Blockchain for Storing Shadow Data of IoT Devices
Abstract
References
Index Terms
- Blockchain for Storing Shadow Data of IoT Devices
Recommendations
Convergence of Blockchain Enabled Internet of Things (IoT) Framework: A Survey
Ubiquitous NetworkingAbstractRecent research and experiments in the field of Internet of Things (IoT) security have found that these devices are vulnerable to various attacks, ranging from cyber-attacks to physical attacks on devices. Internet of Things (IoTs) have certain ...
Solving Internet's Weak Link for Blockchain and IoT Applications
SCC '18: Proceedings of the 1st ACM/EIGSCC Symposium on Smart Cities and CommunitiesBlockchain normalizes applications that run on the internet through the standardization of decentralized data structure, computational requirements and trust in transactions. This new standard has now spawned hundreds of legitimate internet applications ...
Customized blockchain-based architecture for secure smart home for lightweight IoT
Highlights- A novel Blockchain-based solution for secure smart home systems, using a combined hyperledger fabric and hyperledger composer.
- Blockchain can be used as technology for securing IoT devices in smart homes.
- The use of blockchain as a ...
AbstractSafeguarding security and privacy remains a major challenge with regards to the Internet of Things (IoT) primarily due to the large scale and distribution of IoT networks. The information systems in Smart Homes are mainly based on sharing ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 49Total Downloads
- Downloads (Last 12 months)16
- Downloads (Last 6 weeks)0
Other Metrics
Citations
Cited By
View allView Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format