2021
DOI: 10.3390/s21175931
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy for Mobile IoT Applications Using Blockchain

Abstract: Internet of Things (IoT) applications are becoming more integrated into our society and daily lives, although many of them can expose the user to threats against their privacy. Therefore, we find that it is crucial to address the privacy requirements of most of such applications and develop solutions that implement, as far as possible, privacy by design in order to mitigate relevant threats. While in the literature we may find innovative proposals to enhance the privacy of IoT applications, many of those only … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(16 citation statements)
references
References 20 publications
0
16
0
Order By: Relevance
“…The primary information of the included papers [ 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 , 98 , 99 , 100 , 101 , 102 , 103 , 104 , 105 , 106 , 107 , 108 , 109 , 110 , 111 , 112 , 113 , 114 , 115 , 116 , 117 , 118 , 119 , 120 , 121 , 122 , 123 , 124 , 125 , 126 , 127 , 128 , 129 , 130 , 131 , 132 ] is shown in Table 1 . Based on the data shown in Figure 4 , we can observe that 13.95% of the total papers were published in 2018 [ 93 , 103 , 111 , 116 , 120 , 124 ], while 30.23% were published in 2019 [ 90 , 92 , 94 ,…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The primary information of the included papers [ 90 , 91 , 92 , 93 , 94 , 95 , 96 , 97 , 98 , 99 , 100 , 101 , 102 , 103 , 104 , 105 , 106 , 107 , 108 , 109 , 110 , 111 , 112 , 113 , 114 , 115 , 116 , 117 , 118 , 119 , 120 , 121 , 122 , 123 , 124 , 125 , 126 , 127 , 128 , 129 , 130 , 131 , 132 ] is shown in Table 1 . Based on the data shown in Figure 4 , we can observe that 13.95% of the total papers were published in 2018 [ 93 , 103 , 111 , 116 , 120 , 124 ], while 30.23% were published in 2019 [ 90 , 92 , 94 ,…”
Section: Resultsmentioning
confidence: 99%
“…However, many approaches that include blockchain technology in their designs are achieving promising results. Overall, 37.21% of the proposed schemes originate from China [ 92 , 94 , 95 , 96 , 97 , 102 , 104 , 105 , 113 , 114 , 119 , 124 , 125 , 128 , 129 , 132 ], and 62.79% are distributed between 14 countries [ 90 , 91 , 93 , 98 , 99 , 100 , 101 , 103 , 106 , 107 , 108 , 109 , 110 , 111 , 112 , 115 , 116 , 117 , 118 , 120 , 121 , 122 , 123 , 126 , 127 , 130 , 131 ]. Most of the included papers are published in journals, which result in 79.07% [ 90 , 91 , 94 , 96 , 97 , 98 , 99 , 100 , 102 , 104 , …”
Section: Resultsmentioning
confidence: 99%
“…The open network architecture, heterogeneous device structure, and the drastic use of smart connected devices, in our daily life are leading to serious security and privacy issues [11]. The destruction of water utility pumps in industrial IoT, personal data theft [12], generating false messages as the legitimate users [13], unauthorized control over power stations, smart cars, smart restaurants, and manipulation of private information to block regular services are some of the examples of dangerous threats created in the IoT environment in the recent past [14].…”
Section: Ids For Iotsmentioning
confidence: 99%
“…On the other hand, IPS integrated with firewall and IDS can provide preventive measures with alerts for attacks in a preserved network area. Artificial Intelligence (AI) technologies like Machine Learning (ML), Natural Language Processing (NLP), Neural Networks (NN) can provide rapid insights by identifying and mitigating the effects of the attack with daily alerts using a smart Intrusion Detection and Prevention System (IDPS) [11].…”
Section: Introductionmentioning
confidence: 99%
“…Despite security problems of the public blockchain technologies, there are some use cases when public blockchains might be useful in providing security solutions for IoT platforms [78]. Inherent integrity protection and public nonrepudiation make public blockchain suitable as a timestamping mechanism: Block hashes in a public blockchain can be used as a control value of a private blockchain in IoT nodes, e.g., for logging and monitoring.…”
Section: Public Blockchains and Iot Securitymentioning
confidence: 99%