LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy
暂无分享,去创建一个
Praveen Gauravaram | Salil S. Kanhere | Raja Jurdak | Ali Dorri | R. Jurdak | S. Kanhere | P. Gauravaram | A. Dorri | Praveen Gauravaram
[1] Johannes A. Buchmann,et al. Introduction to Cryptography , 2001 .
[2] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[3] Azeddine Bilami,et al. Compressed and distributed host identity protocol for end-to-end security in the IoT , 2014, 2014 International Conference on Next Generation Networks and Services (NGNS).
[4] M.I. Aziz,et al. Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.
[5] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[6] Eduardo Castelló Ferrer. The blockchain: a new framework for robotic swarm systems , 2016, Proceedings of the Future Technologies Conference (FTC) 2018.
[7] Jing Liu,et al. Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[8] S. Popov. The Tangle , 2015 .
[9] Salil S. Kanhere,et al. A trust architecture for blockchain in IoT , 2019, MobiQuitous.
[10] Silvio Micali,et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies , 2017, IACR Cryptol. ePrint Arch..
[11] David Mazières. The Stellar Consensus Protocol : A Federated Model for Internet-level Consensus , 2015 .
[12] Wei Jiang,et al. Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.
[13] Michele Amoretti,et al. Blockchain-Based Proof of Location , 2016, 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).
[14] Meejeong Lee,et al. mSCTP for soft handover in transport layer , 2004, IEEE Communications Letters.
[16] Konstantin Mikhaylov,et al. Analysis of Capacity and Scalability of the LoRa Low Power Wide Area Network Technology , 2016 .
[17] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[18] Salil S. Kanhere,et al. MOF-BC: A Memory Optimized and Flexible BlockChain for Large Scale Networks , 2018, Future Gener. Comput. Syst..
[19] Christian Cachin,et al. Architecture of the Hyperledger Blockchain Fabric , 2016 .
[20] Ling Xu,et al. Resisting Sybil Attack By Social Network and Network Clustering , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.
[21] Dariusz R. Kowalski,et al. Time and Communication Efficient Consensus for Crash Failures , 2006, DISC.
[22] Soohyung Kim,et al. Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[23] Davor Svetinovic,et al. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.
[24] Salil S. Kanhere,et al. On the Activity Privacy of Blockchain for IoT , 2018, 2019 IEEE 44th Conference on Local Computer Networks (LCN).
[25] Nancy Alonistioti,et al. SYSTAS: Density-based algorithm for clusters discovery in wireless networks , 2015, 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[26] Mohsen Guizani,et al. A framework for a distributed key management scheme in heterogeneous wireless sensor networks , 2008, IEEE Trans. Wirel. Commun..
[27] Otto Petrovic,et al. 3.3 The Internet of Things as Disruptive Innovation for the Advertising Ecosystem , 2017 .
[28] Vijay Sivaraman,et al. Low-cost flow-based security solutions for smart-home IoT devices , 2016, International Workshop on Ant Colony Optimization and Swarm Intelligence.
[29] Roy H. Campbell,et al. World of Empowered IoT Users , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).
[30] Chong Kuan Chen,et al. IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.
[31] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[32] Gang Qu,et al. BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[33] Rachid Guerraoui,et al. On the complexity of asynchronous gossip , 2008, PODC '08.
[34] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[35] Arati Baliga,et al. Understanding Blockchain Consensus Models , 2017 .
[36] John K. Ousterhout,et al. In Search of an Understandable Consensus Algorithm , 2014, USENIX ATC.
[37] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[38] Michael Abramowicz,et al. Cryptocurrency-Based Law , 2015 .
[39] Subhas Chandra Mukhopadhyay,et al. Internet of Things: Challenges and Opportunities , 2014 .
[40] Young-Sik Jeong,et al. DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.
[41] Björn Scheuermann,et al. Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.
[42] Srinivas Devadas,et al. Catena: Efficient Non-equivocation via Bitcoin , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[43] Salil S. Kanhere,et al. Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).
[44] Andrey Bogdanov,et al. spongent: A Lightweight Hash Function , 2011, CHES.
[45] Lin Chen,et al. On Security Analysis of Proof-of-Elapsed-Time (PoET) , 2017, SSS.
[46] Marko Vukolic,et al. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.
[47] Erez Shmueli,et al. openPDS: Protecting the Privacy of Metadata through SafeAnswers , 2014, PloS one.
[48] Roberto Baldoni,et al. PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain , 2018, ITASEC.
[49] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .