Bring Trust to Edge: Secure and Decentralized IoT Framework with BFT and Permissioned Blockchain
暂无分享,去创建一个
Y. Yesha | Weisong Shi | Yusen Wu | Jinghui Liao | P. Nguyen
[1] Yueming Lu,et al. CrowdHB: A Decentralized Location Privacy-Preserving Crowdsensing System Based on a Hybrid Blockchain Network , 2022, IEEE Internet of Things Journal.
[2] Yuchen Zeng,et al. Hybrid Blockchain-Based Resource Trading System for Federated Learning in Edge Computing , 2021, IEEE Internet of Things Journal.
[3] Murat Kantarcioglu,et al. BlockFLA: Accountable Federated Learning via Hybrid Blockchain Architecture , 2020, CODASPY.
[4] Louise Crawford,et al. Permissionless and permissioned blockchain diffusion , 2020, Int. J. Inf. Manag..
[5] Yelena Yesha,et al. Intrusion-Tolerant and Confidentiality-Preserving Publish/Subscribe Messaging , 2020, 2020 International Symposium on Reliable Distributed Systems (SRDS).
[6] Yi Sun,et al. Hybrid blockchain–based privacy-preserving electronic medical records sharing scheme across medical information control system , 2020, Measurement and Control.
[7] Ziteng Chen,et al. A Decentralized and Trusted Edge Computing Platform for Internet of Things , 2020, IEEE Internet of Things Journal.
[8] Zhihua Cui,et al. A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN , 2020, IEEE Transactions on Services Computing.
[9] Hyoungshick Kim,et al. Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms , 2020, Sensors.
[10] Ivan Martinovic,et al. Peeves: Physical Event Verification in Smart Homes , 2019, CCS.
[11] Yingshu Li,et al. Hybrid Blockchain Design for Privacy Preserving Crowdsourcing Platform , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).
[12] Murat Kantarcioglu,et al. A Hybrid Blockchain Architecture for Privacy-Enabled and Accountable Auctions , 2019, 2019 IEEE International Conference on Blockchain (Blockchain).
[13] Ciprian Dobre,et al. Decentralized Storage System for Edge Computing , 2019, 2019 18th International Symposium on Parallel and Distributed Computing (ISPDC).
[14] David E. Culler,et al. JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT , 2019, USENIX Security Symposium.
[15] Patrick Traynor,et al. Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems , 2019, NDSS.
[16] Peng Liu,et al. Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms , 2018, USENIX Security Symposium.
[17] Jaemin Lim,et al. Pinto: Enabling Video Privacy for Commodity IoT Cameras , 2018, CCS.
[18] Rüdiger Kapitza,et al. Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric , 2018, ArXiv.
[19] Barbara Carminati,et al. Hybrid-IoT: Hybrid Blockchain Architecture for Internet of Things - PoW Sub-Blockchains , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[20] Praveen Gauravaram,et al. LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy , 2017, ArXiv.
[21] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[22] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[23] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[24] Quan Zhang,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[25] Alysson Neves Bessani,et al. State Machine Replication for the Masses with BFT-SMART , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[26] Alysson Neves Bessani,et al. From Byzantine Consensus to BFT State Machine Replication: A Latency-Optimal Transformation , 2012, 2012 Ninth European Dependable Computing Conference.
[27] G. Crow,et al. Research Ethics and Data Quality: The Implications of Informed Consent , 2006 .
[28] Jin Tong,et al. Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).
[29] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[30] Frédéric Cuppens,et al. Organization based access control , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[31] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[32] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[33] Ravi S. Sandhu,et al. How to do discretionary access control using roles , 1998, RBAC '98.
[34] Sylvia L. Osborn. Mandatory access control and role-based access control revisited , 1997, RBAC '97.
[35] C. Manimegalai,et al. A Modified Hybrid Blockchain Framework for Secured Data Transaction , 2021, Journal of Physics: Conference Series.
[36] Patrick D. McDaniel,et al. IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT , 2019, NDSS.
[37] Dave Levin,et al. Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet , 2019, NDSS.
[38] Rajarshi Gupta,et al. All Things Considered: An Analysis of IoT Devices on Home Networks , 2019, USENIX Security Symposium.
[39] P. G. Allen,et al. Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study , 2019 .
[40] Blase Ur,et al. Rethinking Access Control and Authentication for the Home Internet of Things (IoT) , 2018, USENIX Security Symposium.
[41] E. Soler,et al. Future Generation Computer Systems , 2018 .
[42] Rahim Rahmani,et al. Towards Security on Internet of Things: Applications and Challenges in Technology , 2018, EUSPN/ICTH.
[43] Dimitrios Koutsonikolas,et al. ABC: Enabling Smartphone Authentication with Built-in Camera , 2018, NDSS.
[44] Christian Cachin,et al. Architecture of the Hyperledger Blockchain Fabric , 2016 .
[45] Vijayalakshmi Atluri,et al. Role-based Access Control , 1992 .