Mediating data trustworthiness by using trusted hardware between iot devices and blockchain

B Enkhtaivan, A Inoue - … Conference on Smart Internet of Things …, 2020 - ieeexplore.ieee.org
In recent years, with the progress of data analysis methods utilizing artificial intelligence (AI)
technology, concepts of smart cities collecting data from IoT devices and creating values by …

Provenance and authentication of oracle sensor data with block chain lightweight wireless network authentication scheme for constrained oracle sensors

G Gordon - 2017 - library2.smu.ca
With the significant increase in the dependence of contextual data from constrained IoT, the
blockchain has been proposed as a possible solution to address growing concerns from …

Trustworthy pre-processing of sensor data in data on-chaining workflows for blockchain-based IoT applications

J Heiss, A Busse, S Tai - … , ICSOC 2021, Virtual Event, November 22–25 …, 2021 - Springer
Prior to provisioning sensor data to smart contracts, a pre-processing of the data on
intermediate off-chain nodes is often necessary. When doing so, originally constructed …

Special session: The future of IoT security

S Mohan, M Asplund, G Bloom… - 2018 International …, 2018 - ieeexplore.ieee.org
The Internet-of-Things (IoT) is a large and complex domain. These systems are often
constructed using a very diverse set of hardware, software and protocols. This, combined …

[HTML][HTML] Proof of concept of scalable integration of internet of things and blockchain in healthcare

KP Satamraju - Sensors, 2020 - mdpi.com
The advent of Internet of Things (IoT) brought innovation along with unprecedented benefits
of convenience and efficacy in many operations that were otherwise very cumbersome. This …

A hybrid framework for securing data transmission in Internet of Things (IoTs) environment using blockchain approach

MHS Mohammed - 2021 IEEE International IOT, Electronics …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is a relatively new concept in computer science that connects devices
with constrained resources to insecure internet through different technologies. IoT's …

[HTML][HTML] Towards a lightweight security framework using blockchain and machine learning

S Ismail, M Nouman, DW Dawoud, H Reza - Blockchain: Research and …, 2024 - Elsevier
Cyber-attacks pose a significant challenge to the security of Internet of Things (IoT) sensor
networks, necessitating the development of robust countermeasures tailored to their unique …

[HTML][HTML] IoT-chain and monitoring-chain using multilevel blockchain for IoT security

D Na, S Park - Sensors, 2022 - mdpi.com
In general, the Internet of Things (IoT) relies on centralized servers due to limited computing
power and storage capacity. These server-based architectures have vulnerabilities such as …

Blockchain-based PKI for crowdsourced IoT sensor information

GV Pinto, JP Dias, H Sereno Ferreira - Proceedings of the Tenth …, 2020 - Springer
Abstract The Internet of Things is progressively getting broader, evolving its scope while
creating new markets and adding more to the existing ones. However, both generation and …

[HTML][HTML] Hierarchical blockchain structure for node authentication in IoT networks

MT Al Ahmed, F Hashim, SJ Hashim… - Egyptian Informatics …, 2022 - Elsevier
Abstract Internet of Things (IoT) networks are large peer-to-peer networks of small devices
that require a competent security system that is scalable and adaptable to the limited …