Mostrar el registro sencillo del ítem

dc.contributor.authorDíaz Gutiérrez, Yesid
dc.contributor.authorCueva-Lovelle, Juan Manuel
dc.contributor.authorCandia Herrera, Diana Carolina
dc.date2025-11-28
dc.date.accessioned2026-03-06T12:25:21Z
dc.date.available2026-03-06T12:25:21Z
dc.identifier.citationY. Díaz Gutiérrez, J. M. Cueva Lovelle, D. C. Candia Herrera. Security Model for the Internet of Things, Through Blockchain, International Journal of Interactive Multimedia and Artificial Intelligence, vol. 9, no. 5, pp. 154-162, 2025, http://dx.doi.org/10.9781/ijimai.2025.02.009es_ES
dc.identifier.urihttps://reunir.unir.net/handle/123456789/19132
dc.description.abstractDue to the proliferation of computer crimes related to information vulnerability handled by people and entities and evidenced in attacks of financial, commercial, personal and even family nature; a need has been identified to implement, security strategies and protocols in each and every one of these areas, which make possible the effective protection of the integrity and privacy of data. Regarding this, there are protection schemes such as cryptography and reliable time stamping which undoubtedly have managed to partially solve this problem by attacking structural and crucial points. However, the evolution in the technology field has been currently represented in the fourth industrial revolution and its context towards 4.0 technologies and smart industries; various technologies have been positioned in the emerging and disruptive categories, among which the Internet of Things (IoT) stands out. This technology has become the target of multiple computer attacks, due to the processes of Extraction, Transformation, Loading and Transmission of large volumes of data. Alongside its widespread connection to the Internet, it’s become a strategic target for such attacks. A possible alternative solution to this situation is blockchain, which allows information to be public and stored in different blocks, which makes it easier to guarantee the integrity of information based on the following aspects: • Identification of the attacked and / or compromised information, which can be marked as invalid information. • Public report of the attack. • Information backup in another block to facilitate its recovery. In this regard, it is important to highlight that these functional and technological characteristics offered by the blockchain, facilitate the management of information and its integrity. However, it is necessary and essential to previously guarantee the structure of the information generated; as some processes of Business Intelligence (BI), such as the Extraction, Transformation and Load scheme (ELT), would be of great relevance and support during the development of this procedure.es_ES
dc.language.isoenges_ES
dc.publisherUNIRes_ES
dc.relation.urihttps://doi.org/10.9781/ijimai.2025.02.009es_ES
dc.rightsopenAccesses_ES
dc.subjectBlockchaines_ES
dc.subjectBusiness Intelligencees_ES
dc.subjectCryptography, Immutabilityes_ES
dc.subjectInternet of thingses_ES
dc.subjectReferencinges_ES
dc.subjectSafetyes_ES
dc.subjectSmart Industrieses_ES
dc.titleSecurity Model for the Internet of Things, Through Blockchaines_ES
dc.typearticlees_ES
reunir.tag~IJIMAIes_ES


Ficheros en el ítem

Thumbnail

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem