Survey on blockchain for Internet of Things
暂无分享,去创建一个
Wei Ni | Ren Ping Liu | Y. Jay Guo | Xinxin Niu | Kangfeng Zheng | Xu Wang | Xuan Zha | Wei Ni | Y. Guo | R. Liu | Xinxin Niu | Haoyu Wang | K. Zheng | Xu Wang | Xuan Zha | Hongwen Hui | Huixuan Yang | Haoyu Wang | Weijia Ju | Xingshuo An | Hongjie Gao | Fuhong Lin | Fuhong Lin
[1] Anas Abou El Kalam,et al. FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.
[2] Sergey Zapechnikov,et al. A blockchain-based access control system for cloud storage , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).
[3] Fernando Pedone,et al. High performance state-machine replication , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).
[4] Kwangjo Kim,et al. Blockchain-Based Decentralized Key Management System with Quantum Resistance , 2018, WISA.
[5] Jaiteg Singh,et al. Blockchain-Based Resource Discovery for the Intercloud , 2017, 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS).
[6] Mohamed Amine Ferrag,et al. Blockchain Technologies for the Internet of Things: Research Issues and Challenges , 2018, IEEE Internet of Things Journal.
[7] Bharat K. Bhargava,et al. (WIP) Blockhub: Blockchain-Based Software Development System for Untrusted Environments , 2018, 2018 IEEE 11th International Conference on Cloud Computing (CLOUD).
[8] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[9] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[10] Yun Peng,et al. Efficient key management scheme for health blockchain , 2018, CAAI Trans. Intell. Technol..
[11] Sooyong Park,et al. Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.
[12] Elaine Shi,et al. The Honey Badger of BFT Protocols , 2016, CCS.
[13] Sunghyun Cho,et al. SCC: Storage Compression Consensus for Blockchain in Lightweight IoT Network , 2019, 2019 IEEE International Conference on Consumer Electronics (ICCE).
[14] Marc Pilkington,et al. Blockchain Technology: Principles and Applications , 2015 .
[15] Geoffrey Ye Li,et al. Hypergraph Theory: Applications in 5G Heterogeneous Ultra-Dense Networks , 2017, IEEE Communications Magazine.
[16] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[17] Sitenkov Denis,et al. Access Control in the Internet of Things , 2014 .
[18] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[19] Yanxin Zhang,et al. A decentralized solution for IoT data trusted exchange based-on blockchain , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).
[20] Marko Vukolic,et al. The next 700 BFT protocols , 2010, EuroSys '10.
[21] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[22] Pengfei Wang,et al. A Remote Attestation Security Model Based on Privacy-Preserving Blockchain for V2X , 2018, IEEE Access.
[23] Iddo Bentov,et al. Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.
[24] Wei Ni,et al. Collaborative Authentication in Decentralized Dense Mobile Networks With Key Predistribution , 2017, IEEE Transactions on Information Forensics and Security.
[25] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[26] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[27] Gordan Jezic,et al. Beyond the Internet of Things: The Social Networking of Machines , 2016, Int. J. Distributed Sens. Networks.
[28] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[29] Naoto Yanai,et al. RBAC-SC: Role-Based Access Control Using Smart Contract , 2018, IEEE Access.
[30] Mukesh Taneja,et al. A framework for power saving in IoT networks , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[31] Martijn Bastiaan,et al. Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin , 2015 .
[32] Wade Trappe,et al. A Security Framework for the Internet of Things in the Future Internet Architecture , 2017, Future Internet.
[33] Tianqing Zhu,et al. A blockchain-based location privacy-preserving crowdsensing system , 2019, Future Gener. Comput. Syst..
[34] Wei Ni,et al. Anatomy of Threats to the Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[35] Chun Chen,et al. Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.
[36] Soohyung Kim,et al. Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[37] Ilias Politis,et al. Enhancing SDN security for IoT-related deployments through blockchain , 2017, 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).
[38] William C. Chu,et al. Digital Asset Management with Distributed Permission over Blockchain and Attribute-Based Access Control , 2018, 2018 IEEE International Conference on Services Computing (SCC).
[39] Young-Sik Jeong,et al. DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.
[40] Douglas C. Schmidt,et al. Proposal for Chapter 3 Blockchain Technology Use Cases in Healthcare , 2018 .
[41] Alessandro Bassi,et al. From today's INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view , 2010, IEEE Wireless Communications.
[42] Richard D. Schlichting,et al. Fail-stop processors: an approach to designing fault-tolerant computing systems , 1981, TOCS.
[43] Aviv Zohar,et al. Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains , 2013, IACR Cryptol. ePrint Arch..
[44] Peter Friess,et al. Internet of Things Strategic Research Roadmap , 2011 .
[45] Albert Levi,et al. A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems , 2018, IEEE Communications Surveys & Tutorials.
[46] Nir Kshetri,et al. Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.
[47] Georgios B. Giannakis,et al. Kernel-Based Reconstruction of Space-Time Functions on Dynamic Graphs , 2016, IEEE Journal of Selected Topics in Signal Processing.
[48] Danny Dolev,et al. Authenticated Algorithms for Byzantine Agreement , 1983, SIAM J. Comput..
[49] Leandros A. Maglaras,et al. A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems , 2016, IEEE Transactions on Industrial Informatics.
[50] Neil W. Bergmann,et al. IoT Privacy and Security Challenges for Smart Home Environments , 2016, Inf..
[51] Teresa Riesgo,et al. The Extreme Edge at the Bottom of the Internet of Things: A Review , 2019, IEEE Sensors Journal.
[52] Gareth W. Peters,et al. Understanding Modern Banking Ledgers Through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money , 2015, ArXiv.
[53] Georgios B. Giannakis,et al. On energy efficiency and optimum resource allocation of relay transmissions in the low-power regime , 2005, IEEE Transactions on Wireless Communications.
[54] Qingju Wang,et al. When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.
[55] Barbara Liskov,et al. Viewstamped Replication: A New Primary Copy Method to Support Highly-Available Distributed Systems , 1999, PODC '88.
[56] Sepandar D. Kamvar,et al. Motivating urban cycling through a blockchain-based financial incentives system , 2017, UbiComp/ISWC Adjunct.
[57] David Kotz,et al. Privacy in mobile technology for personal healthcare , 2012, CSUR.
[58] Elaine Shi,et al. Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions , 2015, CCS.
[59] Lei Yang,et al. Crowd-Empowered Privacy-Preserving Data Aggregation for Mobile Crowdsensing , 2018, MobiHoc.
[60] Max Mühlhäuser,et al. Towards Blockchain-Based Collaborative Intrusion Detection Systems , 2017, CRITIS.
[61] Qichao Zhang,et al. A Blockchain-based key Management Scheme for Named Data Networking , 2018, 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).
[62] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[63] Fenghua Li,et al. Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario , 2019, IEEE Access.
[64] Miklos A. Vasarhelyi,et al. Toward Blockchain-Based Accounting and Assurance , 2017, J. Inf. Syst..
[65] J. Potts,et al. Economics of Blockchain , 2016 .
[66] Siraj Raval,et al. Decentralized Applications: Harnessing Bitcoin's Blockchain Technology , 2016 .
[67] Yunhao Liu,et al. Big Data: A Survey , 2014, Mob. Networks Appl..
[68] Mauro Conti,et al. Efficient physical intrusion detection in Internet of Things: A Node deployment approach , 2019, Comput. Networks.
[69] Awais Ahmad,et al. Urban planning and building smart cities based on the Internet of Things using Big Data analytics , 2016, Comput. Networks.
[70] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[71] Joseph K. Liu,et al. Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract) , 2004, ACISP.
[72] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[73] Baijian Yang,et al. Blockchain-Based Whitelisting for Consumer IoT Devices and Home Networks , 2018, SIGITE.
[74] Peng Jiang,et al. An Intelligent Outlier Detection Method With One Class Support Tucker Machine and Genetic Algorithm Toward Big Sensor Data in Internet of Things , 2019, IEEE Transactions on Industrial Electronics.
[75] Prateek Saxena,et al. A Secure Sharding Protocol For Open Blockchains , 2016, CCS.
[76] Wenjing Lou,et al. Attribute-based on-demand multicast group setup with membership anonymity , 2008, SecureComm.
[77] Rengarajan Amirtharajan,et al. Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique , 2016, Int. J. Digit. Multim. Broadcast..
[78] Wei Peng,et al. A Blockchain-Based Authentication and Security Mechanism for IoT , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).
[79] Wei Ni,et al. Optimal Schedule of Mobile Edge Computing for Internet of Things Using Partial Information , 2017, IEEE Journal on Selected Areas in Communications.
[80] Kim-Kwang Raymond Choo,et al. Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices , 2018, IEEE Consumer Electronics Magazine.
[81] Oscar Novo,et al. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.
[82] Fan Zhang,et al. Town Crier: An Authenticated Data Feed for Smart Contracts , 2016, CCS.
[83] Elaine Shi,et al. Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.
[84] Lei Yang,et al. Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC , 2018, Wirel. Commun. Mob. Comput..
[85] Chen Li,et al. A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT , 2019, IEEE Access.
[86] Salil S. Kanhere,et al. Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).
[87] Madhusudan Singh,et al. Introduce reward-based intelligent vehicles communication using blockchain , 2017, 2017 International SoC Design Conference (ISOCC).
[88] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[89] Yannan Li,et al. Blockchain based Privacy-Preserving Software Updates with Proof-of-Delivery for Internet of Things , 2019, J. Parallel Distributed Comput..
[90] Sam Toueg,et al. Asynchronous consensus and broadcast protocols , 1985, JACM.
[91] Abdellah Ait Ouahman,et al. Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT , 2017 .
[92] Ittay Eyal,et al. The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.
[93] Juan M. Corchado,et al. Non-linear adaptive closed-loop control system for improved efficiency in IoT-blockchain management , 2019, Inf. Fusion.
[94] Leslie Lamport,et al. Reaching Agreement in the Presence of Faults , 1980, JACM.
[95] Kung Chen,et al. On design issues and architectural styles for blockchain-driven IoT services , 2017, 2017 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW).
[96] Panayiotis Kotzanikolaou,et al. Evaluating Common Privacy Vulnerabilities in Internet Service Providers , 2009, e-Democracy.
[97] Wen-Long Chin,et al. Energy Big Data Security Threats in IoT-Based Smart Grid Communications , 2017, IEEE Communications Magazine.
[98] Biswanath Mukherjee,et al. A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[99] Lei Yang,et al. Dynamic Pricing for Privacy-Preserving Mobile Crowdsensing: A Reinforcement Learning Approach , 2019, IEEE Network.
[100] Abdulmotaleb El-Saddik,et al. Toward Social Internet of Vehicles: Concept, Architecture, and Applications , 2015, IEEE Access.
[101] Zhu Han,et al. Optimal Pricing-Based Edge Computing Resource Management in Mobile Blockchain , 2017, 2018 IEEE International Conference on Communications (ICC).
[102] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[103] Pin Lv,et al. An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains , 2019, IEEE Access.
[104] Xiaoyu Hong,et al. Blockchain Based Credibility Verification Method for IoT Entities , 2018, Secur. Commun. Networks.
[105] Der-Jiunn Deng,et al. On decentralized group key management mechanism for vehicular ad hoc networks , 2016, Secur. Commun. Networks.
[106] Joaquín B. Ordieres Meré,et al. [WiP] IoT Blockchain Technologies for Smart Sensors Based on Raspberry Pi , 2018, 2018 IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA).
[107] Prateek Saxena,et al. SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains , 2015, IACR Cryptol. ePrint Arch..
[108] Jong Hyuk Park,et al. Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City , 2017, J. Inf. Process. Syst..
[109] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[110] Leslie Lamport,et al. The part-time parliament , 1998, TOCS.
[111] Zhili Sun,et al. Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.
[112] Xiaojiang Du,et al. Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid , 2017, IEEE Access.
[113] Arda Yurdakul,et al. Integrating low-power IoT devices to a blockchain-based infrastructure: work-in-progress , 2017, EMSOFT '17.
[114] Chunhua Su,et al. A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things , 2018, IEEE Access.
[115] Zhou Xin,et al. Study on insulation detection method of electric vehicles based on single point of failure model , 2016, 2016 11th International Forum on Strategic Technology (IFOST).
[116] André Schiper,et al. The Heard-Of model: computing in distributed systems with benign faults , 2009, Distributed Computing.
[117] Pieter Wuille,et al. Enabling Blockchain Innovations with Pegged Sidechains , 2014 .
[118] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[119] Panganamala Ramana Kumar,et al. Real-time communication over unreliable wireless links: a theory and its applications , 2012, IEEE Wireless Communications.
[120] Niraj K. Jha,et al. A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.
[121] Rajappa Muthaiah,et al. A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System , 2015, Wirel. Pers. Commun..
[122] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[123] Kemal Akkaya,et al. A Network Coding Based Information Spreading Approach for Permissioned Blockchain in IoT Settings , 2018, MobiQuitous.
[124] Dusit Niyato,et al. Optimal Auction for Edge Computing Resource Management in Mobile Blockchain Networks: A Deep Learning Approach , 2017, 2018 IEEE International Conference on Communications (ICC).
[125] Marko Vukolic,et al. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.
[126] Zhiqi Shen,et al. Blockchain and IoT based Food Traceability for Smart Agriculture , 2018, ICCSE'18.
[127] Donggang Liu,et al. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.
[128] Feng Gao,et al. A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks , 2018, IEEE Network.
[129] Ghassan O. Karame,et al. Double-spending fast payments in bitcoin , 2012, CCS.
[130] Liming Zhu,et al. Blockchain Based Data Integrity Service Framework for IoT Data , 2017, 2017 IEEE International Conference on Web Services (ICWS).
[131] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[132] Nikolay Teslya,et al. Blockchain-based platform architecture for industrial IoT , 2017, 2017 21st Conference of Open Innovations Association (FRUCT).
[133] Achour Mostéfaoui,et al. A versatile and modular consensus protocol , 2002, Proceedings International Conference on Dependable Systems and Networks.
[134] Suresh Sankaranarayanan,et al. Publish/subscribe based multi-tier edge computational model in Internet of Things for latency reduction , 2019, J. Parallel Distributed Comput..
[135] Björn Scheuermann,et al. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.
[136] Aloknath De,et al. Continuous Security in IoT Using Blockchain , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[137] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[138] Oliver Günther,et al. Security challenges of the EPCglobal network , 2009, CACM.
[139] Lv Jin-na. Group Key Agreement Protocol Based on m-tree and DH Protocol , 2010 .
[140] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[141] Wei Ni,et al. Big Data Analytics and Network Calculus Enabling Intelligent Management of Autonomous Vehicles in a Smart City , 2019, IEEE Internet of Things Journal.
[142] Jeremy Clark,et al. Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges , 2015, CCS.
[143] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[144] Alex Biryukov,et al. Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.
[145] William C. Chu,et al. TBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).
[146] Jong-Il Park,et al. IoT Delegate: Smart Home Framework for Heterogeneous IoT Service Collaboration , 2016, KSII Trans. Internet Inf. Syst..
[147] Xiaohong Jiang,et al. Smart Contract-Based Access Control for the Internet of Things , 2018, IEEE Internet of Things Journal.
[148] Ahmed Serhrouchni,et al. Decentralized Access Control Mechanism with Temporal Dimension Based on Blockchain , 2017, 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE).
[149] Ilsun You,et al. Content Recommendation Algorithm for Intelligent Navigator in Fog Computing Based IoT Environment , 2019, IEEE Access.
