期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Blockchain-Based Robust Data Security Scheme in IoT-Enabled Smart Home 被引量:1
1
作者 anusha vangala Ashok Kumar Das +1 位作者 YoungHo Park Sajjad Shaukat Jamal 《Computers, Materials & Continua》 SCIE EI 2022年第8期3549-3570,共22页
The recent surge in development of smart homes and smart cities can be observed in many developed countries.While the idea to control devices that are in home(embedded with the Internet of Things(IoT)smart devices)by ... The recent surge in development of smart homes and smart cities can be observed in many developed countries.While the idea to control devices that are in home(embedded with the Internet of Things(IoT)smart devices)by the user who is outside the home might sound fancy,but it comes with a lot of potential threats.There can be many attackers who will be trying to take advantage of this.So,there is a need for designing a secure scheme whichwill be able to distinguish among genuine/authorized users of the system and attackers.And knowing about the details of when and what IoT devices are used by the user,the attacker can trace the daily activities of user and can plan an attack accordingly.Thus,the designed security scheme should guarantee confidentiality,anonymity and un-traceability.Most of the schemes proposed in the literature are either non-blockchain based which involves inherent problems of storing data in a single-server or assuming weaker attack models.In this work,we propose a novel scheme based on blockchain technology,assuming a stronger Canetti and Krawczyk(CK)-threat model.Through the formal and informal security,and comparative analysis,we show that the proposed scheme provides a superior security and more functionality features,with less communication cost and comparable computational cost as compared to other competent schemes.Moreover,the blockchain based simulation study on the proposed scheme has been conducted to show its feasibility in real-life application. 展开更多
关键词 Internet of things(IoT) smart home ubiquitous computing blockchain SECURITY
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部