Jeidy Panduro-Ramirez, M. Lourens, A. Gehlot, D. P. Singh, Yashpal Singh, Deepak J. Salunke
{"title":"Blockchain Approach for Implementing Access Control In IOT","authors":"Jeidy Panduro-Ramirez, M. Lourens, A. Gehlot, D. P. Singh, Yashpal Singh, Deepak J. Salunke","doi":"10.1109/AISC56616.2023.10085452","DOIUrl":null,"url":null,"abstract":"Block chain is now attracting a lot of interest from scientists and experts for a variety of reasons, including wireless communication decentralization, remote access, digital security, and confidentiality. Although peer-to-peer networking, confidentiality, improved storage, and extra security are all advantages of crypto currencies, its irreversible nature is the primary factor in its top ranking. Block chain may be utilized as a crucial technique to do away with the need for a trustworthy third person in networks that are linked to one another because of how it is dispersed. The most well-known block chains that may be used for installation are Public block chain Fiber, IBM Bit coin, Eth, Eris, R3 Corda, and multichain. The abovementioned review study presents and evaluates the current proof - of - stake security methods for distribution chain, medicine, and IoT access controls. The thorough analysis of applications of block chain will function as the most recent state-of-the-art for academics to conduct cutting-edge research in the pursuit of block chain - based across diverse disciplines.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AISC56616.2023.10085452","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Block chain is now attracting a lot of interest from scientists and experts for a variety of reasons, including wireless communication decentralization, remote access, digital security, and confidentiality. Although peer-to-peer networking, confidentiality, improved storage, and extra security are all advantages of crypto currencies, its irreversible nature is the primary factor in its top ranking. Block chain may be utilized as a crucial technique to do away with the need for a trustworthy third person in networks that are linked to one another because of how it is dispersed. The most well-known block chains that may be used for installation are Public block chain Fiber, IBM Bit coin, Eth, Eris, R3 Corda, and multichain. The abovementioned review study presents and evaluates the current proof - of - stake security methods for distribution chain, medicine, and IoT access controls. The thorough analysis of applications of block chain will function as the most recent state-of-the-art for academics to conduct cutting-edge research in the pursuit of block chain - based across diverse disciplines.
由于各种原因,包括无线通信去中心化、远程访问、数字安全和保密性,区块链现在吸引了科学家和专家的大量兴趣。虽然点对点网络、保密性、改进的存储和额外的安全性都是加密货币的优势,但其不可逆转性是其排名第一的主要因素。区块链可以用作一种关键技术,以消除网络中对可信第三方的需求,这些网络由于其分散方式而相互关联。可能用于安装的最知名的区块链是Public区块链Fiber、IBM Bit coin、Eth、Eris、R3 Corda和multichain。上述综述研究提出并评估了目前用于分销链、医药和物联网访问控制的权益证明安全方法。对区块链应用的深入分析将成为学术界在跨学科追求区块链的基础上进行前沿研究的最新技术。