ﻻ يوجد ملخص باللغة العربية
Blockchain technology has drawn attention fromvarious communities. The underlying consensus mechanism inBlockchain enables a myriad of applications for the integrityassurance of stored data. In this paper, we utilize Blockchaintechnology to verify the authenticity of a video captured by astreaming IoT device for forensic investigation purposes. Theproposed approach computes the hash of video frames beforethey leave the IoT device and are transferred to a remote basestation. To guarantee the transmission, we ensure that this hashis sent through a TCP-based connection. The hash is then storedon multiple nodes on a permissioned blockchain platform. Incase the video is modified, the discrepancy will be detected byinvestigating the previously stored hash on the blockchain andcomparing it with the hash of the existing frame in question.In this work, we present the prototype as proof-of-concept withexperiment results. The system has been tested on a RaspberryPi with different quality of videos to evaluate performance. Theresults show that the concept can be implemented with moderatevideo resolutions.
In this paper, we have studied how the text of an ancient literature on how their integrity has been preserved for several centuries. Specifically, The Vedas is an ancient literature, which has its text remained preserved without any corruption for t
The data collected from Internet of Things (IoT) devices on various emissions or pollution, can have a significant economic value for the stakeholders. This makes it prone to abuse or tampering and brings forward the need to integrate IoT with a Dist
IoT devices have been adopted widely in the last decade which enabled collection of various data from different environments. The collected data is crucial in certain applications where IoT devices generate data for critical infrastructure or systems
Authorization or access control limits the actions a user may perform on a computer system, based on predetermined access control policies, thus preventing access by illegitimate actors. Access control for the Internet of Things (IoT) should be tailo
As digitization increases, the need to automate various entities becomes crucial for development. The data generated by the IoT devices need to be processed accurately and in a secure manner. The basis for the success of such a scenario requires bloc