{"title":"基于区块链的物联网安全研究进展","authors":"Shahid Ul Haq, A. Abbas","doi":"10.1109/PIECON56912.2023.10085894","DOIUrl":null,"url":null,"abstract":"Security in the Internet of Things (IoT) is a major challenge due to the diversity of their applications and underlying architectures. There is a lot of research and development related to the security of IoT. Blockchain technology has been an enabler for various decentralized applications and one of its main aspects is in securing the IoT. Many researchers have proposed different schemes to improve IoT security using blockchains. In this paper, we present a survey of the research related to IoT security using blockchain. We focus on schemes, methods, and architectures pertaining to the security of IoTs using blockchains. We compare different schemes based on their features, applications, and underlying techniques.","PeriodicalId":182428,"journal":{"name":"2023 International Conference on Power, Instrumentation, Energy and Control (PIECON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Advancements in Security of Internet of Things Using Blockchains\",\"authors\":\"Shahid Ul Haq, A. Abbas\",\"doi\":\"10.1109/PIECON56912.2023.10085894\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security in the Internet of Things (IoT) is a major challenge due to the diversity of their applications and underlying architectures. There is a lot of research and development related to the security of IoT. Blockchain technology has been an enabler for various decentralized applications and one of its main aspects is in securing the IoT. Many researchers have proposed different schemes to improve IoT security using blockchains. In this paper, we present a survey of the research related to IoT security using blockchain. We focus on schemes, methods, and architectures pertaining to the security of IoTs using blockchains. We compare different schemes based on their features, applications, and underlying techniques.\",\"PeriodicalId\":182428,\"journal\":{\"name\":\"2023 International Conference on Power, Instrumentation, Energy and Control (PIECON)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-02-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Power, Instrumentation, Energy and Control (PIECON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PIECON56912.2023.10085894\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Power, Instrumentation, Energy and Control (PIECON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PIECON56912.2023.10085894","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Advancements in Security of Internet of Things Using Blockchains
Security in the Internet of Things (IoT) is a major challenge due to the diversity of their applications and underlying architectures. There is a lot of research and development related to the security of IoT. Blockchain technology has been an enabler for various decentralized applications and one of its main aspects is in securing the IoT. Many researchers have proposed different schemes to improve IoT security using blockchains. In this paper, we present a survey of the research related to IoT security using blockchain. We focus on schemes, methods, and architectures pertaining to the security of IoTs using blockchains. We compare different schemes based on their features, applications, and underlying techniques.