Security and Privacy in Blockchains and the IoT
Data have become an immensely valuable resource. They are the key driver that puts the smart into smart services. This is fundamentally fueled by two technological achievements, namely the Internet of Things (IoT), which enables the continuous and comprehensive collection of all kinds of data, and b...
Saved in:
Other Authors: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Basel
MDPI - Multidisciplinary Digital Publishing Institute
2023
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_96740 | ||
005 | 20230202 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20230202s2023 xx |||||o ||| 0|eng d | ||
020 | |a books978-3-0365-6252-0 | ||
020 | |a 9783036562513 | ||
020 | |a 9783036562520 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.3390/books978-3-0365-6252-0 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a TB |2 bicssc | |
072 | 7 | |a TBX |2 bicssc | |
100 | 1 | |a Stach, Christoph |4 edt | |
700 | 1 | |a Stach, Christoph |4 oth | |
245 | 1 | 0 | |a Security and Privacy in Blockchains and the IoT |
260 | |a Basel |b MDPI - Multidisciplinary Digital Publishing Institute |c 2023 | ||
300 | |a 1 electronic resource (166 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Data have become an immensely valuable resource. They are the key driver that puts the smart into smart services. This is fundamentally fueled by two technological achievements, namely the Internet of Things (IoT), which enables the continuous and comprehensive collection of all kinds of data, and blockchain technologies, which provide secure data management and exchange. In addition to those information security measures, data privacy solutions are also required to protect the sensitive data involved. In this book, eight research papers address security and privacy challenges when dealing with blockchain technologies and the IoT. Solutions are presented to the issue of how IoT group communication can be secured and how trust within IoT applications can be increased. In the context of blockchain technologies, approaches to enhance query-processing capabilities and efficiently apply a proof-of-work consensus protocol in IoT environments are introduced. Furthermore, how blockchain technologies can be used in IoT environments to control access to confidential IoT data as well as enable privacy-aware data sharing is discussed. Finally, two reviews offer an overview of the state-of-the-art in in-app activity recognition based on convolutional neural networks and the prospects for blockchain technology applications in ambient assisted living. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/4.0/ |2 cc |4 https://creativecommons.org/licenses/by/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Technology: general issues |2 bicssc | |
650 | 7 | |a History of engineering & technology |2 bicssc | |
653 | |a crowd management | ||
653 | |a software-defined networking | ||
653 | |a linked-data signatures | ||
653 | |a Web of Things | ||
653 | |a zero-knowledge proofs | ||
653 | |a digital twin | ||
653 | |a blockchain | ||
653 | |a Proof-of-Work | ||
653 | |a microservices | ||
653 | |a Singular Spectrum Analysis (SSA) | ||
653 | |a byzantine fault tolerance | ||
653 | |a IoT | ||
653 | |a security | ||
653 | |a privacy | ||
653 | |a environment | ||
653 | |a IOTA | ||
653 | |a Tangle | ||
653 | |a MAM | ||
653 | |a directed acyclic graph | ||
653 | |a distributed ledger | ||
653 | |a blockchain systems | ||
653 | |a query processing | ||
653 | |a data models | ||
653 | |a data structures | ||
653 | |a block structures | ||
653 | |a encrypted traffic classification | ||
653 | |a network analysis | ||
653 | |a mobile data | ||
653 | |a network traffic to image | ||
653 | |a Internet of Things | ||
653 | |a ECIES | ||
653 | |a secure hash function | ||
653 | |a reliability | ||
653 | |a trust model | ||
653 | |a social internet of things | ||
653 | |a service delegation | ||
653 | |a ambient assisted living | ||
653 | |a security and privacy | ||
653 | |a IoT blockchain integration | ||
653 | |a decentralization | ||
653 | |a n/a | ||
856 | 4 | 0 | |a www.oapen.org |u https://mdpi.com/books/pdfview/book/6686 |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/96740 |7 0 |z DOAB: description of the publication |