No Cover Image

Journal article 134 views 23 downloads

Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach

Firuz Kamalov, Mehdi Gheisari, Yang Liu Orcid Logo, Mohammad Reza Feylizadeh, Sherif Moussa

Sustainability, Volume: 15, Issue: 13, Start page: 10068

Swansea University Author: Yang Liu Orcid Logo

  • 67207.VoR.pdf

    PDF | Version of Record

    © 2023 by the authors. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.

    Download (1.25MB)

Check full text

DOI (Published version): 10.3390/su151310068

Abstract

The Internet of Things (IoT) has been considered in various fields in the last decade. With the increasing number of IoT devices in the community, secure, accessible, and reliable infrastructure for processing and storing computed data has become necessary. Since traditional security protocols are u...

Full description

Published in: Sustainability
ISSN: 2071-1050
Published: MDPI AG 2023
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa67207
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2024-08-29T11:50:01Z
last_indexed 2024-08-29T11:50:01Z
id cronfa67207
recordtype SURis
fullrecord <?xml version="1.0" encoding="utf-8"?><rfc1807 xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"><bib-version>v2</bib-version><id>67207</id><entry>2024-07-29</entry><title>Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach</title><swanseaauthors><author><sid>ba37dab58c9093dc63c79001565b75d4</sid><ORCID>0000-0003-2486-5765</ORCID><firstname>Yang</firstname><surname>Liu</surname><name>Yang Liu</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2024-07-29</date><deptcode>MACS</deptcode><abstract>The Internet of Things (IoT) has been considered in various fields in the last decade. With the increasing number of IoT devices in the community, secure, accessible, and reliable infrastructure for processing and storing computed data has become necessary. Since traditional security protocols are unsuitable for IoT devices, IoT implementation is fraught with privacy and security challenges. Thus, blockchain technology has become an effective solution to the problems of IoT security. Blockchain is an empirical data distribution and storage model involving point-to-point transmission, consensus mechanism, asymmetric encryption, smart contract, and other computer technologies. Security and privacy are becoming increasingly important in using the IoT. Therefore, this study provides a comprehensive framework for classifying security criteria based on blockchain technology. Another goal of the present study is to identify causal relationship factors for the security issue using the Fuzzy Decision-Making Trial-and-Evaluation Laboratory (FDEMATEL) approach. In order to deal with uncertainty in human judgment, fuzzy logic is considered an effective tool. The present study’s results show the proposed approach’s efficiency. Authentication (CR6), intrusion detection (CR4), and availability (CR5) were also introduced as the most effective and essential criteria, respectively.</abstract><type>Journal Article</type><journal>Sustainability</journal><volume>15</volume><journalNumber>13</journalNumber><paginationStart>10068</paginationStart><paginationEnd/><publisher>MDPI AG</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint/><issnElectronic>2071-1050</issnElectronic><keywords>network security and privacy; blockchain technology; cause and effect; fuzzy DEMATEL</keywords><publishedDay>25</publishedDay><publishedMonth>6</publishedMonth><publishedYear>2023</publishedYear><publishedDate>2023-06-25</publishedDate><doi>10.3390/su151310068</doi><url/><notes/><college>COLLEGE NANME</college><department>Mathematics and Computer Science School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>MACS</DepartmentCode><institution>Swansea University</institution><apcterm>Another institution paid the OA fee</apcterm><funders>This work is supported by National Key Research and Development Program of China (No. 2020YFB1005805), Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies (2022B1212010005), Shenzhen Stable Supporting Program (General Project) (No. GXWD20201230155427003-20200821160539001), and China Southern Power Grid Technological Project (No. GDKJXM20201922).</funders><projectreference/><lastEdited>2024-08-29T12:51:55.6008638</lastEdited><Created>2024-07-29T12:47:20.5200140</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Firuz</firstname><surname>Kamalov</surname><order>1</order></author><author><firstname>Mehdi</firstname><surname>Gheisari</surname><order>2</order></author><author><firstname>Yang</firstname><surname>Liu</surname><orcid>0000-0003-2486-5765</orcid><order>3</order></author><author><firstname>Mohammad Reza</firstname><surname>Feylizadeh</surname><order>4</order></author><author><firstname>Sherif</firstname><surname>Moussa</surname><order>5</order></author></authors><documents><document><filename>67207__31172__6f24fa3bd3d24dcf8f21a28819395d65.pdf</filename><originalFilename>67207.VoR.pdf</originalFilename><uploaded>2024-08-29T12:50:37.3827286</uploaded><type>Output</type><contentLength>1306264</contentLength><contentType>application/pdf</contentType><version>Version of Record</version><cronfaStatus>true</cronfaStatus><documentNotes>© 2023 by the authors. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.</documentNotes><copyrightCorrect>true</copyrightCorrect><language>eng</language><licence>https://creativecommons.org/licenses/by/4.0/</licence></document></documents><OutputDurs/></rfc1807>
