Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


Journal

2018 | 4 | 9 | 2001-2006

Article title

Сryptocurrency and Internet of Things: Problems of Implementation and Realization

Content

Title variants

Languages of publication

EN

Abstracts

EN
IoT (Internet of Things) requires the implementation of digital encryption of information, transaction support and recording of all events for security. It can provide cryptocurrencies protocols with adding an additional possibility of payments. This opportunity is not so much demanded at the hardware level as in the software implementation. We have discovered that IoT devices are widely used for illegal purposes for trusts or network consolidated attacks, and virtually no legal and useful ways of using their hardware-distributed capabilities. Standardization and compatibility in IOT network should become the main tools for the possibility of introducing new solutions, testing their utility, performance and safety. The standardization of a new approach to interactive protocols in the IOT network and the Internet with a finance approach is now inevitable. We need new IEEE standards for cryptocurrencies and IoT functioning. They must include standards for protocol functioning, transaction validation and saving, privacy and security support. Cryptocurrencies and IoT interaction diagram were proposed. The IoT network devices technology will be in the future instance of the smart class of digital-physical systems, which also encompasses technologies such as smart homes, intelligent transportation systems, smart cities etc. The financial aspect for purchasing software, services, solutions and sales of the resulting benefits will complement this network with additional capabilities. The development of standards for the financial level of functioning is also necessary.

Journal

Year

Volume

4

Issue

9

Pages

2001-2006

Physical description

Dates

published
2018-09-20

Contributors

  • Lviv University of Business and Law
  • Cherkasy State Technological University
author
  • Lviv Branch of Dnipropetrovsk National University of Railway Transport named after Academician V. Lazaryan
  • Lviv University of Business and Law
  • Lviv University of Business and Law

References

  • CoinMarketCap. (2018). Top 100 CryptoCurrencies by Market Capitalization. Retrieved July 1, 2018, from https://coinmarketcap.com
  • Statista. (2018). Size of the global Internet of Things (IoT) market from 2009 to 2019 (in billion U.S. dollars). Retrieved July 1, 2018, from https://www.statista.com/statistics/485136/global-internet-of-things-market-size/
  • Vigna, P., & Casey, M. (2015). The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order. New York: St. Martin's Press.
  • Fry, J., & Cheah, E.-T. (2016). Negative bubbles and shocks in cryptocurrency markets. International Review of Financial Analysis, 47, 343–352. doi: 10.1016/j.irfa.2016.02.008
  • Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and cryptocurrency technologies: A comprehensive introduction. Oxford: Princeton and Oxford Princeton University Press.
  • Gigli, M., & Koo, S. (2011). Internet of Things: Services and Applications Categorization. Advances in Internet of Things, 01(02), 27–31. doi: 10.4236/ait.2011.12004
  • Castellani, A. P., Bui, N., Casari, P., Rossi, M., Shelby, Z., & Zorzi, M. (2010). Architecture and protocols for the Internet of Things: A case study. 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). doi: 10.1109/percomw.2010.5470520
  • Kurzweil, R. (2016). The singularity is near: When humans transcend biology. London: Duckworth.
  • Russell, S., & Norvig, P. (2003). Artificial Intelligence: A Modern Approach (2nd ed.). Upper Saddle River: Pearson.
  • Roberts, H., Larochelle, D., Faris, R., & Palfrey, J. (2011). Mapping Local Internet Control. Retrieved August 1, 2018, from https://pdfs.semanticscholar.org/bdd5/be2dd6706ca1c1659cf2c9bd26811b9c802d.pdf
  • Murdoch, S., & Anderson, R. (2008). Tools and Technology of Internet Filtering. Retrieved August 1, 2018, from http://access.opennet.net/wp-content/uploads/2011/12/accessdenied-chapter-3.pdf

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.desklight-d757e16e-faa1-42bc-a029-3f4e907dd09a
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.