• 제목/요약/키워드: Blockchain-based Internet of Things

검색결과 79건 처리시간 0.025초

키워드 빈도와 중심성 분석을 활용한 블록체인 기반 사물인터넷 연구 동향 : 미국·영국·한국을 중심으로 (Research Trend on Blockchain-based IoT Using Keyword Frequency and Centrality Analysis : Focusing on the United States, United Kingdom, Korea)

  • 이택균
    • 디지털산업정보학회논문지
    • /
    • 제20권1호
    • /
    • pp.1-15
    • /
    • 2024
  • This study aims to analyze research trends in blockchain-based Internet of Things focusing on the US, UK, and Korea. In Elsevier's Scopus, we collected 2,174 papers about blockchain-based Internet of Things published in from 2018 to 2023. Keyword frequency and centrality analysis were conducted on the abstracts of the collected papers. Through the obtained keyword frequencies, we tried to identify keywords with high frequency of occurrence and through centrality analysis, we tried to identify central research keywords for each country. As a result of the centrality analysis, research on blockchain, smart contracts, Internet of Things, security and personal information protection was conducted as the most central research in each country. The implication for Korea is that cybersecurity, authentication research appears to have been conducted with a lower centrality compared to the United States and the United Kingdom. Thus, it seems that intensive research related to cybersecurity and authentication is needed.

사물인터넷을 위한 블록체인 네트워킹에 대한 연구 (A Study on Blockchain Networking for Internet of Things)

  • 이일구
    • 디지털융복합연구
    • /
    • 제16권8호
    • /
    • pp.201-210
    • /
    • 2018
  • 신뢰하기 어려운 인터넷 환경에서 신뢰를 확보하기 위해 블록체인 기술을 사물인터넷 (IoT Internet of Things)에 적용한 '블록체인 기반 IoT'에 대한 기대감이 높다. 그러나 현재의 블록체인 기반의 IoT 기술은 확장성과 보안성 측면에서 실생활에 응용하기에 한계가 있는 것으로 보인다. 본 논문에서는 최근 각광받는 사물인터넷 디지털 비즈니스를 실현시키기 위한 블록체인 네트워킹 기술의 확장성과 보안성 난제를 고찰하고 정책과 샤딩, 오프체인, 비식별화, P2P 암호화폐 교환 등의 기술적 해결 방안 도입을 제안한다. 후속 연구에서는 본 연구 결과를 바탕으로 보안성과 확장성을 보장하는 사물인터넷 블록체인 플랫폼을 구현하고 기존의 블록체인 플랫폼과 비교할 계획이다.

A double-blockchain architecture for secure storage and transaction on the Internet of Things networks

  • Aldriwish, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.119-126
    • /
    • 2021
  • The Internet of Things (IoT) applications are quickly spread in many fields. Blockchain methods (BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography (ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing (CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

Blockchain based Application to Electric Vehicle in IoT environment

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • 제10권2호
    • /
    • pp.233-239
    • /
    • 2022
  • Recently, research is being conducted on the rapid service provision and reliability of the instance-based rather than the existing IP-based structure. Research is mainly conducted through Block cloud, a platform that combines service-centric networking (SCN) and blockchain. In addition, the Internet of Things network has been proposed as a fog computing environment in the structure of the existing cloud computing. Fog computing is an environment suitable for real-time information processing. In this paper, we propose a new Internet network structure based on fog computing that requires real-time for rapid processing of IoT services. The proposed system applies IoTA, the third-generation blockchain based on DAG, to the block cloud. In addition, we want to propose a basic model of the object block chain and check the application services of electric vehicles.

Use of Blockchain to Support the Security of Internet of Things: A Review

  • Saher Un Nisa;Maryam Khalid
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.149-154
    • /
    • 2023
  • Internet of Things (IoT) is now spreading everywhere. It's the technology of every person's need so we can't step back from IoT but we can secure it as it is spreading quickly so it has greater chances of danger and being misused. There is an urgent need to make IoT devices secure from getting cracked or hacked. A lot of methods had tried and still trying to mitigate IoT security issues. In this paper Blockchain is going to be the solution of most of the IoT issues or problems. We have discussed or highlighted security issues with centralized IoT and then provided solution of such security challenges through the use of blockchain because is based on a decentralized technology that is hard to modify or update.

