Augmenting smart home network security using blockchain technology

被引:8
作者
Saxena, Utkarsh [1 ]
Sodhi, J. S. [1 ]
Tanwar, Rajneesh [1 ]
机构
[1] Amity Univ, Sect 125, Noida, India
关键词
smart home; internet of things; security; blockchain; decentralised approach; user privacy; encryption; data structures; peer-to-peer computing; data sharing; proof-of-data; INTERNET;
D O I
10.1504/IJESDF.2020.103881
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The idea of smart home existed from 1970's onwards but has come into the knowledge of researchers and data scientist due to the development in the domain of internet of things (IoT) (Kopetz, 2011), but it still suffers from privacy and security vulnerabilities. Conventional security policies or approaches are not applicable to IoT, mainly due to its decentralised topology and the resource constraints of the majority of its devices (Dorri et al., 2017a). This Paper presents an innovative, novel and decentralised approach that can be used to augment the existing security architecture of a smart home network. Our scheme guarantees both trustworthiness and user privacy preservations.
引用
收藏
页码:99 / 117
页数:19
相关论文
共 11 条
[1]  
[Anonymous], 2017, P 2 ACM IEEE INT C I
[2]   Information Fusion to Defend Intentional Attack in Internet of Things [J].
Chen, Pin-Yu ;
Cheng, Shin-Ming ;
Chen, Kwang-Cheng .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (04) :337-348
[3]   Blockchains and Smart Contracts for the Internet of Things [J].
Christidis, Konstantinos ;
Devetsikiotis, Michael .
IEEE ACCESS, 2016, 4 :2292-2303
[4]  
Conti M., 2017, IEEE COMMUNICATIONS, V20, P3416
[5]  
Dorri A., 2017, Lsb: a lightweight scalable blockchain for iot security and privacy
[6]  
Dorri A., 2017, Blockchain in Internet of Things: Challenges and Solutions
[7]   Supersensors: Raspberry Pi Devices for Smart Campus Infrastructure (short paper) [J].
Hentschel, Kristian ;
Jacob, Dejice ;
Singer, Jeremy ;
Chalmers, Matthew .
2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2016), 2016, :58-62
[8]  
Kopetz H., 2011, REAL-TIME SYST, P307, DOI [10.1007/978-l-4419-8237-7_13, DOI 10.1007/978-L-4419-8237-7_13, DOI 10.1007/978-1-4419-8237-7]
[9]  
Mena D. M., 2017, INFORM SECURITY J GL, V27, P162
[10]  
Stanciu A., 2017, 21 INT C CONTR SYST