Abstract

IoT devices are widely used in the smart home, automobile, and aerospace areas. Note, however, that recent information on thefts and hacking have given rise to many problems. The aim of this study is to overcome the security weaknesses of existing Internet of Things (IoT) devices using Blockchain technology, which is a recent issue. This technology is used in Machine-to-Machine (M2M) access payment—KYD (Know Your Device)—based on the reliability of existing IoT devices. Thus, this paper proposes a BoT (Blockchain of Things) ecosystem to overcome problems related to the hacking risk of IoT devices to be introduced, such as logistics management and history management. There are also many security vulnerabilities in the sensor multi-platform from the IoT point of view. In this paper, we propose a model that solves the security vulnerability in the sensor multi-platform by using blockchain technology on an empirical model. The color spectrum chain mentioned in this paper suggests a blockchain technique completed by using the multiple-agreement algorithm to enhance Thin-Plate Spline (TPS) performance and measure various security strengths. In conclusion, we propose a radix of the blockchain’s core algorithm to overcome the weaknesses of sensor devices such as automobile, airplane, and close-circuit television (CCTV) using blockchain technology. Because all IoT devices use wireless technology, they have a fundamental weakness over wired networks. Sensors are exposed to hacking and sensor multi-platforms are vulnerable to security by multiple channels. In addition, since IoT devices have a lot of security weaknesses we intend to show the authentication strength of security through the color spectrum chain and apply it to sensor and multi-platform using Blockchain in the future.

Highlights

  • In the world of the Internet of Things (IoT), various users provide new services and communicate with each other

  • The color spectrum chain mentioned in this paper suggests a blockchain technique completed by using the multiple-agreement algorithm to enhance Thin-Plate Spline (TPS) performance and measure various security strengths

  • The blockchain technology was originally developed and used for the transaction of bitcoins providing a higher level of security and anonymity but as it has become clear that the value of bitcoins could be quite unstable and many countries are reluctant to accept them as a legal currency [15,16,17], information technology (IT) researchers have redirected their attention to the other possible application fields for the technology, especially paying close attention to

Read more

Summary

Introduction

In the world of the Internet of Things (IoT), various users provide new services and communicate with each other. 2019, 12, 402 in Korea, sites providing those videos are blocked as harmful, of and circulated It 29is possible for foreigners to watch all hacked CCTV videos in their countries. In Korea, sites providing those videos are blocked as harmful, it is possible for complex specifications than traditional information technology (IT) infrastructure. The blockchain technology was originally developed and used for the transaction of bitcoins providing a higher level of security and anonymity but as it has become clear that the value of bitcoins could be quite unstable and many countries are reluctant to accept them as a legal currency [15,16,17], IT researchers have redirected their attention to the other possible application fields for the technology, especially paying close attention to. It is expected that such a strong feature of blockchain will allow it to be applied to the other fields of business services where information security is vital to their success [18,19]

Objectives
Methods
Findings
Discussion
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.