2022
DOI: 10.18280/ijsse.120611
|View full text |Cite
|
Sign up to set email alerts
|

Attack Detection Using a Lightweight Blockchain Based Elliptic Curve Digital Signature Algorithm in Cyber Systems

Abstract: Cyber-physical systems (CPSs) are highly susceptible to malicious cyberattacks due to their reliance on communication networks. For this reason, many different attack detection techniques have been developed to guarantee the safety of CPSs. This article introduces BlockChain (BC) to address CPS issues such as data security and privacy. Additionally, BC is not well suited for CPS due to its high computing complexity, limited scalability, significant bandwidth overhead, and latency. To meet the requirements of C… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 35 publications
0
7
0
Order By: Relevance
“…Vasa previa can be detected on ultrasound using a variety of techniques, including transvaginal scanning, placental cord insertion, color Doppler applied across the cervix, and three-dimensional (3D) ultrasonography [19,20,21]. When the placenta implants itself into the myometrium lining the uterine wall, a process called accretion occurs.…”
Section: Using Ultrasonography To Diagnose Placental Problemsmentioning
confidence: 99%
“…Vasa previa can be detected on ultrasound using a variety of techniques, including transvaginal scanning, placental cord insertion, color Doppler applied across the cervix, and three-dimensional (3D) ultrasonography [19,20,21]. When the placenta implants itself into the myometrium lining the uterine wall, a process called accretion occurs.…”
Section: Using Ultrasonography To Diagnose Placental Problemsmentioning
confidence: 99%
“…The design and development of lightweight blockchain technology to secure data communication in IoT networks requires various factors to ensure scalability, security, and data privacy. To design a lightweight blockchain to handle many IoT devices and transactions, in addition to lessening the burden on IoT devices, we propose a lightweight cryptographic algorithm to secure data transmission and implement a robust key management process [27,28].…”
Section: Design Considerationmentioning
confidence: 99%
“…Due to variables such as the devices' limited resources, the network's dynamic topology, and the variety of attack vectors, detecting assaults on the routing scheme of IIoT strategies can be challenging [6]. Recent years have seen the development of a number of methods for dealing with this problem, machine learning-based approaches.…”
Section: Introductionmentioning
confidence: 99%