메뉴 건너뛰기




Volumn 4, Issue 3, 2018, Pages 149-160

A blockchain future for internet of things security: a position paper

Author keywords

Blockchain; Blockchain security; Collaborative security; Internet of military things; Intrusion prevention system; IoT dataset; IoT security; IoT self healing; Predictive IoT security; Predictive security

Indexed keywords


EID: 85048485433     PISSN: 24685925     EISSN: 23528648     Source Type: Journal    
DOI: 10.1016/j.dcan.2017.10.006     Document Type: Article
Times cited : (456)

References (104)
  • 2
    • 84980043247 scopus 로고    scopus 로고
    • Coping with denial-of-service attacks on the IP telephony system
    • Norfolk, VA
    • Cadet, F., Fokum, D.T., Coping with denial-of-service attacks on the IP telephony system. SoutheastCon 2016, 2016, 1–7 Norfolk, VA.
    • (2016) SoutheastCon 2016 , pp. 1-7
    • Cadet, F.1    Fokum, D.T.2
  • 6
    • 84980048143 scopus 로고    scopus 로고
    • A process to transfer Fail2ban data to an adaptive enterprise intrusion detection and prevention system
    • Norfolk, vol. A
    • Ford, M., et al. A process to transfer Fail2ban data to an adaptive enterprise intrusion detection and prevention system. SoutheastCon 2016, 2016, 1–4 Norfolk, vol. A.
    • (2016) SoutheastCon 2016 , pp. 1-4
    • Ford, M.1
  • 10
    • 85051000752 scopus 로고    scopus 로고
    • D. Sgandurra; G. Dini; F. Martinelli, “MADAM: effective and efficient behavior-based android malware detection and prevention,” in IEEE Transactions on Dependable and Secure Computing,vol.PP, no.vol. 99, pp.1–1.
    • A. Saracino; D. Sgandurra; G. Dini; F. Martinelli, “MADAM: effective and efficient behavior-based android malware detection and prevention,” in IEEE Transactions on Dependable and Secure Computing,vol.PP, no.vol. 99, pp.1–1.
    • Saracino1    , A.2
  • 15
    • 85040169560 scopus 로고    scopus 로고
    • Intrusion detection and prevention for ZigBee-based home area networks in smart grids
    • In press
    • Jokar, P., Leung, V., Intrusion detection and prevention for ZigBee-based home area networks in smart grids. IEEE Transactions on Smart Grid, 2017 In press.
    • (2017) IEEE Transactions on Smart Grid
    • Jokar, P.1    Leung, V.2
  • 23
    • 85051044748 scopus 로고    scopus 로고
    • Design and implementation of an intrusion prevention system
    • Farhaoui, Yousef, Design and implementation of an intrusion prevention system. Int. J. Netw. Secur. 19:No.5 (2017), 675–683.
    • (2017) Int. J. Netw. Secur. , vol.19 , Issue.No.5 , pp. 675-683
    • Farhaoui, Y.1
  • 25
    • 85001130767 scopus 로고    scopus 로고
    • Jozef Filipek and Ladislav Hudec, “Advances in distributed security for mobile ad hoc networks,” In Proceedings of the 17th International Conference on Computer Systems and Technologies 2016 (CompSysTech '16), Boris Rachev and Angel Smrikarov (Eds.). ACM, New York, NY, USA
    • Jozef Filipek and Ladislav Hudec, “Advances in distributed security for mobile ad hoc networks,” In Proceedings of the 17th International Conference on Computer Systems and Technologies 2016 (CompSysTech '16), Boris Rachev and Angel Smrikarov (Eds.). ACM, New York, NY, USA, 89–96.
  • 27
    • 84962038954 scopus 로고    scopus 로고
    • Towards achieving data security with the cloud computing adoption framework
    • Chang, V., Ramachandran, M., Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. 9:1 (Jan.-Feb. 1 2016), 138–151.
    • (2016) IEEE Trans. Serv. Comput. , vol.9 , Issue.1 , pp. 138-151
    • Chang, V.1    Ramachandran, M.2
