Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Security and Privacy

Enabling Blockchain Technology for Secure Networking and Communications
Set of policies and practices adopted to prevent and monitor unauthorized access or modification of an IT operation. It ensures the efficient system functioning.
Published in Chapter:
A Survey of Blockchain-Based Solutions for IoTs, VANETs, and FANETs
Maroua Abdelhafidh (University of Sfax, Tunisia), Nadia Charef (Canadian University Dubai, UAE), Adel Ben Mnaouer (Canadian University Dubai, UAE), and Lamia Chaari (University of Sfax, Tunisia)
DOI: 10.4018/978-1-7998-5839-3.ch006
Abstract
Recently, the internet of things (IoT) has gained popularity as an enabling technology for wireless connectivity of mobile and/or stationary devices providing useful services for the general public in a collaborative manner. Mobile ad-hoc networks (MANETs) are regarded as a legacy enabling technology for various IoT applications. Vehicular ad-hoc networks (VANETs) and flying ad-hoc networks (FANETs) are specific extensions of MANETs that are drivers of IoT applications. However, IoT is prone to diverse attacks, being branded as the weakest link in the networking chain requiring effective solutions for achieving an acceptable level of security. Blockchain (BC) technology has been identified as an efficient method to remedy IoT security concerns. Therefore, this chapter classifies the attacks targeting IoT, VANETs, and FANETs systems based on their vulnerabilities. This chapter explores a selection of blockchain-based solutions for securing IoT, VANETs, and FANETs and presents open research directions compiled out of the presented solutions as useful guidelines for the readers.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Bank Customer Green Banking Technology Adoption: A Sequential Exploratory Mixed Methods Study
The security and privacy construct mainly describes the perceived credibility (Wang et al., 2003 AU124: The in-text citation "Wang et al., 2003" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ), which is defined as the degree of belief and trust in internet-based products and services to transmit sensitive information (Salisbury et al., 2001 AU125: The in-text citation "Salisbury et al., 2001" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ). In the setting of GB technology, perceived security and privacy is the degree to which a bank customer believes that the GB technology services will be free of security and privacy threats.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR