2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) 2019
DOI: 10.1109/ismsit.2019.8932728
|View full text |Cite
|
Sign up to set email alerts
|

Designing a Secure IoT Network by Using Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…If security precautions are not taken, or if they are not appropriate, it is possible that injury will be of greater consequence [1]. Researchers sees that there is great potential for Blockchain-based identity and access protection to provide IoT protection [2].Fog computing is a dispersed expansion of IoT-oriented cloud-based service computing solutions that increasingly spread cloud processing and storage to the edge network [1]. Each fog node is located near the edge network's IoT devices and offers varying processing, storage, and networking capacities to facilitate the execution of service applications.…”
mentioning
confidence: 99%
See 2 more Smart Citations
“…If security precautions are not taken, or if they are not appropriate, it is possible that injury will be of greater consequence [1]. Researchers sees that there is great potential for Blockchain-based identity and access protection to provide IoT protection [2].Fog computing is a dispersed expansion of IoT-oriented cloud-based service computing solutions that increasingly spread cloud processing and storage to the edge network [1]. Each fog node is located near the edge network's IoT devices and offers varying processing, storage, and networking capacities to facilitate the execution of service applications.…”
mentioning
confidence: 99%
“…If security precautions are not taken, or if they are not appropriate, it is possible that injury will be of greater consequence [1]. Researchers sees that there is great potential for Blockchain-based identity and access protection to provide IoT protection [2].…”
mentioning
confidence: 99%
See 1 more Smart Citation