Browse > Article
http://dx.doi.org/10.33851/JMIS.2019.6.3.139

Apply Blockchain to Overcome Wi-Fi Vulnerabilities  

Kim, Seong-Kyu (Steve) (GOB Universal PTE., LTD)
Publication Information
Journal of Multimedia Information System / v.6, no.3, 2019 , pp. 139-146 More about this Journal
Abstract
This paper, wireless internet such as Wi-Fi has a vulnerability to security. Blockchain also means a 'Ledger' in which transaction information that occurs on a public or private network is encrypted and shared among the network participants. Blockchain maintains information integrity by making it impossible for a particular node to tamper with information arbitrarily, a feature that would result in changes in the overall blockchain hash value if any one transaction information that constitutes a block was changed. The complete sharing of information through a peer-to-peer network will also cripple hacking attempts from outside, targeting specialized nodes, and prepare for the "single point of failure" risk of the entire system being shut down. Due to the value of these Blockchain, various types of Blockchain are emerging, and related technology development efforts are also actively underway. Various business models such as public block chains such as Bitcoin, as well as private block chains that allow only certain authorized nodes to participate, or consortium block chains operated by a select few licensed groups, are being utilized. In terms of technological evolution, Blockchain also shows the potential to grow beyond cryptocurrency into an online platform that allows all kinds of transactions with the advent of 'Smart Contract'. By using Blockchain technology, the company makes suggestions to overcome the vulnerability of wireless Internet.
Keywords
Blockchain; Big-data; Artificial Intelligence; Smart Contract; Wi-Fi;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Nakamoto S., "Bitcoin: a peer-to-peer electronic cash system," pp 1-9, 2008.
2 J-H Huh and K Seo, "Blockchain-based mobile fingerprint verification and automatic log-in platform for future computing," The Journal of Supercomputing, Springer, pp.1-17, 2018.
3 Y Nir Kshetri, "Blockchain's roles in meeting key supply chain management objectives," International Journal of Information Management, Elsevier, 80-82., 2018.
4 Alexander Savelyev, "Copyright in the Blockchain era: Promises and challenges," Computer Law & Security Review, Elsevier, 2018.
5 J.H. H, Otgonchimeg S., and Seo K., "Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid system," The Journal of Supercomputing, 72(5), 1862-1877, 2018.
6 Nir Kshetri, "Blockchain's roles in strengthening cybersecurity and protecting privacy," Telecommunications Policy, pp 20-23, 2017.
7 S-K Kim, U-M Kim, J-H Huh, "A Study on Improvement of Blockchain Application to Overcome Vulnerability of IoT Multiplatform Security," Energies, MDPI, Vol.12, No.3, pp.1-29, 2019.
8 J-H Huh and K Seo, "A Typeface Searching Technique Using Evaluation Functions for Shapes and Positions of Alphabets Used in Ancient Books for Image Searching," International Journal of Hybrid Information Technology, SERSC, Vol.9, No.9, pp. 283-292, 2016.
9 Richard B. Levin, Peter Waltz, and Holly LaCount, "Betting Blockchain Will Change Everything - SEC and CFTC Regulation of Blockchain Technology, Handbook of Blockchain," Digital Finance, and Inclusion, Elsevier, Vol. 2, 187-212, 2017.
10 J-H Huh, "Server Operation and Virtualization to Save Energy and Cost in Future Sustainable Computing," Sustainability, MDPI, Vol.10, No.6, pp.1-20, 2018.   DOI
11 Christoph Prybila, Stefan Schulte, Christoph Hochreiner, and Ingo Webe, "Runtime verification for business processes utilizing the Bitcoin Blockchain," Future Generation Computer Systems, Elsevier, 2017.
12 S-K Kim and J-H Huh, "A Study on the Improvement of Smart Grid Security Performance and Blockchain Smart Grid Perspective," Energies, MDPI, Vol.11, No.7, pp.1-22, 2018.
13 Yan Chen, "Blockchain tokens and the potential democratization of entrepreneurship and innovation," SSRN, pp.12-13, 2017.
14 Bogner, A., Chanson, M., & Meeuw, A., "A decentralised sharing app running a smart contract on the ethereum blockchain," In Proceedings of the 6th International Conference on the Internet of Things, pp. 177-178. ACM, 2016.
15 J. H Huh, Koh, T, Seo, K., "Design of a shipboard outside communication network and the test bed using PLC: for the Workers' safety management during shipbuilding process," In Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication (p. 1-6). ACM, 2016.
16 Casino, F., Dasaklis, T. K., & Patsakis, C., "A systematic literature review of blockchain-based applications: current status, classification and open issues." Elsevier, Telematics and Informatics, 2018.
17 Gatteschi, V., Lamberti, F., Demartini, C., Pranteda, C., & Santamaría, V., "To blockchain or not to blockchain: That is the question," IT Professional, 20(2), 62-74, 2018.   DOI
18 Guo, Y., & Liang, C., "Blockchain application and outlook in the banking industry," Financial Innovation, 2(1), 24, 2016.   DOI
19 Herian, R., "Regulating disruption: Blockchain, Gdpr, and questions of data sovereignty," Journal of Internet Law, 22(2), 1, 2018.
20 Andoni, M., et al., "Blockchain technology in the energy sector: A systematic review of challenges and opportunities," Renewable and Sustainable Energy Reviews, Elsevier, 100, 143-174 2019.   DOI
21 J.H Huh., T Koh., and K Seo, "NMEA2000 ship area network design and test bed experiment using power line communication with the 3-phase 3-line delta connection method," International Journal of Applied Engineering Research, Research India Publications, 10(11), 27789-27797, 2015.
22 Schwerin, S., "Blockchain and privacy protection in the case of the european general data protection regulation (GDPR): a delphi study," The Journal of the British Blockchain Association, 1(1), 3554, 2018.   DOI
23 Fabiano, N., "The Internet of Things ecosystem: The blockchain and privacy issues. The challenge for a global privacy standard," In 2017 IEEE International Conference on Internet of Things for the Global Community (IoTGC), pp. 1-7, 2017.
24 J-H Huh and K Seo, "RUDP design and implementation using OPNET simulation," Computer science and its applications. Springer, 913-919, 2015.
25 J. Park et al., "Design of the real-time mobile push system for implementation of the shipboard smart working," In Advances in Computer Science and Ubiquitous Computing, Springer, 541-548, 2015.