scholarly journals Hyperledger Fabric Blockchain for data Security in IOT Devices

2020 ◽  
Vol 9 (1) ◽  
pp. 2571-2577

Data security for IOT devices is very import aspect these days as the world is moving towards digitalization. Consider a smart energy meter which provides a way to monitor the energy consumption at home, data security in such smart meter reading is very important. If the Power reading signals are tampered, then it may cause serious economic loss for the authorities. The personal information infringement of user can occur at the database and may fall in the hands of unethical persons. In order to address these issues in this paper we propose to use a permissioned blockchain network. Blockchain maintains time stamped ledger records that are very hard to tamper. Every transaction is recorded and distributed across many participant nodes, these records are immutable because they have blocks of data which are linked to each other with strong cryptographic hash. The blockchain network is built using hyperledger fabric, where all the participant nodes are registered and only registered nodes involve in consensus process of transaction. In fabric, MSP (membership service provider) identifies the identity of the participant nodes through X.509 digital certificates issued by certificate authority. Along with creation of blockchain network for the application, a mobile client, a web client, an Arduino client and web server is created. The Arduino client is the hardware module that has an energy meter (SDM120) measuring the energy consumption of the user and sends this information serially to NODEMCU. NODEMCU POSTs the read energy details to the web server at particular api, web server POSTs the details to the Blockchain Network, where transactions undergoes consensus to add this information to blockchain ledger. Now data is decentralized and every peer node has the local copy of ledger. The updated information can be queried and seen on the web Client and Mobile client user interfaces. Anonymity-enhanced blockchain has been implemented to avoid the disclosure of personal information or data. Also performance analysis of the application is carried out for number of sequential requests and concurrent requests from many users using different tools.

2019 ◽  
Vol 18 (3-2) ◽  
pp. 32-36
Author(s):  
Sh. Nurul Hidayah Wan Julihi ◽  
Ili Najaa Aimi Mohd Nordin ◽  
Muhammad Rusydi Muhammad Razif ◽  
Amar Faiz Zainal Abidin

Manual home energy meter reading and billing had caused inconvenience to the utility companies due to lack of manpower to read the energy meter at each household especially in the remote area, explains the increasing number of smart meter reader in the current market. Most of the smart meters in the market do not offer safety of privacy of consumers’ personal information since the data of electricity usage is being transferred digitally to the utility companies for more accurate bills calculation. Plus, the smart meter system is also a bit pricey to be installed in the rural area. Therefore, a private system that able to read energy consumption from a DC load and calculate its bill according to the tariff is proposed. Value of current is being obtained by using ACS712 current sensor. Hall circuit in the current sensor will converts magnetic field into a proportional voltage. The proposed system allows energy meter monitoring from an Android-based smartphone by displaying the real-time energy consumption and bill on Blynk application. An interface of Blynk is developed and connected to WiFi module, ESP8266 for visualizing the energy consumption of the DC load. In conclusion, the Energy Meter transmitter part able to read, calculate and transmit value of energy consumption and current bills to the Blynk application and Blynk application able to receive and show all the data transmitted at the present time. This system will be further improved for long-distance monitoring of electrical appliances used at home.


Author(s):  
Thomas M. Chen ◽  
Zhi (Judy) Fu

Most people are concerned about online privacy but may not be aware of the various ways that their personal information is collected during routine Web browsing. We review the types of personal information that may be collected voluntarily or involuntarily through the Web browser or disclosed by a Web server. We present a taxonomy of regulatory and technological approaches to protect privacy. All approaches to date have only been partial solutions. By its nature, the Web was designed to be an open system to facilitate data sharing, and hence Web privacy continues to be a challenging problem.


2014 ◽  
Vol 29 (2) ◽  
pp. 134-153 ◽  
Author(s):  
Andrés Fortier ◽  
Cecilia Challiol ◽  
Juan Lautaro Fernández ◽  
Santiago Robles ◽  
Gustavo Rossi ◽  
...  

AbstractThere is an increasing trend in moving desktop applications to web browsers, even when the web server is running on the same desktop machine. In this paper, we go further in this direction and show how to combine a web server, a web application framework (enhanced to support desktop-like Model–View–Controller interaction) and a context-aware architecture to develop web-based mobile context-aware applications. By using this approach we take advantage of the well-established web paradigm to design the graphical user interfaces (GUIs) and the inherent ability of the web to mash up applications with external components (such as Google Maps). On top of that, since the web server runs on the device itself, the application can access local resources (such as disk space or sensing devices, which are indispensable for context-aware systems) avoiding the sandbox model of the web browsers. To illustrate our approach we show how a mobile hypermedia system has been built on top of our platform.


Cyber Crime ◽  
2013 ◽  
pp. 83-100
Author(s):  
Thomas M. Chen ◽  
Zhi (Judy) Fu

Most people are concerned about online privacy but may not be aware of the various ways that their personal information is collected during routine Web browsing. We review the types of personal information that may be collected voluntarily or involuntarily through the Web browser or disclosed by a Web server. We present a taxonomy of regulatory and technological approaches to protect privacy. All approaches to date have only been partial solutions. By its nature, the Web was designed to be an open system to facilitate data sharing, and hence Web privacy continues to be a challenging problem.


