Raad Haddad, D. E. D. I. Abou-Tair, Alá F. Khalifeh
{"title":"A Blockchain-Based Verification Process for Smart Cities","authors":"Raad Haddad, D. E. D. I. Abou-Tair, Alá F. Khalifeh","doi":"10.1109/SERA57763.2023.10197780","DOIUrl":null,"url":null,"abstract":"Blockchain technology is widely used in many security-related Internet of Things (IoT) paradigms due to its dynamic and distributed architecture, which assures secure and private network access. Smart cities are one of these IoT applications in which security and privacy play a vital role. This paper proposes a blockchain-based verification process for smart nodes communication within the smart city, demonstrating the implementation details of the proposed security verification process and discussing potential security attacks.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SERA57763.2023.10197780","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Blockchain technology is widely used in many security-related Internet of Things (IoT) paradigms due to its dynamic and distributed architecture, which assures secure and private network access. Smart cities are one of these IoT applications in which security and privacy play a vital role. This paper proposes a blockchain-based verification process for smart nodes communication within the smart city, demonstrating the implementation details of the proposed security verification process and discussing potential security attacks.