IoT Security Based on Smart Contracts: Classification of Algorithms, Complexity, Robustness and Fields of Application
In recent years, as data processing and storage technologies have advanced, the need to ensure computer system security and information confidentiality on all types of networks has grown significantly. The emergence of the Internet of Things (IoT) has led to interconnected objects using various comm...
Saved in:
Published in | 2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM) pp. 1 - 8 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
26.10.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In recent years, as data processing and storage technologies have advanced, the need to ensure computer system security and information confidentiality on all types of networks has grown significantly. The emergence of the Internet of Things (IoT) has led to interconnected objects using various communication protocols through a new generation of Internet networks. The increasing number of connected objects worldwide demands improved methods and techniques to secure these networks, particularly considering the potential presence of sensitive data. Consequently, network security has become a primary focus for numerous computer science researchers, with a particular emphasis on enhancing security techniques and data confidentiality for all participants or devices involved in a network architecture. In response to these challenges, several solutions based on Blockchain technology have been developed to secure Internet of Things networks. These solutions employ smart contracts to ensure verified transaction execution while adhering to authentication, confidentiality, and data integrity rules. This article aims to explore the security solutions for the Internet of Things based on smart contracts, evaluating factors such as complexity, robustness, and fields of application. |
---|---|
AbstractList | In recent years, as data processing and storage technologies have advanced, the need to ensure computer system security and information confidentiality on all types of networks has grown significantly. The emergence of the Internet of Things (IoT) has led to interconnected objects using various communication protocols through a new generation of Internet networks. The increasing number of connected objects worldwide demands improved methods and techniques to secure these networks, particularly considering the potential presence of sensitive data. Consequently, network security has become a primary focus for numerous computer science researchers, with a particular emphasis on enhancing security techniques and data confidentiality for all participants or devices involved in a network architecture. In response to these challenges, several solutions based on Blockchain technology have been developed to secure Internet of Things networks. These solutions employ smart contracts to ensure verified transaction execution while adhering to authentication, confidentiality, and data integrity rules. This article aims to explore the security solutions for the Internet of Things based on smart contracts, evaluating factors such as complexity, robustness, and fields of application. |
Author | Rguig, Bouchra Housni, Khalid Es-Sousy, Brahim Ouhmi, Said |
Author_xml | – sequence: 1 givenname: Bouchra surname: Rguig fullname: Rguig, Bouchra email: bouchra.rguig@uit.ac.ma organization: Ibn Tofail University,L@RI Laboratory, MISC Team, Faculty of Sciences,Kenitra,Morocco – sequence: 2 givenname: Brahim surname: Es-Sousy fullname: Es-Sousy, Brahim email: brahim.es-sousy@uit.ac.ma organization: Ibn Tofail University,L@RI Laboratory, MISC Team, Faculty of Sciences,Kenitra,Morocco – sequence: 3 givenname: Said surname: Ouhmi fullname: Ouhmi, Said email: said.ouhmi@uit.ac.ma organization: Ibn Tofail University,L@RI Laboratory, MISC Team, Faculty of Sciences,Kenitra,Morocco – sequence: 4 givenname: Khalid surname: Housni fullname: Housni, Khalid email: housni.khalid@uit.ac.ma organization: Ibn Tofail University,L@RI Laboratory, MISC Team, Faculty of Sciences,Kenitra,Morocco |
