2022
DOI: 10.1109/access.2022.3223370
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things (IoT) Security With Blockchain Technology: A State-of-the-Art Review

Abstract: With the rapid enhancement in the design and development of the Internet of Things creates a new research interest in the adaptation in industrial domains. It is due to the impact of distributed emerging technology and topology of industrial Internet of Things and the security-related resource constraints of industrial 5.0. This conducts new paradigm along with critical challenges to the existing information preservation, node transactions and communication, transmission, trust and privacy, and security protec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 83 publications
(45 citation statements)
references
References 103 publications
0
16
0
Order By: Relevance
“…Due to the introduction of NuCypher Re-Encryption infrastructure, hashing tree and allocation, deployment of Blockchain proof-of-work it is required more computational power as well. There are discussed possible solutions of mentioned problems in, Khan et al. (2022a, b, c).…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Due to the introduction of NuCypher Re-Encryption infrastructure, hashing tree and allocation, deployment of Blockchain proof-of-work it is required more computational power as well. There are discussed possible solutions of mentioned problems in, Khan et al. (2022a, b, c).…”
Section: Resultsmentioning
confidence: 99%
“…In healthcare sphere. BIoMT: a state-of-the-art consortium server-less network architecture for healthcare system using Blockchain smart contracts is introduced, which provides security, integrity, transparency and provenance to health-related transactions and exchanges sensitive clinical information in a server-less peer-to-peer (P2P) secure network environment, Khan et al. (2022a, b, c).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…As seen in Table 1, this results in several dangers. Researchers have also tackled various cyber-attacks related to several types of UAVs in a pre-controlled environment [40, 41,42,43,44,45]. The crash of drones with numerous parallel queries and the alteration of the request packet is called the buffer-over ow attack.…”
Section: B the Challenges Issues And Vulnerabilities Of Uavsmentioning
confidence: 99%
“…Sensors can gather real-time data on energy production and consumption with the combination of blockchain and IoT/CPS, and this data may be used to develop smart contracts that automatically carry out energy trading depending on specified parameters. By removing the need for middlemen and enabling peer-to-peer (P2P) energy trade, these smart contracts can lower prices and boost efficiency (Maleh et al ., 2022; Khan et al ., 2022).…”
Section: Introductionmentioning
confidence: 99%