0% Complete
فارسی
Home
/
سیزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Securing the Internet of Things via Blockchain-Aided Smart Contracts
Authors :
S. Mohammadali Zanjani
1
Hossein Shahinzadeh
2
Jalal Moradi
3
Zohreh Rezaei
4
Bahareh Kaviani-Baghbaderani
5
Sudeep Tanwar
6
1- دانشگاه آزاد اسلامی واحد نجف آباد
2- دانشگاه صنعتی امیرکبیر (پلیتکنیک تهران)
3- دانشگاه صنعتی امیرکبیر (پلیتکنیک تهران)
4- دانشکده فنی دانشگاه تهران
5- دانشکده فنی دانشگاه تهران
6- Institute of Technology, Nirma University
Keywords :
Blockchain،Smart contracts،Internet of Things (IoT)،Cybersecurity،Message Queuing Telemetry Transport (MQTT) Protocol،Ethereum
Abstract :
The Internet of Things (IoT) paradigm is a relatively novel concept that is rapidly and steadily growing in modern wireless communication models. In IoT, many of the objects in the surrounding environment of us are networked in one or more forms. Sensor network technologies are increasing to meet this new challenge where invisible information and communication systems are embedded in our surroundings. This produces a large amount of information that must be acquired, transferred, stored, sorted, processed, and presented in an integrated, efficient, sensible, and easily interpretable format. Therefore, this interaction and cooperation between humans and smart devices create new challenges for exchanging information security. On the other hand, the lack of appropriate and strong security services, arrangements, and measures can have a negative or even detrimental effect on the objective acceptance of the IoT paradigm. This paper delves into the impacts of the message queuing telemetry transport (MQTT) protocol, which is a widely-applied protocol in the implemented IoT schemes. This protocol does not guarantee secure and reliable native authentication mechanisms requested by developers. Thus, this paper proposes an authentication scheme via blockchain-based smart contracts for MQTT. This proposal enables the authentication of devices in the IoT network by preserving client security and privacy to ensure trust and accountability through Ethereum-based smart contracts. This review article intends to express the security challenges of this issue as well as its proposed solution in the form of a general description of the work.
Papers List
List of archived papers
A Novel Resource Allocation Scheme for Underlaying NOMA-Based Multi-Channel Cognitive D2D Communications
Anahita Akbari - Dr Javad Zeraatkar Moghaddam - Dr Mehrdad Ardebilipour
A novel approach audio watermarking based on (GBT,DCT,SVD)
Mahdi Mosleh
ارائه یک سیستم توصیهگر آگاه به زمینه مبتنی بر رفتار کاربر در شبکه اجتماعی با استفاده از پیامهای برچسب شده جغرافیایی
زهرا امینی - سید علیرضا هاشمی گلپایگانی - علی میرزائی
Statistical distance-base acceptance strategy for desirable offers in bilateral automated negotiation
Arash Ebrahimnezhad - Dr Hamid Jazayeriy - Dr Faria Nassiri-mofakham
A High-Speed Quantum Reversible Controlled Adder/Subtractor Circuit
Negin Mashayekhi - Mohammad Reza Reshadinezhad - Shekoofeh Moghimi
Advanced SMS Spam Detection using Deep Complex Models and Sine-Cosine Algorithm
Sepehr Rezaei - Mohammadreza Shams - Mohsen Alambardar Meybodi
روشی برای تشخیص مرحله پیشرفت آلزایمر در تصاویرFMRI مبتنی بر شبکه های عصبی چگال
فرساد زمانی بروجنی - عباس بهره دار
A Fuzzy Cluster-Based Routing Algorithm to Extend Wireless Sensor Network Lifetime
Mostafa Mirzaie - Armin Mazinani - Dr Sayyed Majid Mazinani
Enhancing Mutation Testing through Grammar Fuzzing and Parse Tree-Driven Mutation Generation
Mohamad Khorsandi - Alireza Dastmalchi Saei - Mohammadreza Sharbaf
Revert Propagation: Who are responsible for a contagion initialization in a Diffusion Network?
Arman Sepehr - Mohammadzaman Zamani - Hamid Beigy - Shabnam Behzad
Samin Hamayesh - Version 40.3.1