Study of Blockchain Technology In Internet of Things

Authors

  • E. Padma  Assistant Professor, Department of CSE, SCSVMV University, Enathur, Tamil Nadu, India

Keywords:

Security, Bitcoin, IoT, Blockchain, Protection of Data

Abstract

In the modern world data are exchanged and transformed without any protection in the digital world. Nowadays, more businesses are committed through online system. The digitization of data can be carried through the centralization and decentralization process with higher protection. All the data can be stored through blocks with transaction history as BlockChain. In a BlockChain the transaction can be simplified with peer-peer network that excludes the involvement of third party. As a new way of communication technology through sensors and actuation object, IoT has been taken its tremendous way of exchanging the information. Security and Privacy policies are to be maintained in their operational feature. The trusted party can be integrated with a chain of link for accessing the information. With the advent of security for high speed networks, smart homes, smart healthcare, the IoT has gained wide acceptance and popularity as the main standard. IoT deployment contains heterogeneous devices with embedded sensors interconnected through network. In this paper, a survey of IoT with Blockchain technology can be implemented for decentralization with high transparency. The security issues are categorized as low-level and high-level for decentralized data. Blockchain technology has been foreseen by research community and plays a major role in controlling and securing IoT devices. Blockchain technology can be worked out for permissible and non-permissible key users. The centralized users can use public Blockchain. The important underlying technology is bitcoin and as a survey in this paper, how the performance feature of Blockchain technology can be worked out for Bitcoin can be discussed. The IoT security and challenges may provide proper solution for the outcoming problems. The Blockchain can be timestamped and validated with a constraint. The main contribution involved in the paper can be summarized as analysis of security threats for decentralized users, IoT security issues with low-level and high-level, how to overcome with Blockchain security attacks. The security threats in IoT exploit Vulnerabilities of different components as software based applications, physical devices. In a distributed system, the decentralized data can be exchanged between each user by using separate key values. The generation of keys can be designed with certification. The keys are stored in a transaction history using blocks. A global security mechanism for various IoT protocols can be implemented interoperably.

References

  1. P. Mahalle, S. Babar, N. R. Prasad and R. Prasad, "Identity management framework towards internet of things (IoT): Roadmap and key challenges," In Recent Trends in Network Security and Applications, Vol.89, pp.430-439, Chennai, India, July 2010.
  2. http://www.nec.com/en/global/solutions/iot/concept/index.html
  3. https://internetofbusiness.com/can-speed-iot-innovation/
  4. http://www.goodworklabs.com/how-to-implement-security-measures-for-internet-of-things/
  5. J. Gubbia, R. Buyyab, S. Marusica and M. Palaniswamia, "Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions,"Future Generation Computer Systems, Vol.29, No.7, pp.1645-1660, September 2013.
  6. D.Yang, F.Liu and Y.Liang, "A Survey of the Internet of Things," in Proc. 1st ICEBI 2010, pp 358-366
  7. R.Khan, S.U. Khan, R.Zaheer and S.Khan, "Future Internet: The Internet of Things architecture, possible applications and key challenges," in Proc.10th Int. Conf.FIT,2012,pp.257-260
  8. GSR14 Best Practice Guidelines on consumer protection in a digital world – A Survey Paper
  9. Alessio Botta , Walter de Donato, Valerio Persico, Antonio Pescapé, "Integration of Cloud computing and Internet of Things: A survey" in Future Generation Computer Systems 56 (2016) 684–700
  10. Thomas Hardjono, Ned Smith, Alex (Sandy) Pentland, "Anonymous Identities for Permissioned Blockchains" A survey paper 2016
  11. Ali Dorri, Salil S. Kanhere, and Raja Jurdak, " Blockchain in Internet of Things: Challenges and Solutions" - proceedings

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
E. Padma, " Study of Blockchain Technology In Internet of Things, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 8, pp.129-134, May-June-2018.