Browse > Article
http://dx.doi.org/10.20465/KIOTS.2019.5.2.033

A Scheme for Information Protection using Blockchain in IoT Environment  

Lee, Keun-Ho (Div. of Information Communication Technology, BaekSeok University)
Publication Information
Journal of Internet of Things and Convergence / v.5, no.2, 2019 , pp. 33-39 More about this Journal
Abstract
Entering the 4th industrial revolution, many technologies are developing and various threats are emerging. In order to cope with such threats, research is being conducted in many fields. Even in the development of various fields, the threats caused by the development of medical technology and intelligent vehicles are the threats to life due to misinformation about medical care and the threats to life by preventing the safe operation of people through intelligent vehicles. In this paper, as the patient's information is important, the private blockchain is used to increase the safety, efficiency, and scalability of the patient's medical records. We propose an information protection technique using blockchain technology to hack the car system and threaten the driver's life, solve privacy problems by identifying personal information and differences, and prevent forgery in the Internet of Things.
Keywords
Internet of Things; Medical Information; Intelligent Vehicles; Blockchain; Threats;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 M.J.Jung, K.H.Lee and S.H.Yun, "Design of Medical Information Security System Using Blockchain", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.40-41, 2019.
2 J.T.Lee, "Identify key issues and analyze future development directions through analysis of technology and market trends in medical information systems.". Paper presented at the Korean Society for Intelligent Information Systems, pp.135-142, 2013.
3 Y.K.Kim "Development Technics and Future Trend of Electronic Engine Control Unit," The Korean Society Of Automotive Engineers, Vol.19, No.2, pp.26-31, 1997.
4 Y.S.Hong, "Evaluation of Function and Safety of Autonomous Vehicles," The Korea Transport Institute, pp.13-18, 2015.
5 G.M.Lee, H.J.Cha and J.C.Kim "Model-based Design and Validation of ADAS Control Software on Multicore ECU," The Korean Society Of Automotive Engineers, pp.335-335, 2016.
6 The Guardian, Woolf, N. "DDoS attack that disrupted internet was largest of its kind in history, experts say." [Internet], https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet
7 B.J.Park, T.J.Lee and J.Gwak, "Blockchain-Based IoT Device Authentication Scheme", Journal of the Korea Institute of Information Security and Cryptology, Vol.27, No.2, pp.343-351, 2017.   DOI
8 K.W.Bae, K.H.Lee and D.H.Kim, "A Scheme for IoT Authenticatino Using Blockchain Forgery/Tamper Protection, The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.46-48, 2019.
9 J.H.Choi, K.H.Lee and S.H.Yun, "Abnormal Process Detection Using Blockchain", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.67-68, 2019.
10 E.G.Hong, S.J.Lee and S.H.Seo, "Blockchain Technology Trends for the Internet of Things", Journal of Information Security, Vol.9, No.1, pp.38-46, 2018.
11 Hyperledger Architecture, Volume 1, https://www.hyperledger.org/wp-content/uploads/2017/08/Hyperledger_Arch_WG_Paper_1_Consensus.pdf, 2018.
12 H.Y.Kim, "Analysis of Security Threats and Countermeasures on Blockchain Platforms," Korean Institute of Information Technology, Vol.16, No.5, pp.103-112, 2018.   DOI
13 H.J.Chu, I.H.Song and B.G.Choi, "A Decentralized Test Management Tool Based on Blockchain Technique," The Korean Institute of Information Scientists and Engineers, Vol.25, No.7, pp.321-328, 2019.
14 J.H.Hong, K.H.Lee and S.H.Yun, "A Scheme for ECU Application Technique using Blockchain", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.34-35, 2019.
15 J.H.Yoon and M.H.Kim, "Private blockchain and smart contract-based high reliability crowd sensing compensation mechanism". Journal of Information Security and Cryptology, Vol.28, No.4, pp.999-1007, .2018.