Securing IoT Devices using Blockchain Concept

被引:4
作者
Sadek, Islam M. Momtaz A. [1 ]
Ilyas, Muhammed [2 ]
机构
[1] Altinbas Univ, Dept Informat Technol, Istanbul, Turkey
[2] Altinbas Univ, Dept Elect & Elect Engn, Istanbul, Turkey
来源
2021 7TH INTERNATIONAL CONFERENCE ON ENGINEERING AND EMERGING TECHNOLOGIES (ICEET 2021) | 2021年
关键词
IoT; Blockchain; Cyber Security for IoT; Blockchain Integrity; IoT attacks; Smart-contract; Decentralized; Ethereum; MQTT; Wireshark; sniffing Attack; INTERNET;
D O I
10.1109/ICEET53442.2021.9659792
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The internet of things (IoT) implementation leads to an extended attack surface that requires continuous mitigation of security. Mission-critical situations (e.g., Smart Grid, Intelligent Transportation Systems, video surveillance, e-health) to business-oriented applications are all examples of IoT applications (e.g., banking, logistics, insurance, and contract law). IoT has made human existence considerably easier and more efficient. Because IoT devices are less expensive to build due to the use of various software, sensors, and the use of Artificial Intelligence, they violate several security regulations. That's why, in the IoT systems; extensive security support is required, particularly for mission-critical applications, but also for downstream commercial applications. There have been a variety of security strategies and approaches suggested and/or used. Blockchain is an amazing concept that manages a distributed ecosystem without the need for a third party. Researchers discovered that it has the ability to solve IoT software-related security problems. The biggest obstacle is combining blockchain with resource-constrained IoT computers. An experimental setup to incorporate blockchain on a smart laboratory IoT-based was completed, and then tested against Wireshark sniffing attacks, the system was more vulnerable to cyber-crimes attacks as we found out that when we employed blockchain technology as the communication medium of IoT devices, the no. of bytes needed for packet transmission was more than the bytes needed without applying Blockchain with about 959 bytes on average.
引用
收藏
页码:373 / 378
页数:6
相关论文
共 50 条
  • [31] ENHANCING CYBERSECURITY DEFENSE OF IOT ECOSYSTEM USING BLOCKCHAIN
    Setia, Prashant
    Sandosh, S.
    SURANAREE JOURNAL OF SCIENCE AND TECHNOLOGY, 2023, 30 (04): : 1 - 14
  • [32] Securing User Identity and Transactions Symbiotically: IoT Meets Blockchain
    Kravitz, David W.
    Cooper, Jason
    2017 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS 2017), 2017, : 415 - 420
  • [33] Securing Over-The-Air IoT Firmware Updates using Blockchain
    He, Xinchi
    Alqahtani, Sarra
    Gamble, Rose
    Papa, Mauricio
    INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (COINS), 2019, : 164 - 171
  • [34] Improving IoT Security Using Blockchain
    AlJemy, Khalid
    AlAnazi, Mohammed
    AlSofiry, Mohammed
    Baig, Adeel
    2019 IEEE 10TH GCC CONFERENCE & EXHIBITION (GCC), 2019,
  • [35] Securing Environmental IoT Data Using Masked Authentication Messaging Protocol in a DAG-Based Blockchain: IOTA Tangle
    Gangwani, Pranav
    Perez-Pons, Alexander
    Bhardwaj, Tushar
    Upadhyay, Himanshu
    Joshi, Santosh
    Lagos, Leonel
    FUTURE INTERNET, 2021, 13 (12):
  • [36] An Over-the-Blockchain Firmware Update Framework for IoT Devices
    Yohan, Alexander
    Lo, Nai-Wei
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 22 - 29
  • [37] A Blockchain-based Access and Management System for IoT Devices
    Valentin, Manuel
    Pahl, Claus
    El Ioini, Nabil
    Barzegar, Hamid R.
    2021 EIGHTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2021, : 69 - 76
  • [38] Blockchain: A Game Changer for Securing IoT Data
    Singh, Madhusudan
    Singh, Abhiraj
    Kim, Shiho
    2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2018, : 51 - 55
  • [39] Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot Study
    Heiding, Fredrik
    Omer, Mohammad-Ali
    Wallstrom, Andreas
    Lagerstrom, Robert
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 424 - 431
  • [40] Securing IoT-based healthcare systems from counterfeit medicine penetration using Blockchain
    A. Divya Preetha
    T. S. Pradeep Kumar
    Applied Nanoscience, 2023, 13 : 1263 - 1275