Leveraging Block Chain for Security and Authentication of IoT Devices

Author(s):  
Sheeba DM ◽  
Dr. Jayalakshmi S
Keyword(s):  

IoT devices are playing a greater role in business specially in wireless communication. IoT devices are achieving higher maturity as seen in smartdust. The aim of this research is to study the functionality of MOTES in smartdust to integrate with IoT architecture and infrastructure for optimization of wireless communication specially linked with 2.4Ghz and 5Ghz band. MOTES are being modeled in MALTAB using Artificial Neural Network integrated with optimization for speed, power and frequency linked with IoT architecture. The result proves that smartdust architecture if utilized in IoT architecture, the over all performances result of IoT devices is increased specially in bandwidth and power consumption. All the modeling result were compared for general sensor data bandwidth in ESP8266 for 2.4 Ghz, and mathematical model are presented for 5Ghz using smartdust MOTES. It is been proposed that using AI optimization technique like Ant Colonization Optimization or Particle Swarm Optimization we can mathematically model smartdust Architecture.


System of bodily hubs or "matters" joined with hardware, programming, sensors, and linked to enact articles to move information from servers, included frameworks, or doubtlessly distinctive associated devices depending on a numerous correspondence foundations may be actualized with net of factors (IoT) version. IoT facts gathered from various sensors, hubs and government are moved to the cover over the net. The principle target of IoT protection is to ensure thriller of the statistics, and make certain the assurance of the consumer's statistics, frameworks, software program's facts substance, and smart machine's of the IoT, via manner of ensures the administrations accessibility of IoT organic gadget. The number one purpose of this exam article is to enhance protection highlights to IoT device becoming a member of with rectangular chain. The significance of Bit-coin the usage of rectangular chain innovation, which changed into at that factor set up for a few, financial nicely well worth exchanges because it have been. Anyhow, because of its Non-delivered collectively engineering, agile corruption and cryptographic defend benefits, for instance, pseudonymous personalities, statistics trustworthiness and take a look at, scientists and safety professionals round the sector are concentrating on the rectangular chain to decide coverage and protection issues of IoT. In this article, we have positioned a few right down to earth problems which can be associated with the becoming a member of of IoT devices with the square chain. At closing, we endorse a course ahead to determine a part of the large difficulties to the rectangular chain's utilization in IoT based totally software program.


Nowadays security is major concern for any user connected to the internet. Various types of attacks are to be performed by intruders to obtaining user information as man- inmiddle attack, denial of service, malware attacks etc. Malware attacks specifically ransomware attack become very famous recently. Ransomware attack threaten the users by encrypting their most valuable data, lock the user screen, play some random videos and by various more means. Finally attacker takes benefits by users through paid ransom. In this paper, we propose a framework which prevents the ransomware attack more appropriately using various techniques as block chain, honeypot, cloud & edge computing. This framework is analyzed mainly through the IoT devices and generalized to the any malware attack.


Author(s):  
Thangaraj Muthuraman ◽  
Punitha Ponmalar Pichiah ◽  
Anuradha S.

The current technology has given arms, hands, and wings to the smart objects-internet of things, which create the centralized data collection and analysis nightmare. Even with the distributed big data-enabled computing, the relevant data filtering for the localized decisions take a long time. To make the IOT data communication smoother and make the devices talk to each other in a coherent way the device data transactions are made to communicate through the block chain, and the applications on the localized destination can take the decisions or complete transaction without the centralized hub communication. This chapter focuses on adding vendor-specific IOT devices to the public or private block chain and the emerging challenges and the possible solutions to make the devices talk to each other and have the decision enablement through the distributed transactions through the block chain technology.