  • 28
    • 84979928325 scopus 로고    scopus 로고
    • Intent-based extensible real-time PHP supervision framework
    • Prokhorenko, V., Choo, K.K.R., Ashman, H., Intent-based extensible real-time PHP supervision framework. IEEE Trans. Inf. Forensics Secur. 11:10 (Oct. 2016), 2215–2226.
    • (2016) IEEE Trans. Inf. Forensics Secur. , vol.11 , Issue.10 , pp. 2215-2226
    • Prokhorenko, V.1    Choo, K.K.R.2    Ashman, H.3
  • 34
    • 84956680241 scopus 로고    scopus 로고
    • Distributed denial of service (DDos) resilience in cloud: review and conceptual cloud DDoS mitigation framework
    • Osanaiye, O., Choo, K.-K.R., Dlodlo, M., Distributed denial of service (DDos) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 67 (2016), 147–165.
    • (2016) J. Netw. Comput. Appl. , vol.67 , pp. 147-165
    • Osanaiye, O.1    Choo, K.-K.R.2    Dlodlo, M.3
  • 40
    • 84964399843 scopus 로고    scopus 로고
    • Proofpoint uncovers internet of things (IoT) cyberattack
    • (last accessed October 31, 2017)
    • Proofpoint, Proofpoint uncovers internet of things (IoT) cyberattack. Proofpoint Release, 2014 http://investors.proofpoint.com/releasedetail.cfm?releaseid=819799 (last accessed October 31, 2017).
    • (2014) Proofpoint Release
    • Proofpoint1
  • 47
    • 84991071149 scopus 로고    scopus 로고
    • Performance study of 802.11w for preventing DoS attacks on wireless local area networks
    • Liu, Chibiao, Qiu, Jinming, Performance study of 802.11w for preventing DoS attacks on wireless local area networks. Wirel. Personal. Commun. 95:2 (2017), 1031–1053.
    • (2017) Wirel. Personal. Commun. , vol.95 , Issue.2 , pp. 1031-1053
    • Liu, C.1    Qiu, J.2
  • 48
    • 85008703761 scopus 로고    scopus 로고
    • The performance analysis of honeypot based intrusion detection system for wireless network
    • Neha, Agrawal, Tapaswi, Shashikala, The performance analysis of honeypot based intrusion detection system for wireless network. Int. J. Wirel. Inf. Netw. 24:1 (2017), 14–26.
    • (2017) Int. J. Wirel. Inf. Netw. , vol.24 , Issue.1 , pp. 14-26
    • Neha, A.1    Tapaswi, S.2
  • 50
    • 84957973763 scopus 로고    scopus 로고
    • Performance comparison and detection analysis in Snort and Suricata environment
    • Park, Wonhyung, Seongjin, Ahn, Performance comparison and detection analysis in Snort and Suricata environment. Wirel. Personal. Commun. 94:2 (2017), 241–252.
    • (2017) Wirel. Personal. Commun. , vol.94 , Issue.2 , pp. 241-252
    • Park, W.1    Seongjin, A.2
  • 51
    • 85051021416 scopus 로고    scopus 로고
    • Y. Qian; J. Chen; K. Hwang; S. Mao; L. Hu, “Privacy protection and intrusion avoidance for cloudlet-based medical data sharing,” in IEEE Transactions on Cloud Computing, vol.PP, no.vol. 99, pp.1–1.
    • M. Chen; Y. Qian; J. Chen; K. Hwang; S. Mao; L. Hu, “Privacy protection and intrusion avoidance for cloudlet-based medical data sharing,” in IEEE Transactions on Cloud Computing, vol.PP, no.vol. 99, pp.1–1.
    • Chen1    , M.2
  • 54
    • 84900614780 scopus 로고    scopus 로고
    • Collaborative network security in multi-tenant data center for cloud computing
    • Chen, Z., Dong, W., Li, H., Zhang, P., Chen, X., Cao, J., Collaborative network security in multi-tenant data center for cloud computing. Tsinghua Sci. Technol. 19:1 (Feb. 2014), 82–94.
    • (2014) Tsinghua Sci. Technol. , vol.19 , Issue.1 , pp. 82-94
    • Chen, Z.1    Dong, W.2    Li, H.3    Zhang, P.4    Chen, X.5    Cao, J.6
  • 65
    • 84906813967 scopus 로고    scopus 로고
