{"title":"将区块链与物联网相结合,减轻企业环境中的网络威胁","authors":"Ali Dharani, S. M. Khaliq-ur-Rehman Raazi","doi":"10.1109/MAJICC56935.2022.9994206","DOIUrl":null,"url":null,"abstract":"The rising number of smart devices in the corporate environment poses a security threat that requires attention; organizations need to address them prior as these devices can work as a gateway for a major breach in their environment. This paper focuses on IoT-based solution towards the bring-your-own-device (BYOD) model in a corporate environment where a user brings their own devices and connects to a private network that brings enormous threats to it. A relatively efficient and security-enhanced model is proposed that addresses the resource constraint while also contributing in the direction of security achievement. It is intended to provide ease to users while not compromising on service delay or introducing resource challenges. Moreover, the comparative result concludes that the proposed model works well in our private testing environment, whereas, no additional resource utilization is involved to achieve maximized security in blockchain-IoT.","PeriodicalId":205027,"journal":{"name":"2022 Mohammad Ali Jinnah University International Conference on Computing (MAJICC)","volume":"288 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Integrating Blockchain with IoT for Mitigating Cyber Threat In Corporate Environment\",\"authors\":\"Ali Dharani, S. M. Khaliq-ur-Rehman Raazi\",\"doi\":\"10.1109/MAJICC56935.2022.9994206\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rising number of smart devices in the corporate environment poses a security threat that requires attention; organizations need to address them prior as these devices can work as a gateway for a major breach in their environment. This paper focuses on IoT-based solution towards the bring-your-own-device (BYOD) model in a corporate environment where a user brings their own devices and connects to a private network that brings enormous threats to it. A relatively efficient and security-enhanced model is proposed that addresses the resource constraint while also contributing in the direction of security achievement. It is intended to provide ease to users while not compromising on service delay or introducing resource challenges. Moreover, the comparative result concludes that the proposed model works well in our private testing environment, whereas, no additional resource utilization is involved to achieve maximized security in blockchain-IoT.\",\"PeriodicalId\":205027,\"journal\":{\"name\":\"2022 Mohammad Ali Jinnah University International Conference on Computing (MAJICC)\",\"volume\":\"288 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Mohammad Ali Jinnah University International Conference on Computing (MAJICC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MAJICC56935.2022.9994206\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Mohammad Ali Jinnah University International Conference on Computing (MAJICC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MAJICC56935.2022.9994206","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Integrating Blockchain with IoT for Mitigating Cyber Threat In Corporate Environment
The rising number of smart devices in the corporate environment poses a security threat that requires attention; organizations need to address them prior as these devices can work as a gateway for a major breach in their environment. This paper focuses on IoT-based solution towards the bring-your-own-device (BYOD) model in a corporate environment where a user brings their own devices and connects to a private network that brings enormous threats to it. A relatively efficient and security-enhanced model is proposed that addresses the resource constraint while also contributing in the direction of security achievement. It is intended to provide ease to users while not compromising on service delay or introducing resource challenges. Moreover, the comparative result concludes that the proposed model works well in our private testing environment, whereas, no additional resource utilization is involved to achieve maximized security in blockchain-IoT.