2020
DOI: 10.1166/jctn.2020.8929
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain: A New Technology to Enhance Data Security and Privacy in Internet of Things

Abstract: A revolutionary technology well into the world of technology has been in the modern world of technology the Internet of Things. Due to continuing increases as nothing more than a consequence of either the rapid development of computing Internet of things-based applications implementations. Many technologies become increasingly embraced throughout compatible devices such as home automation and also smart cities. These IoT applications become operated on both the Internet, whereby information becomes transporte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…The amount of trusted computing and privacy protection methods is relatively small, and they are generally arranged after the protection of theoretical courses and cannot play a role in assisting the trusted computing and privacy protection methods of IoT nodes. In the practice of IoT node trusted computing and privacy protection methods, high repeatability exists, IoT node trusted computing and privacy protection methods are inefficient, and students' individual development is not fully considered, which makes students gradually lose interest and initiative of protection, they are gradually disconnected from the social industry, and it cannot guide them to use their comprehensive abilities in the practice process [18][19][20][21].…”
Section: Fuzzy Logic Blockchain Trusted Computing Methodsmentioning
confidence: 99%
“…The amount of trusted computing and privacy protection methods is relatively small, and they are generally arranged after the protection of theoretical courses and cannot play a role in assisting the trusted computing and privacy protection methods of IoT nodes. In the practice of IoT node trusted computing and privacy protection methods, high repeatability exists, IoT node trusted computing and privacy protection methods are inefficient, and students' individual development is not fully considered, which makes students gradually lose interest and initiative of protection, they are gradually disconnected from the social industry, and it cannot guide them to use their comprehensive abilities in the practice process [18][19][20][21].…”
Section: Fuzzy Logic Blockchain Trusted Computing Methodsmentioning
confidence: 99%
“…Next the machine learning model is used for training and testing the traffic data. The significant infrastructure required for the development of the smart city, intelligent transport system is a hotly debated field of study ( Ota et al, 2017 ; Datta & Sharma, 2017 ; Simaiya et al, 2020 ). Additionally, it employs IoT and ML technology to resolve disputes in a positive manner ( Fig.…”
Section: Machine Learning Models For Atm-altrendmentioning
confidence: 99%
“…Based on the fitness value, all the healthiest participants are chosen depending on the validity of an optimization algorithm. It can be estimated across both PSO and EGA using the RF method with high precision to sustain the subsequent transmission [47,48].…”
Section: Apply Ega-psomentioning
confidence: 99%