[HTML][HTML] A review of IoT security and privacy using decentralized blockchain techniques

V Gugueoth, S Safavat, S Shetty, D Rawat - Computer Science Review, 2023 - Elsevier
IoT security is one of the prominent issues that has gained significant attention among the
researchers in recent times. The recent advancements in IoT introduces various critical …

Impact and key challenges of insider threats on organizations and critical businesses

N Saxena, E Hayes, E Bertino, P Ojo, KKR Choo… - Electronics, 2020 - mdpi.com
The insider threat has consistently been identified as a key threat to organizations and
governments. Understanding the nature of insider threats and the related threat landscape …

On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance

S Brotsis, K Limniotis, G Bendiab, N Kolokotronis… - Computer Networks, 2021 - Elsevier
Blockchain and distributed ledger technologies have received significant interest in various
areas beyond the financial sector, with profound applications in the Internet of Things (IoT) …

Sybil in the haystack: A comprehensive review of blockchain consensus mechanisms in search of strong Sybil attack resistance

M Platt, P McBurney - Algorithms, 2023 - mdpi.com
Consensus algorithms are applied in the context of distributed computer systems to improve
their fault tolerance. The explosive development of distributed ledger technology following …

On the security and privacy of hyperledger fabric: Challenges and open issues

S Brotsis, N Kolokotronis, K Limniotis… - 2020 IEEE World …, 2020 - ieeexplore.ieee.org
In the last few years, a countless number of permissioned blockchain solutions have been
proposed, with each one to claim that it revolutionizes the way of the transaction processing …

Blockchain-enabled intrusion detection and prevention system of APTs within zero trust architecture

L Alevizos, MH Eiza, VT Ta, Q Shi, J Read - Ieee Access, 2022 - ieeexplore.ieee.org
In a world where organisations are embracing new IT working models such as Bring Your
Own Device (BYOD) and remote working, the traditional mindset of defending the network …

[HTML][HTML] Toward pre-standardization of reputation-based trust models beyond 5G

JMJ Valero, PMS Sánchez, MG Pérez… - Computer Standards & …, 2022 - Elsevier
In the last years, the number of connections in mobile telecommunication networks has
increased rampantly, and in consequence, the number and type of relationships among …

Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: a survey

SS Mathew, K Hayawi, NA Dawit, I Taleb, Z Trabelsi - Cluster Computing, 2022 - Springer
The advent of the Industrial Internet of Things (IIoT) integrates all manners of computing
technologies, from tiny actuators to process-intensive servers. The distributed network of IoT …

Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks

W Li, Y Wang, J Li - Journal of Systems Architecture, 2022 - Elsevier
Abstract Internet of Things (IoT) has become more important for setting up a smart
environment, eg, smart home. It is a network of connected devices, which can provide many …

Blockchain meets Internet of Things (IoT) forensics: A unified framework for IoT ecosystems

S Brotsis, KP Grammatikakis, D Kavallieros, AI Mazilu… - Internet of Things, 2023 - Elsevier
With the continuously increasing number of security incidents targeting sensors, embedded
devices, and other electronics appliances and systems that comprise the so-called Internet …