Al-Haija et al., 2023 - Google Patents
Applications of blockchain technology for improving security in the internet of things (IoT)Al-Haija et al., 2023
- Document ID
- 13796909028820990184
- Author
- Al-Haija Q
- Alnabhan M
- Saleh E
- Al-Omari M
- Publication year
- Publication venue
- Blockchain Technology Solutions for the Security of Iot-Based Healthcare Systems
External Links
Snippet
The blockchain protocol is a digitally distributed system that records and verifies Bitcoin transactions, preserved by numerous distributed autonomous computers. The blockchain system is composed of multiple decentralized connected blocks (chains of blocks) that are …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ferrag et al. | Blockchain technologies for the internet of things: Research issues and challenges | |
Moin et al. | Securing IoTs in distributed blockchain: Analysis, requirements and open issues | |
Feng et al. | Blockchain-based cross-domain authentication for intelligent 5G-enabled internet of drones | |
Da Xu et al. | Embedding blockchain technology into IoT for security: A survey | |
Alfandi et al. | A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues | |
Yang et al. | Privacy and security aspects of E-government in smart cities | |
Yavari et al. | An Improved Blockchain‐Based Authentication Protocol for IoT Network Management | |
Zhong et al. | Distributed blockchain‐based authentication and authorization protocol for smart grid | |
Mohanta et al. | A novel approach to solve security and privacy issues for iot applications using blockchain | |
Halgamuge | Estimation of the success probability of a malicious attacker on blockchain-based edge network | |
Bagga et al. | Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions | |
Gugueoth et al. | A review of IoT security and privacy using decentralized blockchain techniques | |
Samuel et al. | An anonymous IoT-based E-health monitoring system using blockchain technology | |
Masud et al. | A user-centric privacy-preserving authentication protocol for IoT-AmI environments | |
Al-Haija et al. | Applications of blockchain technology for improving security in the internet of things (IoT) | |
Babu et al. | Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks | |
Thakur et al. | Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection | |
Saleem et al. | ProofChain: An X. 509-compatible blockchain-based PKI framework with decentralized trust | |
Anand et al. | Identity and access management systems | |
Abdulraheem et al. | Artificial Intelligence of Medical Things for Medical Information Systems Privacy and Security | |
Rudra | Impact of Blockchain for internet of Things Security | |
Ding et al. | Bloccess: enabling fine-grained access control based on blockchain | |
Saha et al. | Protecting the decentralized future: An exploration of common blockchain attacks and their countermeasures | |
Janani et al. | A security framework to enhance IoT device identity and data access through blockchain consensus model | |
Khan et al. | Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks |