logo-ri

Repositório Institucional da Produção Científica da Marinha do Brasil (RI-MB)

Use este identificador para citar ou linkar para este item: https://www.repositorio.mar.mil.br/handle/ripcmb/844281
Título: A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
Autor(es): Jesus, Emanuel Ferreira
Chicarino, Vanessa R. L.
Albuquerque, Célio V. N. de
Rocha, Antônio A. de A.
Palavras-chave: Segurança
Rede ponto a ponto
Internet das Coisas
Data do documento: 2018
Editor: Security and Communication Networks
Citação: Emanuel Ferreira Jesus, Vanessa R. L. Chicarino, Célio V. N. de Albuquerque, and Antônio A. de A. Rocha, “A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack,” Security and Communication Networks, vol. 2018, Article ID 9675050, 27 pages, 2018. https://doi.org/10.1155/2018/9675050.
Abstract: The Internet of Things (IoT) is increasingly a reality today. Nevertheless, some key challenges still need to be given particular attention so that IoT solutions further support the growing demand for connected devices and the services offered. Due to the potential relevance and sensitivity of services, IoT solutions should address the security and privacy concerns surrounding these devices and the data they collect, generate, and process. Recently, the Blockchain technology has gained much attention in IoT solutions. Its primary usage scenarios are in the financial domain, where Blockchain creates a promising applications world and can be leveraged to solve security and privacy issues. However, this emerging technology has a great potential in the most diverse technological areas and can significantly help achieve the Internet of Things view in different aspects, increasing the capacity of decentralization, facilitating interactions, enabling new transaction models, and allowing autonomous coordination of the devices. The paper goal is to provide the concepts about the structure and operation of Blockchain and, mainly, analyze how the use of this technology can be used to provide security and privacy in IoT. Finally, we present the stalker, which is a selfish miner variant that has the objective of preventing a node to publish its blocks on the main chain.
Tipo de Acesso: Acesso aberto
URI: https://www.hindawi.com/journals/scn/2018/9675050/cta/
http://www.repositorio.mar.mil.br/handle/ripcmb/844281
Tipo: Artigo científico
Aparece nas coleções:Tecnologia da Informação: Coleção de Artigos

Arquivos associados a este item:
Arquivo Descrição TamanhoFormato 
Artigo_Vanessa.pdf2,06 MBAdobe PDFThumbnail
Visualizar/Abrir


Este item está licenciada sob uma Licença Creative Commons Creative Commons