Blockchain: A New Technology to Enhance Data Security and Privacy in Internet of Things

2020 ◽  
Vol 17 (6) ◽  
pp. 2552-2556
Author(s):  
Sarita Simaiya ◽  
Umesh Kumar Lilhore ◽  
Sanjeev Kumar Sharma ◽  
Kamali Gupta ◽  
Vidhu Baggan

A revolutionary technology well into the world of technology has been in the modern world of technology the Internet of Things. Due to continuing increases as nothing more than a consequence of either the rapid development of computing Internet of things-based applications implementations. Many technologies become increasingly embraced throughout compatible devices such as home automation and also smart cities. These IoT applications become operated on both the Internet, whereby information becomes transported publicly between a network to the next, therefore flowing information requires a great deal of further privacy consideration to guarantee IoT applications become reliable Internet of things technologies have been using various techniques of data protection of security and privacy. However, all such modern security systems have always been sufficient to ensure the Internet of things perceived safety. A Blockchain has become a revolutionary authoritative digital technology that really transforms commercial transactions absolutely. This is also a collaborative service that facilitates it uses a variety of features of cybersecurity. Blockchain technology seems to be the missing piece of the puzzle throughout the IoT to address problems of usability, anonymity, including security. Block chain’s crypto algorithms must enable transparency from customers very confidential. Throughout this research article, we introduce an analysis of IoT security concerns; blockchain gets addressed briefly as well as later addresses the security of IoT applications dependent on blockchain technologies.

Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
S. A. Zhezhkun ◽  
◽  
L. B. Veksler ◽  
S. M. Brezitsʹkyy ◽  
B. O. Tarasyuk

This article focuses on the analysis of promising technologies for long-range traffic transmission for the implementation of the Internet of Things. The result of the review of technical features of technologies, their advantages and disadvantages is given. A comparative analysis was performed. An analysis is made that in the future heterogeneous structures based on the integration of many used radio technologies will play a crucial role in the implementation of fifth generation networks and systems. The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety of IoT applications have been developed and deployed using different IoT frameworks. An IoT framework is a set of guiding rules, protocols, and standards which simplify the implementation of IoT applications. The success of these applications mainly depends on the ecosystem characteristics of the IoT framework, with the emphasis on the security mechanisms employed in it, where issues related to security and privacy are pivotal. In this paper, we survey the security of the main IoT frameworks, a total of 8 frameworks are considered. For each framework, we clarify the proposed architecture, the essentials of developing third-party smart apps, the compatible hardware, and the security features. Comparing security architectures shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties.


2020 ◽  
Vol 11 (02) ◽  
pp. 97-108
Author(s):  
Ghada Zaky ◽  
◽  
Prof. Ayman Shawky ◽  
Prof. Mohamed A. Ragheb ◽  
◽  
...  

Purpose: This study aims to investigate the factors that affect developing countries especially Egyptian users to adopt IOT Applications/devices, and to what extent those variables affect the overall attitude towards, behavioral intentions and actual usage of IOT applications/devices. Moreover, to develop an extended adoption model by integrating the security concern and privacy concern in UTAUT2 model. Design/Methodology: a descriptive quantitative approach was adopted, and a comprehensive research model was adapted from literature and then tested via an online questionnaire. Results/Findings: The findings revealed that Effort Expectancy, Facilitating Conditions and Security Concern all have a significant positive effect on the overall intention towards using IOT applications/devices in Egypt. Theoretical and practical implications: The Internet of Things (IOT) has emerged as an innovative computing technology destined to optimize business operations and create new products and services. IOT enable the devices to communicate and integrate with one another to collect, exchange, and make data accessible through the Internet. It is projected that by 2025, over 50 billion devices will be connected to the IOT network, reaching a market value of up to $11 trillion. This study adapted the Extended Unified Theory of Acceptance and Use of Technology (UTAUT2) as the theoretical framework and its findings contribute to the literature by adding security and privacy concerns as new predictor variables. This contributes theoretically to the current literature by providing meaningful insights into the main factors that affect using IOT Applications/Devices in developing countries specially Egypt. This study’s conceptual effort provided an overall overview of how IOT users arrive at choosing (or not choosing) to use IOT applications/devices. Additionally, the analytic effort of this study provided a holistic assessment of the role of each variable. One critical question in this case is whether industrial leaders should assign an equal number of resources to each variable or not. By assessing the significance of each variable, the researcher attempted to clarify the comparative importance of each variable in forecasting purchase intentions and decisions to use IOT applications/devices.


The future of Internet of Things (IoT) is already upon us. The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. While enjoying the convenience and efficiency that IoT brings to us, new threats from IoT also have emerged. There are increasing research works to ease these threats, but many problems remain open. To better understand the essential reasons of new threats and the challenges in current research, this survey first proposes the concept of “IoT features”. Then, the security and privacy effects of eight IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved.


Author(s):  
Rahul Verma

The internet of things (IoT) is the new buzzword in technological corridors with most technology companies announcing a smart device of sorts that runs on internet of things (IoT). Cities around the world are getting “smarter” every day through the implementation of internet of things (IoT) devices. Cities around the world are implementing individual concepts on their way to becoming smart. The services are automated and integrated end to end using internet of things (IoT) devices. The chapter presents an array of internet of things (IoT) applications. Also, cyber physical systems are becoming more vulnerable since the internet of things (IoT) attacks are common and threatening the security and privacy of such systems. The main aim of this chapter is to bring more research in the application aspects of smart internet of things (IoT).


