Blockchain Application Analysis Based on IoT Data Flow
نویسندگان
چکیده
In the Internet of Things (IoT) system, data leakage can easily occur due to differing security edge devices and different processing methods in transmission process. Blockchain technology has advantages good non-tamperability, decentralization, de-trust, openness, transparency, it protect on Things. This research integrates means by which flow be combined with blockchain prevent privacy throughout entire transportation process from sender receiver. Through a keyword search last five years, 94 related papers Web Science IEEE Xplore were extracted complex frameworks explained using reconstruction graph. The is divided into modules: encryption, access control, expansion, storage, visualization. A total 11 combining IoT summarized. application field was summarized objectively comprehensively, new perspective for studying given.
منابع مشابه
application of upfc based on svpwm for power quality improvement
در سالهای اخیر،اختلالات کیفیت توان مهمترین موضوع می باشد که محققان زیادی را برای پیدا کردن راه حلی برای حل آن علاقه مند ساخته است.امروزه کیفیت توان در سیستم قدرت برای مراکز صنعتی،تجاری وکاربردهای بیمارستانی مسئله مهمی می باشد.مشکل ولتاژمثل شرایط افت ولتاژواضافه جریان ناشی از اتصال کوتاه مدار یا وقوع خطا در سیستم بیشتر مورد توجه می باشد. برای مطالعه افت ولتاژ واضافه جریان،محققان زیادی کار کرده ...
15 صفحه اولA Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices
This paper describes a unique method for peer to peer identification of ownership of IoT devices in a cloud environment. The described methodology consists of device being added by it’s manufacturer (also referred to as Genesis) & then being transferred to a user based on blockchain technology. This paper also introduces how similar blockchain mechanism can be used for the transfer of ownership...
متن کاملCIoTA: Collaborative IoT Anomaly Detection via Blockchain
Due to their rapid growth and deployment, Internet of things (IoT) devices have become a central aspect of our daily lives. However, they tend to have many vulnerabilities which can be exploited by an attacker. Unsupervised techniques, such as anomaly detection, can help us secure the IoT devices. However, an anomaly detection model must be trained for a long time in order to capture all benign...
متن کاملSynchrosqueezing-based Transform and its Application in Seismic Data Analysis
Seismic waves are non-stationary due to its propagation through the earth. Time-frequency transforms are suitable tools for analyzing non-stationary seismic signals. Spectral decomposition can reveal the non-stationary characteristics which cannot be easily observed in the time or frequency representation alone. Various types of spectral decomposition methods have been introduced by some resear...
متن کاملIoT application in hospitals
Today, the digital revolution has affected all behaviors and lifestyles. From a health care perspective, the Internet of Things is any device that can collect data on people's health, including smart bands, digital drugs, and surgical devices. Implantation or other portable devices that can measure health data and internet connection. Accordingly, one of the most applications of IoT technology ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2022
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics11233907