Securing IoT Devices using Blockchain Concept

被引:4
|
作者
Sadek, Islam M. Momtaz A. [1 ]
Ilyas, Muhammed [2 ]
机构
[1] Altinbas Univ, Dept Informat Technol, Istanbul, Turkey
[2] Altinbas Univ, Dept Elect & Elect Engn, Istanbul, Turkey
关键词
IoT; Blockchain; Cyber Security for IoT; Blockchain Integrity; IoT attacks; Smart-contract; Decentralized; Ethereum; MQTT; Wireshark; sniffing Attack; INTERNET;
D O I
10.1109/ICEET53442.2021.9659792
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The internet of things (IoT) implementation leads to an extended attack surface that requires continuous mitigation of security. Mission-critical situations (e.g., Smart Grid, Intelligent Transportation Systems, video surveillance, e-health) to business-oriented applications are all examples of IoT applications (e.g., banking, logistics, insurance, and contract law). IoT has made human existence considerably easier and more efficient. Because IoT devices are less expensive to build due to the use of various software, sensors, and the use of Artificial Intelligence, they violate several security regulations. That's why, in the IoT systems; extensive security support is required, particularly for mission-critical applications, but also for downstream commercial applications. There have been a variety of security strategies and approaches suggested and/or used. Blockchain is an amazing concept that manages a distributed ecosystem without the need for a third party. Researchers discovered that it has the ability to solve IoT software-related security problems. The biggest obstacle is combining blockchain with resource-constrained IoT computers. An experimental setup to incorporate blockchain on a smart laboratory IoT-based was completed, and then tested against Wireshark sniffing attacks, the system was more vulnerable to cyber-crimes attacks as we found out that when we employed blockchain technology as the communication medium of IoT devices, the no. of bytes needed for packet transmission was more than the bytes needed without applying Blockchain with about 959 bytes on average.
引用
收藏
页码:373 / 378
页数:6
相关论文
共 50 条
  • [41] Securing IoT-based healthcare systems from counterfeit medicine penetration using Blockchain
    Preetha, A. Divya
    Kumar, T. S. Pradeep
    APPLIED NANOSCIENCE, 2021, 13 (2) : 1263 - 1275
  • [42] Securing IoT-based healthcare systems from counterfeit medicine penetration using Blockchain
    A. Divya Preetha
    T. S. Pradeep Kumar
    Applied Nanoscience, 2023, 13 : 1263 - 1275
  • [43] Securing IoT Devices by Exploiting Backscatter Propagation Signatures
    Luo, Zhiqing
    Wang, Wei
    Huang, Qianyi
    Jiang, Tao
    Zhang, Qian
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (12) : 4595 - 4608
  • [44] Securing IoT devices in the smart-city era
    Lecompte, Denny
    Electronic Products, 2023, 65 (02): : 8 - 9
  • [45] An improved chacha algorithm for securing data on IoT devices
    Mahdi, Mohammed Salih
    Hassan, Nidaa Falih
    Abdul-Majeed, Ghassan H.
    SN APPLIED SCIENCES, 2021, 3 (04):
  • [46] An improved chacha algorithm for securing data on IoT devices
    Mohammed Salih Mahdi
    Nidaa Falih Hassan
    Ghassan H. Abdul-Majeed
    SN Applied Sciences, 2021, 3
  • [47] Offline Scaling of IoT Devices in IOTA Blockchain
    Rawat, Abhimanyu
    Daza, Vanesa
    Signorini, Matteo
    SENSORS, 2022, 22 (04)
  • [48] Blockchain for Storing Shadow Data of IoT Devices
    Bao, Luwei
    Lu, Gehao
    2022 5TH INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY AND APPLICATIONS, ICBTA 2022, 2022, : 158 - 163
  • [49] Securing the Internet of things using Blockchain
    Showkat, Sadia
    Qureshi, Shaima
    PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 540 - 545
  • [50] Confidential Discovery of IoT devices through Blockchain
    Rondanini, Christian
    Carminati, Barbara
    Ferrari, Elena
    2019 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (IEEE ICIOT 2019), 2019, : 1 - 8