Open Access   Article Go Back

Implementation of IoT Framework Utilizing Blockchain with Validation and Information Assurance with NFC Innovation

TM.Yasmeen 1 , Zaiba Sultana F2 , Zuha Fathima S.K3 , Basavaraj S.H4

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-14 , Page no. 234-238, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si14.234238

Online published on May 15, 2019

Copyright © TM.Yasmeen, Zaiba Sultana F, Zuha Fathima S.K, Basavaraj S.H . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: TM.Yasmeen, Zaiba Sultana F, Zuha Fathima S.K, Basavaraj S.H, “Implementation of IoT Framework Utilizing Blockchain with Validation and Information Assurance with NFC Innovation,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.234-238, 2019.

MLA Style Citation: TM.Yasmeen, Zaiba Sultana F, Zuha Fathima S.K, Basavaraj S.H "Implementation of IoT Framework Utilizing Blockchain with Validation and Information Assurance with NFC Innovation." International Journal of Computer Sciences and Engineering 07.14 (2019): 234-238.

APA Style Citation: TM.Yasmeen, Zaiba Sultana F, Zuha Fathima S.K, Basavaraj S.H, (2019). Implementation of IoT Framework Utilizing Blockchain with Validation and Information Assurance with NFC Innovation. International Journal of Computer Sciences and Engineering, 07(14), 234-238.

BibTex Style Citation:
@article{F_2019,
author = {TM.Yasmeen, Zaiba Sultana F, Zuha Fathima S.K, Basavaraj S.H},
title = {Implementation of IoT Framework Utilizing Blockchain with Validation and Information Assurance with NFC Innovation},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {14},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {234-238},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1128},
doi = {https://doi.org/10.26438/ijcse/v7i14.234238}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i14.234238}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1128
TI - Implementation of IoT Framework Utilizing Blockchain with Validation and Information Assurance with NFC Innovation
T2 - International Journal of Computer Sciences and Engineering
AU - TM.Yasmeen, Zaiba Sultana F, Zuha Fathima S.K, Basavaraj S.H
PY - 2019
DA - 2019/05/15
PB - IJCSE, Indore, INDIA
SP - 234-238
IS - 14
VL - 07
SN - 2347-2693
ER -

           

Abstract

In a square chain IoT condition, when information or gadget confirmation data is put on a square chain, individual data might be spilled through the verification of-work procedure or address look. In this paper, we apply ZeroKnowledge confirmation to a savvy meter framework to demonstrate that a prover without uncovering data, for example, open key, and we have contemplated how to upgrade secrecy of square chain for security insurance. In this paper, we present a simple to-utilize NFC-based arrangement approach for IoT gadgets that is verified by fitting safety efforts in programming and equipment. Since modern utilization of such a setup approach involves unexpected necessities in comparison to home use, we present and analyze three unique design forms. The relevance of our methodology is exhibited by two prototypical executions, just as an itemized security investigation. We additionally demonstrate that the forced overhead because of the actualized safety efforts is immaterial for most setup refreshes.

Key-Words / Index Term

Component Near Field Communication,Zero Knowledge Technology,Service Provider

References

[1] E. Bertino and N. Islam, “Botnets and Internet of Things security,” Computer, vol. 50, no. 2, pp. 76–79, Feb. 2017.
[2] D. Perakovic, M. Periša, and I. Cviti ´ c, “Analysis of the IoT impact on ´ volume of DDoS attacks,” in Proc. 33rd Symp. New Technol. Postal Telecommun. Traffic (PosTel), 2015, pp. 295–304.
[3] Y. M. P. Pa et al., “IoTPOT: Analysing the rise of IoT compromises,” in Proc. 9th USENIX Conf. Offensive Technol., Washington, DC, USA, 2015, p. 9.
[4] A.-R. Sadeghi, C. Wachsmann, and M. Waidner, “Security and privacy challenges in industrial Internet of Things,” in Proc. 52nd ACM/EDAC/IEEE Design Autom. Conf. (DAC), San Francisco, CA, USA, 2015, pp. 1–6.
[5] T. Ulz et al., “SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration,” in Proc. IEEE Int. Conf. RFID (RFID), Phoenix, AZ, USA, 2017, pp. 1–6.
[6] J. Haase, D. Meyer, M. Eckert, and B. Klauer, “Wireless sensor/actuator device configuration by NFC,” in Proc. IEEE Int. Conf. Ind. Technol. (ICIT), 2016, pp. 1336–1340.
[7] Andreas M, Masteing Bitcoin: Unlocking Digital Cryptocurrencies, pp.49-68, O’REILLY, 2015.
[8] Sung-Hoon Lee, Device authentication in Smart Grid System using Blockchai, KAIST, 2016.
[9] Buterin’s Idea to Release, 2015.
[10] Surae Noether, Review of Ctyptonote White Paper, 2016
[11] Evan Duffield,Daniel Diaz ,Dash: A Privacy-Centric Crypto-Currency, 2015.