Currently, there is an unsolved problem of IoT device authentication in networks to ensure their security. Due to low performance, work with traditional methods of protection is complicated and therefore a different approach is required. The article proposes a method for authenticating IoT devices (devices and software) by verifying their data and then entering it into the data storage. The implementation of a data storage using blockchain technology and the comparison of its efficiency with a classical database are considered. The aim of research is evelopment of the IoT device authentication method, analysis of the effectiveness and applicability of the developed method and comparison of various technological approaches to solving the pro...
The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous technologies composed ...
The implementation of internet of things is plagued by problems such as security and scalability. It...
In general, IoT controls can be divided into three subgroups. First of all, it is the management of ...
Currently, there is an unsolved problem of IoT device authentication in networks to ensure their sec...
Currently, there is an unsolved problem of IoT device authentication in networks to ensure their sec...
Nowadays, internet usage and its importance in human lives for performing many ordinary tasks are gr...
Nowadays, internet usage and its importance in human lives for performing many ordinary tasks are gr...
This paper proposes a blockchain-based identity authentication (BA) scheme for IoT devices to solve ...
The Internet of things (IoT) has many unexplored potentials. Features such as low purchasing costs, ...
The modern world is experiencing a new industrial revolution, known as industry 4.0, where machines,...
With the proliferation of intelligent devices in the Internet of Things (IoT), the security of IoT d...
With the proliferation of intelligent devices in the Internet of Things (IoT), the security of IoT d...
With the proliferation of intelligent devices in the Internet of Things (IoT), the security of IoT d...
Internet of Things is a recent potential advancement in an IT arena, consists of multiple smart thin...
The implementation of internet of things is plagued by problems such as security and scalability. It...
The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous technologies composed ...
The implementation of internet of things is plagued by problems such as security and scalability. It...
In general, IoT controls can be divided into three subgroups. First of all, it is the management of ...
Currently, there is an unsolved problem of IoT device authentication in networks to ensure their sec...
Currently, there is an unsolved problem of IoT device authentication in networks to ensure their sec...
Nowadays, internet usage and its importance in human lives for performing many ordinary tasks are gr...
Nowadays, internet usage and its importance in human lives for performing many ordinary tasks are gr...
This paper proposes a blockchain-based identity authentication (BA) scheme for IoT devices to solve ...
The Internet of things (IoT) has many unexplored potentials. Features such as low purchasing costs, ...
The modern world is experiencing a new industrial revolution, known as industry 4.0, where machines,...
With the proliferation of intelligent devices in the Internet of Things (IoT), the security of IoT d...
With the proliferation of intelligent devices in the Internet of Things (IoT), the security of IoT d...
With the proliferation of intelligent devices in the Internet of Things (IoT), the security of IoT d...
Internet of Things is a recent potential advancement in an IT arena, consists of multiple smart thin...
The implementation of internet of things is plagued by problems such as security and scalability. It...
The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous technologies composed ...
The implementation of internet of things is plagued by problems such as security and scalability. It...
In general, IoT controls can be divided into three subgroups. First of all, it is the management of ...