Abstract

The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of blockchain are also provided. Some of the widely-accepted consensus algorithms are then discussed. Next, we discuss different types of applications in blockchain-based IoIT communication environments. The details of the associated system models are provided, such as, the network and attack models for the blockchain-based IoIT communication environment, which are helpful in designing a security protocol for such an environment. A practical demonstration of the proposed generalized scheme is provided in order to measure the impact of the scheme on the performance of the essential parameters. Finally, some of the future research challenges in the blockchain-based IoIT communication environment are highlighted, which will also be helpful to the researchers.

Highlights

  • The Internet of Things (IoT) is a specific type of computing and communication environment that consists of different types of computing devices, electromechanical devices, people, or animals that have uniquely associated identities

  • A blockchainbased Internet of Intelligent Things (IoIT) environment can be secured through deployment of the blockchain mechanism

  • The system models that will be helpful in designing a security protocol were presented

Read more

Summary

INTRODUCTION

The Internet of Things (IoT) is a specific type of computing and communication environment that consists of different types of computing devices, electromechanical devices, people, or animals that have uniquely associated identities The created block is verified by other nodes (i.e., the parties, or the VOLUME 8, 2020 miner nodes) distributed around the network For this purpose, the nodes utilize a method called a consensus algorithm (i.e., a proof of work [PoW]). Bitcoin uses a blockchain scheme for financial transactions It can be used for other goals (i.e., secure data exchange among authenticated communicating parties [14]–[18]). Proof of Elapsed Time (PoET): This consensus algorithm uses some specific tactics to prevent the high resource utilization along with the high energy consumption It carries permission blockchain network through a fair lottery system.

SYSTEM MODELS
SECURITY ANALYSIS
CONCLUSION AND FUTURE WORK

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.