2019
DOI: 10.1049/iet-com.2019.0194
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain in internet‐of‐things: a necessity framework for security, reliability, transparency, immutability and liability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(22 citation statements)
references
References 12 publications
0
20
0
Order By: Relevance
“…These will also ensure data transfer control and make a transaction in a distributed manner. Finally, tokenization includes some form of entity that can be stored and removed to confirm the transaction from the sender station [28,29]. To work with data storage and management, this research also places a way of database management system in the cloud for interactively real-time data monitoring and storage.…”
Section: Safe Monitoring Of Cloud Data With Blockchainmentioning
confidence: 99%
“…These will also ensure data transfer control and make a transaction in a distributed manner. Finally, tokenization includes some form of entity that can be stored and removed to confirm the transaction from the sender station [28,29]. To work with data storage and management, this research also places a way of database management system in the cloud for interactively real-time data monitoring and storage.…”
Section: Safe Monitoring Of Cloud Data With Blockchainmentioning
confidence: 99%
“…Blockchain technology is frequently associated with cryptocurrencies, however its decentralized nature, its high degree of data immutability and its adaptability offers the potential for applications in a wide range of further use cases [11]. Both scholars and practitioners are increasingly focusing on blockchain's potential to enable supply chain transparency [12][13][14][15].…”
Section: Blockchain and Tracking Technologies In The Raw Materials Sectormentioning
confidence: 99%
“…The first 4 bits of delta characters has to represent a range from 0 to 65,535. However, these four bits are limited [3, 10]. Four types of messages are there in CoAP – CON, NON‐CON, ACK and RST.…”
Section: Background and Related Workmentioning
confidence: 99%
“…IoT networks prefer using user datagram protocol (UDP). New communication protocols have been tailored for operating IoT constrained devices like message queuing telemetry transport, constrained application protocol (CoAP), data distribution service and so on [3].…”
Section: Introductionmentioning
confidence: 99%