Journal article 134 views 23 downloads
Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach
Sustainability, Volume: 15, Issue: 13, Start page: 10068
Swansea University Author: Yang Liu
-
PDF | Version of Record
© 2023 by the authors. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Download (1.25MB)
DOI (Published version): 10.3390/su151310068
Abstract
The Internet of Things (IoT) has been considered in various fields in the last decade. With the increasing number of IoT devices in the community, secure, accessible, and reliable infrastructure for processing and storing computed data has become necessary. Since traditional security protocols are u...
Published in: | Sustainability |
---|---|
ISSN: | 2071-1050 |
Published: |
MDPI AG
2023
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa67207 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
first_indexed |
2024-08-29T11:50:01Z |
---|---|
last_indexed |
2024-08-29T11:50:01Z |
id |
cronfa67207 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0" encoding="utf-8"?><rfc1807 xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"><bib-version>v2</bib-version><id>67207</id><entry>2024-07-29</entry><title>Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach</title><swanseaauthors><author><sid>ba37dab58c9093dc63c79001565b75d4</sid><ORCID>0000-0003-2486-5765</ORCID><firstname>Yang</firstname><surname>Liu</surname><name>Yang Liu</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2024-07-29</date><deptcode>MACS</deptcode><abstract>The Internet of Things (IoT) has been considered in various fields in the last decade. With the increasing number of IoT devices in the community, secure, accessible, and reliable infrastructure for processing and storing computed data has become necessary. Since traditional security protocols are unsuitable for IoT devices, IoT implementation is fraught with privacy and security challenges. Thus, blockchain technology has become an effective solution to the problems of IoT security. Blockchain is an empirical data distribution and storage model involving point-to-point transmission, consensus mechanism, asymmetric encryption, smart contract, and other computer technologies. Security and privacy are becoming increasingly important in using the IoT. Therefore, this study provides a comprehensive framework for classifying security criteria based on blockchain technology. Another goal of the present study is to identify causal relationship factors for the security issue using the Fuzzy Decision-Making Trial-and-Evaluation Laboratory (FDEMATEL) approach. In order to deal with uncertainty in human judgment, fuzzy logic is considered an effective tool. The present study’s results show the proposed approach’s efficiency. Authentication (CR6), intrusion detection (CR4), and availability (CR5) were also introduced as the most effective and essential criteria, respectively.</abstract><type>Journal Article</type><journal>Sustainability</journal><volume>15</volume><journalNumber>13</journalNumber><paginationStart>10068</paginationStart><paginationEnd/><publisher>MDPI AG</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint/><issnElectronic>2071-1050</issnElectronic><keywords>network security and privacy; blockchain technology; cause and effect; fuzzy DEMATEL</keywords><publishedDay>25</publishedDay><publishedMonth>6</publishedMonth><publishedYear>2023</publishedYear><publishedDate>2023-06-25</publishedDate><doi>10.3390/su151310068</doi><url/><notes/><college>COLLEGE NANME</college><department>Mathematics and Computer Science School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>MACS</DepartmentCode><institution>Swansea University</institution><apcterm>Another institution paid the OA fee</apcterm><funders>This work is supported by National Key Research and Development Program of China (No. 2020YFB1005805), Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies (2022B1212010005), Shenzhen Stable Supporting Program (General Project) (No. GXWD20201230155427003-20200821160539001), and China Southern Power Grid Technological Project (No. GDKJXM20201922).</funders><projectreference/><lastEdited>2024-08-29T12:51:55.6008638</lastEdited><Created>2024-07-29T12:47:20.5200140</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Firuz</firstname><surname>Kamalov</surname><order>1</order></author><author><firstname>Mehdi</firstname><surname>Gheisari</surname><order>2</order></author><author><firstname>Yang</firstname><surname>Liu</surname><orcid>0000-0003-2486-5765</orcid><order>3</order></author><author><firstname>Mohammad Reza</firstname><surname>Feylizadeh</surname><order>4</order></author><author><firstname>Sherif</firstname><surname>Moussa</surname><order>5</order></author></authors><documents><document><filename>67207__31172__6f24fa3bd3d24dcf8f21a28819395d65.pdf</filename><originalFilename>67207.VoR.pdf</originalFilename><uploaded>2024-08-29T12:50:37.3827286</uploaded><type>Output</type><contentLength>1306264</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><documentNotes>© 2023 by the authors. This article is an open access article distributed under the terms and
conditions of the Creative Commons Attribution (CC BY) license.</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language><licence>https://creativecommons.org/licenses/by/4.0/</licence></document></documents><OutputDurs/></rfc1807> |
spelling |
