dc.contributor.author | LLante Lucio, Yeison | |
dc.contributor.author | Márceles Villalba, Katerine | |
dc.contributor.author | Donado, Siler Amador | |
dc.date.accessioned | 2022-05-06T08:25:53Z | |
dc.date.available | 2022-05-06T08:25:53Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Y. I. L. Lucio, K. Márceles Villalba and S. A. Donado, "Adaptive Blockchain Technology for a Cybersecurity Framework in IIoT," in IEEE Revista Iberoamericana de Tecnologias del Aprendizaje, vol. 17, no. 2, pp. 178- 184, May 2022, doi: 10.1109/RITA.2022.3166857 | es_ES |
dc.identifier.uri | http://riull.ull.es/xmlui/handle/915/27357 | |
dc.description.abstract | This article presents the problem regarding the assurance of the information that circulates in the devices that are connected to the internet, due to the multiple threats to which they are exposed, running the risk of losing or leaking information; However, with the passage of time, new technologies are emerging that encourage organizations to maintain continuous improvement of their applications and tools, but at the same time the emergence of new technologies brings with it cybersecurity risks that organizations must face when carrying out an integration with them. Therefore, through the action research methodology, two phases were defined, one of them reviewing Blockchain technologies and the second comparing Blockchain technologies to finally determine the most adaptable technology to a cybersecurity Framework focused on IIoT, capable of managing the integrity of the information and achieving a consensus among all the nodes belonging to a certain network | en |
dc.language.iso | es | es_ES |
dc.publisher | IEEE | es_ES |
dc.relation.ispartofseries | IEEE Revista Iberoamericana de Tecnologias del Aprendizaje, vol. 17, no. 2, pp. 178- 184, May 2022; | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Internacional | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.title | Tecnología Blockchain adaptable para un framework de ciberseguridad en IIoT | es_ES |
dc.type | info:eu-repo/semantics/article | |
dc.identifier.doi | 10.1109/RITA.2022.3166857 | |
dc.rights.accessRights | info:eu-repo/semantics/openAccess | es_ES |
dc.type.hasVersion | info:eu-repo/semantics/publishedVersion | es_ES |