Hierarchical Block Chain-Based Authentication Management Scheme for IoT Devices

2021 ◽  
pp. 531-541
Author(s):  
M. Revanesh ◽  
V. Sridhar
Author(s):  
Prateek Chhikara ◽  
Rajkumar Tekchandani ◽  
Neeraj Kumar ◽  
Mohammad S. Obaidat

2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Tianqi Zhou ◽  
Jian Shen ◽  
Sai Ji ◽  
Yongjun Ren ◽  
Leiming Yan

The renewable energy plays an increasingly important role in many fields such as lighting, automobile, and electric power. In order to make full use of the renewable energy, various smart Internet of Thing (IoT) devices are deployed. However, in the field of energy management, the two-way mismatch between the demand and the supply of the renewable energy will greatly affect the efficiency of the renewable energy. In addition, the security threat of the energy data and the privacy leakage of the user may hinder the further development of smart IoT devices. Therefore, how to achieve consistency and balance between the demand and the renewable energy supply and how to guarantee the security and privacy of smart IoT devices become the key problems of the energy-efficient smart environment. In this paper, a secure and intelligent energy data management scheme for smart IoT devices is proposed. It is worth noting that, with the help of artificial intelligence (AI) technologies and secure cryptography primitives, the proposed scheme realizes high-efficient and secure energy utilization in a smart environment. Specifically, the proposed scheme aims at improving the efficiency of the energy utilization in the multidimensions of a smart environment. In order to realize the fine-grain energy management of smart IoT devices, strategies of three different dimensions are considered and realized in the proposed scheme. Moreover, technologies in AI are applied and integrated into the energy management scheme. The analysis shows that the proposed scheme can make full use of the renewable energy in smart IoT devices.


IoT devices are playing a greater role in business specially in wireless communication. IoT devices are achieving higher maturity as seen in smartdust. The aim of this research is to study the functionality of MOTES in smartdust to integrate with IoT architecture and infrastructure for optimization of wireless communication specially linked with 2.4Ghz and 5Ghz band. MOTES are being modeled in MALTAB using Artificial Neural Network integrated with optimization for speed, power and frequency linked with IoT architecture. The result proves that smartdust architecture if utilized in IoT architecture, the over all performances result of IoT devices is increased specially in bandwidth and power consumption. All the modeling result were compared for general sensor data bandwidth in ESP8266 for 2.4 Ghz, and mathematical model are presented for 5Ghz using smartdust MOTES. It is been proposed that using AI optimization technique like Ant Colonization Optimization or Particle Swarm Optimization we can mathematically model smartdust Architecture.


System of bodily hubs or "matters" joined with hardware, programming, sensors, and linked to enact articles to move information from servers, included frameworks, or doubtlessly distinctive associated devices depending on a numerous correspondence foundations may be actualized with net of factors (IoT) version. IoT facts gathered from various sensors, hubs and government are moved to the cover over the net. The principle target of IoT protection is to ensure thriller of the statistics, and make certain the assurance of the consumer's statistics, frameworks, software program's facts substance, and smart machine's of the IoT, via manner of ensures the administrations accessibility of IoT organic gadget. The number one purpose of this exam article is to enhance protection highlights to IoT device becoming a member of with rectangular chain. The significance of Bit-coin the usage of rectangular chain innovation, which changed into at that factor set up for a few, financial nicely well worth exchanges because it have been. Anyhow, because of its Non-delivered collectively engineering, agile corruption and cryptographic defend benefits, for instance, pseudonymous personalities, statistics trustworthiness and take a look at, scientists and safety professionals round the sector are concentrating on the rectangular chain to decide coverage and protection issues of IoT. In this article, we have positioned a few right down to earth problems which can be associated with the becoming a member of of IoT devices with the square chain. At closing, we endorse a course ahead to determine a part of the large difficulties to the rectangular chain's utilization in IoT based totally software program.


Author(s):  
Tamizhselvan C. ◽  
V. Vijayalakshmi

Abstract:: Internet of Things (IoT) faces a variety of challenges and issues in administering security due to its heterogeneous nature and open communication medium. The fundamental security requirement of authentication is expected to secure the communication between the devices from anonymous access. In this article, we present a distributed time-dependent key management (DTKM) technique for securing the communication sessions of the IoT devices. This key management technique considers the communication time and interval of the devices independently to generate session keys for authentication. Key management is preceded by the consideration of request authentication and resource utilization. Based on the communication time session, the validity of the keys is determined and is updated with the current random number consideration for authentication. This helps to prevent unnecessary exploitation of storage and also reduces computation time.


Nowadays security is major concern for any user connected to the internet. Various types of attacks are to be performed by intruders to obtaining user information as man- inmiddle attack, denial of service, malware attacks etc. Malware attacks specifically ransomware attack become very famous recently. Ransomware attack threaten the users by encrypting their most valuable data, lock the user screen, play some random videos and by various more means. Finally attacker takes benefits by users through paid ransom. In this paper, we propose a framework which prevents the ransomware attack more appropriately using various techniques as block chain, honeypot, cloud & edge computing. This framework is analyzed mainly through the IoT devices and generalized to the any malware attack.


Author(s):  
Thangaraj Muthuraman ◽  
Punitha Ponmalar Pichiah ◽  
Anuradha S.

The current technology has given arms, hands, and wings to the smart objects-internet of things, which create the centralized data collection and analysis nightmare. Even with the distributed big data-enabled computing, the relevant data filtering for the localized decisions take a long time. To make the IOT data communication smoother and make the devices talk to each other in a coherent way the device data transactions are made to communicate through the block chain, and the applications on the localized destination can take the decisions or complete transaction without the centralized hub communication. This chapter focuses on adding vendor-specific IOT devices to the public or private block chain and the emerging challenges and the possible solutions to make the devices talk to each other and have the decision enablement through the distributed transactions through the block chain technology.


2021 ◽  
Author(s):  
NAGAJAYANTHI BOOBALAKRISHNAN

Abstract Internet connects people to people, people to machine, and machine to machine for a life of serendipity through a Cloud. Internet of Things networks objects or people and integrates them with software to collect and exchange data. The Internet of things (IoT) influences our lives based on how we ruminate, respond, and anticipate. IoT 2020 heralds from the fringes to the data ecosystem and panaches a comfort zone. IoT is overwhelmingly embraced by businessmen and consumers due to increased productivity and convenience. Internet of Things facilitates intelligent device control with cloud vendors like Amazon and Google using artificial intelligence for data analytics, and with digital assistants like Alexa and Siri providing a voice user interface. Smart IoT is all about duplex connecting, processing, and implementing. With 5G, lightning faster rate of streaming analytics is realistic. An amalgamation of technologies has led to this techno-industrial IoT revolution. Centralized IoT architecture is vulnerable to cyber-attacks. With Block Chain, it is possible to maintain transparency and security of the transaction's data. Standardization of IoT devices is achievable with limited vendors based on Platform, Connectivity, and Application. Robotic Process Automation (RPA) using bots has automated laborious tasks in 2019. Embedded Internet using Facial Recognition could reduce the pandemic crisis. Security concerns are addressed with micro-segmentation approaches. IoT, an incredible vision of the future makes systems adaptive with customized features, responsive with increased efficiency, and procurable with optimized cost. This paper delivers a comprehensive insight into the technical perspectives of IoT, focusing on interoperability, flexibility, scalability, mobility, security, transparency, standardization, and low energy.


Sign in / Sign up

Export Citation Format

Share Document