[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3236461.3241976acmotherconferencesArticle/Chapter ViewAbstractPublication PagessccConference Proceedingsconference-collections
research-article

Solving Internet's Weak Link for Blockchain and IoT Applications

Published: 20 June 2018 Publication History

Abstract

Blockchain normalizes applications that run on the internet through the standardization of decentralized data structure, computational requirements and trust in transactions. This new standard has now spawned hundreds of legitimate internet applications in addition to the cryptocurrency revolution. This next frontier that standardizes internet applications will dramatically increase productivity to levels never seen before, especially when applied to Internet of Things (IoT) applications. The blockchain framework relies on cryptographic private keys to sign digital data as its foundational principle. Without the security of private keys to sign data blocks, there can be no trust in blockchain. Central storage of these keys for managing IoT machines and users, while convenient to implement, will be highly detrimental to the assumed safety and security of this next frontier. In this paper, we will introduce decentralized and device agnostic cryptographic signing solutions suitable for securing users and machines in blockchain and IoT applications.

References

[1]
Y. Lim, "The Promise of Blockchain and Standardized Data," PMG, Apr 2018.
[2]
"iOS Security Guide," Apple, Jan 2018
[3]
www.sagitta.pw
[4]
D. Goodlin, "RSA breach leaks data for hacking SecurID tokens," The Register, Mar 2011.
[5]
https://www.nxp.com/products/identification-and-security/security-controller-ics:MC_71108
[6]
Smartcard performance enhancement circuits and systems, US8451122B2
[7]
Personal digital identity device response to user interaction, US9143938B2

Cited By

View all
  • (2021)Edge-Based Blockchain Architecture for Event-Driven IoT using Hierarchical Identity Based EncryptionInformation Processing and Management: an International Journal10.1016/j.ipm.2021.10252858:3Online publication date: 1-May-2021

Index Terms

  1. Solving Internet's Weak Link for Blockchain and IoT Applications

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        SCC '18: Proceedings of the 1st ACM/EIGSCC Symposium on Smart Cities and Communities
        June 2018
        47 pages
        ISBN:9781450357869
        DOI:10.1145/3236461
        Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 20 June 2018

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Authentication
        2. Blockchain
        3. Cryptography
        4. Decentralized security
        5. Digital signing
        6. Encryption
        7. Hardware security
        8. Internet of Things
        9. IoT
        10. Key storage
        11. Private keys
        12. SECP256K1

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        SCC '18

        Acceptance Rates

        SCC '18 Paper Acceptance Rate 6 of 16 submissions, 38%;
        Overall Acceptance Rate 64 of 159 submissions, 40%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)3
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 17 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2021)Edge-Based Blockchain Architecture for Event-Driven IoT using Hierarchical Identity Based EncryptionInformation Processing and Management: an International Journal10.1016/j.ipm.2021.10252858:3Online publication date: 1-May-2021

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media