7,267 research outputs found

    On the Activity Privacy of Blockchain for IoT

    Full text link
    Security is one of the fundamental challenges in the Internet of Things (IoT) due to the heterogeneity and resource constraints of the IoT devices. Device classification methods are employed to enhance the security of IoT by detecting unregistered devices or traffic patterns. In recent years, blockchain has received tremendous attention as a distributed trustless platform to enhance the security of IoT. Conventional device identification methods are not directly applicable in blockchain-based IoT as network layer packets are not stored in the blockchain. Moreover, the transactions are broadcast and thus have no destination IP address and contain a public key as the user identity, and are stored permanently in blockchain which can be read by any entity in the network. We show that device identification in blockchain introduces privacy risks as the malicious nodes can identify users' activity pattern by analyzing the temporal pattern of their transactions in the blockchain. We study the likelihood of classifying IoT devices by analyzing their information stored in the blockchain, which to the best of our knowledge, is the first work of its kind. We use a smart home as a representative IoT scenario. First, a blockchain is populated according to a real-world smart home traffic dataset. We then apply machine learning algorithms on the data stored in the blockchain to analyze the success rate of device classification, modeling both an informed and a blind attacker. Our results demonstrate success rates over 90\% in classifying devices. We propose three timestamp obfuscation methods, namely combining multiple packets into a single transaction, merging ledgers of multiple devices, and randomly delaying transactions, to reduce the success rate in classifying devices. The proposed timestamp obfuscation methods can reduce the classification success rates to as low as 20%

    Security Requirement Analysis of Blockchain-based E-Voting Systems

    Full text link
    In democratic countries such as India, voting is a fundamental right given to citizens of their countries. Citizens need to physically present and cast their vote in ballot-paper-based voting systems. Most of the citizens fail to fulfill this constraint and have stayed away from their fundamental duty. Electronic-voting systems are often considered one efficient alternative in such situations. Blockchain Technology is an emerging technology that can provide a real solution as it is characterized by immutable, transparent, anonymous, and decentralized properties. This paper presents a security requirement analysis for e-voting systems and evaluates blockchain technology against these requirements

    Network Group Psychological Education of College Students

    Get PDF
    Based on the perspective of psychology, this paper analyzes the causes and characteristics of college students’ network mass incidents, explores the psychological factors of college students’ network mass incidents, and puts forward the educational strategies to solve college students’ network mass incidents: No.1. Adhere to humanism and take appeals as the center; No.2. To improve the campus network public opinion guidance mechanism under the guidance of relevant social cognition theories; No.3. Strengthen communication and improve communication skills; No.4. Promote information disclosure and transparency, and eliminate uncertainty and ambiguity

    Cyber Commodification

    Get PDF
    When it comes to commodification on the Internet, it is a wild, wild World Wide Web. Researching encyclopedia articles for Wikipedia is an unpaid labor of love, but connecting to your friends on Facebook is a $100 billion enterprise. Newspaper classified advertisements are definitely commercial, but their equivalent on Craigslist was mostly non-commercial – until the Delaware Chancery Court stepped in. Selling your organs is prohibited in the United States, whereas selling hair promises to rescue third-world citizens from poverty. Selling sex is illegal as prostitution, but selling adultery online is a hot new business model. And a small company offering a free service to academics has quietly become the dominant method for disseminating academic legal research, quietly beating massive commercial data providers without anyone initially noticing. This Article explores these and other recent developments by discussing the challenging legal issues raised by Internet commodification of what is often unpaid labor
    • …
    corecore