EconPapers    
Economics at your fingertips  
 

Critical Controlling for the Network Security and Privacy Based on Blockchain Technology: A Fuzzy DEMATEL Approach

Firuz Kamalov, Mehdi Gheisari, Yang Liu (), Mohammad Reza Feylizadeh () and Sherif Moussa
Additional contact information
Firuz Kamalov: Department of Electrical Engineering, Canadian University Dubai, Dubai 144534, United Arab Emirates
Mehdi Gheisari: Department of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen 518055, China
Yang Liu: Department of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen 518055, China
Mohammad Reza Feylizadeh: Department of Industrial Engineering, Shiraz Branch, Islamic Azad University, Shiraz 7473171987, Iran
Sherif Moussa: Department of Electrical Engineering, Canadian University Dubai, Dubai 144534, United Arab Emirates

Sustainability, 2023, vol. 15, issue 13, 1-16

Abstract: The Internet of Things (IoT) has been considered in various fields in the last decade. With the increasing number of IoT devices in the community, secure, accessible, and reliable infrastructure for processing and storing computed data has become necessary. Since traditional security protocols are unsuitable for IoT devices, IoT implementation is fraught with privacy and security challenges. Thus, blockchain technology has become an effective solution to the problems of IoT security. Blockchain is an empirical data distribution and storage model involving point-to-point transmission, consensus mechanism, asymmetric encryption, smart contract, and other computer technologies. Security and privacy are becoming increasingly important in using the IoT. Therefore, this study provides a comprehensive framework for classifying security criteria based on blockchain technology. Another goal of the present study is to identify causal relationship factors for the security issue using the Fuzzy Decision-Making Trial-and-Evaluation Laboratory (FDEMATEL) approach. In order to deal with uncertainty in human judgment, fuzzy logic is considered an effective tool. The present study’s results show the proposed approach’s efficiency. Authentication (CR6), intrusion detection (CR4), and availability (CR5) were also introduced as the most effective and essential criteria, respectively.

Keywords: network security and privacy; blockchain technology; cause and effect; fuzzy DEMATEL (search for similar items in EconPapers)
JEL-codes: O13 Q Q0 Q2 Q3 Q5 Q56 (search for similar items in EconPapers)
Date: 2023
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2071-1050/15/13/10068/pdf (application/pdf)
https://www.mdpi.com/2071-1050/15/13/10068/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jsusta:v:15:y:2023:i:13:p:10068-:d:1179145

Access Statistics for this article

Sustainability is currently edited by Ms. Alexandra Wu

More articles in Sustainability from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jsusta:v:15:y:2023:i:13:p:10068-:d:1179145