2020 ◽  
Vol 25 (6) ◽  
pp. 737-745
Author(s):  
Subba Rao Peram ◽  
Premamayudu Bulla

To provide secure and reliable services using the internet of things (IoT) in the smart cities/villages is a challenging and complex issue. A high throughput and resilient services are required to process vast data generated by the smart city/villages that felicitates to run the applications of smart city. To provide security and privacy a scalable blockchain (BC) mechanism is a necessity to integrate the scalable ledger and transactions limit in the BC. In this paper, we investigated the available solutions to improve its scalability and efficiency. However, most of the algorithms are not providing the better solution to achieve scalability for the smart city data. Here, proposed and implemented a hybrid approach to improve the scalability and rate of transactions on BC using practical Byzantine fault tolerance and decentralized public key algorithms. The proposed Normachain is compares our results with the existing model. The results show that the transaction rate got improved by 6.43% and supervision results got improved by 17.78%.


Author(s):  
A. K. M. Bahalul Haque ◽  
Bharat Bhushan

Blockchain gets its name from being a series of blocks that are linked together to form a chain. Once the information has been added to the chain, it cannot be changed. There are several consensus protocols, and each of them is chosen based on the type of blockchain and the system requirements. With the rapid urbanization of the world, several economic, social, and environment-related issues have been raised. Smart cities are an emerging concept that holds the solution to these urban problems. Blockchain is such an innovation that can promote the development of smart cities. Along with its application in the internet of things, smart cities, and logistics, blockchain truly is state-of-the-art technology. Here, the authors aim to provide an in-depth look into this relatively new technology, beginning with blockchain's fundamentals and then covering the applications, issues, and future scope.


2017 ◽  
pp. 260-277
Author(s):  
Mahmoud Elkhodr ◽  
Seyed Shahrestani ◽  
Hon Cheung

The Internet of Things (IoT) promises to revolute communications on the Internet. The IoT enables numerous business opportunities in fields as diverse as e-health, smart cities, smart homes, among many others. It incorporates multiple long-range, short-range, and personal area wireless networks and technologies into the designs of IoT applications. This will result in the IoT being pervasive in many areas which raise many challenges. This chapter reviews the major research issues challenging the IoT with regard to security, privacy, and management.


2018 ◽  
Vol 10 (11) ◽  
pp. 105 ◽  
Author(s):  
YangQun Li

The Internet of Things (IoT) is increasingly part of daily life. However, the development of IoT applications still faces many problems, such as heterogeneity, complex management, and other difficulties. In this paper, first, the open source technologies of IoT are surveyed. We compare these technologies from the point of view of different levels of technical requirements, such as device management, data management, communication, intelligent data processing, security and privacy protection; we also look at requirements of application development and deployment. Second, an IoT integrated development platform architecture for IoT applications based on open source ecosystem is proposed and evaluated in an industrial setting. We applied P2P technology to distributed resource management and blockchain-based smart contract mechanics for resource billing management. The results show that the IoT gateway based on an open source ecosystem had a stable and reliable system performance with a certain data size and concurrency scale. These conditions satisfy the application requirements of the IoT in most sensing environments.


2021 ◽  
Vol 9 (1) ◽  
pp. 912-931
Author(s):  
Pavan Madduru

To meet the growing demand for mobile data traffic and the stringent requirements for Internet of Things (IoT) applications in emerging cities such as smart cities, healthcare, augmented / virtual reality (AR / VR), fifth-generation assistive technologies generation (5G) Suggest and use on the web. As a major emerging 5G technology and a major driver of the Internet of Things, Multiple Access Edge Computing (MEC), which integrates telecommunications and IT services, provides cloud computing capabilities at the edge of an access network. wireless (RAN). By providing maximum compute and storage resources, MEC can reduce end-user latency. Therefore, in this article we will take a closer look at 5G MEC and the Internet of Things. Analyze the main functions of MEC in 5G and IoT environments. It offers several core technologies that enable the use of MEC in 5G and IoT, such as cloud computing, SDN / NFV, information-oriented networks, virtual machines (VMs) and containers, smart devices, shared networks and computing offload. This article also provides an overview of MEC's ​​role in 5G and IoT, a detailed introduction to MEC-enabled 5G and IoT applications, and future perspectives for MEC integration with 5G and IoT. Additionally, this article will take a closer look at the MEC research challenges and unresolved issues around 5G and the Internet of Things. Finally, we propose a use case that MEC uses to obtain advanced intelligence in IoT scenarios.


Author(s):  
Mahmoud Elkhodr ◽  
Seyed Shahrestani ◽  
Hon Cheung

The Internet of Things (IoT) promises to revolute communications on the Internet. The IoT enables numerous business opportunities in fields as diverse as e-health, smart cities, smart homes, among many others. It incorporates multiple long-range, short-range, and personal area wireless networks and technologies into the designs of IoT applications. This will result in the IoT being pervasive in many areas which raise many challenges. This chapter reviews the major research issues challenging the IoT with regard to security, privacy, and management.


Sign in / Sign up

Export Citation Format

Share Document