Security Preservation in Blockchain IoT

Authors

  • Ajay Dept. of Computer Science and Engineering, JC Bose University of Science and Technology, Faridabad, India
  • Kumar R Dept. of Computer Science and Engineering, JC Bose University of Science and Technology, Faridabad, India
  • Anuradha Dept. of Computer Science and Engineering, JC Bose University of Science and Technology, Faridabad, India
  • Anuradha Dept. of Computer Science and Engineering, JC Bose University of Science and Technology, Faridabad, India

DOI:

https://doi.org/10.26438/ijcse/v7i10.168173

Keywords:

IoT, Blockchain, firewalls, DDOS, Availability, Decentralized, Crypto currency, Privacy preservation etc

Abstract

With rapid development of Internet of Things (IoT) , it is evident that users get convenience in different fields such as smart homes,transportation,supply chain, smart contracts etc.Blockchain Mechanisms play a vital role in securing many IoT oriented applications.Blockchain and IoT are both intended to be world changing technologies. Merging these technologies could result in something more than the sum of its parts.IoT security using Blockchain is aimed at providing better security mechanisms so that authentication, confidentiality and integrity constraints are preserved. Based on component interaction in IoTenvironment , the security measures that are depicted in the existing work ensures that no alien commodity is allowed to tamper the data and other devices in IoT environment. However IoT devices are surprisingly insecure.Hence security issue is one of the most challenging task for utilizing Blockchain.

References

[1]S. Ølnes and A. Jansen, ``Blockchain technology as infrastructurein public sector: An analytical framework,`` in Proc. 19thAnnu. Int. Conf. Digit. Government Res., Governance Data Age,New York, NY, USA, 2018, pp. 77:1_77:10. [Online]. Available: http://doi.acm.org/10.1145/3209281.3209293

[2]R. Beck and C. Muller-Bloch, ``Blockchain as radical innovation: Aframework for engaging with distributed ledgers,`` in Proc. 50th HawaiiInt. Conf. Syst. Sci., 2017, pp. 5390_5399.

[3]NallapaneniManoj Kumar, Pradeep Kumar Mallick,“The Internet of Things: Insights into the building blocks, component interactions, and architecture layers”, 2018,www.keaipublishing.com/en/journals/digital- communications-and-networks.

[4]Mandrita Banerjee, Junghee Lee, Kim-Kwang Raymond Choo,2018, ScienceDirect.

[5] Daniel Minoli, Benedict Occhiogrosso DVI Communications,2018, Elsevier

[6]YongfengQian,YingyingJiang,JingChenetal.,MatevžPustišekSchoolofComputerScience,ChinaUniversityofGeosciences,Wuhan,China,SchoolofComputerScienceandTechnology,HuazhongUniversity ofScienceandTechnology,Wuhan430074.

[7]ABassi,MBauer,MFiedler,TKramp,RvanKranenburg,SLange,SMeissner(Eds.),EnablingtheInternetofThings,Springer,2013.

[8] A.K. Pathan (Ed.), “Securing Cyber Physical Systems”, CRC,2015.

[9]A.M. Rahmani, P. Liljeberg, J.-S. Preden, A. Jantsch, “Fog Computing in the Internet Of Things” , Springer,2017.

[10]Q.Hassan,A.R.Khan,S.A.Madani(Eds.),”InternetofThings:Challenges,AdvancesandApplications”,CRCPress, 2017 ISBN9781498778510.

[11]A. Pal, B. Purushothaman, “IoT Technical Challenges and Solutions,” ArtechHouse ISBN: 978-1-63081-111-2,Norwood,Mass,2016.

[12]A.Rayes,S.Salam,“Internet of Things From Hype to Reality”,Springer,2016.

Downloads

Published

2019-10-31
CITATION
DOI: 10.26438/ijcse/v7i10.168173
Published: 2019-10-31

How to Cite

[1]
Ajay, R. Kumar, Anuradha, and Anuradha, “Security Preservation in Blockchain IoT”, Int. J. Comp. Sci. Eng., vol. 7, no. 10, pp. 168–173, Oct. 2019.

Issue

Section

Research Article