[go: up one dir, main page]

Mershad, 2024 - Google Patents

COSIER: A comprehensive lightweight blockchain system for IoT networks

Mershad, 2024

Document ID
15680243144291107596
Author
Mershad K
Publication year
Publication venue
Computer Communications

External Links

Snippet

Abstract Internet of Things (IoT) networks have spread to many important fields and applications. The security of these networks remains a big challenge due to their unique characteristics and delicate operations. The blockchain has recently been proposed as a …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/104Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks

Similar Documents

Publication Publication Date Title
Patil et al. Blockchain for IoT access control, security and privacy: a review
Tian et al. Robust and privacy-preserving decentralized deep federated learning training: Focusing on digital healthcare applications
Adil et al. An AI-enabled hybrid lightweight authentication scheme for intelligent IoMT based cyber-physical systems
Guo et al. Blockchain meets edge computing: A distributed and trusted authentication system
Aggarwal et al. A new secure data dissemination model in internet of drones
Li et al. Security and privacy for edge intelligence in 5G and beyond networks: Challenges and solutions
Lu et al. Edge-assisted intelligent device authentication in cyber–physical systems
Jiang et al. LBlockchainE: A lightweight blockchain for edge IoT-enabled maritime transportation systems
Li et al. A Lightweight Fine‐Grained Searchable Encryption Scheme in Fog‐Based Healthcare IoT Networks
Mershad COSIER: A comprehensive lightweight blockchain system for IoT networks
Battah et al. A trust and reputation system for IoT service interactions
Bhattacharjee et al. Blockchain-based secure and reliable manufacturing system
Ludwig et al. Introduction to federated learning
Huang et al. Blockchain-based federated learning: A systematic survey
Yang et al. Perception layer lightweight certificateless authentication scheme for IoT-based emergency logistics
Raj et al. A Lightweight Blockchain Framework for secure transaction in resource constrained IoT devices
Fan et al. SC-Chain: an efficient blockchain framework for smart City
Gong et al. RSMS: towards reliable and secure metaverse service provision
Baskaran et al. A secured authentication and DSM‐KL ascertained performance optimization of a hybrid block chain‐enabled framework for a multiple WSN
Duan et al. An edge cloud data integrity protection scheme based on blockchain
Kumar et al. Real time two hop neighbour strategic secure routing with attribute specific blockchain encryption scheme for improved security in wireless sensor networks
Liu et al. Security management method of public sentiment analysis based on blockchain and edge computing
Verma et al. Enhancing security and privacy in AI-driven industrial IoT with blockchain integration
Xu et al. ECOM: epoch randomness-based consensus committee configuration for IoT blockchains
Tian et al. SLChain: A secure and low‐storage pressure sharding blockchain