Javascript must be enabled to continue!
BLOCKCHAIN-BASED AUTHENTICATION FOR SECURE IOT NETWORKS: A DECENTRALIZED APPROACH TO IDENTITY MANAGEMENT AND DATA INTEGRITY
View through CrossRef
The growing popularity of the Internet of Things (IoT) networks has called out a growing need in sound and scalable security. The blockchain technology and its features of decentralization, immutability, and transparency can offer an effective solution to manage key security vulnerabilities, namely, authentication, data integrity, and privacy. This paper discusses the use of blockchain to IoT security, namely: decentralized authentication systems, data integrity management, and the challenge of scalability of large IoT networks. The findings indicate that despite the fact that blockchain can greatly improve security by guaranteeing data integrity and scheme-level device authentication, the performance of blockchain faced with output times of heightened issuance, slow transaction processing, and network constraints only emerge as network sizes rise. It has been proven that Proof of Stake (PoS) performs better than Proof of Work (PoW) regarding energy consumption, transaction latency, and time of recovery after failures due to attacks. Nonetheless, the paper underlines that streamlining blockchain protocols can help to mitigate performance stalls during massive IoT usage. The paper shows that, despite blockchain offering a secure basis to IoT, refinements in autonomous agreements, privacy safety nets, and scalability methods are required to make it an opportunity with broad IoT implementations.
Kashf Institute of Development & Studies
Title: BLOCKCHAIN-BASED AUTHENTICATION FOR SECURE IOT NETWORKS: A DECENTRALIZED APPROACH TO IDENTITY MANAGEMENT AND DATA INTEGRITY
Description:
The growing popularity of the Internet of Things (IoT) networks has called out a growing need in sound and scalable security.
The blockchain technology and its features of decentralization, immutability, and transparency can offer an effective solution to manage key security vulnerabilities, namely, authentication, data integrity, and privacy.
This paper discusses the use of blockchain to IoT security, namely: decentralized authentication systems, data integrity management, and the challenge of scalability of large IoT networks.
The findings indicate that despite the fact that blockchain can greatly improve security by guaranteeing data integrity and scheme-level device authentication, the performance of blockchain faced with output times of heightened issuance, slow transaction processing, and network constraints only emerge as network sizes rise.
It has been proven that Proof of Stake (PoS) performs better than Proof of Work (PoW) regarding energy consumption, transaction latency, and time of recovery after failures due to attacks.
Nonetheless, the paper underlines that streamlining blockchain protocols can help to mitigate performance stalls during massive IoT usage.
The paper shows that, despite blockchain offering a secure basis to IoT, refinements in autonomous agreements, privacy safety nets, and scalability methods are required to make it an opportunity with broad IoT implementations.
Related Results
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Streamlining IoT-driven Data Using Blockchain
Streamlining IoT-driven Data Using Blockchain
The integration of Internet of Things (IoT) technology has revolutionized data collection and analytics, creating vast networks of interconnected devices generating large volumes o...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Internet of things (IoT) technology plays a vital role in the current technologies because IoT develops a network by integrating different kinds of objects and sensors to create th...
LEGAL IMPLICATIONS OF BLOCKCHAIN TECHNOLOGY FOR TAX COMPLIANCE AND FINANCIAL REGULATION
LEGAL IMPLICATIONS OF BLOCKCHAIN TECHNOLOGY FOR TAX COMPLIANCE AND FINANCIAL REGULATION
Blockchain technology has emerged as a disruptive force in the realms of tax compliance and financial regulation, presenting both opportunities and challenges for governments, busi...
Blockchain for IOT-based Healthcare: Background, Consensus, Platforms and Use Cases
Blockchain for IOT-based Healthcare: Background, Consensus, Platforms and Use Cases
The area of e-healthcare is one of the most popular areas where Internet of Things (IoT) and blockchain technologies are being exploited extensively. IoT in healthcare allows for t...
Developing guidelines for research institutions
Developing guidelines for research institutions
As introduced in Chapter 1, in this thesis, I developed guidelines to research institutions on how to foster research integrity. I did this by exploring how research institutions c...
Blockchain and Cybersecurity: A dual approach to securing financial transactions in Fintech
Blockchain and Cybersecurity: A dual approach to securing financial transactions in Fintech
The rapid growth of the fintech industry has led to an increased reliance on digital financial transactions, which simultaneously presents significant cybersecurity risks. This abs...

