A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Edge Computing and Its Convergence with Blockchain in 5G and Beyond: Security, Challenges, and Opportunities
2020
IEEE Access
At times it is exceptionally puzzling to ascertain the cause for a service breakdown precisely in the network. ...
(QoS), routing area code (RAC) information, and location awareness [72] , [73] . ...
doi:10.1109/access.2020.3037108
fatcat:iksoyfx7nbhfrefnzgf6uxuw4q
Blockchain for Vehicular Internet of Things: Recent Advances and Open Issues
2020
Sensors
There are many studies focusing on the use of blockchain in managing data and transactions in vehicular environments. ...
However, the application of blockchain in vehicular environments also faces some technical challenges. In this paper, we first explain the fundamentals of blockchain and vehicular IoT. ...
In a traditional blockchain like Bitcoin, blocks are generated by the miners that have solved a complex cryptographic puzzle. ...
doi:10.3390/s20185079
pmid:32906707
pmcid:PMC7571114
fatcat:ukisc67roneg7kcqugsiblh6ca
AACT: Anonymous and Accountable communication topology for Wireless Mesh Networks
2012
IOSR Journal of Computer Engineering
Recently, multihop wireless mesh networks (WMNs) have involved increasing attention and deployment as a low-cost move toward to give broadband Internet access at an urban scale. ...
On the other hand, AACT offers complicated user privacy protection beside both adversaries and a range of other network entities. ...
In this paper we have kept in mind the limitations of the distributed systems which may under perform during high network traffic so we used the group-oriented protocol for rekeying. ...
doi:10.9790/0661-0520112
fatcat:wxrb53grjzdjrmbikh65wzm5iy
Security Considerations for Internet of Things: A Survey
2020
SN Computer Science
This paper is focusing on a survey on IoT security and aims to highlight the most significant problems related to safety and security in the IoT ecosystems. ...
After a review of the relevant, online literature on the topic and after looking at the market trends and developments, one can notice that there are still concerns with regard to security in IoT products ...
Symphony Link, offered by Link Labs, is a wireless solution for enterprise and industrial which connects IoT devices to the cloud securely [97] . ...
doi:10.1007/s42979-020-00201-3
fatcat:4gkafccu7vgq7olrqdxdpgm2eu
Blockchain and IoT Convergence—A Systematic Survey on Technologies, Protocols and Security
2020
Applied Sciences
blocks of IoT architecture and solve the scalability problem as the number of devices increases. ...
The IoT global market is expected to grow from 170 billion USD in 2017 to 560 billion USD by 2022. ...
It is nothing but collection of sensors, actuators which forms Wireless Sensor Network (WSN). ...
doi:10.3390/app10196749
fatcat:wq2gbxxxunb2hdruyoa6di7mri
Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment
2022
Network
A key aspect of privacy in the blockchain is the sensitive content of transactions in the permissionless blockchain. ...
Specifically, DPoSS first uses polynomial interpolation to select a dealer group from many nodes to maintain the consensus of the blockchain system, in which the dealers in the dealer group take turns ...
During the election, each participant will run a cryptographic puzzle for a fixed time, and the result of the puzzle will be broadcast to the network for comparison. ...
doi:10.3390/network2010005
fatcat:x7v6sncmzrfmle7foomxmzqeq4
Blockchain's adoption in IoT: The challenges, and a way forward
2019
Journal of Network and Computer Applications
It can also perform other functions such as cloud computing and handling of data management processes [16] . ...
A data management system for decentralized networks has been proposed in [151] . It protects against issues related to data transparency and auditability, data ownership and access control. ...
Hence, in a network with four replicas, a single request requires 32 messages between client and replicas, i.e., 4 in stage-1, 3 in stage-2, 9 in stage-3, 12 in stage-4 and 4 in stage-5 respectively. ...
doi:10.1016/j.jnca.2018.10.019
fatcat:g6ya7prv6bdzbagaqcai2b4boa
A Survey of IoT and Blockchain Integration: Security Perspective
2021
IEEE Access
The use of blockchain in IoT applications is still in its early stages, particularly at the low end of the computing spectrum. ...
In the Internet of Things (IoT), blockchain can be used to create a decentralized, reliable, and secure environment. ...
