A Lightweight Scalable and Secure Blockchain Based IoT Using Fuzzy Logic

被引:0
作者
N. Anita
M. Vijayalakshmi
S. Mercy Shalinie
机构
[1] Thiagarajar College of Engineering,Department of Computer Science and Engineering
来源
Wireless Personal Communications | 2022年 / 125卷
关键词
Blockchain; IoT; Machine learning; Fuzzy logic; Closed loop model; Filter based security;
D O I
暂无
中图分类号
学科分类号
摘要
The Blockchain mechanism usually transacts the data between the blocks but there exists a restriction of total transaction within a local ledger. This often may lead to compromising the peer transaction validation both at local or global level. The integration of Internet of Things (IoT) data on the blockchain transaction mechanism often fails due to limited resources in the blockchain to carry the rapid collection of IoT data. Further, the processing and validation of data and storing it in the form of logs in ledger may require additional computational time. In this paper, we address such limitations while integrating the IoT data collection modules with blockchain technology using fuzzy logic model. The study uses fuzzy logic engine to analyze the trust level of data packets entering the blockchain network. The encrypted while entering the blockchain and decryption at the receiver end is carried out in addition with the blockchain encryption and decryption. A closed-loop model is developed to address the security related concerns in block chain and data management within supply chains. The implementation of blockchain is carried out in Pyethereum tester tool under Ethereum platform. The result shows an improved security on blockchain than existing benchmark methods in terms block reliability and data integrity.
引用
收藏
页码:2129 / 2146
页数:17
相关论文
共 65 条
[1]  
Wu A(2019)Efficient and privacy-preserving traceable attribute-based encryption in blockchain Annals of Telecommunications 74 401-411
[2]  
Zhang Y(2020)Pay as you decrypt: Decryption outsourcing for functional encryption using blockchain IEEE Transactions on Information Forensics and Security 15 3227-3238
[3]  
Zheng X(2019)Blockchain based searchable encryption for electronic health record sharing Future Generation Computer Systems 95 420-429
[4]  
Guo R(2019)Blockchain-based searchable symmetric encryption scheme Computers & Electrical Engineering 73 32-45
[5]  
Zhao Q(2020)Blockchain mechanism and symmetric encryption in a wireless sensor network Sensors 20 2798-2421
[6]  
Zheng D(2021)An improved task allocation scheme in serverless computing using gray wolf optimization (GWO) based reinforcement learning (RIL) approach Wireless Personal Communications 117 2403-1563
[7]  
Cui H(2020)Cryptanalytic performance appraisal of improved HLL, KUOCHEN, GENGVRF, FENGVRF secure signature with TKIP digital workspaces: For financial cryptography Wireless Personal Communications 115 1541-401
[8]  
Wan Z(1982)The byzantine generals problem ACM Transactions on Programming Languages and Systems 4 382-37
[9]  
Wei X(2020)Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures ACM Computing Surveys (CSUR) 53 1-6102
[10]  
Nepal S(2020)A trustworthy privacy preserving framework for machine learning in industrial IoT systems IEEE Transactions on Industrial Informatics 16 6092-743