Fan et al., 2021 - Google Patents
SBBS: A secure blockchain-based scheme for IoT data credibility in fog environmentFan et al., 2021
View PDF- Document ID
- 9423835094767448151
- Author
- Fan Y
- Zhao G
- Lei X
- Liang W
- Li K
- Choo K
- Zhu C
- Publication year
- Publication venue
- IEEE Internet of Things Journal
External Links
Snippet
Data credibility plays a key role in facilitating evidence-based decision making in organizations and governments (eg, policy making). One of the key data sources is the Internet of Things (IoT) devices and systems, say within a fog environment. However, the …
- 238000002474 experimental method 0 abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Fan et al. | SBBS: A secure blockchain-based scheme for IoT data credibility in fog environment | |
| Ferrag et al. | The performance evaluation of blockchain-based security and privacy systems for the Internet of Things: A tutorial | |
| Nartey et al. | On blockchain and IoT integration platforms: current implementation challenges and future perspectives | |
| Alghamdi et al. | A survey of blockchain based systems: Scalability issues and solutions, applications and future challenges | |
| Liao et al. | Security analysis of IoT devices by using mobile computing: a systematic literature review | |
| Hu et al. | A survey on data provenance in IoT | |
| Hameed et al. | A formally verified blockchain-based decentralised authentication scheme for the internet of things | |
| Rui et al. | Research on secure transmission and storage of energy IoT information based on Blockchain | |
| Chithaluru et al. | RETRACTED: An enhanced consortium blockchain diversity mining technique for IoT metadata aggregation | |
| Yang et al. | An access control model based on blockchain master-sidechain collaboration | |
| Li et al. | Logisticschain: a blockchain‐based secure storage scheme for logistics data | |
| Liu et al. | A data preservation method based on blockchain and multidimensional hash for digital forensics | |
| De Benedictis et al. | Toward the adoption of secure cyber digital twins to enhance cyber-physical systems security | |
| Swarnkar et al. | Security, privacy, trust management and performance optimization of blockchain technology | |
| Wu et al. | [Retracted] Blockchain‐Based Data Audit Mechanism for Integrity over Big Data Environments | |
| Khare et al. | Design of a trustless smart city system: The# SmartME experiment | |
| Zhang et al. | A survey on the security of the metaverse | |
| Ghanmi et al. | Blockchain‐cloud integration: comprehensive survey and open research issues | |
| Wu et al. | Blockchains for internet of things: Fundamentals, applications, and challenges | |
| Sinha | Blockchain for enhancing IoT privacy and security | |
| Al-madni et al. | An Optimized Blockchain Model for Secure and Efficient Data Management in Internet of Things | |
| Alsalim et al. | Efficient and secure data storage for future networks: Review and future opportunities | |
| Zhang et al. | A lightweight blockchain-based access control scheme for integrated edge computing in the internet of things | |
| Khanji et al. | Boosting IoT efficiency and security through blockchain: Blockchain-based car insurance process-A case study | |
| Chen et al. | A decentralized public auditing scheme for secure cloud storage based on blockchain |