2019
DOI: 10.3390/en12030402
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Improvement of Blockchain Application to Overcome Vulnerability of IoT Multiplatform Security

Abstract: IoT devices are widely used in the smart home, automobile, and aerospace areas. Note, however, that recent information on thefts and hacking have given rise to many problems. The aim of this study is to overcome the security weaknesses of existing Internet of Things (IoT) devices using Blockchain technology, which is a recent issue. This technology is used in Machine-to-Machine (M2M) access payment—KYD (Know Your Device)—based on the reliability of existing IoT devices. Thus, this paper proposes a BoT (Blockch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 56 publications
(30 citation statements)
references
References 43 publications
0
30
0
Order By: Relevance
“…Among the competition methods, the Bitcoin PoW is typical. PoW is a game in which the miners in a network independently perform a hash calculation (calculating block hash), and the game is won if a specific goal is reached, i.e., when a Bitcoin is less than or equal to the target [30,31]. When a certain miner finds the desired block hash, it propagates it to the network and immediately finds the next block, and the neighboring miners who propagate it will verify this block.…”
Section: Related Studiesmentioning
confidence: 99%
“…Among the competition methods, the Bitcoin PoW is typical. PoW is a game in which the miners in a network independently perform a hash calculation (calculating block hash), and the game is won if a specific goal is reached, i.e., when a Bitcoin is less than or equal to the target [30,31]. When a certain miner finds the desired block hash, it propagates it to the network and immediately finds the next block, and the neighboring miners who propagate it will verify this block.…”
Section: Related Studiesmentioning
confidence: 99%
“…IoT is implemented as public or private blockchains depending on the field and purpose. If blockchain technology is applied to an IoT environment, it is possible to not only solve cost, scalability, and security issues but also expect high efficiency by ensuring the integrity and transparency of data produced in IoT devices [18][19][20][21][22]. Table 1 shows an example of the benefits of applying the blockchain technology to the IoT environment compared to the centralized system [23].…”
Section: Iot Connectivity Technologiesmentioning
confidence: 99%
“…Kim et al [26] proposed a model to address the security vulnerability of sensor multi-platforms using blockchain technology using an empirical model. They also tried to overcome the weaknesses of sensor devices such as automobiles, airplanes, and close-circuit television (CCTV) using complete blockchain technology by measuring various security strengths.…”
Section: Literature Reviewmentioning
confidence: 99%