No Cover Image

Journal article 134 views 23 downloads

Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach

Firuz Kamalov, Mehdi Gheisari, Yang Liu Orcid Logo, Mohammad Reza Feylizadeh, Sherif Moussa

Sustainability, Volume: 15, Issue: 13, Start page: 10068

Swansea University Author: Yang Liu Orcid Logo

  • 67207.VoR.pdf

    PDF | Version of Record

    © 2023 by the authors. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.

    Download (1.25MB)

Check full text

DOI (Published version): 10.3390/su151310068

Abstract

The Internet of Things (IoT) has been considered in various fields in the last decade. With the increasing number of IoT devices in the community, secure, accessible, and reliable infrastructure for processing and storing computed data has become necessary. Since traditional security protocols are u...

Full description

Published in: Sustainability
ISSN: 2071-1050
Published: MDPI AG 2023
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa67207
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract: The Internet of Things (IoT) has been considered in various fields in the last decade. With the increasing number of IoT devices in the community, secure, accessible, and reliable infrastructure for processing and storing computed data has become necessary. Since traditional security protocols are unsuitable for IoT devices, IoT implementation is fraught with privacy and security challenges. Thus, blockchain technology has become an effective solution to the problems of IoT security. Blockchain is an empirical data distribution and storage model involving point-to-point transmission, consensus mechanism, asymmetric encryption, smart contract, and other computer technologies. Security and privacy are becoming increasingly important in using the IoT. Therefore, this study provides a comprehensive framework for classifying security criteria based on blockchain technology. Another goal of the present study is to identify causal relationship factors for the security issue using the Fuzzy Decision-Making Trial-and-Evaluation Laboratory (FDEMATEL) approach. In order to deal with uncertainty in human judgment, fuzzy logic is considered an effective tool. The present study’s results show the proposed approach’s efficiency. Authentication (CR6), intrusion detection (CR4), and availability (CR5) were also introduced as the most effective and essential criteria, respectively.
Keywords: network security and privacy; blockchain technology; cause and effect; fuzzy DEMATEL
College: Faculty of Science and Engineering
Funders: This work is supported by National Key Research and Development Program of China (No. 2020YFB1005805), Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies (2022B1212010005), Shenzhen Stable Supporting Program (General Project) (No. GXWD20201230155427003-20200821160539001), and China Southern Power Grid Technological Project (No. GDKJXM20201922).
Issue: 13
Start Page: 10068