Fan et al., 2021 - Google Patents

SBBS: A secure blockchain-based scheme for IoT data credibility in fog environment

Fan et al., 2021

View PDF
Document ID
9423835094767448151
Author
Fan Y
Zhao G
Lei X
Liang W
Li K
Choo K
Zhu C
Publication year
Publication venue
IEEE Internet of Things Journal

External Links

Snippet

Data credibility plays a key role in facilitating evidence-based decision making in organizations and governments (eg, policy making). One of the key data sources is the Internet of Things (IoT) devices and systems, say within a fog environment. However, the …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Similar Documents

Publication Publication Date Title
Fan et al. SBBS: A secure blockchain-based scheme for IoT data credibility in fog environment
Ferrag et al. The performance evaluation of blockchain-based security and privacy systems for the Internet of Things: A tutorial
Nartey et al. On blockchain and IoT integration platforms: current implementation challenges and future perspectives
Alghamdi et al. A survey of blockchain based systems: Scalability issues and solutions, applications and future challenges
Liao et al. Security analysis of IoT devices by using mobile computing: a systematic literature review
Hu et al. A survey on data provenance in IoT
Hameed et al. A formally verified blockchain-based decentralised authentication scheme for the internet of things
Rui et al. Research on secure transmission and storage of energy IoT information based on Blockchain
Chithaluru et al. RETRACTED: An enhanced consortium blockchain diversity mining technique for IoT metadata aggregation
Yang et al. An access control model based on blockchain master-sidechain collaboration
Li et al. Logisticschain: a blockchain‐based secure storage scheme for logistics data
Liu et al. A data preservation method based on blockchain and multidimensional hash for digital forensics
De Benedictis et al. Toward the adoption of secure cyber digital twins to enhance cyber-physical systems security
Swarnkar et al. Security, privacy, trust management and performance optimization of blockchain technology
Wu et al. [Retracted] Blockchain‐Based Data Audit Mechanism for Integrity over Big Data Environments
Khare et al. Design of a trustless smart city system: The# SmartME experiment
Zhang et al. A survey on the security of the metaverse
Ghanmi et al. Blockchain‐cloud integration: comprehensive survey and open research issues
Wu et al. Blockchains for internet of things: Fundamentals, applications, and challenges
Sinha Blockchain for enhancing IoT privacy and security
Al-madni et al. An Optimized Blockchain Model for Secure and Efficient Data Management in Internet of Things
Alsalim et al. Efficient and secure data storage for future networks: Review and future opportunities
Zhang et al. A lightweight blockchain-based access control scheme for integrated edge computing in the internet of things
Khanji et al. Boosting IoT efficiency and security through blockchain: Blockchain-based car insurance process-A case study
Chen et al. A decentralized public auditing scheme for secure cloud storage based on blockchain