LSB: A Lightweight Scalable Blockchain for IoT security and anonymity

A Dorri, SS Kanhere, R Jurdak… - Journal of Parallel and …, 2019 - Elsevier
In recent years, Blockchain has attracted tremendous attention due to its salient features
including auditability, immutability, security, and anonymity. Resulting from these salient …

An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy

SN Mohanty, KC Ramya, SS Rani, D Gupta… - Future Generation …, 2020 - Elsevier
Presently, BlockChain (BC) gained significant interest because of its undeniable nature and
related advantages of security and privacy, BC has the power to resolve the limitations of …

Fundamental challenges toward making the iot a reachable reality: A model-centric investigation

Y Xue, J Li, S Nazarian, P Bogdan - ACM Transactions on Design …, 2017 - dl.acm.org
Constantly advancing integration capability is paving the way for the construction of the
extremely large scale continuum of the Internet where entities or things from vastly varied …

Research perspective on energy-efficient protocols in IoT: emerging development of green IoT

UL Tupe, SD Babar, SP Kadam… - International Journal of …, 2022 - emerald.com
Purpose Internet of Things (IoT) is an up-and-coming conception that intends to link multiple
devices with each other. The aim of this study is to provide a significant analysis of Green …

[HTML][HTML] LC-DEX: lightweight and efficient compressed authentication based elliptic curve cryptography in multi-hop 6lowpan wireless sensor networks in HIP-based …

B Bettoumi, R Bouallegue - Sensors, 2021 - mdpi.com
The high level of security requirements and low capabilities of constrained devices that are
connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an …

Modeling and analyses of IP spoofing attack in 6LoWPAN network

M Mavani, K Asawa - Computers & Security, 2017 - Elsevier
Abstract 6LoWPAN (modified version of IPv6 for low power devices) inherits security threats
from its predecessor protocols, IPv4 and IPv6. IP spoofing is one such classic attack. There …

Lightweight key management for adaptive addressing in next generation internet

VV Kimbahune, AV Deshpande… - International Journal of …, 2017 - igi-global.com
The continuous evolution of Next Generation Internet (NGI) amplifies the demand for efficient
and secure communication capable of responding effectively to the challenges posed by the …

A perspective on available security techniques in IoT

A Punia, D Gupta, S Jaiswal - 2017 2nd IEEE international …, 2017 - ieeexplore.ieee.org
Internet of Things is a network of heterogeneous devices, which communicate over wireless
networks and perform the task of sensing and actuation. IoT aims at connecting each and …

[PDF][PDF] 面向智能家居的区块链轻量级认证机制

张珠君, 范伟, 朱大立 - 软件学报, 2022 - jos.org.cn
5G 技术为智能家居行业开拓了更大的发展空间, 但安全问题也日益突出, 用户身份认证作为信息
安全防护的第一道关卡备受关注. 智能家居系统传统的认证方法存在中心化信任挑战 …

[PDF][PDF] Can Blockchain be a Solution to IoT Technical and Security Issues?

AC Eberendu, TI Chinebu - … Journal of Network Security and Its …, 2021 - researchgate.net
ABSTRACT The Internet of Things (IoT) is a growing trend in technology that interconnects
millions of physical devices from any location anytime. Currently, IoT devices have become …