2018
DOI: 10.1007/s10586-018-2516-1
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE: Information security model of block chain based on intrusion sensing in the IoT environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 77 publications
(33 citation statements)
references
References 24 publications
0
28
0
Order By: Relevance
“…The security routing protocol using link layer encryption and authentication, multi path routing, authentication, two-way connection authentication and the broadcast authentication mechanism, effectively improve the network capacity to resist external attacks, enhance the security of routing. 18,19 In security management, there are two key management and secure multicast methods. The waveform of ECG displayed by oscillograph and chart is demonstrated in Figure 7.…”
Section: Secure Routingmentioning
confidence: 99%
See 1 more Smart Citation
“…The security routing protocol using link layer encryption and authentication, multi path routing, authentication, two-way connection authentication and the broadcast authentication mechanism, effectively improve the network capacity to resist external attacks, enhance the security of routing. 18,19 In security management, there are two key management and secure multicast methods. The waveform of ECG displayed by oscillograph and chart is demonstrated in Figure 7.…”
Section: Secure Routingmentioning
confidence: 99%
“…The network layer routing protocol must provide routing service key for the wireless sensor network, security routing algorithm will directly affect the safety and availability of wireless sensor network. The security routing protocol using link layer encryption and authentication, multi path routing, authentication, two‐way connection authentication and the broadcast authentication mechanism, effectively improve the network capacity to resist external attacks, enhance the security of routing 18,19 …”
Section: Wireless Sensor Network Reviewmentioning
confidence: 99%
“…The performance metrics such as transaction cost, computation time, end‐to‐end delay, compromised requests, 23 and energy are compared with M‐G SDN, 14 LTSMM, 11 and LAS, 17 which are discussed earlier.…”
Section: Performance Analysismentioning
confidence: 99%
“…Li et. Al [19] introduced the history and current situation of intrusion detection system, expounds the classification of intrusion detection system and the framework of general intrusion detection, and discusses all kinds of intrusion detection technology in detail.…”
Section: Related Workmentioning
confidence: 99%