本文主要是介绍2021/3/5两篇综述的学习笔记,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!
BKA的学习笔记
- 两篇综述
- 1.Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures
- 1.Introduction
- 2.Threats in IOT
- Security threats
- 1.Denial of Service(拒绝服务攻击)
- 2.Man-in-the-middle
- 3.Malware
- Privacy threats
- 1.MIMT
- 2.Data Privacy
- 3.Literature survey
- Existing Review Papers Using Machine Learning Algorithms as a Solution
- Existing Review Papers Using Blockchain as a Solution
- 4.SOLUTIONS TO IOT THREATS
- Existing Solutions Using Machine Learning Algorithms
- Existing Solutions Using Blockchain Algorithms
- Existing Solutions Using Machine Learning and Blockchain Algorithms
- 5.RESEARCH CHALLENGES
- 1.Challenge to Machine Learning Algorithms in IoT
- 2.Challenge to Blockchain in IoT
- Challenges to ML & BC in IoT
- 6.CONCLUSION AND FUTURE WORK
- 2.Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges
- 1.INTRODUCTION
- 2.AN OVERVIEW OF BLOCKCHAIN AND E DGE COMPUTING
- 3.MOTIVATIONS AND REQUIREMENTS OF INTEGRATION OF BLOCKCHAIN AND EDGE COMPUTING
- 4.FRAMEWORKS OF INTEGRATED BLOCKCHAIN AND EDGE COMPUTING SYSTEMS
- 1. Related Work
- 2. A General Framework
- 5.NETWORK , STORAGE , AND COMPUTATION OF INTEGRATED BLOCKCHAIN AND EDGE COMPUTING SYSTEMS
- 6. CHALLENGES AND BROADER PERSPECTIVES
- 7.CONCLUSION
两篇综述
两篇综述
1.Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures
2.Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges
第一篇主要它的学习写作手法而第二篇则为了拓宽思路,同时注意自己在写的时候要避免雷同
1.Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures
1.Introduction
段1:分析现状Iot,提出问题challenges like security and privacy,列举2013年到目前出现的隐私泄露安全问题的案例,最后总结Hence, security and privacy in complex and resource-constrained IoT environments are
big challenges and need to be tackled effectively.
段2:指出现在网络攻击的日趋复杂,物联网面临的安全挑战也日益增加,传统的网络安全系统和软件不能有效侦察攻击,进而引出 Machine learning 和Blockchain ,然后介绍它们的好处优点
段3:privacy和security的关系
后面是论文挑选标准 paper collection criteria
Paper collection:
Contributions of the article:
2.Threats in IOT
介绍了threats,比较2017-2019其他suvey的贡献并将threats分为两类,一类specific threats,另一类common threats
Security threats
物联网领域中不同类别的安全和隐私威胁:
介绍了三种安全攻击
1.Denial of Service(拒绝服务攻击)
2.Man-in-the-middle
3.Malware
Privacy threats
1.MIMT
2.Data Privacy
总结了各种安全和隐私威胁的比较、类型、影响和可行的解决方案(表2和表3)
3.Literature survey
提供了现有文献综述,并对基于ML算法和BC技术为解决物联网安全和隐私问题所做的努力进行了分类。本节分为两个小节,即ML算法和BC技术。
Existing Review Papers Using Machine Learning Algorithms as a Solution
讨论一些ML算法,这些已经被证明在降低安全性和隐私攻击方面非常有帮助。
并从两个方向讨论:Security efforts,Privacy efforts
Existing Review Papers Using Blockchain as a Solution
也是从Security efforts,Privacy efforts两个方向讨论
4.SOLUTIONS TO IOT THREATS
Existing Solutions Using Machine Learning Algorithms
介绍ML,然后从Security efforts,Privacy efforts两个方面
Existing Solutions Using Blockchain Algorithms
介绍BC,然后从Security efforts,Privacy efforts两个方面
Existing Solutions Using Machine Learning and Blockchain Algorithms
讨论现有的用ML算法和BC技术的解决方法
从Security solutions,Privacy solutions两个方面讨论
5.RESEARCH CHALLENGES
1.Challenge to Machine Learning Algorithms in IoT
limitations:
- Scalability and Complexity
- Latency
- Compatibility
- Vulnerability
2.Challenge to Blockchain in IoT
limitations:
- Latency and speed
- Computation, processing, and data storage
- Compatibility and Standardization
- Vulnerability
Challenges to ML & BC in IoT
limitations:
- Storage
- Latency challenges
- Scalability
- Vulnerability
6.CONCLUSION AND FUTURE WORK
对整个内容的回顾
结论
提出现状不足
未来目标
2.Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges
It focus on several vital aspects of the integration of blockchain and edge computing: motivations, frameworks, enabling functionalities, and challenges.
1.INTRODUCTION
2.AN OVERVIEW OF BLOCKCHAIN AND E DGE COMPUTING
3.MOTIVATIONS AND REQUIREMENTS OF INTEGRATION OF BLOCKCHAIN AND EDGE COMPUTING
- What Is the Integration of Blockchain and Edge Computing
- Why Do We Need Integration of Blockchain and Edge Computing
- 1.The Security of Edge Computing Is Challenged
- 2.Technical Challenges and Limitations of Blockchain
- 3.The Benefits Brought by the Integration of Blockchain and Edge Computing
- The Requirements of Integration of Blockchain and Edge Computing
- 1.Authentication
- 2.Adaptability
- 3.Network security
- 4.Data integrity
- 5.Verifiable computation
- 6.Low latency
4.FRAMEWORKS OF INTEGRATED BLOCKCHAIN AND EDGE COMPUTING SYSTEMS
typical frameworks (architectures) of integrated blockchain
1. Related Work
2. A General Framework
分两块:
基于私有区块链的本地网络,由终端节点(设备)和边缘服务器(雾)组成;
基于区块链的P2P网络的服务器
5.NETWORK , STORAGE , AND COMPUTATION OF INTEGRATED BLOCKCHAIN AND EDGE COMPUTING SYSTEMS
讨论集成的区块链和边缘计算系统如何满足网络、存储和计算的需求。在每个方向上,介绍了一些启用技术
确保安全从三个角度
network: A Software-Defined Fog 和 The Software Defined Components and Virtual Resources
storage: Decentralized Data Storage via Blockchains , The Scalable Blockchain Database, Storage Over Blockchain Name System, Use in Fog/Edge Computing Infrastructures
computation: Computation Offloading at the Edges, Secure Multiparty Computations on Blockchain, Network Computing and Blockchain, A Scalable Verification for Ethereum Computer, A Blockchain-Based Fully Distributed Cloud Infrastructure
6. CHALLENGES AND BROADER PERSPECTIVES
Challenge:
- Scalability Enhancements
- Security and Privacy
- Self-Organization
- Function Integration
- Resource Management
Broader Perspectives:
- Directed Acyclic Graph
- Blockchain for Big Data
- Interaction With Big Data Analytics
- Contribution to Artificial Intelligence
- Benefits From Artificial Intelligence
7.CONCLUSION
这篇关于2021/3/5两篇综述的学习笔记的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!