Corpus ID: 21589

Blockchain in internet of things: Challenges and Solutions

@article{Dorri2016BlockchainII,
  title={Blockchain in internet of things: Challenges and Solutions},
  author={A. Dorri and Salil S. Kanhere and Raja Jurdak},
  journal={ArXiv},
  year={2016},
  volume={abs/1608.05187}
}
  • A. Dorri, Salil S. Kanhere, Raja Jurdak
  • Published 2016
  • Computer Science
  • ArXiv
  • The Internet of Things IoT is experiencing exponential growth in research and industry, but it still suffers from privacy and security vulnerabilities. [...] Key Method The described method is investigated on a smart home application as a representative case study for broader IoT applications. The proposed architecture is hierarchical, and consists of smart homes, an overlay network and cloud storages coordinating data transactions with BC to provide privacy and security.Expand Abstract
    222 Citations
    Towards Secure IoT Communication with Smart Contracts in a Blockchain Infrastructure
    • 7
    • PDF
    Integration of Blockchain and IoT: An Enhanced Security Perspective
    • 1
    • PDF
    Enhancing IoT Security and Privacy Using Distributed Ledgers with IOTA and the Tangle
    • 8
    Lightweight Blockchain to Improve Security and Privacy in Smarthome
    • PDF
    Blockchain for IoT security and privacy: The case study of a smart home
    • 726
    • PDF
    A Study on Leveraging Blockchain Technology for IoT Security Enhancement
    • 2
    Sliding Window Blockchain Architecture for Internet of Things
    • 5
    Hyperledger Fabric Blockchain for Securing the Edge Internet of Things

    References

    SHOWING 1-10 OF 16 REFERENCES
    Privacy and Security Challenges in Internet of Things
    • M. Das
    • Computer Science
    • ICDCIT
    • 2015
    • 19
    Privacy-Aware Authentication in the Internet of Things
    • 17
    • PDF
    Smart Locks: Lessons for Securing Commodity Internet of Things Devices
    • 153
    • PDF
    IoT-Privacy: To be private or not to be private
    • 89
    openPDS: Protecting the Privacy of Metadata through SafeAnswers
    • 188
    • PDF
    Bitcoin meets strong consistency
    • 164
    • PDF
    Security vulnerabilities of connected vehicle streams and their impact on cooperative driving
    • 184
    • PDF
    Introduction to Cryptography
    • M. Aziz, S. Akbar
    • Computer Science
    • 2005 International Conference on Microelectronics
    • 2005
    • 326
    Dirichlet Reputation Systems
    • A. Jøsang, J. Haller
    • Computer Science
    • The Second International Conference on Availability, Reliability and Security (ARES'07)
    • 2007
    • 196
    • PDF
    Biographies
    • 101