2019
DOI: 10.3390/s19040856
|View full text |Cite
|
Sign up to set email alerts
|

Management and Monitoring of IoT Devices Using Blockchain

Abstract: Nowadays, we are surrounded by a large number of IoT (Internet of Things) devices and sensors. These devices are designed to make life easier and more comfortable. Blockchain technology, especially its mass application, is becoming a term number one. Adoption of blockchain into enterprise networks still has a few challenges that need to be tackled. Utilizing blockchain can bring increased security and efficiency of network maintenance. The key feature of the blockchain, immutability, brings resistance to unaut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 105 publications
(49 citation statements)
references
References 25 publications
0
36
0
2
Order By: Relevance
“…It combines the SaaS business model with blockchain, which was used to buy and sell sensor data. Reference [11] proposed an improved blockchain structure. In the enterprise network, the private chain was used to manage the device configuration files of IoT in a distributed way.…”
Section: Related Workmentioning
confidence: 99%
“…It combines the SaaS business model with blockchain, which was used to buy and sell sensor data. Reference [11] proposed an improved blockchain structure. In the enterprise network, the private chain was used to manage the device configuration files of IoT in a distributed way.…”
Section: Related Workmentioning
confidence: 99%
“…Ethereum [47] and Hyperledger Fabric [48] are the two most popular blockchain application development platforms. Their underlying technologies are the same.…”
Section: Blockchainmentioning
confidence: 99%
“…DLP likes Intrusion Detection System (IDS) in identifying malicious act and notifying person who in charge of network. On other hands, IDS is not designed to avoid data leakage [23]. Finally, network monitor of DLP can be deployed near router or switch that connected all devices together to control all incoming and outcoming packets [24].…”
Section: Data In Motionmentioning
confidence: 99%