Blockchain Technology - Based Solutions for IOT Security

Author(s):  
Israa Al_Barazanchi ◽  
Aparna Murthy ◽  
Ahmad AbdulQadir Al Rababah ◽  
Ghadeer Khader ◽  
Haider Rasheed Abdulshaheed ◽  
...  

Blockchain innovation has picked up expanding consideration from investigating and industry over the later a long time. It permits actualizing in its environment the smart-contracts innovation which is utilized to robotize and execute deals between clients. Blockchain is proposed nowadays as the unused specialized foundation for a few sorts of IT applications. Blockchain would aid avoid the duplication of information because it right now does with Bitcoin and other cryptocurrencies. Since of the numerous hundreds of thousands of servers putting away the Bitcoin record, it’s impossible to assault and alter. An aggressor would need to change the record of 51 percent of all the servers, at the precise same time. The budgetary fetched of such an assault would distantly exceed the potential picks up. The same cannot be said for our private data that lives on single servers possessed by Google and Amazon. In this paper, we outline major Blockchain technology that based as solutions for IOT security. We survey and categorize prevalent security issues with respect to IoT data privacy, in expansion to conventions utilized for organizing, communication, and administration. We diagram security necessities for IoT together with the existing scenarios for using blockchain in IoT applications.

Author(s):  
Divya Asok ◽  
Chitra P. ◽  
Bharathiraja Muthurajan

In the past years, the usage of internet and quantity of digital data generated by large organizations, firms, and governments have paved the way for the researchers to focus on security issues of private data. This collected data is usually related to a definite necessity. For example, in the medical field, health record systems are used for the exchange of medical data. In addition to services based on users' current location, many potential services rely on users' location history or their spatial-temporal provenance. However, most of the collected data contain data identifying individual which is sensitive. With the increase of machine learning applications around every corner of the society, it could significantly contribute to the preservation of privacy of both individuals and institutions. This chapter gives a wider perspective on the current literature on privacy ML and deep learning techniques, along with the non-cryptographic differential privacy approach for ensuring sensitive data privacy.


Author(s):  
K. Dinesh Kumar ◽  
Venkata Rathnam T. ◽  
Venkata Ramana R. ◽  
M. Sudhakara ◽  
Ravi Kumar Poluru

Internet of things (IoT) technology plays a vital role in the current technologies because IoT develops a network by integrating different kinds of objects and sensors to create the communication among objects directly without human interaction. With the presence of internet of things technology in our daily comes smart thinking and various advantages. At the same time, secure systems have been a most important concern for the protection of information systems and networks. However, adopting traditional security management systems in the internet of things leads several issues due to the limited privacy and policies like privacy standards, protocol stacks, and authentication rules. Usually, IoT devices has limited network capacities, storage, and computing processors. So they are having more chances to attacks. Data security, privacy, and reliability are three main challenges in the IoT security domain. To address the solutions for the above issues, IoT technology has to provide advanced privacy and policies in this large incoming data source. Blockchain is one of the trending technologies in the privacy management to provide the security. So this chapter is focused on the blockchain technologies which can be able to solve several IoT security issues. This review mainly focused on the state-of-the-art IoT security issues and vulnerabilities by existing review works in the IoT security domains. The taxonomy is presented about security issues in the view of communication, architecture, and applications. Also presented are the challenges of IoT security management systems. The main aim of this chapter is to describe the importance of blockchain technology in IoT security systems. Finally, it highlights the future directions of blockchain technology roles in IoT systems, which can be helpful for further improvements.


Author(s):  
A. Benahmed Daho

Abstract. Blockchain is an emerging immature technology that disrupt many well established industries nowadays, like finance, supply chain, transportation, energy, official registries (identity, vehicles, …). In this contribution we present a smart contracts library, named Crypto-Spatial, written for the Ethereum Blockchain and designed to serve as a framework for geospatially enabled decentralized applications (dApps) development. The main goal of this work is to investigate the suitability of Blockchain technology for the storage, retrieval and processing of vector geospatial data. The design and the proof-of-concept implementation presented are both based on the Open Geospatial Consortium standards: Simple Feature Access, Discrete Global Grid Systems (DGGS) and Well Known Binary (WKB). Also, the FOAM protocol concept of Crypto-Spatial Coordinate (CSC) was used to uniquely identify spatial features on the Blockchain immutable ledger. The design of the Crypto-Spatial framework was implemented as a set of smart contracts using the Solidity object oriented programming language. The implemented library was assessed toward Etheruem’s best practices design patterns and known security issues (common attacks). Also, a generic architecture for geospatially enabled decentralized applications, combining blockchain and IPFS technologies, was proposed. Finally, a proof-of-concept was developed using the proposed approach which main purpose is to port the UN/FAO-SOLA to Blockchain techspace allowing more transparency and simplifying access to users communities. The smart contracts of this prototype are live on the Rinkeby testnet and the frontend is hosted on Github pages. The source code of the work presented here is available on Github under Apache 2.0 license.


