772 541
Full Length Article
Journal of Cybersecurity and Information Management
Volume 1 , Issue 2, PP: 35-40 , 2020 | Cite this article as | XML | Html |PDF


Authenticating IoT Devices issues based on Blockchain

Authors Names :   Hosny. H. Abo Emira   1 *  

1  Affiliation :  Computer Science Department, Faculty of Computers and Information, Nahda University, Egypt

    Email :  hosny.aboemira@gmail.com

Doi   :   https://doi.org/10.54216/JCIM.010202

Abstract :

The Internet of Things (IoT) is increasingly an authenticity today. Nevertheless, some key challenges still need to be given care so that IoT solutions further support the rising demand for connected devices and the facilities offered. Outstanding to the possible significance and sensitivity of facilities, IoT solutions should address the security and privacy worries nearby these devices and the data they assemble, generate, and process. Recently, Blockchain technology has increased much attention in IoT solutions. Its principal usage conditions are in the financial domain, where Blockchain creates a capable application world and can be leveraged to explain security and privacy issues. However, this developing technology has a great possibility in the most various technological areas and can significantly help achieve the Internet of Things view in different features, increasing the measurements of decentralization, facilitating communications, allowing new transaction models, and allowing independent coordination of the devices. The paper's goal is to provide the ideas about the structure and operation of Blockchain and, typically, analyze how the use of this technology can be used to deliver security and privacy in IoT.

Keywords :

Internet of Things , Authentication , Blockchain

References :

[1]   Ghadekar, P., Doke, N., Kaneri, S. and Jha, V. (2019). Secure Access Control to IoT Devices using Blockchain. International Journal of Recent Technology and Engineering, 8(2), pp.3064-3070.

[2]    Uzair Javaid, Ang Kiang Siang, Muhammad Naveed Aman, and Biplab Sikdar. (2018). Mitigating loT Device based DDoS Attacks using Blockchain. In Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems (CryBlock’18). Association for Computing Machinery, New York, NY, USA, 71–76.

[3]    Yohan, A. and Lo, N. (2019). FOTB: a secure blockchain-based firmware update framework for IoT environment. International Journal of Information Security.

[4]    S. Asiri and A. Miri, "A Sybil Resistant IoT Trust Model Using Blockchains," 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 2018, pp. 1017-1026.

[5]    Y. Yuan, L. Huo, Z. Wang and D. Hogrefe, "Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks," in IEEE Access, vol. 6, pp. 27629-27636, 2018.

[6]    M. Pilkington, Blockchain technology: principles and applications. research handbook on digital transformations, F. X. Olleros andM. Zhegu, Eds., 2016.

[7]    Jesus, E., Chicarino, V., de Albuquerque, C. and Rocha, A. (2018). A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack. Security and Communication Networks, 2018, pp.1-27.

[8]    Gartner. Report: “Forecast: The Internet of Things, Worldwide, 2013”.Nov. 2013.

[9]    Cisco Systems. White paper: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016–2021. March 2017.

[10] Fraga-Lamas, P., Fernández-Caramés, T. M., Castedo, L. "Towards theInternet of Smart Trains: A Review on Industrial IoT-Connected Railways" in Sensors, vol. 17 (6), no. 1457, pp.1–44, June 2017.

[11] Pulkkis, Göran, et al. "Blockchain-based security solutions for iot systems." Internet of Things A to Z: Technologies and Applications 20180501 (2018).


Cite this Article as :
Hosny. H. Abo Emira, Authenticating IoT Devices issues based on Blockchain, Journal of Cybersecurity and Information Management, Vol. 1 , No. 2 , (2020) : 35-40 (Doi   :  https://doi.org/10.54216/JCIM.010202)