Nothing Special   »   [go: up one dir, main page]

Dwivedi et al., 2021 - Google Patents

Blockchain‐based internet of things and industrial IoT: a comprehensive survey

Dwivedi et al., 2021

View PDF @Full View
Document ID
8257898580539574589
Author
Dwivedi S
Roy P
Karda C
Agrawal S
Amin R
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

Industry 4.0 connects the latest technologies such as cloud computing, Internet of things (IoT), machine learning and artificial intelligence (ML/AI), and blockchain to provide more automation in the industrial process and also bridges the gap between the physical and …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30946Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition

Similar Documents

Publication Publication Date Title
Dwivedi et al. Blockchain‐based internet of things and industrial IoT: a comprehensive survey
Ferrag et al. The performance evaluation of blockchain-based security and privacy systems for the Internet of Things: A tutorial
Abdelmaboud et al. Blockchain for IoT applications: taxonomy, platforms, recent advances, challenges and future research directions
Wu et al. A comprehensive survey of blockchain: From theory to IoT applications and beyond
Saxena et al. Blockchain based solutions to secure IoT: Background, integration trends and a way forward
Wenhua et al. Blockchain technology: security issues, healthcare applications, challenges and future trends
Bhushan et al. Blockchain for smart cities: A review of architectures, integration trends and future research directions
Uddin et al. A survey on the adoption of blockchain in iot: Challenges and solutions
Idrees et al. Security aspects of blockchain technology intended for industrial applications
Niranjanamurthy et al. Analysis of Blockchain technology: pros, cons and SWOT
Wheelus et al. IoT network security: Threats, risks, and a data-driven defense framework
Mosakheil Security threats classification in blockchains
Cui et al. Blockchain in IoT: current trends, challenges, and future roadmap
Ibrahim et al. DDoS attack prevention for internet of thing devices using ethereum blockchain technology
Alzoubi et al. Internet of things and blockchain integration: security, privacy, technical, and design challenges
Khalil et al. A comparative analysis on blockchain versus centralized authentication architectures for IoT-enabled smart devices in smart cities: a comprehensive review, recent advances, and future research directions
Manoj et al. A trusted IoT data sharing and secure oracle based access for agricultural production risk management
Iftikhar et al. Privacy preservation in resource-constrained IoT devices using blockchain—A survey
Al Sadawi et al. On the integration of blockchain with IoT and the role of oracle in the combined system: The full picture
Papoutsakis et al. Towards a collection of security and privacy patterns
Jin et al. Toward secure, privacy-preserving, and interoperable medical data sharing via blockchain
Mainetti et al. A sustainable approach to delivering programmable peer-to-peer offline payments
Ahakonye et al. Tides of Blockchain in IoT Cybersecurity
Sujihelen An efficient chain code for access control in hyper ledger fabric healthcare system
Ramalingam et al. A holistic systems security approach featuring thin secure elements for resilient IoT deployments