A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack

Detalhes bibliográficos
Autor(a) principal: Jesus, Emanuel Ferreira
Data de Publicação: 2018
Outros Autores: Chicarino, Vanessa R. L., Albuquerque, Célio V. N. de, Rocha, Antônio A. de A.
Tipo de documento: Artigo
Idioma: eng
Título da fonte: Repositório Institucional da Produção Científica da Marinha do Brasil (RI-MB)
Texto Completo: https://doi.org/10.1155/2018/9675050
https://www.hindawi.com/journals/scn/2018/9675050/cta/
http://www.repositorio.mar.mil.br/handle/ripcmb/844281
Resumo: The Internet of Things (IoT) is increasingly a reality today. Nevertheless, some key challenges still need to be given particular attention so that IoT solutions further support the growing demand for connected devices and the services offered. Due to the potential relevance and sensitivity of services, IoT solutions should address the security and privacy concerns surrounding these devices and the data they collect, generate, and process. Recently, the Blockchain technology has gained much attention in IoT solutions. Its primary usage scenarios are in the financial domain, where Blockchain creates a promising applications world and can be leveraged to solve security and privacy issues. However, this emerging technology has a great potential in the most diverse technological areas and can significantly help achieve the Internet of Things view in different aspects, increasing the capacity of decentralization, facilitating interactions, enabling new transaction models, and allowing autonomous coordination of the devices. The paper goal is to provide the concepts about the structure and operation of Blockchain and, mainly, analyze how the use of this technology can be used to provide security and privacy in IoT. Finally, we present the stalker, which is a selfish miner variant that has the objective of preventing a node to publish its blocks on the main chain.
id MB_329b759989da7401562668fc77cb9b13
oai_identifier_str oai:www.repositorio.mar.mil.br:ripcmb/844281
network_acronym_str MB
network_name_str Repositório Institucional da Produção Científica da Marinha do Brasil (RI-MB)
repository_id_str
spelling Jesus, Emanuel FerreiraChicarino, Vanessa R. L.Albuquerque, Célio V. N. deRocha, Antônio A. de A.2019-11-29T17:10:29Z2019-11-29T17:10:29Z2018Emanuel Ferreira Jesus, Vanessa R. L. Chicarino, Célio V. N. de Albuquerque, and Antônio A. de A. Rocha, “A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack,” Security and Communication Networks, vol. 2018, Article ID 9675050, 27 pages, 2018. https://doi.org/10.1155/2018/9675050.https://doi.org/10.1155/2018/9675050https://www.hindawi.com/journals/scn/2018/9675050/cta/http://www.repositorio.mar.mil.br/handle/ripcmb/844281The Internet of Things (IoT) is increasingly a reality today. Nevertheless, some key challenges still need to be given particular attention so that IoT solutions further support the growing demand for connected devices and the services offered. Due to the potential relevance and sensitivity of services, IoT solutions should address the security and privacy concerns surrounding these devices and the data they collect, generate, and process. Recently, the Blockchain technology has gained much attention in IoT solutions. Its primary usage scenarios are in the financial domain, where Blockchain creates a promising applications world and can be leveraged to solve security and privacy issues. However, this emerging technology has a great potential in the most diverse technological areas and can significantly help achieve the Internet of Things view in different aspects, increasing the capacity of decentralization, facilitating interactions, enabling new transaction models, and allowing autonomous coordination of the devices. The paper goal is to provide the concepts about the structure and operation of Blockchain and, mainly, analyze how the use of this technology can be used to provide security and privacy in IoT. Finally, we present the stalker, which is a selfish miner variant that has the objective of preventing a node to publish its blocks on the main chain.engengSecurity and Communication NetworksSegurançaRede ponto a pontoInternet das CoisasA Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attackinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articleInglaterrainfo:eu-repo/semantics/openAccessreponame:Repositório