2021 ◽  
Author(s):  
NAGAJAYANTHI BOOBALAKRISHNAN

Abstract Internet connects people to people, people to machine, and machine to machine for a life of serendipity through a Cloud. Internet of Things networks objects or people and integrates them with software to collect and exchange data. The Internet of things (IoT) influences our lives based on how we ruminate, respond, and anticipate. IoT 2020 heralds from the fringes to the data ecosystem and panaches a comfort zone. IoT is overwhelmingly embraced by businessmen and consumers due to increased productivity and convenience. Internet of Things facilitates intelligent device control with cloud vendors like Amazon and Google using artificial intelligence for data analytics, and with digital assistants like Alexa and Siri providing a voice user interface. Smart IoT is all about duplex connecting, processing, and implementing. With 5G, lightning faster rate of streaming analytics is realistic. An amalgamation of technologies has led to this techno-industrial IoT revolution. Centralized IoT architecture is vulnerable to cyber-attacks. With Block Chain, it is possible to maintain transparency and security of the transaction's data. Standardization of IoT devices is achievable with limited vendors based on Platform, Connectivity, and Application. Robotic Process Automation (RPA) using bots has automated laborious tasks in 2019. Embedded Internet using Facial Recognition could reduce the pandemic crisis. Security concerns are addressed with micro-segmentation approaches. IoT, an incredible vision of the future makes systems adaptive with customized features, responsive with increased efficiency, and procurable with optimized cost. This paper delivers a comprehensive insight into the technical perspectives of IoT, focusing on interoperability, flexibility, scalability, mobility, security, transparency, standardization, and low energy.


Due to increasing digitalization and the development of new technologies such as the IoT, the application of machine learning (ML) algorithms is rapidly expanding (IoT). ML algorithms are being used in healthcare, IoT, engineering, finance, and other fields in today's digital age. However, in order to predict/solve a specific issue, all of these algorithms must be taught. There's a good chance that the training datasets have been tampered with, resulting in skewed findings. As a result, we have suggested a blockchain-based approach to protect datasets produced by IoT devices for E-Health applications in this paper. To address the aforementioned problem, the suggested blockchain-based system makes use of a private cloud. For assessment, we created a mechanism that dataset owners may use to protect their data.


Author(s):  
Thangaraj Muthuraman ◽  
Punitha Ponmalar Pichiah ◽  
Anuradha S.

The current technology has given arms, hands, and wings to the smart objects-internet of things, which create the centralized data collection and analysis nightmare. Even with the distributed big data-enabled computing, the relevant data filtering for the localized decisions take a long time. To make the IOT data communication smoother and make the devices talk to each other in a coherent way the device data transactions are made to communicate through the block chain, and the applications on the localized destination can take the decisions or complete transaction without the centralized hub communication. This chapter focuses on adding vendor-specific IOT devices to the public or private block chain and the emerging challenges and the possible solutions to make the devices talk to each other and have the decision enablement through the distributed transactions through the block chain technology.


With the advent of digitalization the entire world is greatly connected to the digital world. The modern gadgets are equipped with Internet-connectivity encouraging web browsing. Due to rapid mobility of devices numerous applications are launched while these come with lot of advantages and wide spread of information they are prone to attacks too. These attacks on IoT devices compromise the security & privacy of the user. The attackers get entry and invade through the data, inject malware, or schedule attacks on neighborhood. In this paper, we present the attacks and the vulnerabilities in IoT, along with the preventive and counter measures to be adapted to safeguard from attacks. We compiled a brief outline of the security breaches and the latest block chain application to implement security in IoT devices as work for future direction.


The main things we used to build the project in this paper are one raspberry pi as server, two Arduino’s as two nodes which are configured to connect to Wi-Fi using ESP8266 (node mcu). We will connect temperature and humidity sensor to one Arduino and RFID Reader module to another Ardunio Board to demonstrate the entire process. The working follows as the data is taken from DTH sensor and RFID Reader module which is sent to Raspberry Pi. Arduino’s acts as nodes from which data transmission starts. The Raspberry Pi acts as gateway between two Arduino’s and it is the server. All the components are connected to the Wi-Fi. The data from the sensors is taken and will be sent to server in hash, hash includes all the previous data and we already know that block chain is a decentralized network. We cannot manipulate the values of data at any point because of their data contains both previous and local hash. This is why usage of block chain provides more security to IOT devices. Henceforth, we implemented this exceptional way of blockchain technology for communication of data for safety and immense security


Sign in / Sign up

Export Citation Format

Share Document