2019 Global IoT Summit (GIoTS) 2019
DOI: 10.1109/giots.2019.8766403
|View full text |Cite
|
Sign up to set email alerts
|

IoT Resource Access utilizing Blockchains and Trusted Execution Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Hash-locking [37] uses hash algorithm [38] and time lock [39] to achieve cross-chain asset exchange, which is often applied to exchange tokens on different chains, such as between ethereum and bitcoin on ethereum, but the needs of asset transfer and message sending cannot be achieved independently. Hash-locking provides time delay for both parties to interact assets and ensures the atomicity of transactions [40], i.e., the operation of both parties is a whole and can only be fully completed or fully undone, and the priority encryption of sent assets avoids problems such as double-spending, which is a lightweight and more secure cross-chain asset interaction technology.…”
Section: A Hash-lockingmentioning
confidence: 99%
“…Hash-locking [37] uses hash algorithm [38] and time lock [39] to achieve cross-chain asset exchange, which is often applied to exchange tokens on different chains, such as between ethereum and bitcoin on ethereum, but the needs of asset transfer and message sending cannot be achieved independently. Hash-locking provides time delay for both parties to interact assets and ensures the atomicity of transactions [40], i.e., the operation of both parties is a whole and can only be fully completed or fully undone, and the priority encryption of sent assets avoids problems such as double-spending, which is a lightweight and more secure cross-chain asset interaction technology.…”
Section: A Hash-lockingmentioning
confidence: 99%
“…A model is proposed in [130] to provide IoT devices the trust while making the payment by using blockchain and OAuth 2.0 authorization framework. It ensures the confidentiality and integrity of IoT data.…”
Section: Auditable Trustworthy and Robustnessmentioning
confidence: 99%
“…(1) Implementation complexity, (2) Response time analysis along with the security perspective needs to be presented in details Agrawal et al [79] Makes the system robust, secure and immune to failure Lack of details of the proposed system along with implementation cost Guin et al [41] (1) Registered devices can be verified anywhere without actually locating the manufacturer, ( 2 [130] (1) Ensures the confidentiality and integrity of IoT data, (2) Hash-lock and time-lock mechanisms are used to cryptographically link various trusted IoT resources access, along with for authorisation grants and blockchain payments…”
Section: Integration Of Iot With Aimentioning
confidence: 99%
“…AnyLedger is pluggable to any blockchain technology (for example Ethereum or Bitcoin). [61] is another system which equips IoT devices with a TEE to guarantee integrity and confidentiality of the IoT data.…”
Section: Related Workmentioning
confidence: 99%