Skip navigation
  • Home
  • Browse
    • Communities
      & Collections
    • Browse Items by:
    • Publication Date
    • Author
    • Title
    • Subject
    • Department
  • Sign on to:
    • My MacSphere
    • Receive email
      updates
    • Edit Profile


McMaster University Home Page
  1. MacSphere
  2. Departments and Schools
  3. Faculty of Engineering
  4. Department of Mechanical Engineering
  5. Mechanical Engineering Publications
Please use this identifier to cite or link to this item: http://hdl.handle.net/11375/31306
Title: An anomaly detecting blockchain strategy for secure IoT networks
Authors: Alsadi N
Hilal W
Surucu O
Giuliani A
Gadsden A
Yawney J
Iskander S
Department: Mechanical Engineering
Keywords: 40 Engineering;4006 Communications Engineering;4009 Electronics, Sensors and Digital Hardware;51 Physical Sciences;5102 Atomic, Molecular and Optical Physics
Publication Date: 30-May-2022
Publisher: SPIE, the international society for optics and photonics
Abstract: Highly distributed connected systems, such as the Internet of Things (IoT), have made their way across numerous fields of application. IoT systems present a method for the connection for various heterogeneous devices across the internet, facilitating the efficient distribution, collection and processing of system-related data. However, while system interconnectivity has aided communication and augmented the effectiveness of integrated technology, it has also increased system vulnerability. To this end, researchers have proposed various security protocols and frameworks for IoT ecosystems. Yet while many suggested approaches augment system security, centralization remains an area of concern within IoT systems. Therefore, we propose the use of a decentralization scheme for IoT ecosystems based on Blockchain technology. The proposed method is inspired by Helium, a public wireless long-range network powered by blockchain. Each network node is characterized by its device properties, which are comprised of local and network-level features. Communication in the network requires the testimony of other companion nodes, ensuring that anomalous behaviour is not accepted and thereby preventing malicious attacks of various sorts.
URI: http://hdl.handle.net/11375/31306
metadata.dc.identifier.doi: https://doi.org/10.1117/12.2618301
ISBN: 978-1-5106-5110-4
ISSN: 0277-786X
1996-756X
Appears in Collections:Mechanical Engineering Publications

Files in This Item:
File Description SizeFormat 
120-121170A.pdf
Open Access
Published version754.57 kBAdobe PDFView/Open
Show full item record Statistics


Items in MacSphere are protected by copyright, with all rights reserved, unless otherwise indicated.

Sherman Centre for Digital Scholarship     McMaster University Libraries
©2022 McMaster University, 1280 Main Street West, Hamilton, Ontario L8S 4L8 | 905-525-9140 | Contact Us | Terms of Use & Privacy Policy | Feedback

Report Accessibility Issue