqp34qpa

Blockchain Use in IoT for Privacy-Preserving Anti-Pandemic Home Quarantine

Jinxin Zhang, Meng Wu
2020 Electronics  
In this paper, we propose a blockchain-based system to provide the secure management of home quarantine.  ...  The privacy and security attributes for various events are based on advanced cryptographic primitives.  ...  Acknowledgments: We would like to thank the anonymous reviewers for their comments and suggestions that help us improve the paper. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics9101746 fatcat:7jbql3yb6bfefe74erilftqbeu

Block-Chain Based Authorization and Access Control Mechanisms for IoT Environments: Challenges and Opportunities

With the swift and fast paced developments in the area of smart cities, smart homes, and smart everything the Internet of Things (IoT) is creating an exceptional role that has scope for immense growth  ...  Internet of Things (IoT) involves interconnecting smart devices for data collection and making intelligent decisions where, the usual devices become autonomous and smart.  ...  [38] proposed an ABAC (Attribute-Based Access Control) architecture to address the security challenges that are prevalent in a home IoT environment.  ... 
doi:10.35940/ijitee.l7997.1091220 fatcat:pvyq2hekvnhhthni4hdspwur2m

Proposed Authentication Protocol for IoT using Blockchain and Fog Nodes

Ahmed Nabil Abdalah, Ammar Mohamed, Hesham A.
2020 International Journal of Advanced Computer Science and Applications  
In this paper, we propose a decentralized token-based authentication based on fog computing and blockchain.  ...  We evaluate this protocol communication between controller, gateways, and devices using AVISPA/ HLPSL, and results obtained from AVISPA simulation shows that our protocol is safe based on secrecy and strong  ...  Then the controller will add the gateway (IDg) to the Blockchain using the smart contract function Add gateway after adding the gateway to the Blockchain Controller will generating a certificate for the  ... 
doi:10.14569/ijacsa.2020.0110491 fatcat:pwrigznigbagnhfjkurd3axd2m

Blockchain for Edge of Things: Applications, Opportunities, and Challenges [article]

Thippa Reddy Gadekallu, Quoc-Viet Pham, Dinh C. Nguyen, Praveen Kumar Reddy Maddikunta, N Deepa, Prabadevi B, Pubudu N. Pathirana, Jun Zhao, Won-Joo Hwang
2021 arXiv   pre-print
Subsequently, we discuss the use of BEoT in a wide range of industrial applications, from smart transportation, smart city, smart healthcare to smart home and smart grid.  ...  Particularly, the convergence of blockchain and EoT leads to a new paradigm, called BEoT that has been regarded as a promising enabler for future services and applications.  ...  So, the work in [85] presented a blockchainbased gateway architecture to prevent data theft by malicious users.  ... 
arXiv:2110.05022v1 fatcat:cluqv67o2jcpnoif75gwatayrm

The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey

Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir
2019 Sensors  
After introducing the infrastructure generating big data, the functionality-based fog architecture is defined.  ...  In this context, this work formalizes the task of securing big data and its scope, provides a taxonomy to categories threats to fog-based IoT systems, presents a comprehensive comparison of state-of-the-art  ...  using blockchain for prevention of fraudulent data [162] • Trustless access control management • constrained IoT device tampering to prevent fraudulent data A blockchain-based proof of concept for securing  ... 
doi:10.3390/s19081788 fatcat:iazdjbrwwfdwxfrpkwpzjf4i3m

Blockchain based Privacy-Preserving Software Updates with Proof-of-Delivery for Internet of Things [article]

Yanqi Zhao, Yiming Liu, Yong Yu, Yannan Li
2019 arXiv   pre-print
Generally, the IoT device has to execute complex computation for an attribute-based signature (ABS). It is intolerable for resource limited devices.  ...  Existing studies deliver secure and reliable updates based on blockchain network which serves as the transmission network.  ...  IoT and its applications have pervaded in our daily lives from smart home, smart city to smart everything.  ... 
arXiv:1902.03712v1 fatcat:tzdp275jfrbs5keqorulnz7ffe

A Lightweight Authentication and Authorization Framework for Blockchain-Enabled IoT Network in Health-Informatics

Muhammad Tahir, Muhammad Sardaraz, Shakoor Muhammad, Muhammad Saud Khan
2020 Sustainability  
IoT is a cloud-based internet service in which processing and collection of user's data are accomplished remotely.  ...  Hence, it establishes a secure connection among IoT devices for further data acquisition.  ...  The utilization of Blockchain for examining and aggregating individual clinical information is a potential cause of the Healthcare Data Gateway (HDG) [34] .  ... 
doi:10.3390/su12176960 fatcat:e3xwgsk2kjegfiv5tsbrjxwl2m

