2023
DOI: 10.3390/electronics12173618
|View full text |Cite
|
Sign up to set email alerts
|

A New Blockchain-Based Authentication Framework for Secure IoT Networks

Ahmad K. Al Hwaitat,
Mohammed Amin Almaiah,
Aitizaz Ali
et al.

Abstract: Most current research on decentralized IoT applications focuses on a specific vulnerability. However, for IoT applications, only a limited number of techniques are dedicated to handling privacy and trust concerns. To address that, blockchain-based solutions that improve the quality of IoT networks are becoming increasingly used. In the context of IoT security, a blockchain-based authentication framework could be used to store and verify the identities of devices in a decentralized manner, allowing them to comm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 76 publications
0
2
0
Order By: Relevance
“…Furthermore, the early adoption of ensemble learning, where multiple models collectively make decisions, bolstered the robustness and accuracy of mobile threat detection. By leveraging the strengths of individual models and mitigating their weaknesses through a collective approach, ensemble methods exhibit enhanced resilience against false positives and improved overall detection rates [73]. Table 3 provides a comprehensive overview of the preliminary work on intelligent techniques for mobile security, spanning from AI-based anomaly detection to ensemble learning for threat mitigation.…”
Section: Preliminary Work In Intelligent Techniquesmentioning
confidence: 99%
“…Furthermore, the early adoption of ensemble learning, where multiple models collectively make decisions, bolstered the robustness and accuracy of mobile threat detection. By leveraging the strengths of individual models and mitigating their weaknesses through a collective approach, ensemble methods exhibit enhanced resilience against false positives and improved overall detection rates [73]. Table 3 provides a comprehensive overview of the preliminary work on intelligent techniques for mobile security, spanning from AI-based anomaly detection to ensemble learning for threat mitigation.…”
Section: Preliminary Work In Intelligent Techniquesmentioning
confidence: 99%
“…Figure 4 shows the secure IoT framework with blockchain implementation, as the IoT is challenged by insufficient standardization, the limited capacity of cloud servers, low manipulation potential, and costs [4]. As a way to facilitate IoT device privacy and security, lightweight scalable blockchain is described in [20]. By implementing a blockchain with robust computing performance, decentralization and privacy protection are achieved due to the implementation of an overlay network.…”
Section: Secure Iot Framework Based On Blockchainmentioning
confidence: 99%
“…Detection: Attackers may attempt to bypass or evade detection mechanisms implemented in the smart-grid system. This could involve sophisticated techniques to hide their activities, such as disguising malicious traffic or exploiting vulnerabilities in the system’s monitoring and detection capabilities [ 47 ].…”
Section: Homomorphic Operationsmentioning
confidence: 99%