2022
DOI: 10.3390/s22093426
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Based Privacy Information Security Sharing Scheme in Industrial Internet of Things

Abstract: Due to the competitive relationship among different smart factories, equipment manufacturers cannot integrate the private information of all smart factories to train the intelligent manufacturing equipment fault prediction model and improve the accuracy of intelligent manufacturing equipment fault detection. The use of a low fault recognition rate model for smart factories will cause additional losses for them. In this work, we propose a blockchain-based privacy information security sharing scheme in Industria… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…Industrial control system even has some general shortcomings, and repair requires a lot of human and material resources. Second, there are more and more attacks on industrial control networks [2]. Stuxnet is a very representative term in industrial history.…”
Section: Introductionmentioning
confidence: 99%
“…Industrial control system even has some general shortcomings, and repair requires a lot of human and material resources. Second, there are more and more attacks on industrial control networks [2]. Stuxnet is a very representative term in industrial history.…”
Section: Introductionmentioning
confidence: 99%
“…Although computationally inadequate, it protects the confidentiality of personal data. Wang et al proposed an IIoT privacy solution in [27]. This framework uses blockchain technology to record transactions securely and safeguard sensitive data during transmission.…”
Section: A Security Protocols For Secure Data Sharingmentioning
confidence: 99%
“…Differential privacy adds noise to the data before sharing it with the nodes, which makes it difficult for malicious nodes to identify the data of a specific node. Other approaches include blockchainbased [42,43] privacy information security sharing schemes. Overall, it is important to balance the benefits of the proposed model's resource optimization with the potential privacy risks, ensuring that adequate measures are in place to protect sensitive data and respect the users' privacy rights.…”
Section: Model Challenges and Feasible Solutions (A) Security And Pri...mentioning
confidence: 99%