Internet of Things (IoT) is growing rapidly in recent days and increasing of IoT devices day by day producing vast amount of data, to store this data security is a major challenge in IoT. To avoid these security challenges, blockchain is the perfect solution. With its security by design, immutable nature, transparent nature and encryption methodology blockchain will solve architectural issues of IoT. In these days, the energy meters in our homes are not able send the information to the cloud and man power also needed to update readings every month, and manually errors also taken place some times to avoid these, in the paper a smart energy meter is proposed, that will measure the power consumption and that readings will be stored in to the blockchain to secure the data from the fraudsters and also to make the payment without any third parties like banks, in the blockchain technology amount can be transferred from one to one without any third parties using crypto currencies like bitcoin, ether.., etc. The user will be able to check the bills in the blockchain and do the payments. By using the blockchain technology the user data will be more secure and the IoT security issues also solvable.


2016 ◽  
Vol 1 (1) ◽  
pp. 001
Author(s):  
Harry Setya Hadi

String searching is a common process in the processes that made the computer because the text is the main form of data storage. Boyer-Moore is the search string from right to left is considered the most efficient methods in practice, and matching string from the specified direction specifically an algorithm that has the best results theoretically. A system that is connected to a computer network that literally pick a web server that is accessed by multiple users in different parts of both good and bad aim. Any activity performed by the user, will be stored in Web server logs. With a log report contained in the web server can help a web server administrator to search the web request error. Web server log is a record of the activities of a web site that contains the data associated with the IP address, time of access, the page is opened, activities, and access methods. The amount of data contained in the resulting log is a log shed useful information.


2020 ◽  
Vol 14 ◽  
Author(s):  
M. Sivaram ◽  
V. Porkodi ◽  
Amin Salih Mohammed ◽  
S. Anbu Karuppusamy

Background: With the advent of IoT, the deployment of batteries with a limited lifetime in remote areas is a major concern. In certain conditions, the network lifetime gets restricted due to limited battery constraints. Subsequently, the collaborative approaches for key facilities help to reduce the constraint demands of the current security protocols. Aim: This work covers and combines a wide range of concepts linked by IoT based on security and energy efficiency. Specifically, this study examines the WSN energy efficiency problem in IoT and security for the management of threats in IoT through collaborative approaches and finally outlines the future. The concept of energy-efficient key protocols which clearly cover heterogeneous IoT communications among peers with different resources has been developed. Because of the low capacity of sensor nodes, energy efficiency in WSNs has been an important concern. Methods: Hence, in this paper, we present an algorithm for Artificial Bee Colony (ABC) which reviews security and energy consumption to discuss their constraints in the IoT scenarios. Results: The results of a detailed experimental assessment are analyzed in terms of communication cost, energy consumption and security, which prove the relevance of a proposed ABC approach and a key establishment. Conclusion: The validation of DTLS-ABC consists of designing an inter-node cooperation trust model for the creation of a trusted community of elements that are mutually supportive. Initial attempts to design the key methods for management are appropriate individual IoT devices. This gives the system designers, an option that considers the question of scalability.


Sensors ◽  
2021 ◽  
Vol 21 (14) ◽  
pp. 4798
Author(s):  
Fangni Chen ◽  
Anding Wang ◽  
Yu Zhang ◽  
Zhengwei Ni ◽  
Jingyu Hua

With the increasing deployment of IoT devices and applications, a large number of devices that can sense and monitor the environment in IoT network are needed. This trend also brings great challenges, such as data explosion and energy insufficiency. This paper proposes a system that integrates mobile edge computing (MEC) technology and simultaneous wireless information and power transfer (SWIPT) technology to improve the service supply capability of WSN-assisted IoT applications. A novel optimization problem is formulated to minimize the total system energy consumption under the constraints of data transmission rate and transmitting power requirements by jointly considering power allocation, CPU frequency, offloading weight factor and energy harvest weight factor. Since the problem is non-convex, we propose a novel alternate group iteration optimization (AGIO) algorithm, which decomposes the original problem into three subproblems, and alternately optimizes each subproblem using the group interior point iterative algorithm. Numerical simulations validate that the energy consumption of our proposed design is much lower than the two benchmark algorithms. The relationship between system variables and energy consumption of the system is also discussed.


2009 ◽  
Vol 43 (1) ◽  
pp. 203-205 ◽  
Author(s):  
Chetan Kumar ◽  
K. Sekar

The identification of sequence (amino acids or nucleotides) motifs in a particular order in biological sequences has proved to be of interest. This paper describes a computing server,SSMBS, which can locate and display the occurrences of user-defined biologically important sequence motifs (a maximum of five) present in a specific order in protein and nucleotide sequences. While the server can efficiently locate motifs specified using regular expressions, it can also find occurrences of long and complex motifs. The computation is carried out by an algorithm developed using the concepts of quantifiers in regular expressions. The web server is available to users around the clock at http://dicsoft1.physics.iisc.ernet.in/ssmbs/.


2014 ◽  
Vol 602-605 ◽  
pp. 2939-2942
Author(s):  
Ying Ying Yang ◽  
Yi Shan ◽  
Zhi Tong Liu ◽  
Jian Feng Li ◽  
Jing Jin ◽  
...  

For a long time,users electic larceny has been a headache topic of the electric power department.The users long-term electic larceny has brought great economic loss to the power supply department.In recent years,the stealing power means are emerging in an endless stream,and they have been broght mant difficulties to prevent electic larceny.But the road is high one feet evil spirite is high one a unit of lengh, according to the study on electic energy meter,we will understand the electic larceny means at the sours.Therefore, further study of stealing power means is also our current priority,only the better anti-stealing electic power means, can be completely blocked leak.


Sign in / Sign up

Export Citation Format

Share Document