spelling v2 67207 2024-07-29 Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach ba37dab58c9093dc63c79001565b75d4 0000-0003-2486-5765 Yang Liu Yang Liu true false 2024-07-29 MACS The Internet of Things (IoT) has been considered in various fields in the last decade. With the increasing number of IoT devices in the community, secure, accessible, and reliable infrastructure for processing and storing computed data has become necessary. Since traditional security protocols are unsuitable for IoT devices, IoT implementation is fraught with privacy and security challenges. Thus, blockchain technology has become an effective solution to the problems of IoT security. Blockchain is an empirical data distribution and storage model involving point-to-point transmission, consensus mechanism, asymmetric encryption, smart contract, and other computer technologies. Security and privacy are becoming increasingly important in using the IoT. Therefore, this study provides a comprehensive framework for classifying security criteria based on blockchain technology. Another goal of the present study is to identify causal relationship factors for the security issue using the Fuzzy Decision-Making Trial-and-Evaluation Laboratory (FDEMATEL) approach. In order to deal with uncertainty in human judgment, fuzzy logic is considered an effective tool. The present study’s results show the proposed approach’s efficiency. Authentication (CR6), intrusion detection (CR4), and availability (CR5) were also introduced as the most effective and essential criteria, respectively. Journal Article Sustainability 15 13 10068 MDPI AG 2071-1050 network security and privacy; blockchain technology; cause and effect; fuzzy DEMATEL 25 6 2023 2023-06-25 10.3390/su151310068 COLLEGE NANME Mathematics and Computer Science School COLLEGE CODE MACS Swansea University Another institution paid the OA fee This work is supported by National Key Research and Development Program of China (No. 2020YFB1005805), Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies (2022B1212010005), Shenzhen Stable Supporting Program (General Project) (No. GXWD20201230155427003-20200821160539001), and China Southern Power Grid Technological Project (No. GDKJXM20201922). 2024-08-29T12:51:55.6008638 2024-07-29T12:47:20.5200140 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Firuz Kamalov 1 Mehdi Gheisari 2 Yang Liu 0000-0003-2486-5765 3 Mohammad Reza Feylizadeh 4 Sherif Moussa 5 67207__31172__6f24fa3bd3d24dcf8f21a28819395d65.pdf 67207.VoR.pdf 2024-08-29T12:50:37.3827286 Output 1306264 application/pdf Version of Record true © 2023 by the authors. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. true eng https://creativecommons.org/licenses/by/4.0/
title Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach
spellingShingle Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach
Yang Liu
title_short Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach
title_full Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach
title_fullStr Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach
title_full_unstemmed Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach
title_sort Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach
author_id_str_mv ba37dab58c9093dc63c79001565b75d4
author_id_fullname_str_mv ba37dab58c9093dc63c79001565b75d4_***_Yang Liu
author Yang Liu
author2 Firuz Kamalov
Mehdi Gheisari
Yang Liu
Mohammad Reza Feylizadeh
Sherif Moussa
format Journal article
container_title Sustainability
container_volume 15
container_issue 13
container_start_page 10068
publishDate 2023
institution Swansea University
issn 2071-1050
doi_str_mv 10.3390/su151310068
publisher MDPI AG
college_str Faculty of Science and Engineering
hierarchytype
hierarchy_top_id facultyofscienceandengineering
hierarchy_top_title Faculty of Science and Engineering
hierarchy_parent_id facultyofscienceandengineering
hierarchy_parent_title Faculty of Science and Engineering
department_str School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science
document_store_str 1
active_str 0
description The Internet of Things (IoT) has been considered in various fields in the last decade. With the increasing number of IoT devices in the community, secure, accessible, and reliable infrastructure for processing and storing computed data has become necessary. Since traditional security protocols are unsuitable for IoT devices, IoT implementation is fraught with privacy and security challenges. Thus, blockchain technology has become an effective solution to the problems of IoT security. Blockchain is an empirical data distribution and storage model involving point-to-point transmission, consensus mechanism, asymmetric encryption, smart contract, and other computer technologies. Security and privacy are becoming increasingly important in using the IoT. Therefore, this study provides a comprehensive framework for classifying security criteria based on blockchain technology. Another goal of the present study is to identify causal relationship factors for the security issue using the Fuzzy Decision-Making Trial-and-Evaluation Laboratory (FDEMATEL) approach. In order to deal with uncertainty in human judgment, fuzzy logic is considered an effective tool. The present study’s results show the proposed approach’s efficiency. Authentication (CR6), intrusion detection (CR4), and availability (CR5) were also introduced as the most effective and essential criteria, respectively.
published_date 2023-06-25T12:51:54Z
_version_ 1808722626991882240
score 11.037603