دانلود رایگان مقاله انگلیسی بلاک چین ها به عنوان فعال ساز امنیت در برنامه های اینترنت اشیا - امرالد 2017

عنوان فارسی
بلاک چین ها به عنوان فعال ساز امنیت در برنامه های اینترنت اشیا
عنوان انگلیسی
Blockchains as security-enabler for industrial IoT-applications
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
12
سال انتشار
2017
نشریه
امرالد - Emerald
فرمت مقاله انگلیسی
PDF
کد محصول
E7747
رشته های مرتبط با این مقاله
مهندسی کامپیوتر، فناوری اطلاعات
گرایش های مرتبط با این مقاله
امنیت اطلاعات، رایانش امن، اینترنت و شبکه های گسترده، شبکه های کامپیوتری
مجله
مجله آسیا پیسیفیک نوآوری و کارآفرینی - Asia Pacific Journal of Innovation and Entrepreneurship
دانشگاه
Hamburg University of Applied Sciences - Hamburg - Germany
کلمات کلیدی
بلاک چین، تولید هوشمند، شبکه های سنسور، Oracles، قراردادهای هوشمند، اینترنت اشیا (صنعتی)
چکیده

Abstract


Purpose – This paper aims to describe a method for Internet-of-Things-devices to achieve industrial grade reliability for information transfer from wireless sensor systems to production systems using blockchain technologies. Design/methodology/approach – An increased security and reliability of submitted data within the sensor network could be achieved on an application level. Therefore, a lightweight, high-level communication protocol based on blockchain principles was designed. Findings – Blockchain mechanisms can secure the wireless communication of Internet-of-Things-devices in a lightweight and scalable manner. Originality/value – The innovation of this research is the successful application of general blockchain mechanisms to increase security of a wireless sensor system without binding to a dedicated blockchain technology.

بخشی از متن مقاله

5. Summary and outlook


In this article, a principle for increased information security for IIoT-systems organized in wireless sensor networks was presented. Mechanisms from blockchains and distributed ledger technologies were derived and adopted to microcontrollers, with a small energy budget and low calculation capabilities. It was shown that principles such as chained blocks, distributed ledger, time-stamping and consensus could be transferred. This leads to a higher effort for intruders to gain access to the communication process and to inject false information. In the next steps of research, this concept will be implemented into different domains of application such as long- and short-distance communication, self-sufficient nodes with extensive sleep cycles and transferred to various cloud-based blockchains for permanent information-keeping


بدون دیدگاه