Rights statement: ©2019 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Accepted author manuscript, 578 KB, PDF document
Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License
Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Utilizing Public Blockchains for Censorship-Circumvention and IoT Communication
AU - Al-Salami, Nasser
AU - Zhang, Bingsheng
N1 - ©2019 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
PY - 2019/12/23
Y1 - 2019/12/23
N2 - The advancement of blockchain technology and the Internet of Things (IoT) has presented us with unlimited possibilities to integrate the physical and the virtual worlds. In this work, we demonstrate how to override any existing public blockchain, that has enough redundancy in its transactions, to covertly broadcast arbitrary information. Besides, we implement and demonstrate our technique on a real-world cryptocurrency and show how it can be utilized in two specific applications: recording IoT data, and circumventing censorship.
AB - The advancement of blockchain technology and the Internet of Things (IoT) has presented us with unlimited possibilities to integrate the physical and the virtual worlds. In this work, we demonstrate how to override any existing public blockchain, that has enough redundancy in its transactions, to covertly broadcast arbitrary information. Besides, we implement and demonstrate our technique on a real-world cryptocurrency and show how it can be utilized in two specific applications: recording IoT data, and circumventing censorship.
U2 - 10.1109/DSC47296.2019.8937637
DO - 10.1109/DSC47296.2019.8937637
M3 - Conference contribution/Paper
SP - 1
EP - 7
BT - IEEE Conference on Dependable and Secure Computing (DSC)
PB - IEEE
ER -