Redirigiendo al acceso original de articulo en 24 segundos...
Inicio  /  Applied Sciences  /  Vol: 11 Par: 6 (2021)  /  Artículo
ARTÍCULO
TITULO

A Traceable and Authenticated IoTs Trigger Event of Private Security Record Based on Blockchain

Chin-Ling Chen    
Zi-Yi Lim    
Hsien-Chou Liao and Yong-Yuan Deng    

Resumen

Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of Things (IoTs) device in the client?s house and connect it with the IoT main controller; then, the IoT main controller connects to the security control center (SCC). Once there is an event triggered (e.g., a break-in or fire incident) by the IoTs device, the controller sends a message to the SCC. The SCC allocates a security guard (SG) to the incident scene immediately. After the task is accomplished, the SG sends a message to the SCC. All of these record the messages and events chained in the blockchain center. The proposed scheme makes security event records have the following characteristics: authenticated, traceable, and integral. The proposed scheme is proved by a security analysis with mutual authentication, traceability, integrity, and non-repudiation. The known attacks (e.g., man-in-the-middle attack, replay attack, forgery attack) are avoided by message encryption and a signing mechanism. Threat models in the communication phase can also be avoided. Finally, computation cost, communication performance, and comparison with related works are also discussed to prove its applicability. We also provide an arbitration mechanism, so that the proposed scheme can reduce disputes between private security companies and the client.

 Artículos similares

       
 
Jee-Tae Park, Chang-Yui Shin, Ui-Jun Baek and Myung-Sup Kim    
The classification of encrypted traffic plays a crucial role in network management and security. As encrypted network traffic becomes increasingly complicated and challenging to analyze, there is a growing need for more efficient and comprehensive analyt... ver más
Revista: Applied Sciences

 
Dimitrios Kaklis, Ioannis Kontopoulos, Iraklis Varlamis, Ioannis Z. Emiris and Takis Varelas    
Trajectory data holds pivotal importance in the shipping industry and transcend their significance in various domains, including transportation, health care, tourism, surveillance, and security. In the maritime domain, improved predictions for estimated ... ver más

 
Woonghee Lee and Younghoon Kim    
This study introduces a deep-learning-based framework for detecting adversarial attacks in CT image segmentation within medical imaging. The proposed methodology includes analyzing features from various layers, particularly focusing on the first layer, a... ver más
Revista: Applied Sciences

 
Chenglin Yang, Dongliang Xu and Xiao Ma    
Due to the increasing severity of network security issues, training corresponding detection models requires large datasets. In this work, we propose a novel method based on generative adversarial networks to synthesize network data traffic. We introduced... ver más
Revista: Applied Sciences

 
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng    
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl... ver más
Revista: Applied Sciences