Authenticity

A Blockchain-based Ontology for the Internet of Things Security

We built, through the hypothetical-deductive method, a BIoT model based on particular domain ontologies. We then interact between IoT devices and security ontologies and blockchain network concepts to capture characteristics. We then performed performance tests (sandbox).