Performance Analysis of Data Sharing Using Blockchain Technology in IoT Security Issues

被引:2
作者
Babu, R. Ganesh [1 ]
Yuvaraj, S. [1 ]
Manjula, M. Muthu [1 ]
Kaviyapriya, S. [1 ]
Harini, R. [1 ]
机构
[1] SRM TRP Engn Coll, Dept Elect & Commun Engn, Tiruchirappalli, Tamil Nadu, India
来源
INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, ICICC 2022, VOL 3 | 2023年 / 492卷
关键词
Blockchain; IoT; Security issues; IoT gadgets; Bitcoin; Performance analysis;
D O I
10.1007/978-981-19-3679-1_42
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things (IoT) is advancing rapidly in research and industry, but it still has insurance and security flaws. On a fundamental level, common security and assurance approaches will be irrelevant for IoT due to its decentralized geology and the resource requirements of a significant portion of its contraptions. Blockchain (BC), which supports the digital currency Bitcoin, is being used to provide security and insurance via conveyed networks of IoT-related geologies. Regardless, BCs are computationally expensive but have real-world exchange speeds overhead as well as delays, making them unsuitable for IoT devices. In addition to IoT, this location article recommends another secure, one-of-a-kind, but portable design based on BC advancement that eliminates BC operating costs while retaining a significant portion of its security and higher efficiency. The depicted methodology is based on a brilliant internal implementation and is only a specialist relevant examination for a broader range of IoT devices. The proposed strategy is more even-handed and incorporates magnificent homes, an underlay association, and cloud stores coordinating BC information trades that can provide assurance and security. We use various types of BCs based on an organization's hierarchy of leadership when a trade occurs, and we also use flowed trust procedures instead of a distributed geology. The abstract evaluations of a design under standard threat models justify providing IoT device security and insurance.
引用
收藏
页码:507 / 515
页数:9
相关论文
共 10 条
  • [1] Ahmad Ijaz, 2018, IEEE Communications Standards Magazine, V2, P36, DOI 10.1109/MCOMSTD.2018.1700063
  • [2] A Security Authentication Scheme of 5G Ultra-Dense Network Based on Block Chain
    Chen, Zhonglin
    Chen, Shanzhi
    Xu, Hui
    Hu, Bo
    [J]. IEEE ACCESS, 2018, 6 : 55372 - 55379
  • [3] Karthika P, 2020, J AMB INTEL HUM COMP, V11, P1
  • [4] Karthika P., 2019, INT J RECENT TECHNOL, V8, P436
  • [5] Federated Learning for Internet of Things: Recent Advances, Taxonomy, and Open Challenges
    Khan, Latif U.
    Saad, Walid
    Han, Zhu
    Hossain, Ekram
    Hong, Choong Seon
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (03): : 1759 - 1799
  • [6] Kostal K., 2019, SENSORS, V19, P1
  • [7] Integration of IoT with blockchain and homomorphic encryption: Challenging issues and opportunities
    Shrestha, Rakesh
    Kim, Shiho
    [J]. ROLE OF BLOCKCHAIN TECHNOLOGY IN IOT APPLICATIONS, 2019, 115 : 293 - 331
  • [8] Tom R, 2020, SUSTAIN ENERGY TECHN, V38, P1
  • [9] Vadivel T, 2021, ACTA AGR SCAND B-S P, V5, P1
  • [10] Pedestrian and cyclist detection based on deep neural network fast R-CNN
    Wang, Kelong
    Zhou, Wei
    [J]. INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2019, 16 (02)