2018
DOI: 10.4108/eai.13-7-2018.164628
|View full text |Cite
|
Sign up to set email alerts
|

IoT-Chain: Security of things for Pervasive, Sustainable and Efficient Computing using Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…Performance parameters like scalability, energy consumption, confirmed transaction per second (CTPS), real-time applicability are necessary while assessing a DLT platform (Akhtar & Rizvi, 2020a;Akhtar & Rizvi, 2020b). Scalability is defined as a system's nature to handle high request of transaction and changes.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Performance parameters like scalability, energy consumption, confirmed transaction per second (CTPS), real-time applicability are necessary while assessing a DLT platform (Akhtar & Rizvi, 2020a;Akhtar & Rizvi, 2020b). Scalability is defined as a system's nature to handle high request of transaction and changes.…”
Section: Discussionmentioning
confidence: 99%
“…An exhaustive comparison is done between Proof of Work (PoW) and Proof of Stake for IoT applications feasibility in Akhtar & Rizvi (2020a) and Akhtar & Rizvi (2020b). PoW and PoS are two known consensus algorithms that are required to establish truth in the distributed network.…”
Section: Blockchain For Consumer Electronicsmentioning
confidence: 99%
See 1 more Smart Citation
“…To mitigate such issues of trust and transparency in distributed networks, solutions like distribute ledger technology (DLT) (including blockchain in particular) combined with IoT can help the network to increase traceability and overall reliability. Also, in the present IoT implementation the data is highly unreliable and most of the time data integrity is not ensured [ 5 , 6 ]. In present-day critical applications like healthcare, military operations, weather forecasting, etc., data reliability is of prime importance since they work based on data-driven decision making.…”
Section: Introductionmentioning
confidence: 99%
“…IoT applications come with lot of features like being omnipresent and pervasive. However, the IoT ecosystem is vulnerable due to a number of factors [ 5 ]. Major problems seen in IoT implementations are: Highly centralized systems : Being centralized might not be an issue in today’s internet world but being the single point of failure increases the probability of concerns.…”
Section: Introductionmentioning
confidence: 99%