IRO Journals

IRO Journal on Sustainable Wireless Systems

Analysis of Visible Light Communication using Integrated Avalanche Photodiode
Volume-4 | Issue-2

A Review on Identifying Suitable Machine Learning Approach for Internet of Things Applications
Volume-3 | Issue-3

TOWARDS GHZ METALLIC ACCESS NETWORKS
Volume-1 | Issue-1

REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS
Volume-1 | Issue-3

Process Control Ladder Logic Trouble Shooting Techniques Fundamentals
Volume-1 | Issue-4

TRUST BASED ROUTING ALGORITHM IN INTERNET OF THINGS (IoT)
Volume-1 | Issue-1

COMPUTATIONAL OFFLOADING FOR PERFORMANCE IMPROVEMENT AND ENERGY SAVING IN MOBILE DEVICES
Volume-1 | Issue-4

ANALYSIS OF ROUTING PROTOCOLS IN FLYING WIRELESS NETWORKS
Volume-1 | Issue-3

Dual Edge-Fed Left Hand and Right Hand Circularly Polarized Rectangular Micro-Strip Patch Antenna for Wireless Communication Applications
Volume-2 | Issue-3

Modified Gray Wolf Feature Selection and Machine Learning Classification for Wireless Sensor Network Intrusion Detection
Volume-3 | Issue-2

TRUST BASED ROUTING ALGORITHM IN INTERNET OF THINGS (IoT)
Volume-1 | Issue-1

Hybrid Micro-Energy Harvesting Model using WSN for Self-Sustainable Wireless Mobile Charging Application
Volume-3 | Issue-3

Three Phase Coil based Optimized Wireless Charging System for Electric Vehicles
Volume-3 | Issue-3

Cyber-attack and Measuring its Risk
Volume-3 | Issue-4

REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS
Volume-1 | Issue-3

Analysis of Solar Power Generation Performance Improvement Techniques
Volume-4 | Issue-3

Pollination Inspired Clustering Model for Wireless Sensor Network Optimization
Volume-3 | Issue-3

Design of Low Power Cam Memory Cell for the Next Generation Network Processors
Volume-3 | Issue-4

A STUDY OF RESEARCH NOTIONS IN WIRELESS BODY SENSOR NETWORK (WBSN)
Volume-1 | Issue-2

Computation of Constant Gain and NF Circles for 60 GHz Ultra-low noise Amplifiers
Volume-3 | Issue-3

Home / Archives / Volume-2 / Issue-4 / Article-2

Volume - 2 | Issue - 4 | december 2020

Data Elimination on Repetition using a Blockchain based Cyber Threat Intelligence
Pages: 149-154
Published
05 January, 2021
Abstract

Cyber threat is a major issue that has been terrorizing the computing work. A typical cyber-physical system is crucial in ensuring a safe and secure architecture of a sustainable computing ecosystem. Cyber Threat Intelligence (CTI) is a new methodology that is used to address some of the existing cyber threats and ensure a more secure environment for communication. Data credibility and reliability plays a vital role in increasing the potential of a typical CTI and the data collected for this purpose is said to be highly reliable. In this paper, we have introduced a CTI system using blockchain to tackle the issues of sustainability, scalability, privacy and reliability. This novel approach is capable of measuring organizations contributions, reducing network load, creating a reliable dataset and collecting CTI data with multiple feeds. We have testing various parameters to determine the efficiency of the proposed methodology. Experimental results show that when compared to other methodologies, we can save upto 20% of storage space using the proposed methodology.

Keywords

Sustainable computing blockchain cyber threat intelligence attacks scalability and reliability

Full Article PDF Download Article PDF 
×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
For single article (Indian)
1,200 INR
Article Access Charge
For single article (non-Indian)
15 USD
Open Access Fee (Indian) 5,000 INR
Open Access Fee (non-Indian) 80 USD
Annual Subscription Fee
For 1 Journal (Indian)
15,000 INR
Annual Subscription Fee
For 1 Journal (non-Indian)
200 USD
secure PAY INR / USD
Subscription form: click here