    • A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications
    • Ben Saied, Yosra, Olivereau, Alexis, Zeghlache, Djamal, Laurent, Maryline, A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications. J. Netw. Comput. Appl. 45 (2014), 215–227 ISSN 1084-8045.
    • (2014) J. Netw. Comput. Appl. , vol.45 , pp. 215-227
    • Ben Saied, Y.1    Olivereau, A.2    Zeghlache, D.3    Laurent, M.4
  • 66
    • 84942105224 scopus 로고    scopus 로고
    • Game-theoretic strategies for IDS deployment in peer-to-peer networks
    • Narang, Pratik, Hota, Chittaranjan, Game-theoretic strategies for IDS deployment in peer-to-peer networks. Inf. Syst. Front. 17 5:October 2015 (2015), 1017–1028.
    • (2015) Inf. Syst. Front. 17 , vol.5 , Issue.October 2015 , pp. 1017-1028
    • Narang, P.1    Hota, C.2
  • 67
    • 85008640878 scopus 로고    scopus 로고
    • Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system
    • Li, Beibei, Lu, Rongxing, Wang, Wei, Choo, Kim-Kwang Raymond, Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system. J. Parallel Distrib. Comput. 103, C:May 2017 (2017), 32–41.
    • (2017) J. Parallel Distrib. Comput. , vol.103 C , Issue.May 2017 , pp. 32-41
    • Li, B.1    Lu, R.2    Wang, W.3    Choo, K.-K.R.4
  • 68
    • 84956853933 scopus 로고    scopus 로고
    • A general collaborative framework for modeling and perceiving distributed network behavior
    • Xie, Y., Wang, Y., He, H., Xiang, Y., Yu, S., Liu, X., A general collaborative framework for modeling and perceiving distributed network behavior. IEEE/ACM Trans. Netw. 24:5 (October 2016), 3162–3176.
    • (2016) IEEE/ACM Trans. Netw. , vol.24 , Issue.5 , pp. 3162-3176
    • Xie, Y.1    Wang, Y.2    He, H.3    Xiang, Y.4    Yu, S.5    Liu, X.6
  • 71
    • 85051029879 scopus 로고    scopus 로고
    • K. Ota; M. Dong; J. Li; H. Wang, “Big data analysis based security situational awareness for smart grid,” in IEEE Trans. Big Data, vol.PP, no.99, pp.1–1.
    • J. Wu; K. Ota; M. Dong; J. Li; H. Wang, “Big data analysis based security situational awareness for smart grid,” in IEEE Trans. Big Data, vol.PP, no.99, pp.1–1.
    • Wu1    , J.2
  • 73
    • 85011891525 scopus 로고    scopus 로고
    • I know what you did before”: general framework for correlation analysis of cyber threat incidents
    • Baltimore, MD
    • Kim, Daegeon, Woo, JiYoung, Kim, Huy Kang, I know what you did before”: general framework for correlation analysis of cyber threat incidents. MILCOM 2016-2016 IEEE Military Communications Conference, 2016, 782–787 Baltimore, MD.
    • (2016) MILCOM 2016-2016 IEEE Military Communications Conference , pp. 782-787
    • Kim, D.1    Woo, J.2    Kim, H.K.3
  • 79
    • 85051010250 scopus 로고    scopus 로고
    • da Costa Júnior, Edmilson P., et al. “An Architecture for Self-adaptive Distributed Firewall.”.
    • da Costa Júnior, Edmilson P., et al. “An Architecture for Self-adaptive Distributed Firewall.”.
  • 81
    • 84966930566 scopus 로고    scopus 로고
    • Enhancing access-control with risk-metrics for collaboration on social cloud-platforms
    • Helsinki
    • Bouchami, A., Goettelmann, E., Perrin, O., Godart, C., Enhancing access-control with risk-metrics for collaboration on social cloud-platforms. 2015 IEEE Trustcom/BigDataSE/ISPA, 2015, 864–871 Helsinki.
    • (2015) 2015 IEEE Trustcom/BigDataSE/ISPA , pp. 864-871
    • Bouchami, A.1    Goettelmann, E.2    Perrin, O.3    Godart, C.4
  • 82
    • 84976488748 scopus 로고    scopus 로고
    • DISCS: a DIStributed collaboration system for inter-as spoofing defense
