Building security into the design of distributed ledger technologies.
Background
Crimes such as homicide and theft, and drugs such as heroin and cocaine have always been of public concern, and there has been a recent focus on areas such as child sexual abuse, modern slavery, new psychoactive substances, online fraud, and online indecent images of children.
Next steps
Get in touch with research@homeoffice.gov.uk
Source
This question was published as part of the set of ARIs in this document:
Areas of research interest relevant to the Home Office GOVUK
Topics
Related UKRI funded projects
-
Klevoya: A Cybersecurity solution for WebAssembly based distributed ledgers
Over the last several years there has been a growing interest in distributed ledger technologies (DLTs - which include blockchains such as Ethereum and EOS). One powerful aspect of DLTs that is fueling this interest is t...
Funded by: Innovate UK
Why might this be relevant?
The project specifically focuses on developing cybersecurity solutions for DLT applications, addressing the need to build security into distributed ledger technologies.
-
BlockchaIn device Metric ENhanced Security (IMmENSe)
The proposal will develop novel authentication and authorisation mechanisms for networked financial data using distributed ledger (blockchain) technology. Recent progress in blockchains suggests that one of the interesti...
Funded by: Innovate UK
Why might this be relevant?
The project aims to develop authentication and authorization mechanisms for financial data using blockchain technology, which partially addresses the question of building security into DLTs.
-
DLT Cybersecurity Monitoring
This project seeks to validate the market and identify requirements for a security-monitoring (attack-detection) tool for distributed-ledger technology (DLT)-based systems. DLT-based systems are being developed and impl...
Funded by: ISCF
Why might this be relevant?
The project focuses on validating the market and identifying requirements for a security-monitoring tool for DLT-based systems, which partially addresses the question of building security into DLTs.