مشخصات مقاله | |
ترجمه عنوان مقاله | ارزیابی عملکرد سیستم های امنیتی و حریم خصوصی مبتنی بر بلاکچین برای اینترنت اشیا: یک آموزش |
عنوان انگلیسی مقاله | The Performance Evaluation of Blockchain-based Security and Privacy Systems for the Internet of Things: A Tutorial |
انتشار | مقاله سال 2021 |
تعداد صفحات مقاله انگلیسی | 25 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
پایگاه داده | نشریه IEEE |
مقاله بیس | این مقاله بیس نمیباشد |
نمایه (index) | JCR – Master Journal List – Scopus |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
ایمپکت فاکتور(IF) |
12.366 در سال 2020 |
شاخص H_index | 97 در سال 2021 |
شاخص SJR | 2.075 در سال 2020 |
شناسه ISSN | 2327-4662 |
شاخص Quartile (چارک) | Q1 در سال 2020 |
فرضیه | ندارد |
مدل مفهومی | ندارد |
پرسشنامه | ندارد |
متغیر | ندارد |
رفرنس | دارد |
رشته های مرتبط | مهندسی کامپیوتر و فناوری اطلاعات |
گرایش های مرتبط | اینترنت و شبکه های گسترده، امنیت اطلاعات، رایانش امن |
نوع ارائه مقاله |
ژورنال |
مجله / کنفرانس | مجله اینترنت اشیا – IEEE Internet of Things Journal |
دانشگاه | Department of Computer Science, Guelma University, Nanjing Agricultural University, China |
کلمات کلیدی | امنیت ، حریم خصوصی ، بلاکچین ، اینترنت اشیا ، آزمایشگاه ها ، |
کلمات کلیدی انگلیسی | Security, Privacy, Blockchain, IoT, Testbeds, Experimentation environments |
شناسه دیجیتال – doi |
https://doi.org/10.1109/JIOT.2021.3078072 |
کد محصول | E15541 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
1- INTRODUCTION 2- BLOCKCHAIN FOR IOT APPLICATIONS 3- CONSENSUS ALGORITHMS AND EVALUATION PARAMETERS 4- SECURITY ANALYSIS TECHNIQUES 5- PERFORMANCE EVALUATION TECHNIQUES 6- LESSONS LEARNED 7- OPEN CHALLENGES AND FUTURE RESEARCH OPPORTUNITIES 8- CONCLUSION 9- ACKNOWLEDGEMENT 10- REFERENCES |
بخشی از متن مقاله: |
Abstract: This paper presents research challenges and a tutorial on performance evaluation of blockchain-based security and privacy systems for the internet of things (IoT). We start by summarizing the existing surveys that deal with blockchain security for IoT networks. Then, we review the blockchain-based security and privacy systems for seventeen types of IoT applications, e.g., Industry 4.0, Software Defined Networking, Edge computing, Internet of Drones, Internet of Cloud, Internet of Energy, Internet of Vehicles, etc. We also review various consensus algorithms and provide a comparison with respect to the nine properties such as latency, throughput, computation, storage, and communication costs, scalability, attack model, advantage, and disadvantage…etc. Moreover, we present the security analysis techniques and provide a classification into four categories, including, BAN logic, game theory, theory analysis, and AVISPA tool. In addition, we analyze the performance metrics, blockchain testbeds, and cryptography libraries used in the performance evaluation of blockchain-based security and privacy systems for the IoT networks. Based on the current survey, we discuss the major steps to follow for building and evaluating blockchain-based security and privacy systems. Finally, we discuss and highlight open challenges and future research opportunities. I. INTRODUCTION Today, with the emergence of many low-cost and powerful devices such as sensors and RFIDs associated with various communication media, the Internet of Things (IoT) has gained tremendous popularity, which offers a high potential for the development of not only different home automation systems but also various industrial applications, such as connected drones, connected health, smart farming, wearables, among other areas. The IoT market is projected to increase from over 15 billion devices in 2015 to more than 75 billion in 2025. This projection indicates that on average, there will be at least 25 personal IoT devices for every person on earth [1]. The large-scale and transverse nature of IoT systems, with the different elements and components associated with the implementation of such systems, has opened new security and privacy challenges [2], [3]. |