Use este identificador para citar ou linkar para este item:
https://www.repositorio.mar.mil.br/handle/ripcmb/844281
Registro completo de metadados
Campo DC | Valor | Idioma |
---|---|---|
dc.contributor.author | Jesus, Emanuel Ferreira | - |
dc.contributor.author | Chicarino, Vanessa R. L. | - |
dc.contributor.author | Albuquerque, Célio V. N. de | - |
dc.contributor.author | Rocha, Antônio A. de A. | - |
dc.date.accessioned | 2019-11-29T17:10:29Z | - |
dc.date.available | 2019-11-29T17:10:29Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | Emanuel Ferreira Jesus, Vanessa R. L. Chicarino, Célio V. N. de Albuquerque, and Antônio A. de A. Rocha, “A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack,” Security and Communication Networks, vol. 2018, Article ID 9675050, 27 pages, 2018. https://doi.org/10.1155/2018/9675050. | en_US |
dc.identifier.other | https://doi.org/10.1155/2018/9675050 | - |
dc.identifier.uri | https://www.hindawi.com/journals/scn/2018/9675050/cta/ | - |
dc.identifier.uri | http://www.repositorio.mar.mil.br/handle/ripcmb/844281 | - |
dc.description.abstract | The Internet of Things (IoT) is increasingly a reality today. Nevertheless, some key challenges still need to be given particular attention so that IoT solutions further support the growing demand for connected devices and the services offered. Due to the potential relevance and sensitivity of services, IoT solutions should address the security and privacy concerns surrounding these devices and the data they collect, generate, and process. Recently, the Blockchain technology has gained much attention in IoT solutions. Its primary usage scenarios are in the financial domain, where Blockchain creates a promising applications world and can be leveraged to solve security and privacy issues. However, this emerging technology has a great potential in the most diverse technological areas and can significantly help achieve the Internet of Things view in different aspects, increasing the capacity of decentralization, facilitating interactions, enabling new transaction models, and allowing autonomous coordination of the devices. The paper goal is to provide the concepts about the structure and operation of Blockchain and, mainly, analyze how the use of this technology can be used to provide security and privacy in IoT. Finally, we present the stalker, which is a selfish miner variant that has the objective of preventing a node to publish its blocks on the main chain. | en_US |
dc.language.iso | eng | en_US |
dc.language.iso | eng | pt_BR |
dc.publisher | Security and Communication Networks | en_US |
dc.rights | openAccess | pt_BR |
dc.subject | Segurança | pt_BR |
dc.subject | Rede ponto a ponto | pt_BR |
dc.subject | Internet das Coisas | pt_BR |
dc.title | A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack | en_US |
dc.type | journalArticle | pt_BR |
dc.location.country | Inglaterra | pt_BR |
Aparece nas coleções: | Tecnologia da Informação: Coleção de Artigos |
Arquivos associados a este item:
Arquivo | Descrição | Tamanho | Formato | |
---|---|---|---|---|
Artigo_Vanessa.pdf | 2,06 MB | Adobe PDF | Visualizar/Abrir |
Este item está licenciada sob uma Licença Creative Commons