Blockchain Security by Design Framework for Trust and Adoption in IoT Environment

by   Gohar Sargsyan, et al.

With the recent advances of IoT (Internet of Things) new and more robust security frameworks are needed to detect and mitigate new forms of cyber-attacks, which exploit complex and heterogeneity IoT networks, as well as, the existence of many vulnerabilities in IoT devices. With the rise of blockchain technologies service providers pay considerable attention to better understand and adopt blockchain technologies in order to have better secure and trusted systems for own organisations and their customers. The present paper introduces a high level guide for the senior officials and decision makers in the organisations and technology managers for blockchain security framework by design principle for trust and adoption in IoT environments. The paper discusses Cyber-Trust project blockchain technology development as a representative case study for offered security framework. Security and privacy by design approach is introduced as an important consideration in setting up the framework.



There are no comments yet.


page 2

page 3

page 4

page 5

page 6

page 7


Towards Efficient Integration of Blockchain for IoT Security: The Case Study of IoT Remote Access

The booming Internet of Things (IoT) market has drawn tremendous interes...

A Trust and Reputation System for IoT Exploiting Distributed Ledger Technology

The advent of Bitcoin, and consequently Blockchain, has ushered in a new...

Integrating Hardware Security into a Blockchain-Based Transactive Energy Platform

This applied research paper introduces a novel framework for integrating...

Toward a Blockchain-based Platform to Manage Cybersecurity Certification of IoT devices

The goal of this paper is to propose a blockchain-based platform to enha...

Adaptive Safety for Internet of Things in e-Health

Wireless pervasive computing devices are rapidly penetrating our environ...

Blockchain-assisted Undisclosed IIoT Vulnerabilities Trusted Sharing Protection with Dynamic Token

With the large-scale deployment of industrial internet of things (IIoT) ...

IoT Security: An End-to-End View and Case Study

In this paper, we present an end-to-end view of IoT security and privacy...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.