Tree-chain incorporates a consensus algorithm that does not require validators to solve any puzzles or provide proof of x before storing a new block. ...
doi:10.1109/access.2021.3129697
fatcat:l3tj4zelejbobouc2ouw3j3pcy
WiFi Dependent Consensus Mechanism For Constrained Devices Using Blockchain Technology
2020
IEEE Access
The nature of the problem is real-time i.e. miners become aware of the elements of the puzzle when the parts that make up the puzzle (the block contents) are revealed on the network. ...
This single hop network does not introduce any additional delays as would be experienced in multi-hop networks. ...
doi:10.1109/access.2020.3014287
fatcat:lqiegl2tgvbmlhd3s47osdf7x4
A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions
[article]
2022
arXiv
pre-print
Lastly, a number of open issues and challenges as well as future opportunities in the area of AI-enabled BIoV, hardware-assisted security for BIoV and quantum computing attacks on BIoV. ...
In this work, we present the state-of-the-art of Blockchain-enabled IoVs (BIoV) with a particular focus on their applications such as crowdsourcing-based applications, energy trading, traffic congestion ...
The transaction lifecycle is depicted in Fig. 2 To add a block to Blockchain, a miner must successfully solve the computationally difficult puzzle of finding the right nonce for a block header. ...
arXiv:2203.10708v1
fatcat:sozptzz5l5a27oh5rukujcg32a
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
2018
IEEE Communications Surveys and Tutorials
From an abstract perspective, a blockchain is a distributed ledger capable of maintaining an immutable log of transactions happening in a network. ...
In this context, the blockchain is seen as the missing link toward building a truly decentralized, trustless, and secure environment for the IoT and, in this survey, we aim to shape a coherent and comprehensive ...
As an alternative to computationally expensive puzzle solving, proof of stake aims to stake peers' economic share in the network [50] . ...
doi:10.1109/comst.2018.2886932
fatcat:b6m4roave5c7tpdlzgguustf6e
Multi-grid cellular genetic algorithm for optimizing variable ordering of ROBDDs
2012
2012 IEEE Congress on Evolutionary Computation
The population evolves on a bidimensional grid and is implicitly organized in geographical clusters that present a form of structural similarity between individuals. ...
This paper presents a cellular genetic algorithm for optimizing the variable order in Reduced Ordered Binary Decision Diagrams. The evolution process is inspired by a basic genetic algorithm. ...
Dynamic Wireless Sensor Networks by Genetic Algorithm 522, Pei-Chuan Tsai, Chih-Ming Chen and Ying-ping Chen, Sparse Degrees Analysis for LT Codes Optimization 575, Lucas Benedicic, Mitja Stular and Peter ...
doi:10.1109/cec.2012.6256590
dblp:conf/cec/RotaruB12
fatcat:4ly3nrktw5habc6lf5err7d5py
D2.1 Vision, State of the Art and Requirements Analysis
2019
Zenodo
A Privacy-Aware Authentication (PAA) scheme is presented in [106] to solve the identification problem in Mobile Cloud computing services. ...
In [143] a multi-authority scheme is proposed, that can solve the trust issues, attribute revocation problem, and system failure. ...
scalability, and localizability; • others (+), which mainly include: • Design: they specify or constraint architectural elements and their relationship; • Implementation: they specify or constraint the coding ...
doi:10.5281/zenodo.3564301
fatcat:lrb6r6zat5bk5oqwpwwlui3ztm
D2.1 Vision, State of the Art and Requirements Analysis
2019
Zenodo
A Privacy-Aware Authentication (PAA) scheme is presented in [120] to solve the identification problem in Mobile Cloud computing services. ...
In [157] a multi-authority scheme is proposed, that can solve the trust issues, attribute revocation problem, and system failure. ...
This outcome is aligned with the scope of the GUARD project, which aims at unifying the user experience for prevention, detection, investigation and response actions, in a distributed environment across ...
doi:10.5281/zenodo.4268474
fatcat:vtvogbwapzdc7nn6vms2cvdjou
5GZORRO_D2.2: Design of the 5GZORRO Platform for Security & Trust
2021
Zenodo
There are many consensus algorithms in use today, broadly being categorised into the following types: • Proof of Work (PoW) -an algorithm whereby 'miners' compete to solve a mathematical puzzle and generate ...
In early stage (Incubation).
5GZORRO Focus In 5GZORRO scope, DIDs and VCs, together with DLTs, enable a multi-stakeholder decentralized identity management solution. ...
doi:10.5281/zenodo.5561042
fatcat:o5ecnvwvifhmveigarvfgih3l4
« Previous
Showing results 1 — 15 out of 49 results