Author(s):  
Pawan Vishwakarma

IoT is the component which is set up between advanced machines and associated gadgets. It is an interrelated framework where every thing has a novel identifier and consequently moves information and works the framework which works in the internet. Be that as it may, it isn't protected to leave the gadgets open since programmers or infections can undoubtedly assault or cut the information of the concerned individual or client. Various high-profile episodes where a typical IoT gadget was utilized to invade and assault the bigger organization has caused to notice the requirement for IoT security. Lacking information insurance (correspondence and capacity) The most regular worries in the information security of IoT applications are because of shaky interchanges and information stockpiling. One of the critical difficulties for IoT protection and security is that compromised gadgets can be utilized to get to classified information. It is basic to guaranteeing the security of organizations with IoT gadgets associated with them. Security in IoT is the demonstration of getting Internet of Things gadgets and the organizations they're associated with. In the business setting, IoT gadgets incorporate modern machines, keen energy networks, building mechanization, in addition to whatever individual IoT gadgets representatives bring to work. This scope of gadgets can present security hazards that can undermine your business. Every now and again planned without security, IoT gadgets have become another danger vector for agitators to utilize when dispatching assaults. We have effectively seen a few assaults utilizing these disseminated, apparently blameless gadgets. IoT security, incorporates a wide scope of procedures, systems, conventions and activities that intend to alleviate the expanding IoT weaknesses of present day organizations. In this paper the theoretical investigation of safety issues in IoT is given


Author(s):  
Padmavathi U. ◽  
Narendran Rajagopalan

Blockchain refers to a distributed ledger technology that helps people to regulate and manage their information without any intermediaries. This technology emerges as a promising panacea for authentication and authorization with potential for use in every possible domain including financial, manufacturing, educational institutions, etc. Blockchain has its birth through the concept of Bitcoin, a digital cryptocurrency by Satoshi Nakamoto, called as Blockchain 1.0. Blockchain 2.0 came into existence in 2014 with Ethereum and smart contracts. The challenges such as scalability, interoperability, sustainability, and governance led to the next generation of Blockchain also called as IOTA, a blockchainless cryptocurrency for the internet of things runs on the top of their own ledger called Tangle, which is immune towards quantum computers. This disruptive technology evolved to provide cross chain support and more security through Blockchain 4.0. Finally, the chapter concludes by discussing the various applications of this technology and its advantages and security issues.


2019 ◽  
Vol 9 (22) ◽  
pp. 4966 ◽  
Author(s):  
Daraghmi ◽  
Daraghmi ◽  
Yuan

Although blockchain technology was first introduced through Bitcoin, extending its usage to non-financial applications, such as managing academic records, is a new mission for recent research to balance the needs for increasing data privacy and the regular interaction among students and universities. In this paper, a design for a blockchain-based system, namely UniChain, for managing Electronic Academic Records (EARs) is proposed. UniChain is designed to improve the current management systems as it provides interoperable, secure, and effective access to EARs by students, universities, and other third parties, while keeping the students’ privacy. UniChain employs timed-based smart contracts for governing transactions and controlling access to EARs. It adopts advanced encryption techniques for providing further security. This work proposes a new incentive mechanism that leverages the degree of universities regarding their efforts on maintaining academic records and creating new blocks. Extensive experiments were conducted to evaluate the UniChain performance, and the results indicate the efficiency of the proposal in handling a large dataset at low latency.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Linkai Zhu ◽  
Sheng Peng ◽  
Zhiming Cai ◽  
Wenjian Liu ◽  
Chunjiang He ◽  
...  

Aiming at the problems of low protection accuracy and long time consumption in traditional privacy data protection methods, a privacy data protection method based on trusted computing and blockchain is proposed. Set up the Internet node secure transmission protocol through the trusted node uplink transmission protocol and the downlink transmission protocol, and according to the transmission protocol, combined with the blockchain technology, the ECC elliptic curve encryption algorithm is used to encrypt the amount of data existing in the blockchain, and the AES symmetric encryption algorithm is used to encrypt the private data that exists in the nonblockchain, thereby completing the protection of network private data. The simulation experiment results show that the privacy data protection accuracy of the proposed method is higher and the work efficiency is faster.


Electronics ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 255 ◽  
Author(s):  
Tianyu Sun ◽  
Wensheng Yu

Blockchain technology has attracted more and more attention from academia and industry recently. Ethereum, which uses blockchain technology, is a distributed computing platform and operating system. Smart contracts are small programs deployed to the Ethereum blockchain for execution. Errors in smart contracts will lead to huge losses. Formal verification can provide a reliable guarantee for the security of blockchain smart contracts. In this paper, the formal method is applied to inspect the security issues of smart contracts. We summarize five kinds of security issues in smart contracts and present formal verification methods for these issues, thus establishing a formal verification framework that can effectively verify the security vulnerabilities of smart contracts. Furthermore, we present a complete formal verification of the Binance Coin (BNB) contract. It shows how to formally verify the above security issues based on the formal verification framework in a specific smart contract. All the proofs are checked formally using the Coq proof assistant in which contract model and specification are formalized. The formal work of this paper has a variety of essential applications, such as the verification of blockchain smart contracts, program verification, and the formal establishment of mathematical and computer theoretical foundations.


Sign in / Sign up

Export Citation Format

Share Document