2021/3/5两篇综述的学习笔记

两篇综述

两篇综述
1.Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures

2.Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges

第一篇主要它的学习写作手法而第二篇则为了拓宽思路,同时注意自己在写的时候要避免雷同

1.Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures

1.Introduction

段1:分析现状Iot,提出问题challenges like security and privacy,列举2013年到目前出现的隐私泄露安全问题的案例,最后总结Hence, security and privacy in complex and resource-constrained IoT environments are
big challenges and need to be tackled effectively.
段2:指出现在网络攻击的日趋复杂,物联网面临的安全挑战也日益增加,传统的网络安全系统和软件不能有效侦察攻击,进而引出 Machine learning 和Blockchain ,然后介绍它们的好处优点
段3:privacy和security的关系

后面是论文挑选标准 paper collection criteria
Paper collection:
Contributions of the article:

2.Threats in IOT

介绍了threats,比较2017-2019其他suvey的贡献并将threats分为两类,一类specific threats,另一类common threats

Security threats

物联网领域中不同类别的安全和隐私威胁:
在这里插入图片描述
介绍了三种安全攻击

1.Denial of Service(拒绝服务攻击)

在这里插入图片描述

2.Man-in-the-middle

在这里插入图片描述

3.Malware

在这里插入图片描述

Privacy threats
1.MIMT

在这里插入图片描述

2.Data Privacy

在这里插入图片描述
在这里插入图片描述
总结了各种安全和隐私威胁的比较、类型、影响和可行的解决方案(表2和表3)

3.Literature survey

提供了现有文献综述,并对基于ML算法和BC技术为解决物联网安全和隐私问题所做的努力进行了分类。本节分为两个小节,即ML算法和BC技术。

Existing Review Papers Using Machine Learning Algorithms as a Solution

讨论一些ML算法,这些已经被证明在降低安全性和隐私攻击方面非常有帮助。
并从两个方向讨论:Security effortsPrivacy efforts

Existing Review Papers Using Blockchain as a Solution

也是从Security effortsPrivacy efforts两个方向讨论

4.SOLUTIONS TO IOT THREATS

Existing Solutions Using Machine Learning Algorithms

介绍ML,然后从Security effortsPrivacy efforts两个方面

Existing Solutions Using Blockchain Algorithms

介绍BC,然后从Security effortsPrivacy efforts两个方面

Existing Solutions Using Machine Learning and Blockchain Algorithms

讨论现有的用ML算法和BC技术的解决方法
Security solutionsPrivacy solutions两个方面讨论

5.RESEARCH CHALLENGES

1.Challenge to Machine Learning Algorithms in IoT

limitations:

  • Scalability and Complexity
  • Latency
  • Compatibility
  • Vulnerability
2.Challenge to Blockchain in IoT

limitations:

  • Latency and speed
  • Computation, processing, and data storage
  • Compatibility and Standardization
  • Vulnerability
Challenges to ML & BC in IoT

limitations:

  • Storage
  • Latency challenges
  • Scalability
  • Vulnerability

6.CONCLUSION AND FUTURE WORK

对整个内容的回顾
结论
提出现状不足在这里插入图片描述
未来目标

2.Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges

It focus on several vital aspects of the integration of blockchain and edge computing: motivations, frameworks, enabling functionalities, and challenges.

1.INTRODUCTION

2.AN OVERVIEW OF BLOCKCHAIN AND E DGE COMPUTING

在这里插入图片描述

3.MOTIVATIONS AND REQUIREMENTS OF INTEGRATION OF BLOCKCHAIN AND EDGE COMPUTING

  • What Is the Integration of Blockchain and Edge Computing
  • Why Do We Need Integration of Blockchain and Edge Computing
    • 1.The Security of Edge Computing Is Challenged
    • 2.Technical Challenges and Limitations of Blockchain
    • 3.The Benefits Brought by the Integration of Blockchain and Edge Computing
  • The Requirements of Integration of Blockchain and Edge Computing
    • 1.Authentication
    • 2.Adaptability
    • 3.Network security
    • 4.Data integrity
    • 5.Verifiable computation
    • 6.Low latency

4.FRAMEWORKS OF INTEGRATED BLOCKCHAIN AND EDGE COMPUTING SYSTEMS

typical frameworks (architectures) of integrated blockchain

1. Related Work
2. A General Framework

分两块:
基于私有区块链的本地网络,由终端节点(设备)和边缘服务器(雾)组成;
基于区块链的P2P网络的服务器

5.NETWORK , STORAGE , AND COMPUTATION OF INTEGRATED BLOCKCHAIN AND EDGE COMPUTING SYSTEMS

讨论集成的区块链和边缘计算系统如何满足网络、存储和计算的需求。在每个方向上,介绍了一些启用技术

确保安全从三个角度

network: A Software-Defined Fog 和 The Software Defined Components and Virtual Resources

storage: Decentralized Data Storage via Blockchains , The Scalable Blockchain Database, Storage Over Blockchain Name System, Use in Fog/Edge Computing Infrastructures

computation: Computation Offloading at the Edges, Secure Multiparty Computations on Blockchain, Network Computing and Blockchain, A Scalable Verification for Ethereum Computer, A Blockchain-Based Fully Distributed Cloud Infrastructure

6. CHALLENGES AND BROADER PERSPECTIVES

Challenge:

  • Scalability Enhancements
  • Security and Privacy
  • Self-Organization
  • Function Integration
  • Resource Management

Broader Perspectives:

  • Directed Acyclic Graph
  • Blockchain for Big Data
  • Interaction With Big Data Analytics
  • Contribution to Artificial Intelligence
  • Benefits From Artificial Intelligence

7.CONCLUSION

  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 1
    评论
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值