2019
DOI: 10.1177/1550147719842725
|View full text |Cite
|
Sign up to set email alerts
|

Toward secure and accountable data transmission in Narrow Band Internet of Things based on blockchain

Abstract: The developments of Narrow Band Internet of Things have attracted much attention from both academia and industry nowadays. While Narrow Band Internet of Things is gradually designed for commercial applications, it also confronts with several security concerns such as identification and privacy. Blockchain technique is equipped with authentication, auditing, and accountability, and thus it can serve as a promising tool for providing secure data communication on the network. To enhance the security level and ach… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 23 publications
1
12
0
Order By: Relevance
“…Secure: Given the critical nature of the information being collected regarding user behaviors, locations, and identities, the IoT must be su ciently secured through con dence-enhancing technologies to motivate user participation 38,39 . Integration further exposes systemic vulnerabilities; therefore, some intermediary or standardized security protocol is required to protect users against internal and external threats 32 .…”
Section: Research Questions and Evidencesmentioning
confidence: 99%
See 3 more Smart Citations
“…Secure: Given the critical nature of the information being collected regarding user behaviors, locations, and identities, the IoT must be su ciently secured through con dence-enhancing technologies to motivate user participation 38,39 . Integration further exposes systemic vulnerabilities; therefore, some intermediary or standardized security protocol is required to protect users against internal and external threats 32 .…”
Section: Research Questions and Evidencesmentioning
confidence: 99%
“…A parallel consensus and transaction-veri ed authentication have been facilitated from the central conceptual foundation for the Helium network or Tangle proposed by 67 , which ensures paucity of con ict between the existing and any previous transactions 69 . Blockchain technologies were proposed as a decentralized solution that is dynamically susceptible to doublespending, security breaches, and exploitation for online transactional systems 31,37,39 . The wireless mesh network is one of the pragmatic developments developed through current long-range and high-frequency wireless technologies 67,72 .…”
Section: Blockchain and The Iotmentioning
confidence: 99%
See 2 more Smart Citations
“…Lightweight BC for resource-constrained devices 45,51,57 Consensus protocols 45,66,71 Scalability and processing overheads 51,59,63 Latency and throughput 46,72,73 Energy efficiency 45,74,75 Identity 74, [76][77][78] Auditability and accountability 33,75,79 BC-based authentication schemes 35 data without learning anything from them. Their system consists of record nodes and light nodes.…”
Section: Research Issue Research Workmentioning
confidence: 99%