Security Preservation in Blockchain IoT
Ajay 1 , Ravi Kumar2 , Anuradha 3
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-10 , Page no. 168-173, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.168173
Online published on Oct 31, 2019
Copyright © Ajay, Ravi Kumar, Anuradha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Ajay, Ravi Kumar, Anuradha, “Security Preservation in Blockchain IoT,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.168-173, 2019.
MLA Style Citation: Ajay, Ravi Kumar, Anuradha "Security Preservation in Blockchain IoT." International Journal of Computer Sciences and Engineering 7.10 (2019): 168-173.
APA Style Citation: Ajay, Ravi Kumar, Anuradha, (2019). Security Preservation in Blockchain IoT. International Journal of Computer Sciences and Engineering, 7(10), 168-173.
BibTex Style Citation:
@article{Kumar_2019,
author = {Ajay, Ravi Kumar, Anuradha},
title = {Security Preservation in Blockchain IoT},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2019},
volume = {7},
Issue = {10},
month = {10},
year = {2019},
issn = {2347-2693},
pages = {168-173},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4915},
doi = {https://doi.org/10.26438/ijcse/v7i10.168173}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i10.168173}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4915
TI - Security Preservation in Blockchain IoT
T2 - International Journal of Computer Sciences and Engineering
AU - Ajay, Ravi Kumar, Anuradha
PY - 2019
DA - 2019/10/31
PB - IJCSE, Indore, INDIA
SP - 168-173
IS - 10
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
420 | 313 downloads | 168 downloads |
Abstract
With rapid development of Internet of Things (IoT) , it is evident that users get convenience in different fields such as smart homes,transportation,supply chain, smart contracts etc.Blockchain Mechanisms play a vital role in securing many IoT oriented applications.Blockchain and IoT are both intended to be world changing technologies. Merging these technologies could result in something more than the sum of its parts.IoT security using Blockchain is aimed at providing better security mechanisms so that authentication, confidentiality and integrity constraints are preserved. Based on component interaction in IoTenvironment , the security measures that are depicted in the existing work ensures that no alien commodity is allowed to tamper the data and other devices in IoT environment. However IoT devices are surprisingly insecure.Hence security issue is one of the most challenging task for utilizing Blockchain
Key-Words / Index Term
IoT, Blockchain, firewalls, DDOS, Availability, Decentralized, Crypto currency, Privacy preservation etc
References
[1]S. Ølnes and A. Jansen, ``Blockchain technology as infrastructurein public sector: An analytical framework,`` in Proc. 19thAnnu. Int. Conf. Digit. Government Res., Governance Data Age,New York, NY, USA, 2018, pp. 77:1_77:10. [Online]. Available: http://doi.acm.org/10.1145/3209281.3209293
[2]R. Beck and C. Muller-Bloch, ``Blockchain as radical innovation: Aframework for engaging with distributed ledgers,`` in Proc. 50th HawaiiInt. Conf. Syst. Sci., 2017, pp. 5390_5399.
[3]NallapaneniManoj Kumar, Pradeep Kumar Mallick,“The Internet of Things: Insights into the building blocks, component interactions, and architecture layers”, 2018,www.keaipublishing.com/en/journals/digital- communications-and-networks.
[4]Mandrita Banerjee, Junghee Lee, Kim-Kwang Raymond Choo,2018, ScienceDirect.
[5] Daniel Minoli, Benedict Occhiogrosso DVI Communications,2018, Elsevier
[6]YongfengQian,YingyingJiang,JingChenetal.,MatevžPustišekSchoolofComputerScience,ChinaUniversityofGeosciences,Wuhan,China,SchoolofComputerScienceandTechnology,HuazhongUniversity ofScienceandTechnology,Wuhan430074.
[7]ABassi,MBauer,MFiedler,TKramp,RvanKranenburg,SLange,SMeissner(Eds.),EnablingtheInternetofThings,Springer,2013.
[8] A.K. Pathan (Ed.), “Securing Cyber Physical Systems”, CRC,2015.
[9]A.M. Rahmani, P. Liljeberg, J.-S. Preden, A. Jantsch, “Fog Computing in the Internet Of Things” , Springer,2017.
[10]Q.Hassan,A.R.Khan,S.A.Madani(Eds.),”InternetofThings:Challenges,AdvancesandApplications”,CRCPress, 2017 ISBN9781498778510.
[11]A. Pal, B. Purushothaman, “IoT Technical Challenges and Solutions,” ArtechHouse ISBN: 978-1-63081-111-2,Norwood,Mass,2016.
[12]A.Rayes,S.Salam,“Internet of Things From Hype to Reality”,Springer,2016.