The New Advanced Society. Группа авторов

Чтение книги онлайн.

Читать онлайн книгу The New Advanced Society - Группа авторов страница 31

The New Advanced Society - Группа авторов

Скачать книгу

of entities of IoT as well as proper access management is emerging as a more crucial reason in the dynamics of information security matters. Accordingly, IAM is going to play a critically prominent role in future time to come.

      Blockchain and distributed ledger empowered security technique have proved their significance as potential technology for tomorrow’s world. But there is a way forward for its effective application and wide acceptance as a decentralize approach based solution towards security of an IoT cloud. Gradual improvement in efficiency and the consensus algorithms used by blockchain, needs comparatively heavy computational loads to be addressed for its effective use. Thus without introducing significant overhead, the design of a less computation intensive consensus mechanism for resource constrained IoT devices cloud could be more pertinent for security solution empowered with blockchain and using distributed ledger based IoT ecosystems.

      1. GSMA, IoT Security Guidelines for Endpoint Ecosystems, https://www.gsma.com/iot/iot-security-guidelines-for-endpoint-ecosystem/, Last accessed: 07 Nov 2020.

      2. GSMA, IoT Security Guidelines for Network Operators, https://www.gsma.com/iot/iot-security-guidelines-for-network-operators/, Last accessed: 08 Nov 2020.

      3. Miessler, D., Securing the internet of things: Mapping attack surface areas using the OWASP IoT top 10, in: RSA Conference, 2015.

      4. Andersen, M.P., Kolb, J., Chen, K., Fierro, G., Culler, D.E., Popa, R.A., WAVE: A Decentralized Authorization System for IoT via Blockchain Smart Contracts. Tech. Rep., 2017.

      5. Hussein, D., Bertin, E., Frey, V., A Community-Driven Access Control Approach in Distributed IoT Environments. IEEE Commun. Mag., 55, 3, 146–153, 2017.

      6. Aman, M.N., Chua, K.C., Sikdar, B., Mutual authentication in IoT systems using physical unclonable functions. IEEE Internet Things J., 4, 5, 1327–1340, 017.

      7. Vijayakumar, P., Chang, V., Deborah, L.J., Balusamy, B., Shynu, P.G., Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Future Gener. Comput. Syst., 78, 943–955, 2018.

      8. Gong, B., Zhang, Y., Wang, Y., A remote attestation mechanism for the sensing layer nodes of the Internet of Things. Future Gener. Comput. Syst., 78, 867–886, 2018.

      9. Roychoudhury, P., Roychoudhury, B., Saikia, D.K., Provably secure group authentication and key agreement for machine type communication using Chebyshev’s polynomial. Comput. Commun., 127, 146–157, 2018.

      10. Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A., Bubbles of trust: A decentralized blockchain-based authentication system for IoT. Comput. Secur., 78, 126–142, 2018.

      11. Feng, W., Qin, Y., Zhao, S., Feng, D., AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS. Comput. Netw., 134, 167–182, 2018.

      12. Gope, P. and Sikdar, B., Lightweight and privacy-preserving two factor authentication scheme for IoT devices. IEEE Internet Things J., 6, 580–589, 2019.

      13. Cha, S.C., Chen, J.F. et al., A blockchain connected gateway for BLE-based devices in the Internet of Things. IEEE Access, 6, 24639–24649, 2018.

      14. Xiong, Z., Zhang, Y. et al., When mobile blockchain meets edge computing. IEEE Commun. Mag., 56, 8, 33–39, 2018.

      15. Li, R., Song, T. et al., Blockchain for large-scale internet of things data storage and protection. IEEE Trans. Serv. Comput., 12, 5, 762–771, 2018.

      16. Sharma, P.K., Chen, M., Park, J.H., A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access, 6, 115–124, 2018.

      17. Manzoor, A., Liyanage, M. et al., Blockchain based proxy re-encryption scheme for secure IoT data sharing, in: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 99–103, May 2019.

      18. Lu, Y. and Li, J., A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. Future Gener. Comput. Syst., 62, 140–147, 2016.

      19. Kim, S.K., Kim, U.M. et al., A study on improvement of blockchain application to overcome vulnerability of IoT multiplatform security. Energies, 12, 3, 402, 2019.

      20. Huh, J.H. and Seo, K., Blockchain-based mobile fingerprint verification and automatic log-in platform for future computing. J. Supercomput., 75, 6, 3123–3139, 2019.

      21. Liu, H.C., Lin, Q., Wen, S., Blockchain-enabled Data Collection and Sharing for Industrial IoT with Deep Reinforcement Learning. IEEE Trans. Industr. Inform., 15, 3516–3526, 2018.

      22. Hammi, B., Khatoun, R., Zeadally, S., Fayad, A., Khoukhi, L., IoT technologies for smart cities. IET Netw., 7, 1–13, 2017.

      23. Baker, T., Asim, M., MacDermott, A. et al., A secure fog-based platform for SCADA-based IoT critical infrastructure. Software Pract. Exp., 2019.

      24. Goyal, T.K. and Sahula, V., Lightweight security algorithm for low power IoT devices, in: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1725–1729, 2016.

      *Corresponding author: [email protected]

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.

/9j/4AAQSkZJRgABAQEBLAEsAAD/7SPKUGhvdG9zaG9wIDMuMAA4QklNBAQAAAAAAA8cAVoAAxsl RxwCAAACAAAAOEJJTQQlAAAAAAAQzc/6fajHvgkFcHaurwXDTjhCSU0EOgAAAAAA9wAAABAAAAAB AAAAAAALcHJpbnRPdXRwdXQAAAAFAAAAAFBzdFNib29sAQAAAABJbnRlZW51bQAAAABJbnRlAAAA AENscm0AAAAPcHJpbnRTaXh0ZWVuQml0Ym9vbAAAAAALcHJpbnRlck5hbWVURVhUAAAACgBBAGQA bwBiAGUAIABQAEQARgAAAAAAD3ByaW50UHJvb2ZTZXR1cE9iamMAAAAMAFAAcgBvAG8AZgAgAFMA ZQB0AHUAcAAAAAAACnByb29mU2V0dXAAAAABAAAAAEJsdG5lbnVtAAAADGJ1aWx0aW5Qcm9vZgAA AAlwcm9vZkNNWUsAOEJJTQQ7AAAAAAItAAAAEAAAAAEAAAAAABJwcmludE91dHB1dE9wdGlvbnMA AAAXAAAAAENwdG5ib29sAAAAAABDbGJyYm9vbAAAAAAAUmdzTWJvb2wAAAAAAENybkNib29sAAAA AABDbnRDYm9vbAAAAAAATGJsc2Jvb2wAAAAAAE5ndHZib29sA

Скачать книгу