2022
DOI: 10.1007/978-981-16-9885-9_22
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Implementation in IoT Privacy and Cyber Security Feasibility Study and Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…• Public blockchain: It is a new distributed ledger technology with no restrictions or permissions, where every member of the blockchain network can contribute to the distribution of new blocks and the use of blockchain content [27].…”
Section: B Taxonomy Of Blockchain Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…• Public blockchain: It is a new distributed ledger technology with no restrictions or permissions, where every member of the blockchain network can contribute to the distribution of new blocks and the use of blockchain content [27].…”
Section: B Taxonomy Of Blockchain Systemsmentioning
confidence: 99%
“…• Private blockchain: Appropriate for companies operating in a restricted environment under a structured administration where only certain members can join the blockchain network. [27].…”
Section: B Taxonomy Of Blockchain Systemsmentioning
confidence: 99%
“…Vrabie [ 94 ] presented IoT services that could help to develop smart cities and provided numerous examples of cities that have implemented these concepts. Viswanadham and Jayavel [ 95 ] surveyed related research on blockchain technology implemented within IoT devices and applications. They aimed to provide an understanding of blockchain security and privacy features for IoT services.…”
Section: Cybersecurity In Smart Citiesmentioning
confidence: 99%
“…IoT Abomhara and Køien [88] 2015 Threat classification, attack characterization and an analysis of IoT devices Rohokale and Prasad [89] 2015 A critical systematic review of cyberthreats to heterogeneous IoT networks Saadeh et al [90] 2016 A survey of IoT authentication techniques Sivanathan et al [91] 2017 An evaluation of vulnerabilities through CIA and the capability of DDoS attacks Neshenko [92] 2018 An evaluation of large-scale malicious IoT data from cyberthreat intelligence Ainane et al [93] 2018 An identification of data and protocol exchanges between users and IoT applications Vrabie [94] 2018 How IoT networks and services can develop smart cities Viswanadham and Jayavel [95] 2018 The implementation of blockchain in IoT security and its domain Lewis [96] 2018 The security of IoT networks and devices Wu et al [97] 2018 Hyperconnected interdependent IoT services and future applications James [98] 2019 The detection of critical attacks on IoT devices by executing cybersecuritybased attacks Shokeen et al [99] 2019 An accurate evaluation of each vulnerability of IoT systems Roukounaki et al [100] 2019 The identification of threats using security analytics algorithms, vulnerabilities, and attacks Van Kleek et al [101] 2019 The classification of IoT device data in privacy-empowering networks Thorburn et al [102] 2019 Basic future frameworks for IoT devices that share data with third parties Nwafor and Olufowobi [103] 2019 An anomaly detection system for events in IoT ecosystems Ullah et al [104] 2019 The detection of infected SW and files across IoT networks using deep learning (DL) Sharma et al [105] 2020 The computerized security of IoT devices Karie et al [106] 2020 A literature review of IoT threat detection and security challenges Andrade et al [107] 2020 An evaluation of IoT cybersecurity maturity in smart cities according to its risk levels Singh et al [108] 2020 The types of IoT security threats and their countermeasures Cvitić et al [109] 2021 The detection of DDoS traffic attack using logistic model trees on different IoT devices Jhanjhi et al [110] 2021 An investigation of cyberattacks that target the four layers of the IoT Strecker et al [111] 2021 The detection of malicious and anomalous data in IoT systems using machine learning (ML) Ahmed et al…”
Section: Category Authors Year Approach/experimentsmentioning
confidence: 99%
“…In [ 3 ], the authors carried out a comprehensive study regarding IoT security from more perspectives, showing that attacks can occur on all three layers of IoT systems (application, network, and physical). Works [ 4 , 5 , 6 , 7 , 8 , 9 ] present comprehensive studies related to the security of the IoT domain, with different focuses: general threats, security solutions based on machine learning, or artificial intelligence. IoT devices are significant in industry, which has resulted in a specialized branch, Industry IoT (IIoT).…”
Section: Introductionmentioning
confidence: 99%