Javascript must be enabled to continue!
Implementing Security in IOT Systems Via Blockchain
View through CrossRef
With today’s day and age rapidly going digital, the emergence of Internet of Things has become prominent and IoT systems are now being applied to almost every field. IoT systems can be seen being applied to fields such as healthcare, agriculture, manufacturing and many more. As IoT systems encompass numerous devices, each of these devices becomes a target for attacks and exploitation; thus, IoT systems have long been associated with issues related to security. Hence, making IoT systems secure and safe is of paramount importance. While Internet of Things has become a technology that is extremely widespread today due to the wide range of advantages it provides including scalability, dependence, and ease of access; the shortcomings and possible loopholes should also be accounted for. Currently a client/server model or a centralized model of networking in employed in IoT devices.These devices also use a single gateway to transfer data between them and connect through a cloudserver. This model has lots of shortcomings like high cost of centralized cloud maintenance and network equipment and the cost will continue to rise with the increase in the number of devices and the volume of data. Single gateway is not very secure as it allows gaining access to a whole IoT network by compromisinga single device. To tackle the issue of security, we propose the inclusion of blockchain technology. A Blockchainis a distributed ledger where data is stored across various nodes all over the world, this eliminatesthe single point of failure. This project proposes the plethora of benefits that blockchain technologyoffers and aimsto tackle the security aspect of IoT systems. Keywords: Blockchain, Internet of Things, Security
Title: Implementing Security in IOT Systems Via Blockchain
Description:
With today’s day and age rapidly going digital, the emergence of Internet of Things has become prominent and IoT systems are now being applied to almost every field.
IoT systems can be seen being applied to fields such as healthcare, agriculture, manufacturing and many more.
As IoT systems encompass numerous devices, each of these devices becomes a target for attacks and exploitation; thus, IoT systems have long been associated with issues related to security.
Hence, making IoT systems secure and safe is of paramount importance.
While Internet of Things has become a technology that is extremely widespread today due to the wide range of advantages it provides including scalability, dependence, and ease of access; the shortcomings and possible loopholes should also be accounted for.
Currently a client/server model or a centralized model of networking in employed in IoT devices.
These devices also use a single gateway to transfer data between them and connect through a cloudserver.
This model has lots of shortcomings like high cost of centralized cloud maintenance and network equipment and the cost will continue to rise with the increase in the number of devices and the volume of data.
Single gateway is not very secure as it allows gaining access to a whole IoT network by compromisinga single device.
To tackle the issue of security, we propose the inclusion of blockchain technology.
A Blockchainis a distributed ledger where data is stored across various nodes all over the world, this eliminatesthe single point of failure.
This project proposes the plethora of benefits that blockchain technologyoffers and aimsto tackle the security aspect of IoT systems.
Keywords: Blockchain, Internet of Things, Security.
Related Results
Security Challenges and Solutions in the Internet of Things
Security Challenges and Solutions in the Internet of Things
The Internet of Things (IoT) is pervasive in today's world and may be located almost throughout. It is employed in smart cities for things like highways and clinics, as well as in ...
Evaluation of Performance of Cloud of Things (CoT) for Transferring Multimedia and Bulk-set Data
Evaluation of Performance of Cloud of Things (CoT) for Transferring Multimedia and Bulk-set Data
As the number of context-aware and unique data extracting and computing has grown leaps and bounds, paving way to their application in many platforms, Internet of Things (IoT) has ...
Securing Management Information Systems Using Blockchain Technology
Securing Management Information Systems Using Blockchain Technology
This study aims to present the basic principles of blockchain technology that has received the attention of various sectors, including the higher education sector, which studies th...
Improving ICS security through Honeynets and Machine Learning techniques
Improving ICS security through Honeynets and Machine Learning techniques
Abstract
Abstract The internet of things(IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical Systems (CPS) can be seen everywhere, Home applications, Buildin...
Blockchain: A mechanism of “unorthodox” trust
Blockchain: A mechanism of “unorthodox” trust
Blockchain is a revolutionary technology which is expected to cut off proxies, reduce cost and increase speed and range. It offers transparency, safety and traceability and conside...
Traceability of Pharmaceutical Drugs throughout the Supply Chain using Blockchain
Traceability of Pharmaceutical Drugs throughout the Supply Chain using Blockchain
The pharmaceutical industry is prone to many risks and the effect of these risks propagating to patients is enormous. Just like other sectors, the pharmaceutical sector can also be...
Connecting the dots: Internet of things and human resource management
Connecting the dots: Internet of things and human resource management
With each organization gradually turning out to be based on innovation to better supervise business activities, HR pioneers must choose the option to adjust to advancements in like...
SECURITY AND PRIVACY MECHANISM USING BLOCKCHAIN
SECURITY AND PRIVACY MECHANISM USING BLOCKCHAIN
Block chain being a foundational technology impacting and attracting a wide range of applications has become predominant in solving the problem of privacy preserving and security i...