Busca avançada
Ano de início
Entree


A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack

Texto completo
Autor(es):
Jesus, Emanuel Ferreira ; Chicarino, Vanessa R. L. ; de Albuquerque, Celio V. N. ; Rocha, Antonio A. de A.
Número total de Autores: 4
Tipo de documento: Artigo Científico
Fonte: SECURITY AND COMMUNICATION NETWORKS; v. N/A, p. 27-pg., 2018-01-01.
Resumo

The Internet of Things (IoT) is increasingly a reality today. Nevertheless, some key challenges still need to be given particular attention so that IoT solutions further support the growing demand for connected devices and the services offered. Due to the potential relevance and sensitivity of services, IoT solutions should address the security and privacy concerns surrounding these devices and the data they collect, generate, and process. Recently, the Blockchain technology has gained much attention in IoT solutions. Its primary usage scenarios are in the financial domain, where Blockchain creates a promising applications world and can be leveraged to solve security and privacy issues. However, this emerging technology has a great potential in the most diverse technological areas and can significantly help achieve the Internet of Things view in different aspects, increasing the capacity of decentralization, facilitating interactions, enabling new transactionmodels, and allowing autonomous coordination of the devices. The paper goal is to provide the concepts about the structure and operation of Blockchain and, mainly, analyze how the use of this technology can be used to provide security and privacy in IoT. Finally, we present the stalker, which is a selfish miner variant that has the objective of preventing a node to publish its blocks on the main chain. (AU)

Processo FAPESP: 15/24358-7 - Ícarus - Internet das Coisas: autenticação, redes ubíquas e sensoriamento
Beneficiário:Célio Vinicius Neves de Albuquerque
Modalidade de apoio: Auxílio à Pesquisa - Regular