Security Preservation in Blockchain IoT
DOI:
https://doi.org/10.26438/ijcse/v7i10.168173Keywords:
IoT, Blockchain, firewalls, DDOS, Availability, Decentralized, Crypto currency, Privacy preservation etcAbstract
With rapid development of Internet of Things (IoT) , it is evident that users get convenience in different fields such as smart homes,transportation,supply chain, smart contracts etc.Blockchain Mechanisms play a vital role in securing many IoT oriented applications.Blockchain and IoT are both intended to be world changing technologies. Merging these technologies could result in something more than the sum of its parts.IoT security using Blockchain is aimed at providing better security mechanisms so that authentication, confidentiality and integrity constraints are preserved. Based on component interaction in IoTenvironment , the security measures that are depicted in the existing work ensures that no alien commodity is allowed to tamper the data and other devices in IoT environment. However IoT devices are surprisingly insecure.Hence security issue is one of the most challenging task for utilizing Blockchain.
References
[1]S. Ølnes and A. Jansen, ``Blockchain technology as infrastructurein public sector: An analytical framework,`` in Proc. 19thAnnu. Int. Conf. Digit. Government Res., Governance Data Age,New York, NY, USA, 2018, pp. 77:1_77:10. [Online]. Available: http://doi.acm.org/10.1145/3209281.3209293
[2]R. Beck and C. Muller-Bloch, ``Blockchain as radical innovation: Aframework for engaging with distributed ledgers,`` in Proc. 50th HawaiiInt. Conf. Syst. Sci., 2017, pp. 5390_5399.
[3]NallapaneniManoj Kumar, Pradeep Kumar Mallick,“The Internet of Things: Insights into the building blocks, component interactions, and architecture layers”, 2018,www.keaipublishing.com/en/journals/digital- communications-and-networks.
[4]Mandrita Banerjee, Junghee Lee, Kim-Kwang Raymond Choo,2018, ScienceDirect.
[5] Daniel Minoli, Benedict Occhiogrosso DVI Communications,2018, Elsevier
[6]YongfengQian,YingyingJiang,JingChenetal.,MatevžPustišekSchoolofComputerScience,ChinaUniversityofGeosciences,Wuhan,China,SchoolofComputerScienceandTechnology,HuazhongUniversity ofScienceandTechnology,Wuhan430074.
[7]ABassi,MBauer,MFiedler,TKramp,RvanKranenburg,SLange,SMeissner(Eds.),EnablingtheInternetofThings,Springer,2013.
[8] A.K. Pathan (Ed.), “Securing Cyber Physical Systems”, CRC,2015.
[9]A.M. Rahmani, P. Liljeberg, J.-S. Preden, A. Jantsch, “Fog Computing in the Internet Of Things” , Springer,2017.
[10]Q.Hassan,A.R.Khan,S.A.Madani(Eds.),”InternetofThings:Challenges,AdvancesandApplications”,CRCPress, 2017 ISBN9781498778510.
[11]A. Pal, B. Purushothaman, “IoT Technical Challenges and Solutions,” ArtechHouse ISBN: 978-1-63081-111-2,Norwood,Mass,2016.
[12]A.Rayes,S.Salam,“Internet of Things From Hype to Reality”,Springer,2016.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
