2018 Innovations in Intelligent Systems and Applications (INISTA) 2018
DOI: 10.1109/inista.2018.8466268
|View full text |Cite
|
Sign up to set email alerts
|

Implementing a Forms of Consent Smart Contract on an IoT-based Blockchain to promote user trust

Abstract: The H2020 European research project SafeGuarding Home IoT Environments with Personalised Real-time Risk Control (GHOST) aims to develop a cyber-security layer on IoT smart home installations. The proposed system analyses packet-level data flows for building patterns of communications between IoT devices and external entities. To ensure nonrepudiation, integrity and authentication of the data captured, they are stored in a Blockchain, a distributed ledger network, as digitally-signed transactions. Since the dat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 13 publications
0
10
0
Order By: Relevance
“…We observe that all included papers concerning the latter category were published only after 2015. Nine [9,10,19,29,33,35,46,47,59] of those 12 papers were, in fact, published after April 2016, which is when the GDPR was adopted. We therefore hypothesize that this increase in research for generally applicable e-consent implementations is caused by the introduction of the GDPR, which introduced stricter regulations for such applications.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…We observe that all included papers concerning the latter category were published only after 2015. Nine [9,10,19,29,33,35,46,47,59] of those 12 papers were, in fact, published after April 2016, which is when the GDPR was adopted. We therefore hypothesize that this increase in research for generally applicable e-consent implementations is caused by the introduction of the GDPR, which introduced stricter regulations for such applications.…”
Section: Methodsmentioning
confidence: 99%
“…In situations where trust is lacking (which is often the case in online environments), including a third party may not be an option. Several of the proposed solutions [10,35,37,47,50,59] therefore rely on a blockchain to provide transparent and verifiable audit logs.…”
Section: Non-repudiationmentioning
confidence: 99%
See 1 more Smart Citation
“…Nowadays, the absence of IoT standards and the intrinsic complexity demand for proper security layers constitute the need of holistic IoT security solutions imperative. Apart from some notable exceptions, such as [13] where the authors propose a methodology to validate and certify different technological solutions in large-scale conditions and [14] where the cyber security aspect regarding the communication between IoT devices and external entities is addressed, there is still a long way until the total armour of the IoT.…”
Section: Emerging Advancementsmentioning
confidence: 99%
“…Therefore, applications of blockchain towards enhancing the security and privacy of the IoT have received great attention due to its capacity in providing a fundamentally di erent approach as a distributed, transparent and accountable sys-tem [54,100,169]. Examples of application areas include identity security [24], intrusion detection systems and mitigation of distributed denial-of-service attacks [15,99], data security and digital forensic evidence preservation [2,38], as well as privacy enhancement and management [70,102]. Specifically for the IoT, the security through transparency approach in public blockchains has in many cases clear advantages compared to the usual security through obscurity model.…”
Section: Introductionmentioning
confidence: 99%