You are in:Home/Publications/Using Blockchain-Based Attestation Architecture for Securing IoT

Dr. mohamed loey ramadan :: Publications:

Title:
Using Blockchain-Based Attestation Architecture for Securing IoT
Authors: Mohamed Sohail, Said Tabet, Mohamed Loey, Nour Eldeen M Khalifa
Year: 2022
Keywords: Not Available
Journal: Not Available
Volume: Not Available
Issue: Not Available
Pages: Not Available
Publisher: Not Available
Local/International: International
Paper Link: Not Available
Full paper Not Available
Supplementary materials Not Available
Abstract:

When the internet first came along, humans had no idea if it really will disrupt their life and the way they interact with almost everything from healthcare, education, financial services to their day-to-day lifestyle. They had no clue that it would ever have this impact. IoT and edge security is a serious challenge for all the current deployed implementations. Gartner predicts by the end of 2020 that there will be 20.4 billion IoT devices, of which 7.5 billion devices will be for business purposes and 12.8 for consumers. All these devices will be heavily interacting with many endpoints, most of which with a dynamically changing security profile. Organizations around the world are still looking for better solutions and ways to harden their systems while consistently adding new security controls. We are currently in the early phases of blockchain and there is much potential yet to come and be unlocked. In this book chapter, we

Google ScholarAcdemia.eduResearch GateLinkedinFacebookTwitterGoogle PlusYoutubeWordpressInstagramMendeleyZoteroEvernoteORCIDScopus