Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/2058
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Karthikeyyan P. | |
dc.contributor.author | Velliangiri S. | |
dc.contributor.author | Joseph I.T. | |
dc.date.accessioned | 2022-05-26T06:16:47Z | - |
dc.date.available | 2022-05-26T06:16:47Z | - |
dc.date.issued | 2019 | |
dc.identifier.citation | 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies, ICICICT 2019 | |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/2058 | - |
dc.description.abstract | The always increasing number of Internet net of Things (IoT) devices in the society, it makes a secure, accessible, and reliable infrastructure to process and store the computed data. The present IoT model uses a central cloud server model which leads to single point failures. To avoid this Blockchain technology is integrated with IoT because Blockchain uses a distributed network. Blockchain technology has tremendous development in the field of IoT security. In this paper, we conducted a systematic review of Blockchain based IoT application and its security issues. Comparison between IoT and Blockchain technology discussed. Based on an organized, evaluation and efficient content analysis of the academic literature, we discussed the broad classification of blockchain-based IoT applications through various segments such as Industrial, smart Health care, smart city, smart home, ad-hoc vehicle networks (VANET), eBusiness model, and supply chain management. We also pointed out the security issues of Blockchain based IoT application, particularly limitations the blockchain technology in IoT. This paper will help the academician and researcher further develop the IoT based Blockchain application. © 2019 IEEE. | |
dc.language.iso | en | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
dc.title | Review of Blockchain based IoT application and its security issues | |
dc.type | Conference Paper | |
Appears in Collections: | Mathematics Department |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.