Institucional da Produção Científica da Marinha do Brasil (RI-MB)instname:Marinha do Brasil (MB)instacron:MBTEXTArtigo_Vanessa.pdf.txtArtigo_Vanessa.pdf.txtExtracted texttext/plain144115https://www.repositorio.mar.mil.br/bitstream/ripcmb/844281/6/Artigo_Vanessa.pdf.txtaf3c58d29bafd109dea1042441919cd0MD56THUMBNAILArtigo_Vanessa.pdf.jpgArtigo_Vanessa.pdf.jpgGenerated Thumbnailimage/jpeg1591https://www.repositorio.mar.mil.br/bitstream/ripcmb/844281/7/Artigo_Vanessa.pdf.jpg595e377552d2775f0bcb4dd0e3fd566fMD57ORIGINALArtigo_Vanessa.pdfArtigo_Vanessa.pdfapplication/pdf2106767https://www.repositorio.mar.mil.br/bitstream/ripcmb/844281/1/Artigo_Vanessa.pdf8f417a1c7e87603332d16ca84b22a6c7MD51CC-LICENSElicense_urllicense_urltext/plain; charset=utf-849https://www.repositorio.mar.mil.br/bitstream/ripcmb/844281/2/license_url4afdbb8c545fd630ea7db775da747b2fMD52license_textlicense_texttext/html; charset=utf-80https://www.repositorio.mar.mil.br/bitstream/ripcmb/844281/3/license_textd41d8cd98f00b204e9800998ecf8427eMD53license_rdflicense_rdfapplication/rdf+xml; charset=utf-80https://www.repositorio.mar.mil.br/bitstream/ripcmb/844281/4/license_rdfd41d8cd98f00b204e9800998ecf8427eMD54LICENSElicense.txtlicense.txttext/plain; charset=utf-83046https://www.repositorio.mar.mil.br/bitstream/ripcmb/844281/5/license.txt3391012dab7743d44d51d311d20477e3MD55ripcmb/8442812022-09-23 18:00:33.274oai:www.repositorio.mar.mil.br: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Repositório InstitucionalPUBhttps://www.repositorio.mar.mil.br/oai/requestdphdm.repositorio@marinha.mil.bropendoar:2022-09-23T21:00:33Repositório Institucional da Produção Científica da Marinha do Brasil (RI-MB) - Marinha do Brasil (MB)false
dc.title.en_US.fl_str_mv A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
title A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
spellingShingle A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
Jesus, Emanuel Ferreira
Segurança
Rede ponto a ponto
Internet das Coisas
title_short A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
title_full A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
title_fullStr A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
title_full_unstemmed A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
title_sort A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
author Jesus, Emanuel Ferreira
author_facet Jesus, Emanuel Ferreira
Chicarino, Vanessa R. L.
Albuquerque, Célio V. N. de
Rocha, Antônio A. de A.
author_role author
author2 Chicarino, Vanessa R. L.
Albuquerque, Célio V. N. de
Rocha, Antônio A. de A.
author2_role author
author
author
dc.contributor.author.fl_str_mv Jesus, Emanuel Ferreira
Chicarino, Vanessa R. L.
Albuquerque, Célio V. N. de
Rocha, Antônio A. de A.
dc.subject.por.fl_str_mv Segurança
Rede ponto a ponto
Internet das Coisas
topic Segurança
Rede ponto a ponto
Internet das Coisas
description The Internet of Things (IoT) is increasingly a reality today. Nevertheless, some key challenges still need to be given particular attention so that IoT solutions further support the growing demand for connected devices and the services offered. Due to the potential relevance and sensitivity of services, IoT solutions should address the security and privacy concerns surrounding these devices and the data they collect, generate, and process. Recently, the Blockchain technology has gained much attention in IoT solutions. Its primary usage scenarios are in the financial domain, where Blockchain creates a promising applications world and can be leveraged to solve security and privacy issues. However, this emerging technology has a great potential in the most diverse technological areas and can significantly help achieve the Internet of Things view in different aspects, increasing the capacity of decentralization, facilitating interactions, enabling new transaction models, and allowing autonomous coordination of the devices. The paper goal is to provide the concepts about the structure and operation of Blockchain and, mainly, analyze how the use of this technology can be used to provide security and privacy in IoT. Finally, we present the stalker, which is a selfish miner variant that has the objective of preventing a node to publish its blocks on the main chain.