[150] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[151] Nabil Bouzerna,et al. Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[152] Yang Xu,et al. Decentralized group key management for hierarchical access control using multilinear forms , 2016, Concurr. Comput. Pract. Exp..
[153] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[154] Nabil Rifi,et al. Blockchain Technology: Is It a Good Candidate for Securing IoT Sensitive Medical Data? , 2018, Wirel. Commun. Mob. Comput..
[155] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[156] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[157] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[158] Laurence T. Yang,et al. Data Mining for Internet of Things: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[159] Klara Nahrstedt,et al. INCEPTION: incentivizing privacy-preserving data aggregation for mobile crowd sensing systems , 2016, MobiHoc.
[160] Yousof Al-Hammadi,et al. Blockchain-based Ownership Management for Medical IoT (MIoT) Devices , 2018, 2018 International Conference on Innovations in Information Technology (IIT).
[161] Ke Xiao,et al. A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications , 2018, IEEE Access.
[162] Nai-Wei Lo,et al. An Over-the-Blockchain Firmware Update Framework for IoT Devices , 2018, 2018 IEEE Conference on Dependable and Secure Computing (DSC).
[163] Xiao Liu,et al. Service matchmaking for Internet of Things based on probabilistic topic model , 2019, Future Gener. Comput. Syst..
[164] Qi He,et al. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[165] Shen Noether,et al. Ring Confidential Transactions , 2016, Ledger.
[166] Antonio Puliafito,et al. Blockchain and IoT Integration: A Systematic Survey , 2018, Sensors.
[167] Sun Jingtao,et al. Steiner tree based optimal resource caching scheme in fog computing , 2015, China Communications.
[168] Haoyu Wang,et al. Survey on Blockchain for Internet of Things , 2019, J. Internet Serv. Inf. Secur..
[169] Stamatis Karnouskos,et al. Cyber-Physical Systems in the SmartGrid , 2011, 2011 9th IEEE International Conference on Industrial Informatics.
[170] Abbas Jamalipour,et al. Blockchain in IoT Security: A Survey , 2018, 2018 28th International Telecommunication Networks and Applications Conference (ITNAC).
[171] Ethan Heilman,et al. Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..
[172] Theodora A. Varvarigou,et al. Implementation of smart contracts for blockchain based IoT applications , 2018, 2018 9th International Conference on the Network of the Future (NOF).
[173] Rogério de Lemos,et al. Self-Adaptation Made Easy with Blockchains , 2018, 2018 IEEE/ACM 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).
[174] Aggelos Kiayias,et al. Proof-of-Burn , 2020, IACR Cryptol. ePrint Arch..
[175] Donald E. Eastlake,et al. US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) , 2011, RFC.
[176] Vladimiro Sassone,et al. A Blockchain-based Infrastructure for Reliable and Cost-effective IoT-aided Smart Grids , 2018, IoT 2018.
[177] Giuseppe Piro,et al. When Blockchain Makes Ephemeral Keys Authentic: A Novel Key Agreement Mechanism in the IoT World , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).
[178] Ruoyu Li,et al. SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective Detection , 2018, 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).
[179] Kim-Kwang Raymond Choo,et al. Blockchain-Based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual Design , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).
[180] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[181] Özgür B. Akan,et al. Spatio-temporal correlation: theory and applications for wireless sensor networks , 2004, Comput. Networks.
[182] Bryan Ford,et al. Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing , 2016, USENIX Security Symposium.
[183] Smruti R. Sarangi,et al. Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..
[184] Andrej Kos,et al. Approaches to Front-End IoT Application Development for the Ethereum Blockchain , 2017, IIKI.
[185] Nabil Rifi,et al. Towards using blockchain technology for IoT data access protection , 2017, 2017 IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB).
[186] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[187] Denise Demirel,et al. How to Securely Prolong the Computational Bindingness of Pedersen Commitments , 2015, IACR Cryptol. ePrint Arch..
