Blockchain for Enhancing IoT Privacy and Security

Authors

  • Shweta Sinha

Keywords:

Internet of Things, Blockchain, Privacy, IoT Features, Blockchain Characteristics.

Abstract

The technological advancements in the network technologies that deal with interconnected computing devices has led to the dramatic increase in the number of Internet of Things (IoT)  devices.  It promises to improve the convenience of our lives by leveraging to modernize the way day to day items are connected to various elements of existence by converting it to smart object. However, with the unprecedented convenience, accessibility, and efficiency, IoT has caused acute security and privacy threats in recent years, and it must be addressed properly. Due to the massive scale and distributed nature of IoT networks, overlooking these privacy and security issues will negatively impact many elements of our existence that involves our surroundings, and these effects will influence our own masses too. The national or jurisdictional boundaries are not restricted to the centralized cloud infrastructure that provides interconnectivity of IoT items, hence maintaining robustness, authentication and security becomes crucial. Recently, the development of blockchain technology is a plausible solution to offer such features. Security, authentication, and maintenance issues can be solved by the secure decentralization of blockchain and overcome the current IoT ecosystem's drawbacks. This paper highlights the IoT features and presents a IoT security and privacy problems are examined and classified in accordance with the IoT layered architecture. Further, we explore the IoT security and privacy challenges and examine blockchain technology towards a solution that help solve many of the IoT privacy and security issues

Author Biography

Shweta Sinha

Associate Professor, Department of Computer Science and Engineering, Amity School of Engineering & Technology, Amity University, Gurugram, Haryana, India

References

F. S. Ali, M. Aloqaily, O. Alfandi, and O. Ozkasap, "Cyberphysical blockchain-enabled peer-to-peer energy trading," Computer, vol. 53, no. 9, pp. 56–65, 2020.

M. Aloqaily, A. Boukerche, O. Bouachir, F. Khalid, and S. Jangsher, "An energy trade framework using smart contracts: Overview and challenges," IEEE Network, vol. 34, no. 4, pp. 119–125, 2020.

D. Kushner, "The real story of stuxnet," IEEE Spectrum. [Online]. Available: https://spectrum.ieee.org/the-real-story-of-stuxnet, 2013.

I. Arghire, "Mirai-based botnet launches massive DDOS attack on streaming service," 2019.

H. Subramanian, "Decentralized blockchain-based electronic marketplaces," Commun. ACM, vol. 61, no. 1, pp. 78–84, 2017.

Network Working Group Internet-Draft, "Secure IoT Bootstrapping: A Survey." [Online]. Available: https://datatracker.ietf.org/doc/draft-irtf-t2trg-secure-bootstrapping/.

H. Liu et al., "Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices," in Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, pp. 13–18. Nov. 2017

JD, "Joylink." [Online]. Available: https://smartdev.jdcloud.com/.

Y. Yang, "BadTunnel: NetBIOS Name Service spoofing over the Internet." [Online]. Available: https://www.blackhat.com/docs/us-16/materials/us-16-Yu-BadTunnel-How-Do-I-Get-Big-Brother-Power.pdf.

H. Liu et al., "Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices," in Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, pp. 13–18, Nov. 2017.

I. Lee, "The Internet of Things for enterprises: An ecosystem, architecture, and IoT service business model," Internet of Things, vol. 7, p. 100078, 2019.

A. C. Jaiswal, S. Sinha, and P. Makkar, "Using TRPO to control quadruped gait behaviors," Journal of Integrated Science and Technology, vol. 11, no. 4, pp. 574-574, 2023.

J. Gu, B. Sun, X. Du, J. Wang, Y. Zhuang, and Z. Wang, "Consortium blockchain-based malware detection in mobile devices," IEEE Access, vol. 6, pp. 12118-12128, 2018.

S. Sinha, A. Agrawal, A. Singh, and P. Raj, "Transforming interactions: mouse-based to voice-based interfaces," Telecommunications and Radio Engineering, vol. 79, no. 14, 2020.

N. Naik, "Choice of effective messaging protocols for IoT systems: MQTT, CoAP, AMQP and HTTP," in 2017 IEEE International Systems Engineering Symposium (ISSE), Oct. 2017, pp. 1-7.

D. Puthal and S. P. Mohanty, "Proof of authentication: IoT-friendly blockchains," IEEE Potentials, vol. 38, no. 1, pp. 26-29, 2018.

S. Sinha and P. Makkar, "Wireless sensor networks: Concepts, components, and challenges," in Security and Privacy Issues in IoT Devices and Sensor Networks. Academic Press, 2021, pp. 1-27.

H. Si, C. Sun, Y. Li, H. Qiao, and L. Shi, "IoT information sharing security mechanism based on blockchain technology," Future Generation Computer Systems, vol. 101, pp. 1028-1040, 2019.

D. Singh, S. Sinha, and V. Thada, "Review of attribute based access control (ABAC) models for cloud computing," in 2021 International Conference on Computational Performance Evaluation (ComPE), Dec. 2021, pp. 710-715.

S. Mehrotra, S. Sinha, and S. K. Sharma, "Overview of the Internet of Things and Ubiquitous Computing," in Blockchain Technology for Data Privacy Management. CRC Press, 2021, pp. 1-19.

A. Dorri, S. S. Kanhere, and R. Jurdak, "MOF-BC: A memory optimized and flexible blockchain for large scale networks," Future Generation Computer Systems, vol. 92, pp. 357-373, 2019.

Downloads

Published

2024-03-30

How to Cite

[1]
S. Sinha, “Blockchain for Enhancing IoT Privacy and Security”, IJIRCST, vol. 12, no. 2, pp. 106–110, Mar. 2024.

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.