v2 67207 2024-07-29 Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach ba37dab58c9093dc63c79001565b75d4 0000-0003-2486-5765 Yang Liu Yang Liu true false 2024-07-29 MACS The Internet of Things (IoT) has been considered in various fields in the last decade. With the increasing number of IoT devices in the community, secure, accessible, and reliable infrastructure for processing and storing computed data has become necessary. Since traditional security protocols are unsuitable for IoT devices, IoT implementation is fraught with privacy and security challenges. Thus, blockchain technology has become an effective solution to the problems of IoT security. Blockchain is an empirical data distribution and storage model involving point-to-point transmission, consensus mechanism, asymmetric encryption, smart contract, and other computer technologies. Security and privacy are becoming increasingly important in using the IoT. Therefore, this study provides a comprehensive framework for classifying security criteria based on blockchain technology. Another goal of the present study is to identify causal relationship factors for the security issue using the Fuzzy Decision-Making Trial-and-Evaluation Laboratory (FDEMATEL) approach. In order to deal with uncertainty in human judgment, fuzzy logic is considered an effective tool. The present study’s results show the proposed approach’s efficiency. Authentication (CR6), intrusion detection (CR4), and availability (CR5) were also introduced as the most effective and essential criteria, respectively. Journal Article Sustainability 15 13 10068 MDPI AG 2071-1050 network security and privacy; blockchain technology; cause and effect; fuzzy DEMATEL 25 6 2023 2023-06-25 10.3390/su151310068 COLLEGE NANME Mathematics and Computer Science School COLLEGE CODE MACS Swansea University Another institution paid the OA fee This work is supported by National Key Research and Development Program of China (No. 2020YFB1005805), Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies (2022B1212010005), Shenzhen Stable Supporting Program (General Project) (No. GXWD20201230155427003-20200821160539001), and China Southern Power Grid Technological Project (No. GDKJXM20201922). 2024-08-29T12:51:55.6008638 2024-07-29T12:47:20.5200140 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Firuz Kamalov 1 Mehdi Gheisari 2 Yang Liu 0000-0003-2486-5765 3 Mohammad Reza Feylizadeh 4 Sherif Moussa 5 67207__31172__6f24fa3bd3d24dcf8f21a28819395d65.pdf 67207.VoR.pdf 2024-08-29T12:50:37.3827286 Output 1306264 application/pdf Version of Record true © 2023 by the authors. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. true eng https://creativecommons.org/licenses/by/4.0/ |
title |
Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach |
spellingShingle |
Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach Yang Liu |
title_short |
Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach |
title_full |
Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach |
title_fullStr |
Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach |
title_full_unstemmed |
Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach |
title_sort |
Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach |
author_id_str_mv |
ba37dab58c9093dc63c79001565b75d4 |
author_id_fullname_str_mv |
ba37dab58c9093dc63c79001565b75d4_***_Yang Liu |
author |
Yang Liu |
author2 |
Firuz Kamalov Mehdi Gheisari Yang Liu Mohammad Reza Feylizadeh Sherif Moussa |
format |
Journal article |
container_title |
Sustainability |
container_volume |
15 |
container_issue |
13 |
container_start_page |
10068 |
publishDate |
2023 |
institution |
Swansea University |
issn |
2071-1050 |
doi_str_mv |
10.3390/su151310068 |
publisher |
MDPI AG |
college_str |
Faculty of Science and Engineering |
hierarchytype |
|
hierarchy_top_id |
facultyofscienceandengineering |
hierarchy_top_title |
Faculty of Science and Engineering |
hierarchy_parent_id |
facultyofscienceandengineering |
hierarchy_parent_title |
Faculty of Science and Engineering |
department_str |
School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science |
document_store_str |
1 |
active_str |
0 |
description |
The Internet of Things (IoT) has been considered in various fields in the last decade. With the increasing number of IoT devices in the community, secure, accessible, and reliable infrastructure for processing and storing computed data has become necessary. Since traditional security protocols are unsuitable for IoT devices, IoT implementation is fraught with privacy and security challenges. Thus, blockchain technology has become an effective solution to the problems of IoT security. Blockchain is an empirical data distribution and storage model involving point-to-point transmission, consensus mechanism, asymmetric encryption, smart contract, and other computer technologies. Security and privacy are becoming increasingly important in using the IoT. Therefore, this study provides a comprehensive framework for classifying security criteria based on blockchain technology. Another goal of the present study is to identify causal relationship factors for the security issue using the Fuzzy Decision-Making Trial-and-Evaluation Laboratory (FDEMATEL) approach. In order to deal with uncertainty in human judgment, fuzzy logic is considered an effective tool. The present study’s results show the proposed approach’s efficiency. Authentication (CR6), intrusion detection (CR4), and availability (CR5) were also introduced as the most effective and essential criteria, respectively. |
published_date |
2023-06-25T12:51:54Z |
_version_ |
1808722626991882240 |
score |
11.037603 |