사물인터넷 기반 블록체인 교육모델에 관한 연구 (A Study on the IoT-based Blockchain Education Model)

  • 이근호
    • 사물인터넷융복합논문지
    • /
    • 제7권4호
    • /
    • pp.77-83
    • /
    • 2021
  • 4차 산업혁명에 대한 다양한 신기술에 대한 연구가 활발히 진행이 되고 있다. 4차 산업혁명의 신기술 분야중에 정보보안 분야에서는 블록체인에 대한 관심이 상당히 높다. 이러한 블록체인에 대한 연구는 대학원 중심으로 많은 연구가 활발히 진행이 되고 있으며, 대학에서 학부생 중심으로 전용 블록체인 교육과정을 운영하는 것은 여러 가지 상황이 쉽지 않은 상황이다. 이러한 상황에서 블록체인 관련 산업의 활성화를 위하여 다양한 신규 블록체인 생태계가 생겨나고 그만큼 많은 관심과 노력으로 많은 발전을 이루고 있는 상황이다. 본 연구에서는 이러한 4차 산업혁명에서 중요한 블록체인에 대한 대학의 교육과정 모델을 제안하고자 한다. 블록체인 교육모델에 대한 것은 인력양성 과정을 통하여 산업체 중심의 교육과정을 운영했던 내용을 중심으로 관련 블록체인 교육 모델을 제안하여 다양한 블록체인의 교육이 활성화되어 블록체인 산업 발전을 이루고자 한다.

IoT 네트워크에서 스토리지와 트랜잭션 보호를 위한 이중 블록체인 구조 (A Double-blockchain Architecture for Secure Storage and Transaction on the Internet of Things Networks)

  • 박종순;박찬길
    • 디지털산업정보학회논문지
    • /
    • 제17권4호
    • /
    • pp.43-52
    • /
    • 2021
  • IoT applications are quickly spread in many fields. Blockchain methods(BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography(ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing(CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

에지 컴퓨팅 기반의 사물인터넷에 대한 블록체인 적용 방안 연구 (A study on the application of blockchain to the edge computing-based Internet of Things)

  • 최정열
    • 디지털융복합연구
    • /
    • 제17권12호
    • /
    • pp.219-228
    • /
    • 2019
  • 정보기술의 발달과 스마트한 서비스의 활성화로 인해서 다양한 스마트기기가 네트워크에 연결되는 사물인터넷 기술이 지속적으로 발전해오고 있다. 기존의 사물인터넷 구조에서는 클라우드 컴퓨팅 기술을 기반으로 중앙 집중형으로 데이터를 처리해왔으나, 단일 장애 지점, 종단간 전송 지연, 보안에 대한 우려가 있다. 이러한 문제를 해결하기 위해서 탈중앙화된 블록체인 기술을 사물인터넷에 적용할 필요가 있다. 하지만 많은 사물인터넷 기기들은 컴퓨팅 성능이 부족하여 블록 채굴과 같은 막대한 자원이 소요되는 일을 처리하기에 어려움이 있다. 이를 극복하기 위해서 본 논문은 컴퓨팅 자원이 부족한 사물인터넷 기기에서도 블록체인 기술을 적용할 수 있는 에지 컴퓨팅 기술 기반의 사물인터넷 구조를 제안한다. 본 논문은 또한 에지 컴퓨팅 기반의 사물인터넷에서의 블록체인의 동작 절차를 제시한다.

A Heterogeneous IoT Node Authentication Scheme Based on Hybrid Blockchain and Trust Value

  • Zhang, Shiqiang;Cao, Yang;Ning, Zhenhu;Xue, Fei;Cao, Dongzhi;Yang, Yongli
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권9호
    • /
    • pp.3615-3638
    • /
    • 2020
  • Node identity authentication is an essential means to ensure the security of the Internet of Things. Existing blockchain-based IoT node authentication schemes have many problems. A heterogeneous IoT node authentication scheme based on an improved hybrid blockchain is proposed. Firstly, the hybrid blockchain model is designed to make the blockchain and IoT environment more compatible. Then the proxy node selection mechanism is intended to establish a bridge between the ordinary IoT node and the blockchain, building by calculating the trust value between nodes. Finally, based on the improved hybrid blockchain, the node authentication scheme of the model and proxy node selection mechanism establishes a secure connection for communication between nodes. Safety and performance analysis shows proper safety and performance.

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

  • Chao Ma;Xiaojun Jin;Song Luo;Yifei Wei;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권7호
    • /
    • pp.1935-1950
    • /
    • 2023
  • The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.