4.5 Article

A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

A Self-Trading and Authenticated Roaming Scheme Based on Blockchain for Smart Grids

Xiaohan Hao et al.

Summary: “The increasing volume of user and household data and number of smart meters pose challenges to ensuring efficiency and privacy protection in electricity trading. This article introduces a new architecture for smart meters, utilizing blockchain-based wallets for transactions and smart contracts for transmission switch instructions. The proposed scheme includes a decentralized peer-to-peer electricity trading scheme and a blockchain-based anonymous authentication scheme to achieve automated electricity transmission and privacy protection.”

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Theory & Methods

Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures

Nazar Waheed et al.

Summary: The security and privacy concerns of users have become significant as IoT devices become more involved in various applications. Machine Learning algorithms and Blockchain techniques are being used to address these issues effectively in recent years.

ACM COMPUTING SURVEYS (2021)

Article Computer Science, Theory & Methods

Smart Contract Languages: A Multivocal Mapping Study

Angel Jesus Varela-Vaca et al.

Summary: Blockchain technology has attracted attention from the scientific community and companies, leading to exponential growth in related publications. Smart contracts play a crucial role in blockchain transactions, being implemented through programming languages.

ACM COMPUTING SURVEYS (2021)

Article Computer Science, Information Systems

Securing IoT Devices Using Zero Trust and Blockchain

Suparna Dhar et al.

Summary: The benefits of using IoT also raise security concerns as existing network security tools are inadequate for its heterogeneous networks. This paper proposes a security framework for IoT devices based on Zero Trust and blockchain, which includes risk-based segmentation and extends trust beyond traditional IT/OT networks. The framework aims to improve device identification and access control capabilities by using blockchain technology.

JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE (2021)

Article Computer Science, Information Systems

Blockchain-Enabled Secure Data Sharing Scheme in Mobile-Edge Computing: An Asynchronous Advantage Actor-Critic Learning Approach

Lei Liu et al.

Summary: Mobile-edge computing (MEC) plays a crucial role in supporting various service applications through efficient data sharing. However, the unique characteristics of MEC also introduce data privacy and security concerns, hindering its development. Blockchain technology is seen as a promising solution to ensure secure data sharing, but integrating it into MEC systems faces challenges due to dynamic network conditions. In this article, a secure data sharing scheme using an asynchronous learning approach in a blockchain-enabled MEC system is proposed, aiming to optimize system performance while balancing energy consumption and throughput.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Attribute-Based Secure Announcement Sharing Among Vehicles Using Blockchain

Jianfeng Ma et al.

Summary: The research proposes an attribute-based encryption algorithm using blockchain for securely accessing different types of announcement messages in VANET. By recording the uploader's key on the blockchain and tracking all transactions, the scheme achieves a balance between security and efficiency.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Engineering, Multidisciplinary

ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts

Wei Wang et al.

Summary: Smart contracts are decentralized applications running on Blockchain, and detecting vulnerabilities in contracts is important yet time-consuming. A new method called ContractWard is proposed to use machine learning techniques for vulnerability detection, with experimental results demonstrating its effectiveness and efficiency.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Article Computer Science, Theory & Methods

A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling

Laphou Lao et al.

ACM COMPUTING SURVEYS (2020)

Article Computer Science, Theory & Methods

Orchestrating the Development Lifecycle of Machine Learning-based IoT Applications: A Taxonomy and Survey

Bin Qian et al.

ACM COMPUTING SURVEYS (2020)

Article Engineering, Electrical & Electronic

An Efficient Decentralized Key Management Mechanism for VANET With Blockchain

Zhuo Ma et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

Integration of Blockchain and Cloud of Things: Architecture, Applications and Challenges

Dinh C. Nguyen et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Theory & Methods

Orchestrating Big Data Analysis Workflows in the Cloud: Research Challenges, Survey, and Future Directions

Mutaz Barika et al.

ACM COMPUTING SURVEYS (2019)

Article Computer Science, Information Systems

Blockchain based permission delegation and access control in Internet of Things (BACI)

Gauhar Ali et al.

COMPUTERS & SECURITY (2019)

Proceedings Paper Computer Science, Theory & Methods

On the Universally Composable Security of OpenStack

Kyle Hogan et al.

2019 IEEE SECURE DEVELOPMENT (SECDEV 2019) (2019)

Article Computer Science, Information Systems

BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation

Lijing Zhou et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT

Oscar Novo

IEEE INTERNET OF THINGS JOURNAL (2018)

Proceedings Paper Computer Science, Information Systems

Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks

Nisha Malik et al.

2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) (2018)

Proceedings Paper Computer Science, Theory & Methods

A Semantic Framework for the Security Analysis of Ethereum Smart Contracts

Ilya Grishchenko et al.

PRINCIPLES OF SECURITY AND TRUST, POST 2018 (2018)

Proceedings Paper Computer Science, Software Engineering

Zero-Trust Hierarchical Management in IoT

Mayra Samaniego et al.

2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT) (2018)

Article Computer Science, Information Systems

The IoT electric business model: Using blockchain technology for the internet of things

Yu Zhang et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)

Proceedings Paper Computer Science, Hardware & Architecture

Blockchain-Based Government Information Resource Sharing

Liang Wang et al.

2017 IEEE 23RD INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Blockchain based Data Integrity Service Framework for IoT data

Bin Liu et al.

2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT

Aafaf Ouaddah et al.

EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (2017)

Proceedings Paper Computer Science, Information Systems

Situational Awareness based Risk-adaptable Access Control in Enterprise Networks

Brian Lee et al.

IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (2017)