BookMark | eNo1kE1LAzEQhqMoWGv_gYd479Z8dLMZb3WxWqgWbMVjyeZDI9vNsknB_nsXrafhZd7ngZlLdNaExiJ0Q8mEUgK374uXcvWcQyHIhBHGJ5RwxoCLEzSCAiTP-wyimJ6iASsEZAAwvUCjGL8IIZwWRSFhgPaLsMFrq_edTwd8r6I1ODR4vVNdwmVoUqd0ine4rFWM3nmtku_3weFZ_RF66HMXx31x19b2u1eM8Wuo9jE1NkasGoPn3tYm_gJtWx_5K3TuVB3t6DiH6G3-sCmfsuXqcVHOlpmnFFLmtGRQ5TkXuqLOSW2BSukMcU4YJ6SsuJTCGGlM5ShhUhGlK0GImeaWy5wP0fWf11trt23n-7MO2_9P8R-79GIR |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/WINCOM59760.2023.10322936 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9798350329674 |
EISSN | 2769-9994 |
EndPage | 8 |
ExternalDocumentID | 10322936 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL AAJGR ALMA_UNASSIGNED_HOLDINGS CBEJK IPLJI RIE RIL |
ID | FETCH-LOGICAL-i119t-fc829b5536cb1ff8ce9188fd0ff6df688b3886dd8ddbf1028a0acb600d45e3853 |
IEDL.DBID | RIE |
IngestDate | Wed Jun 26 19:23:59 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i119t-fc829b5536cb1ff8ce9188fd0ff6df688b3886dd8ddbf1028a0acb600d45e3853 |
PageCount | 8 |
ParticipantIDs | ieee_primary_10322936 |
PublicationCentury | 2000 |
PublicationDate | 2023-Oct.-26 |
PublicationDateYYYYMMDD | 2023-10-26 |
PublicationDate_xml | – month: 10 year: 2023 text: 2023-Oct.-26 day: 26 |
PublicationDecade | 2020 |
PublicationTitle | 2023 10th International Conference on Wireless Networks and Mobile Communications (WINCOM) |
PublicationTitleAbbrev | WINCOM |
PublicationYear | 2023 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0003177789 |
Score | 1.8973892 |
Snippet | In recent years, as data processing and storage technologies have advanced, the need to ensure computer system security and information confidentiality on all... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Blockchain Consensus Cryptography Cyber-Attacks Data privacy Data processing Internet of Things Mobile communication Network architecture Network security Protocol Security Smart contract Smart contracts Wireless networks |
Title | IoT Security Based on Smart Contracts: Classification of Algorithms, Complexity, Robustness and Fields of Application |
URI | https://ieeexplore.ieee.org/document/10322936 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1dS8MwFA1uD-KTihO_ieDj2vUzTXxTcUxhQ9yGexvNlw5dK7Z90F9vbtZtKAi-lUAg5Jacc5N7zkXogsjEVzTVDnBZk6Aw6nDD6x0DDjJIDaMIrEisPyC9cXQ_iSe1WN1qYZRStvhMufBp3_JlLiq4KuuA-ZuBJ9JAjYSxhVhrdaFigDBJKNtE57WPZucJ8uK-YczEc6FLuLuc_6OTigWS7jYaLJewqB95dauSu-Lrlzvjv9e4g1przR5-WKHRLtpQ2R6q7vIRHtYt6vC1QSyJ8wwP5-aHwWBMBRqp4hLb1phQNGTjhHONr96eczPpZV60MZwZ4JtZfrbxY86rooTzEaeZxF0ogCvshPVLeAuNu7ejm55TN1pwZr7PSkcLGjAexyER3NeaCsV8SrX0tCZSE0p5SCmRkkrJNTCS1EsFN1RJRrEKDeDvo2aWZ-oAYRELyn2PMqJVxLRJmKI4DcNEGloqIxEdohbs2fR94aUxXW7X0R_jx2gLQgdoEZAT1Cw_KnVqaEDJz2z4vwE_OLJe |
link.rule.ids | 310,311,783,787,792,793,799,27939,55088 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1dS8MwFA06QX1SceK3EXxcu36mqW8qjk23IW5D30bzpaJrxbYP-uvNzboNBcG3UkgIScg5N7nnXITOiIhcSRNlAZfVAUpMLaZ5vaXBQXiJZhSeEYn1-qQ9Cm4ew8dKrG60MFJKk3wmbfg0b_ki4yVclTXB_E3DE1lGKyEQi6lca36loqEwimi8ik4rJ83mA0TGPc2ZiWNDnXB71sOPWioGSlobqD8bxDSD5NUuC2bzr1_-jP8e5SaqL1R7-G6OR1toSabbqOxkQzyoitThS41ZAmcpHkz0lsFgTQUqqfwcm-KYkDZkVgpnCl-8PWW60fMkb2A4NcA5s_hs4PuMlXkBJyROUoFbkAKXmwaLt_A6GrWuh1dtqyq1YL24blxYilMvZmHoE85cpSiXsUupEo5SRChCKfMpJUJQIZgCTpI4CWeaLIkglL6G_B1US7NU7iLMQ06Z69CYKBnESodMQZj4fiQ0MRUBD_ZQHeZs_D510xjPpmv_j_8naK097HXH3U7_9gCtwzICdnjkENWKj1IeaVJQsGOzFb4Bwe21qw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+10th+International+Conference+on+Wireless+Networks+and+Mobile+Communications+%28WINCOM%29&rft.atitle=IoT+Security+Based+on+Smart+Contracts%3A+Classification+of+Algorithms%2C+Complexity%2C+Robustness+and+Fields+of+Application&rft.au=Rguig%2C+Bouchra&rft.au=Es-Sousy%2C+Brahim&rft.au=Ouhmi%2C+Said&rft.au=Housni%2C+Khalid&rft.date=2023-10-26&rft.pub=IEEE&rft.eissn=2769-9994&rft.spage=1&rft.epage=8&rft_id=info:doi/10.1109%2FWINCOM59760.2023.10322936&rft.externalDocID=10322936 |