Open Access   Article Go Back

Security Preservation in Blockchain IoT

Ajay 1 , Ravi Kumar2 , Anuradha 3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-10 , Page no. 168-173, Oct-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i10.168173

Online published on Oct 31, 2019

Copyright © Ajay, Ravi Kumar, Anuradha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ajay, Ravi Kumar, Anuradha, “Security Preservation in Blockchain IoT,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.168-173, 2019.

MLA Style Citation: Ajay, Ravi Kumar, Anuradha "Security Preservation in Blockchain IoT." International Journal of Computer Sciences and Engineering 7.10 (2019): 168-173.

APA Style Citation: Ajay, Ravi Kumar, Anuradha, (2019). Security Preservation in Blockchain IoT. International Journal of Computer Sciences and Engineering, 7(10), 168-173.

BibTex Style Citation:
@article{Kumar_2019,
author = {Ajay, Ravi Kumar, Anuradha},
title = {Security Preservation in Blockchain IoT},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2019},
volume = {7},
Issue = {10},
month = {10},
year = {2019},
issn = {2347-2693},
pages = {168-173},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4915},
doi = {https://doi.org/10.26438/ijcse/v7i10.168173}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i10.168173}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4915
TI - Security Preservation in Blockchain IoT
T2 - International Journal of Computer Sciences and Engineering
AU - Ajay, Ravi Kumar, Anuradha
PY - 2019
DA - 2019/10/31
PB - IJCSE, Indore, INDIA
SP - 168-173
IS - 10
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
296 296 downloads 153 downloads
  
  
           

Abstract

With rapid development of Internet of Things (IoT) , it is evident that users get convenience in different fields such as smart homes,transportation,supply chain, smart contracts etc.Blockchain Mechanisms play a vital role in securing many IoT oriented applications.Blockchain and IoT are both intended to be world changing technologies. Merging these technologies could result in something more than the sum of its parts.IoT security using Blockchain is aimed at providing better security mechanisms so that authentication, confidentiality and integrity constraints are preserved. Based on component interaction in IoTenvironment , the security measures that are depicted in the existing work ensures that no alien commodity is allowed to tamper the data and other devices in IoT environment. However IoT devices are surprisingly insecure.Hence security issue is one of the most challenging task for utilizing Blockchain

Key-Words / Index Term

IoT, Blockchain, firewalls, DDOS, Availability, Decentralized, Crypto currency, Privacy preservation etc

References

[1]S. Ølnes and A. Jansen, ``Blockchain technology as infrastructurein public sector: An analytical framework,`` in Proc. 19thAnnu. Int. Conf. Digit. Government Res., Governance Data Age,New York, NY, USA, 2018, pp. 77:1_77:10. [Online]. Available: http://doi.acm.org/10.1145/3209281.3209293
[2]R. Beck and C. Muller-Bloch, ``Blockchain as radical innovation: Aframework for engaging with distributed ledgers,`` in Proc. 50th HawaiiInt. Conf. Syst. Sci., 2017, pp. 5390_5399.
[3]NallapaneniManoj Kumar, Pradeep Kumar Mallick,“The Internet of Things: Insights into the building blocks, component interactions, and architecture layers”, 2018,www.keaipublishing.com/en/journals/digital- communications-and-networks.
[4]Mandrita Banerjee, Junghee Lee, Kim-Kwang Raymond Choo,2018, ScienceDirect.
[5] Daniel Minoli, Benedict Occhiogrosso DVI Communications,2018, Elsevier
[6]YongfengQian,YingyingJiang,JingChenetal.,MatevžPustišekSchoolofComputerScience,ChinaUniversityofGeosciences,Wuhan,China,SchoolofComputerScienceandTechnology,HuazhongUniversity ofScienceandTechnology,Wuhan430074.
[7]ABassi,MBauer,MFiedler,TKramp,RvanKranenburg,SLange,SMeissner(Eds.),EnablingtheInternetofThings,Springer,2013.
[8] A.K. Pathan (Ed.), “Securing Cyber Physical Systems”, CRC,2015.
[9]A.M. Rahmani, P. Liljeberg, J.-S. Preden, A. Jantsch, “Fog Computing in the Internet Of Things” , Springer,2017.
[10]Q.Hassan,A.R.Khan,S.A.Madani(Eds.),”InternetofThings:Challenges,AdvancesandApplications”,CRCPress, 2017 ISBN9781498778510.
[11]A. Pal, B. Purushothaman, “IoT Technical Challenges and Solutions,” ArtechHouse ISBN: 978-1-63081-111-2,Norwood,Mass,2016.
[12]A.Rayes,S.Salam,“Internet of Things From Hype to Reality”,Springer,2016.