2017 IEEE 6th Global Conference on Consumer Electronics (GCCE) 2017
DOI: 10.1109/gcce.2017.8229327
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-aware and blockchain connected gateways for users to access legacy IoT devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(14 citation statements)
references
References 2 publications
0
10
0
Order By: Relevance
“…The use of blockchain gateways is also proposed in [15], where the setup is tailored for use with IoT scenarios, and, more specifically, with legacy devices. In particular, the user can use the same account for connecting to different blockchain-enabled gateways rather than having to register to each gateway, thus enhancing practicality.…”
Section: Related Workmentioning
confidence: 99%
“…The use of blockchain gateways is also proposed in [15], where the setup is tailored for use with IoT scenarios, and, more specifically, with legacy devices. In particular, the user can use the same account for connecting to different blockchain-enabled gateways rather than having to register to each gateway, thus enhancing practicality.…”
Section: Related Workmentioning
confidence: 99%
“…There have been many proposals to develop services and systems based on the blockchain technology to take advantage of its properties such as immutability, irreversibility, and decentralization, and many more attempts are underway to utilize the technology [2][3][4][5][6][7][8][9][10][11][12][13][14][15]30,31]. For example, Xia et al presented a platform to configure access control of medical information data through blockchain [7].…”
Section: Related Workmentioning
confidence: 99%
“…To calculate the ITR from A to B, our model determines a broker X who has the highest DTR product (max(DTR A→X * DTR X→B )) among others who have done transactions with both A and B. Once the broker is determined, ITR is derived according to Equation (9). Figure 3 illustrates an example of ITR calculation between the "user" and the "target", given that there is no direct trust (past transaction) between the two.…”
Section: Indirect Trust (Itr)mentioning
confidence: 99%
See 1 more Smart Citation
“…K-anonymity protection ensures that information for each user contained in transactions cannot be distinguished from at least k − 1 users whose information also appears in transactions. In order to maintain existing smart devices and connect them to the blockchain network some authors [ 34 ] propose Blockchain Connected Gateways (BC Gateways) to protect users from providing personal data to IoT devices without user consent. In addition, the gateways store user privacy preferences on IoT devices in the blockchain network.…”
Section: State Of the Artmentioning
confidence: 99%