Blockchain-based Intrusion Detection System of IoT urban data with device authentication against DDoS attacks

ES Babu, BKN SrinivasaRao, SR Nayak… - Computers and …, 2022 - Elsevier
Abstract The Internet of Things (IoT) is a technology enabler for enhancing the urban
physical infrastructure and providing public services. However, public access to collected …

A review of intrusion detection and blockchain applications in the cloud: approaches, challenges and solutions

O Alkadi, N Moustafa, B Turnbull - IEEE Access, 2020 - ieeexplore.ieee.org
This paper reviews the background and related studies in the areas of cloud systems,
intrusion detection and blockchain applications against cyber attacks. This work aims to …

Blockchains for artificial intelligence of things: a comprehensive survey

M Shen, A Gu, J Kang, X Tang, X Lin… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
With the rapid advances in information and communication technologies, the Internet of
Things (IoT) has become large and complex, bearing tremendous amounts of data and …

Analysing perceived role of blockchain technology in SCM context for the manufacturing industry

A Karamchandani, SK Srivastava, S Kumar… - … Journal of Production …, 2021 - Taylor & Francis
Blockchain is a disruptive technology that promises to embed visibility and trustworthiness in
supply chains. This paper examines the perceived role of blockchain in improving SCM and …

An exhaustive research on the application of intrusion detection technology in computer network security in sensor networks

Y Wang, J Ma, A Sharma, PK Singh… - Journal of …, 2021 - Wiley Online Library
Intrusion detection is crucial in computer network security issues; therefore, this work is
aimed at maximizing network security protection and its improvement by proposing various …

[PDF][PDF] Analysis of recent trend and applications in block chain technology

B Vivekanadam - Journal of ISMAC, 2020 - scholar.archive.org
Blockchain is a digital ledger in which each record known as blocks and that are combined
in a single list known as a chain. It is regarded as Bitcoin's backbone technology. It is also …

Blockchain based credibility verification method for IoT entities

C Qu, M Tao, J Zhang, X Hong… - Security and …, 2018 - Wiley Online Library
With the fast development of mobile Internet, Internet of Things (IoT) has been found in many
important applications recently. However, it still faces many challenges in security and …

Blockchain solutions for forensic evidence preservation in IoT environments

S Brotsis, N Kolokotronis, K Limniotis… - … IEEE Conference on …, 2019 - ieeexplore.ieee.org
The technological evolution brought by the Internet of things (IoT) comes with new forms of
cyber-attacks exploiting the complexity and heterogeneity of IoT networks, as well as, the …

[HTML][HTML] MalInsight: A systematic profiling based malware detection framework

W Han, J Xue, Y Wang, Z Liu, Z Kong - Journal of Network and Computer …, 2019 - Elsevier
To handle the security threat faced by the widespread use of Internet of Things (IoT) devices
due to the ever-lasting increase of malware, the security researchers increasingly rely on …

Blockchain access control ecosystem for big data security

UU Uchibeke, KA Schneider… - … on Internet of Things …, 2018 - ieeexplore.ieee.org
In recent years, the advancement in modern technologies has not only resulted in an
explosion of huge data sets being captured and recorded in different fields, but also given …