证据与信任:物联网协同安全机制

Bin Wen, Ziqiang Luo, Yazhi Wen
{"title":"证据与信任:物联网协同安全机制","authors":"Bin Wen, Ziqiang Luo, Yazhi Wen","doi":"10.1109/ICIST.2018.8426148","DOIUrl":null,"url":null,"abstract":"The evidence has three properties including relevance, authenticity and legitimacy. For evidence, once implemented, it must not be tampered with and can always be traced back. For trust, the content can be forensics, so the relationship between each other is trustworthy and exchangeable value. Blockchain is a tamper-proof and unforgeable decentralized shared ledger that chunks data blocks chronologically into specific data structures and is cryptographically guaranteed. In this paper, we use the key technologies of blockchain to investigate and achieve collaborative security for IoT devices. This approach uses distributed crowd-sourcing to make tampering of critical data evidence (security). Combination of theoretical research and empirical validation, the paper tries to provide a technical operational and cost-effective solution for collaborative security with blockchain services and promoting the key data stability and self-healing ability.","PeriodicalId":331555,"journal":{"name":"2018 Eighth International Conference on Information Science and Technology (ICIST)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Evidence and Trust: IoT Collaborative Security Mechanism\",\"authors\":\"Bin Wen, Ziqiang Luo, Yazhi Wen\",\"doi\":\"10.1109/ICIST.2018.8426148\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The evidence has three properties including relevance, authenticity and legitimacy. For evidence, once implemented, it must not be tampered with and can always be traced back. For trust, the content can be forensics, so the relationship between each other is trustworthy and exchangeable value. Blockchain is a tamper-proof and unforgeable decentralized shared ledger that chunks data blocks chronologically into specific data structures and is cryptographically guaranteed. In this paper, we use the key technologies of blockchain to investigate and achieve collaborative security for IoT devices. This approach uses distributed crowd-sourcing to make tampering of critical data evidence (security). Combination of theoretical research and empirical validation, the paper tries to provide a technical operational and cost-effective solution for collaborative security with blockchain services and promoting the key data stability and self-healing ability.\",\"PeriodicalId\":331555,\"journal\":{\"name\":\"2018 Eighth International Conference on Information Science and Technology (ICIST)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Eighth International Conference on Information Science and Technology (ICIST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICIST.2018.8426148\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Eighth International Conference on Information Science and Technology (ICIST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIST.2018.8426148","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

证据具有相关性、真实性和合法性三个属性。对于证据,一旦实施,它就不能被篡改,并且总是可以追溯到。对于信任,内容可以是鉴识的,因此彼此之间的关系是可信的,具有交换价值。区块链是一种防篡改和不可伪造的去中心化共享分类账,它将数据块按时间顺序分成特定的数据结构,并进行加密保证。在本文中,我们使用区块链的关键技术来研究和实现物联网设备的协同安全。这种方法使用分布式众包来篡改关键数据证据(安全性)。本文将理论研究与实证验证相结合,试图为区块链服务协同安全提供技术可操作性和成本效益的解决方案,并促进关键数据的稳定性和自愈能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Evidence and Trust: IoT Collaborative Security Mechanism
The evidence has three properties including relevance, authenticity and legitimacy. For evidence, once implemented, it must not be tampered with and can always be traced back. For trust, the content can be forensics, so the relationship between each other is trustworthy and exchangeable value. Blockchain is a tamper-proof and unforgeable decentralized shared ledger that chunks data blocks chronologically into specific data structures and is cryptographically guaranteed. In this paper, we use the key technologies of blockchain to investigate and achieve collaborative security for IoT devices. This approach uses distributed crowd-sourcing to make tampering of critical data evidence (security). Combination of theoretical research and empirical validation, the paper tries to provide a technical operational and cost-effective solution for collaborative security with blockchain services and promoting the key data stability and self-healing ability.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信