Sign in

Detecting the Attacks Using Blockchain-Based Decentralized Security Architecture in IoT Environment.

M. Rudra KumarR. V. S. S. S. Tarun TejaA. Venkata Rakesh ReddyS. Vamshi KrishnaP. Venkata Koushik
Published in: MIKE (2023)
Keyphrases
  • security architecture
  • security mechanisms
  • insider threat
  • access control
  • management system
  • database
  • multi agent
  • cooperative
  • distributed systems
  • cloud computing
  • smart card
  • security model