Blockchain Security in MANETs
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
Blockchain Security in MANETs

Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara

Abstract:

The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.

Keywords: Ad hoc networks, blockchain, MPR, security.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.3566283

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 845

References:


[1] M. A. Khan and K. Salah, ”IoT security: Review, blockchain solutions, and open challenges”. Future Gener. Comput. Syst., vol. 82, p. 395-411, mai 2018.
[2] ”CONDENSE: A Reconfigurable Knowledge Acquisition Architecture for Future 5G IoT ”. IEEE Journals Magazine . https://ieeexplore.ieee.org/abstract/document/7508921/.
[3] Y. Liu, Y. Kuang, Y. Xiao, and G. Xu ”SDN-Based Data Transfer Security for Internet of Things”. IEEE Internet Things J., vol. 5, no 1, p. 257-268, fvr. 2018.
[4] M. Swan, ”Blockchain thinking: The brain as a dac (decentralized autonomous organization)”, in Proceedings of the Texas Bitcoin Conference, pp. 2729, 2015.
[5] H. Chourabi et al., ”Understanding Smart Cities: An Integrative Framework ”, in 2012 45th Hawaii International Conference on System Sciences, 2012, p. 2289-2297.
[6] T. Forsyth ”Community-based adaptation: a review of past and future challenges ”. Wiley Interdiscip. Rev. Clim. Change, vol. 4, no 5, p. 439-446.
[7] H. Nguyen-Minh, ”Contribution to the Intelligent Transportation System: security of Safety Applications in Vehicle Ad hoc Networks ”. p. 159.
[8] I. Ali, S. Sabir, and Z. Ullah, ”Internet of Things Security, Device Authentication and Access Control: A Review ”. vol. 14, no 8, p. 12, 2016.
[9] D. Minoli and B. Occhiogrosso ”Blockchain mechanisms for IoT security ”. Internet of Things Journal 12 (2018).
[10] M. Grabovica, S. Popi, D. Pezer and V. Kneevi, ”CProvided security measures of enabling technologies in Internet of Things (IoT): A survey ”. Zooming Innovation in Consumer Electronics International Conference (ZINC) 2016.
[11] Florian Wessling and Volker Gruhn ”Engineering Software Architectures of Blockchain-Oriented Applications ”. 2018 IEEE International Conference on Software Architecture Companion (ICSA-C) 2018.
[12] S. Nakamoto. ”Bitcoin ”. A Peer-to-Peer Electronic Cash System.bitcoin.org, 2008.
[13] L. Kan, Y. Wei, A. Hafiz Muhammad, W. Siyuan, G. Linchao and H. Kai, ”A Multiple Blockchains Architecture on Inter-Blockchain Communication ”. IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).
[14] Z. Yang, K. Zheng, K. Yang et V. C. M. Leung, ”A blockchain-based reputation system for data credibility assessment in vehicular networks ”. 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[15] H. Amraoui and A. Habbani and A. Hajami, ”Mobility Quantification for MultiPoint Relays Selection Algorithm in Mobile Ad Hoc Networks”. 5th International Conference on Multimedia Computing and Systems (ICMCS), p.278-283, September 2016.
[16] M. Souidi and A. Habbani and H. Berradi and F. El Mahdi, ”Geographic forwarding rules to reduce broadcast redundancy in mobile ad hoc wireless networks”. Pers Ubiquit Comput, May 2018.