2020
DOI: 10.3390/s20226471
|View full text |Cite
|
Sign up to set email alerts
|

An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things

Abstract: As the Internet of Things (IoT) has become prevalent, a massive number of logs produced by IoT devices are transmitted and processed every day. The logs should contain important contents and private information. Moreover, these logs may be used as evidences for forensic investigations when cyber security incidents occur. However, evidence legality and internal security issues in existing works were not properly addressed. This paper proposes an autonomous log storage management protocol with blockchain mechani… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 60 publications
0
13
0
Order By: Relevance
“…We provide security verification of the proposed scheme using the widely accepted AVISPA tool, which was frequently used in a lot of relevant works [31,42,54]. Unlike RoR model and BAN logic, AVISPA is a push-button software for the automated validation of cryptographic protocols and applications.…”
Section: Formal Security Verification Using Avispa Simulation Toolmentioning
confidence: 99%
“…We provide security verification of the proposed scheme using the widely accepted AVISPA tool, which was frequently used in a lot of relevant works [31,42,54]. Unlike RoR model and BAN logic, AVISPA is a push-button software for the automated validation of cryptographic protocols and applications.…”
Section: Formal Security Verification Using Avispa Simulation Toolmentioning
confidence: 99%
“…This tool offers an expressive and modular formal language for defining protocols and their security properties by incorporating different back-end automated analysis techniques [ 63 ]. Many researchers have widely adopted this automatic security verification to validate the security of their proposed schemes [ 64 , 65 , 66 , 67 ]. SC-ABSE was designed and coded by a specific programming language called the high-level protocol specification language (HLPSL) via the animator’s security protocol (SPAN) [ 68 ].…”
Section: Security Analysismentioning
confidence: 99%
“…Here, also one interesting question emerges: how can 5G improve renewable energy trade market? In addition to the peer-to-peer (P2P) energy trading markets that would involve not only energy companies but also prosumers, 5G networks would also help to reduce the costs, coupling 5G networks with renewable energy that would also reduce the telecommunications industry's carbon footprint by eliminating its dependence on fossil fuels (Hsu et al, 2020;Israr et al, 2020). As the energy market is developing a more productive relationship with the IoT, the addition of 5G will improve usability and utility of the IoT by making households and networks smarter and more energy efficient.…”
Section: Fifth Generation Wireless Network In the Internet Of Energymentioning
confidence: 99%