Blockchain-Technology-Based Solutions for IOT Security

被引:0
|
作者
Al-Barazanchi I. [1 ,2 ]
Murthy A. [3 ]
Al Rababah A.A.Q. [4 ]
Khader G. [5 ]
Abdulshaheed H.R. [1 ]
Rauf H.T. [6 ]
Daghighi E. [7 ]
Niu Y. [8 ]
机构
[1] Baghdad College, Economic Sciences University, Baghdad
[2] College of Computer Science & Information Technology, Universiti Tenaga Nasional (UNITEN)
[3] Professional Engineers in Ontario, North York, M2N 6K9, ON
[4] Faculty of Computing and Information Technology, King Abdulaziz University, Rabigh
[5] Masters of Applied Sciences in Engineering Physics, Stoke-on-Trent
[6] Centre for Smart Systems, AI and Cybersecurity, Staffordshire University, Stoke-on-Trent
[7] Technical and Vocational University, Tehran
[8] Belarusian-Russian University, Mira Avenue 43, Mogilev
关键词
Blockchain; Blockchain technology; Data security; IoT security; Network security;
D O I
10.52866/ijcsm.2022.01.01.006
中图分类号
学科分类号
摘要
After a long period of development, blockchain innovation has received much attention from scholars and industry practitioners alike. This innovation allows the issuance of smart contracts, which are utilised to automate and execute deals amongst clients. Blockchain is also being used nowadays by a few IT applications as a specialised foundation. This technology also prevents the duplication of information similar to what is being done with Bitcoin and other cryptocurrencies. Specifically, Bitcoin records are virtually impossible to alter as this cryptocurrency is being traded amongst hundreds of thousands of servers. Therefore, to launch a successful attack, the aggressor should change the Bitcoin records of 51% of these servers simultaneously. The cost of such effort significantly exceeds the potential payoff. Meanwhile, private data that are stored on single servers, such as Amazon and Google, are prone to malicious attacks. Therefore, in this paper, we propose the use of blockchain to solve the security issues in the Internet of Things (IOT). We initially identify and categorise the prevalent security issues, particularly data privacy, being faced in IoT in expansion to conventions utilized for organizing, communication, and administration. Afterwards, we formulate some security measures for IoT and illustrate scenarios where blockchain is being used in IoT applications. © 2022 Iraqi Journal for Computer Science and Mathematics. All rights reserved.
引用
收藏
页码:53 / 63
页数:10
相关论文
共 50 条
  • [21] What's next for blockchain-technology in IoT security?
    Crandall, Kodey S.
    North, Matt
    AMCIS 2020 PROCEEDINGS, 2020,
  • [22] Exploitation of the Promising Technology: Using BlockChain to Enhance the Security of IoT
    AlDoaies, Bayan Hazaa
    Almagwashi, Haya
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [23] Blockchain-based PKI solutions for IoT
    Singla, Ankush
    Bertino, Elisa
    2018 4TH IEEE INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2018), 2018, : 9 - 15
  • [24] Consensus Mechanism of IoT Based on Blockchain Technology
    Wu, Yue
    Song, Liangtu
    Liu, Lei
    Li, Jincheng
    Li, Xuefei
    Zhou, Linli
    SHOCK AND VIBRATION, 2020, 2020
  • [25] Blockchain Technology: Characteristics, Security and Privacy; Issues and Solutions
    Yassein, Muneer Bani
    Shatnawi, Farah
    Rawashdeh, Saif
    Mardin, Wail
    2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [26] Security Using Blockchain in IoT-Based System
    Suman
    THIRD CONGRESS ON INTELLIGENT SYSTEMS, CIS 2022, VOL 1, 2023, 608 : 311 - 326
  • [27] Technical Development of a Security Platform for IoT Based on Blockchain
    Ferro, Roberto
    Bernal, Yakkay
    Tapicha, Jorge
    KNOWLEDGE MANAGEMENT IN ORGANIZATIONS, KMO 2018, 2018, 877 : 625 - 633
  • [28] A Blockchain-based Authentication and Security Mechanism for IoT
    Li, Dongxing
    Peng, Wei
    Deng, Wenping
    Gai, Fangyu
    2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
  • [29] A Raspberry Pi based blockchain application on IoT security
    Abas, Sherhan Upahm
    Duran, Fecir
    Tekerek, Adem
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 229
  • [30] IoT Security Access Authentication Method Based on Blockchain
    Cheng, Yang
    Lei, Min
    Chen, Shiyou
    Fang, Zigang
    Yang, Shuaipeng
    ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2019, PT II, 2019, 302 : 229 - 238