A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things

Noshina Tariq, Muhammad Asim, Farrukh Aslam Khan, Thar Baker, Umair Khalid, Abdelouahid Derhab
2020 Sensors  
This paper presents an energy-efficient decentralized trust mechanism using a blockchain-based multi-mobile code-driven solution for detecting internal attacks in sensor node-powered IoT.  ...  A multitude of smart things and wirelessly connected Sensor Nodes (SNs) have pervasively facilitated the use of smart applications in every domain of life.  ...  Acknowledgments: The authors extend their sincere appreciation to the Deanship of Scientific Research at King Saud University for funding this work through the Research Group No. RGP-214.  ... 
doi:10.3390/s21010023 pmid:33375153 pmcid:PMC7792932 fatcat:pb7wkfnbabcp3a6o3xldkchasa

An Efficient Forensics Architecture in Software-Defined Networking-IoT using Blockchain Technology

Mehran Pourvahab, Gholamhossein Ekbatanifard
2019 IEEE Access  
The blockchain is a distributed peer-to-peer network that can be utilized on SDN-based Internet of Things (IoT) environments for security provisioning.  ...  A Potential solution for solving forensic is the use of blockchain in software-defined networking (SDN).  ...  A blockchain based Data Preservation System (DPS) was proposed for securing sensitive medical data [37] .  ... 
doi:10.1109/access.2019.2930345 fatcat:5nnoi672mbbszaqtvqpghi5zey

An Attribute-Based Access Control for IoT Using Blockchain and Smart Contracts

Syed Yawar Abbas Zaidi, Munam Ali Shah, Hasan Ali Khattak, Carsten Maple, Hafiz Tayyab Rauf, Ahmed M. El-Sherbeeny, Mohammed A. El-Meligy
2021 Sustainability  
Through smart contracts, ciphertext can be stored on a blockchain by the data owner.  ...  Data can only be decrypted in a valid access period, whereas in blockchains, the trace function is achieved by the storage of invocation and the creation of smart contracts.  ...  Acknowledgments: The authors extend their appreciation to King Saud University for funding this work through the researchers supporting project number (RSP-2021/133), King Saud University, Riyadh, Saudi  ... 
doi:10.3390/su131910556 fatcat:jmjyqhgo3zedlbb55xog7apt4e

A Hypergraph-Based Blockchain Model and Application in Internet of Things-Enabled Smart Homes

Chao Qu, Ming Tao, Ruifen Yuan
2018 Sensors  
With the fast development and expansion of the Internet of Things (IoT), billions of smart devices are being continuously connected, and smart homes, as a typical IoT application, are providing people  ...  The emergence of blockchain technology has brought about a change of decentralized management, providing an effective solution for the protection of network security and privacy.  ...  R.Y. implemented the experiments and analyzed the data. All authors read and approved the manuscript. Conflicts of Interest: The authors declare no conflicts of interest.  ... 
doi:10.3390/s18092784 pmid:30149523 fatcat:24p5snvobzdadlsoehhjo2shtm

Blockchain-Based Context-Aware Authorization Management as a Service in IoT

Tidiane Sylla, Leo Mendiboure, Mohamed Aymen Chalouf, Francine Krief
2021 Sensors  
In this paper, we propose a decentralized context-aware authorization management as a service based on the blockchain.  ...  The proposed architecture extends the Authentication and Authorization for Constrained Environments (ACE) framework with blockchain technology and context-awareness capabilities.  ...  For instance, the owner of a smart home and their partner can have concurrent access to the smart lock.  ... 
doi:10.3390/s21227656 pmid:34833732 pmcid:PMC8619443 fatcat:uzg2pe6o3rbwrjsj3yi76p22vi

D2Gen: A Decentralized Device Genome based Integrity Verification Mechanism for Collaborative Intrusion Detection Systems

Imran Makhdoom, Kadhim Hayawi, Mohammed Kaosar, Sujith Samuel Mathew, Pin-Han Ho
2021 IEEE Access  
In general, the blockchain-based CIDS is secure against data integrity, forgery, and application/policy violation threats.  ...  Similarly, [28] proposed a technique to seek behavior transparency and control for smart home IoT devices.  ...  He has also been a Food Agility Scholar from 2019-2020 and has made a valuable contribution to data security and privacy in the Food Tech/Agri Tech.  ... 
doi:10.1109/access.2021.3117938 fatcat:ovf52sgm45erxktfeyqtcurxqq

Securing IoT Applications using Blockchain: A Survey [article]

Sreelakshmi K. K., Ashutosh Bhatia, Ankit Agrawal
2020 arXiv   pre-print
The Internet of Things (IoT) has become a guiding technology behind automation and smart computing.  ...  A majority of security issues arise because of the centralized architecture of IoT systems.  ...  The patients are monitored within the premises of their smart home. The smart home has a local gateway that connects to an edge server for performing computationally intensive tasks.  ... 
arXiv:2006.03317v1 fatcat:xio2x32w25gkxahyhvvqd6vcdu
« Previous Showing results 1 — 15 out of 120 results