2021
DOI: 10.1109/jiot.2020.3022033
|View full text |Cite
|
Sign up to set email alerts
|

IoTCop: A Blockchain-Based Monitoring Framework for Detection and Isolation of Malicious Devices in Internet-of-Things Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(9 citation statements)
references
References 46 publications
0
6
0
Order By: Relevance
“…Blockchain technology can provide a secure distributed system framework on currently available information and communication technology (ICT) applications utilizing the latest cryptography, PKI, consensus, smart contract, and access control mechanisms. Blockchain technology has been widely adopted in IoT applications and e-commerce systems for secure communications, data sharing, and software security [114], [115]. In the energy sector, blockchain technology has been mostly studied in secure or privacy-preserved energy trading [116], [117].…”
Section: Network and Firmware Security Detection And Mitigation Metho...mentioning
confidence: 99%
“…Blockchain technology can provide a secure distributed system framework on currently available information and communication technology (ICT) applications utilizing the latest cryptography, PKI, consensus, smart contract, and access control mechanisms. Blockchain technology has been widely adopted in IoT applications and e-commerce systems for secure communications, data sharing, and software security [114], [115]. In the energy sector, blockchain technology has been mostly studied in secure or privacy-preserved energy trading [116], [117].…”
Section: Network and Firmware Security Detection And Mitigation Metho...mentioning
confidence: 99%
“…In Figure 8, it is shown that the validity of the blocks is verified by the check of the three level agents, which ensures the security of the data. The automatic handling of compromised devices can avoid dangerous behaviors time; Rodriguez [26] proposed a Hyperledger (Fabric)-based IoT device monitorin scheme. In Figure 5, the source and target devices are shown to verify the transaction r liability through the endorsing node in Hyperledger, and the dangerous devices are au tomatically isolated by chaincode.…”
Section: Iot Securitymentioning
confidence: 99%
“…17 In "IoTCop," Seshadri et al utilize HyperLedger Fabric to monitor network traffic between edge devices and to isolate malicious devices that do not comply with the security policies. 32 However, in this work, we evaluate the viability of a blockchain-based monitoring system for communicating resource usage between lightweight devices on the far edge.…”
Section: Related Workmentioning
confidence: 99%