Fig 1 - uploaded by Ali Dorri
Content may be subject to copyright.
An overview of LSB. 

An overview of LSB. 

Source publication
Preprint
Full-text available
BlockChain (BC) has attracted tremendous attention due to its immutable nature and the associated security and privacy benefits. BC has the potential to overcome security and privacy challenges of Internet of Things (IoT). However, BC is computationally expensive, has limited scalability and incurs significant bandwidth overheads and delays which a...

Contexts in source publication

Context 1
... use a fresh PK to generate each new transaction to ensure anonymity (dis- cussed further in Section 4.1). The overlay, as shown in Fig 1, is comprised of various entities, known as overlay nodes, including the smart home (represented by the Local BM (LBM), which will be introduced in Section 2.2), mobile devices, Service Provider (SP) servers, and cloud storage (used by smart home devices for storing data). ...
Context 2
... results are illustrated in Fig 10. When PTV equals to 100, OBMs verify all transactions in a block, leading to zero attack success percentage (i.e., the attack is always detected). ...
Context 3
... PTV equals to 100, OBMs verify all transactions in a block, leading to zero attack success percentage (i.e., the attack is always detected). As shown in Fig 10, as PTV decreases, the attack success percentage increases. For the network configuration used in this simulation, the lowest value of PTV that can guarantee security is 60. ...
Context 4
... 40 seconds, the load increases further to 44 transactions per second until 45 seconds when the load drops to 12 transactions per second. The changes in the network load are illustrated in Fig 11. Recall that DTM computes the network utilization, α, at the end of each consensus-period as the ratio between the number of trans- actions generated and the number of transactions added to the overlay BC since the last computation of α. Time intervals when α is computed by OBMs is shown using gray dots in the figure. ...
Context 5
... reduce the network utilization, DTM re- duces the consensus-period to the newly computed value of 2.5 seconds (see lines 2-5 Algorithm 2) using Equation 1, where α is set to 0.62, which is the mid point of α min and α max . The consensus-period is also illustrated in Fig 11. Subsequently, since the network load remains stable until 40 seconds, the consensus period also remains unchanged. At this time, the network load increases further. ...

Similar publications

Conference Paper
Full-text available
Blockchains have been widely used in Internet of Things(IoT) applications including smart cities, smart home and smart governance to provide high levels of security and privacy. In this article, we advance a Blockchain based decentralized architecture for the storage of IoT data produced from smart home/cities. The architecture includes a secure co...
Article
Full-text available
Currently, smart homes rely heavily on wireless sensor networks (WSNs), which typically consist of wireless sensor nodes with limited resources and are scattered throughout the network. This topology makes them vulnerable to packet sniffing, spoofing, and other malicious attacks, which can result in the leakage of private data collected by devices....
Article
Full-text available
Smart home, as a typical Internet of Things (IoT) application, provides people with a variety of conveniences. Unfortunately, it may suffer from security and privacy issues. Currently, blockchain theory is considered as one of the potential solutions to the IoT security problem. However, according to the rules of blockchain, it requires large stora...
Conference Paper
Full-text available
The increasing use of smart devices for monitoring spaces has caused an increase in concerns about the privacy of users of these spaces. Given this problem, the legislation on the right to privacy has been worked to ensure that the existing laws on this subject are sufficiently comprehensive to preserve the privacy of users. In this way, research o...
Conference Paper
Full-text available
Rapid expanding availability and efficacy of Internet of Things (IoT) devices have made a huge revolution in routine life. Especially, with concepts like smart home, smart office, smart city, and smart industry human interaction with machines and devices are rising. Simultaneously, these friendly devices are generating, storing and distributing an...

Citations

... This ledger is utilized to hold transactional records that correspond to real-world purchases. One intriguing aspect is that the data is accessible to everybody, yet remains impervious to tampering [40][41][42][43]. ...
Article
Full-text available
Artificial intelligence (AI) and blockchain are two disruptive technologies that have emerged from the Fourth Industrial Revolution (IR4.0) and have brought about significant transformations in the industry. The convergence of artificial intelligence (AI) with blockchain technology presents significant opportunities for the development of novel business models facilitated by digitalization. The current body of research pertaining to the integration of artificial intelligence (AI) with blockchain technology is available, although there is a lack of comprehensive understanding of the practicality and effectiveness of this integration within the business context. In order to bridge this existing knowledge gap, the primary objective of this research endeavor is to comprehensively analyze and delineate the various applications and advantages of integrated artificial intelligence (AI) and blockchain platforms within diverse sectors of the business industry.
Chapter
Full-text available
Blockchain is a novel decentralized technology that is used to share, replicate, and synchronize data across different geographical locations. It guarantees a trusted transaction in any untrustworthy environment. There is no central administrator or central authority to control all the data-related aspects of blockchain technology. A blockchain network depends on the consensus algorithm that must be agreed upon by all the entities for any new transaction. There are numerous advantages of blockchain, such as security, trust, open source, traceability, transparency, and many more, which make it very popular to apply in different sectors. This chapter first covers all the technologies behind blockchain. Then, some fundamental aspects of blockchain, such as types of blockchain, features, advantages, and disadvantages have been discussed. Many applications of blockchain technology in several sectors are presented in this chapter in order to demonstrate its functional value. Finally, some challenges in the adoption of blockchain technology have been discussed, which can be beneficial for researchers doing their research in blockchain.KeywordsDistributed ledger technologyPeer-to-peer networkConsensus algorithmMerkle treeSmart contract