Continuous Security in IoT Using Blockchain.
Rahul AgrawalPratik VermaRahul SonanisUmang GoelAloknath DeSai Anirudh-KondaveetiSuman ShekharPublished in: ICASSP (2018)
Keyphrases
- security problems
- key management
- information security
- information assurance
- management system
- access control
- rfid systems
- intrusion detection
- network security
- statistical databases
- data security
- network management
- security policies
- security management
- security requirements
- security threats
- functional requirements
- security level
- resource constrained
- security measures
- malware detection
- computer security
- security mechanisms
- database
- computer networks
- cloud computing
- neural network