Mershad, 2024 - Google Patents
COSIER: A comprehensive lightweight blockchain system for IoT networksMershad, 2024
- Document ID
- 15680243144291107596
- Author
- Mershad K
- Publication year
- Publication venue
- Computer Communications
External Links
Snippet
Abstract Internet of Things (IoT) networks have spread to many important fields and applications. The security of these networks remains a big challenge due to their unique characteristics and delicate operations. The blockchain has recently been proposed as a …
- 238000003860 storage 0 abstract description 129
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Patil et al. | Blockchain for IoT access control, security and privacy: a review | |
| Tian et al. | Robust and privacy-preserving decentralized deep federated learning training: Focusing on digital healthcare applications | |
| Adil et al. | An AI-enabled hybrid lightweight authentication scheme for intelligent IoMT based cyber-physical systems | |
| Guo et al. | Blockchain meets edge computing: A distributed and trusted authentication system | |
| Aggarwal et al. | A new secure data dissemination model in internet of drones | |
| Li et al. | Security and privacy for edge intelligence in 5G and beyond networks: Challenges and solutions | |
| Lu et al. | Edge-assisted intelligent device authentication in cyber–physical systems | |
| Jiang et al. | LBlockchainE: A lightweight blockchain for edge IoT-enabled maritime transportation systems | |
| Li et al. | A Lightweight Fine‐Grained Searchable Encryption Scheme in Fog‐Based Healthcare IoT Networks | |
| Mershad | COSIER: A comprehensive lightweight blockchain system for IoT networks | |
| Battah et al. | A trust and reputation system for IoT service interactions | |
| Bhattacharjee et al. | Blockchain-based secure and reliable manufacturing system | |
| Ludwig et al. | Introduction to federated learning | |
| Huang et al. | Blockchain-based federated learning: A systematic survey | |
| Yang et al. | Perception layer lightweight certificateless authentication scheme for IoT-based emergency logistics | |
| Raj et al. | A Lightweight Blockchain Framework for secure transaction in resource constrained IoT devices | |
| Fan et al. | SC-Chain: an efficient blockchain framework for smart City | |
| Gong et al. | RSMS: towards reliable and secure metaverse service provision | |
| Baskaran et al. | A secured authentication and DSM‐KL ascertained performance optimization of a hybrid block chain‐enabled framework for a multiple WSN | |
| Duan et al. | An edge cloud data integrity protection scheme based on blockchain | |
| Kumar et al. | Real time two hop neighbour strategic secure routing with attribute specific blockchain encryption scheme for improved security in wireless sensor networks | |
| Liu et al. | Security management method of public sentiment analysis based on blockchain and edge computing | |
| Verma et al. | Enhancing security and privacy in AI-driven industrial IoT with blockchain integration | |
| Xu et al. | ECOM: epoch randomness-based consensus committee configuration for IoT blockchains | |
| Tian et al. | SLChain: A secure and low‐storage pressure sharding blockchain |