مقاله انگلیسی رایگان در مورد تکنولوژی بلاک چین برای مسائل امنیتی و چالش ها در اینترنت اشیا – الزویر ۲۰۱۸
مشخصات مقاله | |
ترجمه عنوان مقاله | تکنولوژی بلاک چین برای مسائل امنیتی و چالش ها در اینترنت اشیا |
عنوان انگلیسی مقاله | Blockchain technology for security issues and challenges in IoT |
انتشار | مقاله سال ۲۰۱۸ |
تعداد صفحات مقاله انگلیسی | ۹ صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه الزویر |
نوع نگارش مقاله |
مقاله پژوهشی (Research Article) |
مقاله بیس | این مقاله بیس نمیباشد |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
۱٫۰۱۳ در سال ۲۰۱۷ |
شاخص H_index | ۳۴ در سال ۲۰۱۹ |
شاخص SJR | ۰٫۲۵۸ در سال ۲۰۱۷ |
شناسه ISSN | ۱۸۷۷-۰۵۰۹ |
رشته های مرتبط | مهندسی کامپیوتر، مهندسی فناوری اطلاعات |
گرایش های مرتبط | امنیت اطلاعات، اینترنت و شبکه های گسترده، هوش مصنوعی، شبکه های کامپیوتری |
نوع ارائه مقاله |
کنفرانس |
کنفرانس | پروسدیای علوم کامپیوتر – Procedia Computer Science |
دانشگاه | Faculty of Electrical and Electronics Engineering, Universiti Malaysia Pahang, 26600 Pekan, Pahang, Malaysia |
کلمات کلیدی | اینترنت اشیا، امنیت اینرتنت اشیا، چالش ها در اینترنت اشیا، فناوری بلاک چین، کاربردهای فناوری بلاک چین، IoT-BC، سرور مرکزی در اینترنت اشیا |
کلمات کلیدی انگلیسی | The Internet of Things، IoT Security، Challenges in IoT، Blockchain Technology، Applications of Blockchain Technology، IoT-BC، Central Server in IoT |
شناسه دیجیتال – doi |
https://doi.org/10.1016/j.procs.2018.05.140 |
کد محصول | E11187 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract
۱- Introduction ۲- Issues and Challenges in IoT ۳- Could Blockchain Technology Can be a Remedy? ۴- Conclusion References |
بخشی از متن مقاله: |
Abstract The internet of things (IoT) enabled a common operating picture (COP) across the various applications of modern day living. The COP is achieved through the advancements seen in wireless sensor network devices that were able to communicate through the network thereby exchanging information and performing various analysis. In IoT, the exchange of information and data authentication is only done through the central server there by leading to the security and privacy concerns. Chances of device spoofing, false authentication, less reliability in data sharing could happen. To address such security and privacy concerns, a central server concept is eliminated and blockchain (BC) technology is introduced as a part of IoT. This paper elaborates the possible security and privacy issues considering the component interaction in IoT and studies how the distributed ledger based blockchain (DL-BC) technology contribute to it. Applications of BC with respect to focused sectors and category were clearly studied here. Various challenges specific to IoT and IoT with BC were also discussed to understand blockchain technology contribution. Introduction The Internet of Things (IoT), an evolutionary technology that raised and gained huge scope in the science and engineering applications solving problems without the intervention of human-human work force. It enables mostly smart work force i.e. creating an interaction between human to machine, machine to machine. The internet of things (IoT) enabled a common operating picture (COP) across the various applications of modern day living1 .The COP is achieved through the advancements seen in wireless sensor network devices that were able to communicate through the network thereby exchanging information and performing various analysis1 . From this point one must clearly understand that IoT is not a single technology, it is a combination of multiple technologies that would work for the smart ness achievement2-4. These technologies include communication technology, information technology, electronic sensor and actuator technology, and the trending advancements in computing and analytics. The integration of all such technologies could make it complex and difficulty in handling when working on wider and large application point of view2-5. The complex scale of device integration, network interconnection, and distributed nature of the things in IoT gives a scope for central server concept where all the things or the devices would compulsory relay on it for authentication. In this case the interconnection between the devices would become unreliable allowing the data sharing with false authentications or allowing device spoofing leading to insecure data flow. For clear understanding of the problem concerned with IoT, one can refer to the views of Gartner expressed in 2016 and International Telecommunication Union reports of 20156,7. These two reports suggest that in future i.e. by the end of 2020, twenty billion physical things could connect to the internet and operate as a single network under IoT6,7. This statement suggests that IoT could be become much more complex in the coming future by connecting to a Network of Plentiful Things (NPT) making a provision for digital access. In such cases, the NPT devices could obtain enormous amount of information from the inclosing boundaries or the application or focus environment. These devices must communicate with the network and software defined computing and analytics platform, and this process is completely done through internet and leading to a point of central server storage. This communication results in the rich interactions between the things and network IoT architecture giving a scope for huge data generation allowing the reliable and trustworthy services over the wide area network of things through the Centralized Data Management Servers (CDMS). Here, reliability and trustworthiness in providing services could not be done in fully secure manner. Chances of security and privacy issues with the data is possible and it is due to the due to the sensitive ness of the things that are interconnected among them as well as the network. More provision and chances exist for reveling the sensitive aspects of the data to outside world (outside of the communicating network or NPT) through the false authentications, device spoofing.This leads to the various security and privacy issues in IoT making it as a challenge to encounter. |