[188] J. Efrim Boritz,et al. IS practitioners' views on core concepts of information integrity , 2005, Int. J. Account. Inf. Syst..
[189] André Ricardo Abed Grégio,et al. ControlChain: Blockchain as a Central Enabler for Access Control Authorizations in the IoT , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[190] Wei Ni,et al. Virus Propagation Modeling and Convergence Analysis in Large-Scale Networks , 2016, IEEE Transactions on Information Forensics and Security.
[191] Rocio Maciel,et al. A Use Case in Cybersecurity based in Blockchain to deal with the security and privacy of citizens and Smart Cities Cyberinfrastructures , 2018, 2018 IEEE International Smart Cities Conference (ISC2).
[192] Wei Ni,et al. The Impact of Link Duration on the Integrity of Distributed Mobile Networks , 2018, IEEE Transactions on Information Forensics and Security.
[193] Robert H. Deng,et al. Lightweight Break-Glass Access Control System for Healthcare Internet-of-Things , 2018, IEEE Transactions on Industrial Informatics.
[194] Xiaohui Liang,et al. Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.
[195] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[196] Wei Peng,et al. Combination of Cloud Computing and Internet of Things (IOT) in Medical Monitoring Systems , 2015 .
[197] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[198] Matthias Fitzi,et al. Efficient Byzantine Agreement Secure Against General Adversaries , 1998, DISC.
[199] Yu-Chee Tseng,et al. An Energy-Efficient Sleep Scheduling With QoS Consideration in 3GPP LTE-Advanced Networks for Internet of Things , 2013, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.
[200] Luming Tan,et al. Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[201] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[202] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[203] Patrick D. McDaniel,et al. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic , 2014, Financial Cryptography.
[204] Tam Le,et al. CapChain: A Privacy Preserving Access Control Framework Based on Blockchain for Pervasive Environments , 2018, 2018 IEEE International Conference on Smart Computing (SMARTCOMP).
[205] Sam Toueg,et al. Distributed agreement in the presence of processor and communication faults , 1986, IEEE Transactions on Software Engineering.
[206] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[207] Yaling Zhang,et al. A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems , 2018, IEEE Access.
[208] Ebraheim Alsaadi,et al. Internet of Things : Features , Challenges , and Vulnerabilities Authors , 2015 .
[209] Freddy K. Santoso,et al. Securing IoT for smart home system , 2015, 2015 International Symposium on Consumer Electronics (ISCE).
[210] Nicolas Courtois,et al. Stealth Address and Key Management Techniques in Blockchain Systems , 2017, ICISSP.
[211] Gautam Srivastava,et al. A Decentralized Privacy-Preserving Healthcare Blockchain for IoT , 2019, Sensors.
[212] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[213] Naixue Xiong,et al. A novel code data dissemination scheme for Internet of Things through mobile vehicle of smart cities , 2019, Future Gener. Comput. Syst..
[214] Ki-Hyung Kim,et al. Dynamic Access Control Scheme for IoT Devices using Blockchain , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).
[215] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[216] Arda Yurdakul,et al. Designing a Blockchain-Based IoT With Ethereum, Swarm, and LoRa: The Software Solution to Create High Availability With Minimal Security Risks , 2018, IEEE Consumer Electronics Magazine.
[217] Liu Qian,et al. Cooperative differential game for model energy-bandwidth efficiency tradeoff in the Internet of Things , 2014, China Communications.
[218] Prem Prakash Jayaraman,et al. QDaS: Quality driven data summarisation for effective storage management in Internet of Things , 2019, J. Parallel Distributed Comput..
[219] Aron Laszka,et al. When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools , 2015, Financial Cryptography Workshops.
[220] Mohamed A. El-Sharkawi,et al. Optimal Scheduling of Vehicle-to-Grid Energy and Ancillary Services , 2012, IEEE Transactions on Smart Grid.
[221] Jun-Ho Huh,et al. A Study on Improvement of Blockchain Application to Overcome Vulnerability of IoT Multiplatform Security , 2019, Energies.