Nothing Special   »   [go: up one dir, main page]

Al-Haija et al., 2023 - Google Patents

Applications of blockchain technology for improving security in the internet of things (IoT)

Al-Haija et al., 2023

Document ID
13796909028820990184
Author
Al-Haija Q
Alnabhan M
Saleh E
Al-Omari M
Publication year
Publication venue
Blockchain Technology Solutions for the Security of Iot-Based Healthcare Systems

External Links

Snippet

The blockchain protocol is a digitally distributed system that records and verifies Bitcoin transactions, preserved by numerous distributed autonomous computers. The blockchain system is composed of multiple decentralized connected blocks (chains of blocks) that are …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Similar Documents

Publication Publication Date Title
Ferrag et al. Blockchain technologies for the internet of things: Research issues and challenges
Moin et al. Securing IoTs in distributed blockchain: Analysis, requirements and open issues
Feng et al. Blockchain-based cross-domain authentication for intelligent 5G-enabled internet of drones
Da Xu et al. Embedding blockchain technology into IoT for security: A survey
Alfandi et al. A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues
Yang et al. Privacy and security aspects of E-government in smart cities
Yavari et al. An Improved Blockchain‐Based Authentication Protocol for IoT Network Management
Zhong et al. Distributed blockchain‐based authentication and authorization protocol for smart grid
Mohanta et al. A novel approach to solve security and privacy issues for iot applications using blockchain
Halgamuge Estimation of the success probability of a malicious attacker on blockchain-based edge network
Bagga et al. Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions
Gugueoth et al. A review of IoT security and privacy using decentralized blockchain techniques
Samuel et al. An anonymous IoT-based E-health monitoring system using blockchain technology
Masud et al. A user-centric privacy-preserving authentication protocol for IoT-AmI environments
Al-Haija et al. Applications of blockchain technology for improving security in the internet of things (IoT)
Babu et al. Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks
Thakur et al. Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection
Saleem et al. ProofChain: An X. 509-compatible blockchain-based PKI framework with decentralized trust
Anand et al. Identity and access management systems
Abdulraheem et al. Artificial Intelligence of Medical Things for Medical Information Systems Privacy and Security
Rudra Impact of Blockchain for internet of Things Security
Ding et al. Bloccess: enabling fine-grained access control based on blockchain
Saha et al. Protecting the decentralized future: An exploration of common blockchain attacks and their countermeasures
Janani et al. A security framework to enhance IoT device identity and data access through blockchain consensus model
Khan et al. Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks