2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C) 2017
DOI: 10.1109/icse-c.2017.60
|View full text |Cite
|
Sign up to set email alerts
|

Peer to Peer for Privacy and Decentralization in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 73 publications
(39 citation statements)
references
References 3 publications
(3 reference statements)
0
32
0
1
Order By: Relevance
“…Meanwhile, edge computing service providers cannot decrypt transactions which maintains security at the edge computing sub layer. Encryption using symmetric keys as employed in Conoscenti et al; Dorri et al; Zyskind and Nathan [18,44,49] does not guarantee effective data confidentiality, since keys are transmitted together with sensor data. An eavesdropper who listens to traffic between communicating parties can successfully capture encryption keys hence decrypt data meant for either party.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Meanwhile, edge computing service providers cannot decrypt transactions which maintains security at the edge computing sub layer. Encryption using symmetric keys as employed in Conoscenti et al; Dorri et al; Zyskind and Nathan [18,44,49] does not guarantee effective data confidentiality, since keys are transmitted together with sensor data. An eavesdropper who listens to traffic between communicating parties can successfully capture encryption keys hence decrypt data meant for either party.…”
Section: Resultsmentioning
confidence: 99%
“…The authors concluded that encryption and hashing operations performed by the miner on all transactions are non-trivial processes compared to the encryption operation done by individual devices. The work in Conoscenti et al [49] uses blockchain technology in place of a centralized server for sensor data storage. Like cryptocurrencies, sensor data in the proposed system are managed by users via a distributed database.…”
Section: A Blockchain-based Security and Privacy Preservation Schemementioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, there is need for investigating when both technologies can be applied appropriately. In that sense, the literature [9,37,[39][40][41][42][43] has been addressing the following: (i) A cost-effective Blockchain that fits low-capability devices (ii) Micropayments between sensors for paying for data (iii) Computation and knowledge extraction from sensitive data (iv) Integration on smart homes, smart cities, or enabling shared economy All of the above discussion is about applicability and solutions for connecting Blockchain and IoT. In this way, it becomes necessary to know the main weaknesses to which Blockchain is exposed and to keep it in mind when developing new applications.…”
Section: Cases Of Use For Providing Security and Privacy At Iot Usingmentioning
confidence: 99%