Smart City Gnosys

Smart city article details

Title Evaluating A Blockchain-Based Method For Industrial Iot Data Confidentiality: Proof Of Concept
ID_Doc 24539
Authors Ashena E.
Year 2021
Published 2021 7th International Conference on Web Research, ICWR 2021
DOI http://dx.doi.org/10.1109/ICWR51868.2021.9443118
Abstract Utilizing the Internet of Things in the industry has led to an event called IIoT (Industrial Internet of Things) due to make smart cities, communication routes, smart grids, etc. IIoT deals with various sensors, devices scattered on the edges, and cloud servers by identified standards and protocols in decentralized networks. Besides all benefits the IIoT has carried out, the data stream's security and privacy remain a debatable subject of this technology. There are many solutions to overcome security issues and confidentiality breaches, but some do not completely consider the purpose. Factors like speed, integrity, security, and power consumption must be considered, and of course, the cost factor is a significant role in achieving the goal. The purpose of this article is to introduce a new scheme evolved from Blockchain methodology to overcome privacy and data confidentiality challenges. © 2021 IEEE.
Author Keywords Blockchain; Confidentiality; Data; Hash; Industrial IoT(IIoT); IoT; Security


Similar Articles


Id Similarity Authors Title Published
12390 View0.929Najjar-Ghabel S.; Yousefi S.; Karimipour H.Blockchain Applications In The Industrial Internet Of ThingsAI-Enabled Threat Detection and Security Analysis for Industrial IoT (2021)
522 View0.918Tan L.; Yu K.; Yang C.; Bashir A.K.A Blockchain-Based Shamir'S Threshold Cryptography For Data Protection In Industrial Internet Of Things Of Smart City6G-ABS 2021 - Proceedings of the 1st ACM Workshop on Artificial Intelligence and Blockchain Technologies for Smart Cities with 6G, Part of ACM MobiCom 2021 (2021)
33015 View0.903Abosata N.; Al-Rubaye S.; Inalhan G.; Emmanouilidis C.Internet Of Things For System Integrity: A Comprehensive Survey On Security, Attacks And Countermeasures For Industrial ApplicationsSensors, 21, 11 (2021)
12350 View0.899Sreekantha D.K.; Kulkarni R.V.; Gao X.-Z.Blockchain And 5G-Enabled Industrial Internet Of Things: Application-Specific AnalysisBlockchain for 5G-Enabled IoT: The new wave for Industrial Automation (2021)
16945 View0.893Buja A.; Apostolova M.; Luma A.; Januzaj Y.Cyber Security Standards For The Industrial Internet Of Things (Iiot)- A Systematic ReviewHORA 2022 - 4th International Congress on Human-Computer Interaction, Optimization and Robotic Applications, Proceedings (2022)
5322 View0.892Mishra N.; Hafizul Islam S.K.; Zeadally S.A Survey On Security And Cryptographic Perspective Of Industrial-Internet-Of-ThingsInternet of Things (Netherlands), 25 (2024)
17032 View0.892Raimundo R.J.; Rosário A.T.Cybersecurity In The Internet Of Things In Industrial ManagementApplied Sciences (Switzerland), 12, 3 (2022)
15951 View0.891Osama O.F.; Jamil A.S.; Al-Madhhachi A.F.J.; Ahmed R.K.A.; Hatim Q.Y.; Osmanov R.; Al-Jawher W.A.M.Contextual Blockchain For The Internet Of Things With Dynamic Approach To Dlt Based On Ambient ConditionsConference of Open Innovation Association, FRUCT (2024)
5270 View0.88Aouedi O.; Vu T.-H.; Sacco A.; Nguyen D.C.; Piamrat K.; Marchetto G.; Pham Q.-V.A Survey On Intelligent Internet Of Things: Applications, Security, Privacy, And Future DirectionsIEEE Communications Surveys and Tutorials, 27, 2 (2025)
56218 View0.878Ward G.; Janczewski L.The Pisa Model: A Common Data Security Model For The Industrial Internet Of Things (Iiot) Information SystemsProceedings IMCIC - International Multi-Conference on Complexity, Informatics and Cybernetics, 2023-March (2023)