Open Access   Article Go Back

Implementation of IoT System using Blockchain with Authentication and Data Protection

Farheen Shaik1 , Satish G.C2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-14 , Page no. 171-175, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si14.171175

Online published on May 15, 2019

Copyright © Farheen Shaik, Satish G.C . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Farheen Shaik, Satish G.C, “Implementation of IoT System using Blockchain with Authentication and Data Protection,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.171-175, 2019.

MLA Style Citation: Farheen Shaik, Satish G.C "Implementation of IoT System using Blockchain with Authentication and Data Protection." International Journal of Computer Sciences and Engineering 07.14 (2019): 171-175.

APA Style Citation: Farheen Shaik, Satish G.C, (2019). Implementation of IoT System using Blockchain with Authentication and Data Protection. International Journal of Computer Sciences and Engineering, 07(14), 171-175.

BibTex Style Citation:
@article{Shaik_2019,
author = {Farheen Shaik, Satish G.C},
title = {Implementation of IoT System using Blockchain with Authentication and Data Protection},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {14},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {171-175},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1114},
doi = {https://doi.org/10.26438/ijcse/v7i14.171175}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i14.171175}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1114
TI - Implementation of IoT System using Blockchain with Authentication and Data Protection
T2 - International Journal of Computer Sciences and Engineering
AU - Farheen Shaik, Satish G.C
PY - 2019
DA - 2019/05/15
PB - IJCSE, Indore, INDIA
SP - 171-175
IS - 14
VL - 07
SN - 2347-2693
ER -

           

Abstract

Technologies are rapidly increasing and dependent on the Internet. In near future, Hardware will be embedded with software and interconnected to the Internet to send or receive data, which is termed as Internet of Things. Resulting to Database shared between different devices, technology of Distributed Database is Blockchain. Using these latest technologies, Internet of things (IOT), block chain, and Near Field Communication (NFC) for providing data protection, we are developing a system for authentication on Android applications. In this paper, we are using Zero knowledge authentication system to login into Android application using Hashing Technique along with NFC. The data generated in Android Application and transferred to block chain server which convert the transaction details into blocks, which ever growing and store it in blockchain storage. With the help of all these technologies we are providing more Secure environment which prevent data tampering and modification. As well restricted data or block visibility. With unbreakable authentication system.

Key-Words / Index Term

IOT, Blockchain, NFC, Android Application

References

[1] Gungor, V. Cagri, et al. "A survey on smart grid potential applications and communication requirements." Industrial Informatics, Vol.9, No.1, 2013, pp. 28-42.
[2] Gangale, Flavia, Anna Mengolini, and Ijeoma Onyeji., "Consumer
engagement: An insight from smart grid projects in Europe.", Energy Policy, Vol.60, 2013, pp.621-628.
[3] Luan, Shang-Wen, et al. "Development of a smart power meter forAMI based on ZigBee communication", Power Electronics and Drive Systems, 2009. PEDS 2009. International Conference on. IEEE, 2009.
[4] Common Criteria for Information Technology Security Evaluation,
Version3.1, CCMB, Setp.2006.
[5] Youngu Lee, A Study for PKI Based Home Network System
Authentication and Access Control Protocol, KICS `10-04Vol.35No.4
[6] Kepco, Prosumer Power Trading, http://home.kepco.co.kr
[7] Andreas M, Masteing Bitcoin: Unlocking Digital Cryptocurrencies, pp.49-68, O’REILLY, 2015
[8] Sung-Hoon Lee, Device authentication in Smart Grid System using
Blockchai, KAIST, 2016.
[9] Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System,
2008.
[10] Nick Szabo, Smart Contracts, 1994.
[11] Nick Szabo, The Idea of Smart Contracts, 1997.
[12] The Cointelegraph, A Brief History of Ethereum From Vitalik
[13] Buterin’s Idea to Release, 2015
[14] Jean-Jacques Quisquater, How to Explain Zero-Knowledge Protocols to Your Children, 1989.
[15] KETI, Mobius IoT server platform, http://iotocean.com
[16] Ryan Cheu, An Implementation of Zero Knowledge Authentication, 2014
[17] Eli Ben-Sasson, Zerocash: Decentralized Anonymous Payments from Bitcoin, 2014
[18] Surae Noether, Review of Ctyptonote White Paper, 2016
[19] Charles RackoffDaniel R. Simon, Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack, Annual International Cryptology Conference, 1991
[20] Evan Duffield,Daniel Diaz ,Dash: A Privacy-Centric Crypto-Currency,2015.