    • Beijing
    • Liu, B., Bi, J., DISCS: a DIStributed collaboration system for inter-as spoofing defense. 2015 44th International Conference on Parallel Processing, 2015, 160–169 Beijing.
    • (2015) 2015 44th International Conference on Parallel Processing , pp. 160-169
    • Liu, B.1    Bi, J.2
  • 83
    • 84962892965 scopus 로고    scopus 로고
    • Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm
    • Indore
    • Arya, N., Singh, U., Singh, S., Detecting and avoiding of worm hole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm. 2015 International Conference on Computer, Communication and Control (IC4), 2015, 1–5 Indore.
    • (2015) 2015 International Conference on Computer, Communication and Control (IC4) , pp. 1-5
    • Arya, N.1    Singh, U.2    Singh, S.3
  • 94
  • 95
    • 84967333002 scopus 로고    scopus 로고
    • A novel architecture for predictive CyberSecurity using non-homogenous Markov models
    • Helsinki
    • Abraham, S., Nair, S., A novel architecture for predictive CyberSecurity using non-homogenous Markov models. 2015 IEEE Trustcom/BigDataSE/ISPA, 2015, 774–781 Helsinki.
    • (2015) 2015 IEEE Trustcom/BigDataSE/ISPA , pp. 774-781
    • Abraham, S.1    Nair, S.2
  • 97
    • 85051040649 scopus 로고    scopus 로고
    • “Common vulnerability scoring system (CVSS),”
    • M. Schiffman, “Common vulnerability scoring system (CVSS),” http://www.first.org/cvss/.
    • Schiffman, M.1
  • 98
    • 84920267716 scopus 로고    scopus 로고
    • A Software Application to Analyze Affects of Temporal and Environmental Metrics on Overall CVSS V2 Score
    • Concordia University College of Alberta Edmonton, Canada
    • Ali, Assad, Zavarsky, Pavol, Lindskog, Dale, Ruhl, Ron, A Software Application to Analyze Affects of Temporal and Environmental Metrics on Overall CVSS V2 Score. October 2010, Concordia University College of Alberta, Edmonton, Canada.
    • (2010)
    • Ali, A.1    Zavarsky, P.2    Lindskog, D.3    Ruhl, R.4
  • 99
    • 85051029039 scopus 로고    scopus 로고
    • https://nvd.nist.gov/[last accessed 11September 2017].
  • 101
    • 77956356055 scopus 로고    scopus 로고
    • Trusted cloud computing resources and data coloring
    • Hwang, K., Li, D., Trusted cloud computing resources and data coloring. IEEE Internet Co., 14, Sept. 2010.
    • (2010) IEEE Internet Co. , vol.14
    • Hwang, K.1    Li, D.2
  • 102
    • 85051037367 scopus 로고    scopus 로고
    • A novel adaptive grey verhulst model for network security situation prediction
    • Leau, Yu-Beng, Manickam, Selvakumar, A novel adaptive grey verhulst model for network security situation prediction. Int. J. Adv. Comput. Sci. Appl. 1:7 (2016), 90–95.
    • (2016) Int. J. Adv. Comput. Sci. Appl. , vol.1 , Issue.7 , pp. 90-95
    • Leau, Y.-B.1    Manickam, S.2
  • 103
    • 85051033898 scopus 로고    scopus 로고
    • The Coco Framework Technical Overview. [last accessed 10 October 2017].
    • Microsoft 2017. The Coco Framework Technical Overview. https://raw.githubusercontent.com/Azure/coco.framework/master/docs/Coco%20Framework%20whitepaper.pdf [last accessed 10 October 2017].
    • (2017)
    • Microsoft1
  • 104
    • 84979828304 scopus 로고    scopus 로고
    • Blockchains and smart contracts for the internet of things
    • Christidis, K., Devetsikiotis, M., Blockchains and smart contracts for the internet of things. IEEE Access 4 (2016), 2292–2303.
    • (2016) IEEE Access , vol.4 , pp. 2292-2303
    • Christidis, K.1    Devetsikiotis, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.