Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions

作者: Bharat Bhushan , Chinmayee Sahoo , Preeti Sinha , Aditya Khamparia

DOI: 10.1007/S11276-020-02445-6

关键词:

摘要: … fusion rules that achieved enhanced spectral efficiency and extended battery lifetime. Zhu et al. [60] … Maintaining a stable network for various IoT applications is difficult within such an …

参考文章(239)
Aaron Wright, Primavera De Filippi, Decentralized Blockchain Technology and the Rise of Lex Cryptographia Social Science Research Network. ,(2015) , 10.2139/SSRN.2580664
Jordi Herrera-Joancomartí, Research and Challenges on Bitcoin Anonymity DPM/SETOP/QASA. pp. 3- 16 ,(2014) , 10.1007/978-3-319-17016-9_1
Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai, Li Tseng, A novel ID-Based authentication and key exchange protocol resistant to ephemeral-secret-leakage attacks for mobile devices International Journal of Distributed Sensor Networks. ,vol. 2015, pp. 898716- ,(2015) , 10.1155/2015/898716
Duane Wilson, Giuseppe Ateniese, From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain Network and System Security. pp. 368- 375 ,(2015) , 10.1007/978-3-319-25645-0_25
M. I. Jordan, T. M. Mitchell, Machine learning: Trends, perspectives, and prospects. Science. ,vol. 349, pp. 255- 260 ,(2015) , 10.1126/SCIENCE.AAA8415
Chun-Wei Tsai, Chin-Feng Lai, Han-Chieh Chao, Athanasios V. Vasilakos, Big data analytics: a survey Journal of Big Data. ,vol. 2, pp. 21- ,(2015) , 10.1186/S40537-015-0030-3
Jorge Granjal, Edmundo Monteiro, Jorge Sa Silva, Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues IEEE Communications Surveys and Tutorials. ,vol. 17, pp. 1294- 1312 ,(2015) , 10.1109/COMST.2015.2388550
Susan Landau, Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations ieee symposium on security and privacy. ,vol. 12, pp. 62- 64 ,(2014) , 10.1109/MSP.2013.161