2020
DOI: 10.3390/s21010023
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things

Abstract: A multitude of smart things and wirelessly connected Sensor Nodes (SNs) have pervasively facilitated the use of smart applications in every domain of life. Along with the bounties of smart things and applications, there are hazards of external and internal attacks. Unfortunately, mitigating internal attacks is quite challenging, where network lifespan (w.r.t. energy consumption at node level), latency, and scalability are the three main factors that influence the efficacy of security measures. Furthermore, mos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1
1

Relationship

2
8

Authors

Journals

citations
Cited by 41 publications
(37 citation statements)
references
References 70 publications
(96 reference statements)
0
28
0
Order By: Relevance
“…In [14] suggested an energy-effective decentralized mechanism of trust with the use of the blockchain-dependent solution for multi-mobile code on behalf of sensing the interior attacks in the SN (sensor node) enabled IoT. The outcome validates improved concert of presented technique over traditional ones with 43.94% and 2.67% a reduced amount of overhead message in the Greyhole and blackhole attack circumstances correspondingly.…”
Section: Related Workmentioning
confidence: 64%
“…In [14] suggested an energy-effective decentralized mechanism of trust with the use of the blockchain-dependent solution for multi-mobile code on behalf of sensing the interior attacks in the SN (sensor node) enabled IoT. The outcome validates improved concert of presented technique over traditional ones with 43.94% and 2.67% a reduced amount of overhead message in the Greyhole and blackhole attack circumstances correspondingly.…”
Section: Related Workmentioning
confidence: 64%
“…However, a single point of failure issue occurs, and MNs tamper the data. In [31][32][33], IoST faces the issue of internal attacks that affect the network's lifetime, scalability, and throughput. In [7], MNs broadcast false destination address, which affects the network's performance because data packets are continuously moved in the loop.…”
Section: Maliciousmentioning
confidence: 99%
“…Device tampering attacks also result in selective message eavesdropping attacks which acts as a base for launching other serious security attacks such as wormhole, black-hole attacks. The device tempering attacks can be avoided using various tempering proof techniques [58]- [60] proposed in the literature however require additional energy and processing costs.…”
Section: B Secure the Communication Channelmentioning
confidence: 99%