publishDate 2018
dc.date.issued.fl_str_mv 2018
dc.date.accessioned.fl_str_mv 2019-11-29T17:10:29Z
dc.date.available.fl_str_mv 2019-11-29T17:10:29Z
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/article
format article
status_str publishedVersion
dc.identifier.citation.fl_str_mv Emanuel Ferreira Jesus, Vanessa R. L. Chicarino, Célio V. N. de Albuquerque, and Antônio A. de A. Rocha, “A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack,” Security and Communication Networks, vol. 2018, Article ID 9675050, 27 pages, 2018. https://doi.org/10.1155/2018/9675050.
dc.identifier.uri.fl_str_mv https://www.hindawi.com/journals/scn/2018/9675050/cta/
http://www.repositorio.mar.mil.br/handle/ripcmb/844281
dc.identifier.other.none.fl_str_mv https://doi.org/10.1155/2018/9675050
identifier_str_mv Emanuel Ferreira Jesus, Vanessa R. L. Chicarino, Célio V. N. de Albuquerque, and Antônio A. de A. Rocha, “A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack,” Security and Communication Networks, vol. 2018, Article ID 9675050, 27 pages, 2018. https://doi.org/10.1155/2018/9675050.
url https://doi.org/10.1155/2018/9675050
https://www.hindawi.com/journals/scn/2018/9675050/cta/
http://www.repositorio.mar.mil.br/handle/ripcmb/844281
dc.language.iso.fl_str_mv eng
eng
language eng
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.publisher.none.fl_str_mv Security and Communication Networks
publisher.none.fl_str_mv Security and Communication Networks
dc.source.none.fl_str_mv reponame:Repositório Institucional da Produção Científica da Marinha do Brasil (RI-MB)
instname:Marinha do Brasil (MB)
instacron:MB
instname_str Marinha do Brasil (MB)
instacron_str MB
institution MB
reponame_str Repositório Institucional da Produção Científica da Marinha do Brasil (RI-MB)
collection Repositório Institucional da Produção Científica da Marinha do Brasil (RI-MB)
bitstream.url.fl_str_mv https://www.repositorio.mar.mil.br/bitstream/ripcmb/844281/6/Artigo_Vanessa.pdf.txt
https://www.repositorio.mar.mil.br/bitstream/ripcmb/844281/7/Artigo_Vanessa.pdf.jpg
https://www.repositorio.mar.mil.br/bitstream/ripcmb/844281/1/Artigo_Vanessa.pdf
https://www.repositorio.mar.mil.br/bitstream/ripcmb/844281/2/license_url
https://www.repositorio.mar.mil.br/bitstream/ripcmb/844281/3/license_text
https://www.repositorio.mar.mil.br/bitstream/ripcmb/844281/4/license_rdf
https://www.repositorio.mar.mil.br/bitstream/ripcmb/844281/5/license.txt
bitstream.checksum.fl_str_mv af3c58d29bafd109dea1042441919cd0
595e377552d2775f0bcb4dd0e3fd566f
8f417a1c7e87603332d16ca84b22a6c7
4afdbb8c545fd630ea7db775da747b2f
d41d8cd98f00b204e9800998ecf8427e
d41d8cd98f00b204e9800998ecf8427e
3391012dab7743d44d51d311d20477e3
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositório Institucional da Produção Científica da Marinha do Brasil (RI-MB) - Marinha do Brasil (MB)
repository.mail.fl_str_mv dphdm.repositorio@marinha.mil.br
_version_ 1813189029840027648