Abstract

Now, the security and privacy-preserving of Internet of Things are receiving more attention. This article proposes a new method of Internet of Things security and privacy preserving by combining di...

Highlights

  • The Internet of Things (IoT) has been developing continuously in recent years and has gradually penetrated into various fields, including agricultural production, industrial manufacturing, climate monitoring, and medical care

  • We mainly combine DNK-Means algorithm which we proposed in this article before with data encryption, multi-signature, and blockchain to protect the privacy and security of IoT nodes and data

  • In order to achieve the purpose of IoT privacy protection, we combine the DNK-Means algorithm with the blockchain and applied RSA encryption and multi-signature method to protect the security and privacy of nodes and transmitted data in the IoT

Read more

Summary

Introduction

The Internet of Things (IoT) has been developing continuously in recent years and has gradually penetrated into various fields, including agricultural production, industrial manufacturing, climate monitoring, and medical care. Blockchain technology is a new technology that has emerged in recent years It can play an important role in security and can be applied to the privacy protection of IoT. We abstract the common IoT into a threedimensional model which is inspired by the four-layer HetIoT architecture proposed by Qiu et al.[12] the bottom layer is a collection of sensors distributed throughout They either pass data to the servers on the second layer, either single or multiple. In the second layer structure, this article proposes a new method of security and privacy protection of IoT with differentiated nodes, precision clustering, RSA algorithm, multi-signature, and blockchain. Considering that incoming nodes of each node have certain decision on whether the data of the node can be transmitted, we filter the highest two nodes as the participating nodes of 2/3 multi-signature according to the NR value of each node. Experiments show that the proposed method can effectively distinguish between active nodes and inactive nodes, increase the difficulty of attackers, and effectively protect the security and privacy of IoT

Related work
23: Add to Blockchain
Findings
Conclusion and future work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call