A survey on addressing iot security issues by embedding blockchain technology solutions: review, attacks, current trends, and applications
By 2025, the Internet of Things (IoT) infrastructure is projected to encompass over 75 billion devices, facilitated by the increasing proliferation of intelligent applications. The IoT ecosystem consists of sensors that function as data generators and applications that necessitate financial transact...
| Main Authors: | Huan, Nathalie Tan Yhe, Zukarnain, Zuriati Ahmad |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Institute of Electrical and Electronics Engineers (IEEE)
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/117526/ http://psasir.upm.edu.my/id/eprint/117526/1/117526.pdf |
Similar Items
Blockchain technology for security issues and challenges in IoT
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018)
Vehicular ad hoc networks and security issues: survey
by: Abdulkader, Zaid A., et al.
Published: (2017)
by: Abdulkader, Zaid A., et al.
Published: (2017)
Mobility management for IoT: a survey
by: M. Ghaleb, Safwan, et al.
Published: (2016)
by: M. Ghaleb, Safwan, et al.
Published: (2016)
Internet of things (IoT); security requirements, attacks and counter measures
by: Imdad, Maria, et al.
Published: (2020)
by: Imdad, Maria, et al.
Published: (2020)
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023)
by: Alahmed, Mahmoud Tayseer
Published: (2023)
A survey of sybil attack countermeasures in underwater sensor and acoustic networks
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2023)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2023)
Online identity theft, security issues, and reputational damage
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2021)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2021)
Exploring manet security aspects: analysis of attacks and node misbehaviour issues
by: Islam Khan, Burhan Ul, et al.
Published: (2022)
by: Islam Khan, Burhan Ul, et al.
Published: (2022)
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
by: Arshad, Akashah, et al.
Published: (2021)
by: Arshad, Akashah, et al.
Published: (2021)
Reducing Risks and Enhancing Security and Privacy in IoT-based Health Monitoring Application using Blockchain Technology
by: Chitra, Batumalai, et al.
Published: (2022)
by: Chitra, Batumalai, et al.
Published: (2022)
Application of Advance Energy Storage System in IoT and Blockchain
by: Ahmed Siddiqui, Fahad, et al.
Published: (2022)
by: Ahmed Siddiqui, Fahad, et al.
Published: (2022)
The emergence and challenges of blockchain technology in business and IoT applications
by: Suyatna, I. Putu Ngurah, et al.
Published: (2023)
by: Suyatna, I. Putu Ngurah, et al.
Published: (2023)
How women address their spouses: a current trend in pronoun usage
by: Mansor, Nor Shahila
Published: (2019)
by: Mansor, Nor Shahila
Published: (2019)
Novel multi security and privacy benchmarking framework for blockchain-based IoT healthcare industry 4.0 systems
by: Qahtan, Sarah, et al.
Published: (2022)
by: Qahtan, Sarah, et al.
Published: (2022)
Blockchain technology in the healthcare industry: trends and opportunities
by: Hussien, Hassan Mansur, et al.
Published: (2021)
by: Hussien, Hassan Mansur, et al.
Published: (2021)
Policy monitoring, implementation key to addressing food security issues
by: Ibrahim, Ahmad
Published: (2022)
by: Ibrahim, Ahmad
Published: (2022)
Authentication securing methods for mobile identity: issues, solutions and challenges
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2022)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2022)
A comprehensive survey of the current trends and extensions for the proxy mobile IPv6 protocol
by: Jabir, Adnan J., et al.
Published: (2015)
by: Jabir, Adnan J., et al.
Published: (2015)
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
IP spoofing defense : current issues, trend and challenges.
by: Lee, Soon, et al.
Published: (2009)
by: Lee, Soon, et al.
Published: (2009)
Attacks, vulnerabilities and security requirements in smart metering networks
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Future trends in security issues in internet and web applications
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Recent trends and future directions of congestion management strategies for routing in IoT-based wireless sensor network: a thematic review
by: Zainaddin, D.A., et al.
Published: (2024)
by: Zainaddin, D.A., et al.
Published: (2024)
Regional cooperation in addressing food security issues in Southeast
Asia: Malaysian perspectives
by: Bakri Mat,, et al.
Published: (2014)
by: Bakri Mat,, et al.
Published: (2014)
Performance comparisons of AODV, secure AODV and adaptive secure AODV routing protocols in free attack simulation environment.
by: Ahmad Zulkarnain, Zuriati, et al.
Published: (2009)
by: Ahmad Zulkarnain, Zuriati, et al.
Published: (2009)
Embedded processor security
by: d'Auriol, Brian J., et al.
Published: (2007)
by: d'Auriol, Brian J., et al.
Published: (2007)
Blockchain-based secure medical record sharing system
by: Tian, Xiang Yang
Published: (2019)
by: Tian, Xiang Yang
Published: (2019)
The efficiency of embedding-based attacks on the GGH lattice-based cryptosystem
by: Mandangan,, A., et al.
Published: (2023)
by: Mandangan,, A., et al.
Published: (2023)
A survey on privacy-preserving authentication schemes in VANETs: attacks, challenges and open issues
by: Ahmed Jan, Sagheer, et al.
Published: (2021)
by: Ahmed Jan, Sagheer, et al.
Published: (2021)
Embedded Wireless Communication Platform Addresses Crane Safety and Efficiency
by: Rahnamayiezekavat, Payam, et al.
Published: (2014)
by: Rahnamayiezekavat, Payam, et al.
Published: (2014)
Blockchain technology can improve food supply chain security
by: Mimi Rabita, Abdul Wahit, et al.
Published: (2020)
by: Mimi Rabita, Abdul Wahit, et al.
Published: (2020)
Internet of things security implementation using blockchain for wireless technology
by: Karim, Karim Jabur
Published: (2019)
by: Karim, Karim Jabur
Published: (2019)
Secure IPv6 address generation
by: -, Nashrul Hakiem, et al.
Published: (2011)
by: -, Nashrul Hakiem, et al.
Published: (2011)
Need to address and enhance food security
by: Khen, Han Ming
Published: (2016)
by: Khen, Han Ming
Published: (2016)
Phishing image spam classification research trends: Survey and open issues
by: John Abari, Ovye, et al.
Published: (2020)
by: John Abari, Ovye, et al.
Published: (2020)
Cloud computing security threat with quantum key distribution defense model
by: Khalid, Roszelinda, et al.
Published: (2015)
by: Khalid, Roszelinda, et al.
Published: (2015)
IoT security: Challenges and solutions for mining
by: Barrie, Glenn, et al.
Published: (2017)
by: Barrie, Glenn, et al.
Published: (2017)
Similar Items
-
Blockchain technology for security issues and challenges in IoT
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018) -
Blockchain Security Hole: Issues and Solutions
by: Norul Suhaliana, Abd Halim, et al.
Published: (2018) -
Vehicular ad hoc networks and security issues: survey
by: Abdulkader, Zaid A., et al.
Published: (2017) -
Mobility management for IoT: a survey
by: M. Ghaleb, Safwan, et al.
Published: (2016) -
Internet of things (IoT); security requirements, attacks and counter measures
by: Imdad, Maria, et al.
Published: (2020)