Abstract

Advancement in technology has led to innovation in equipment, and the number of devices is increasing every day. Industries are introducing new devices every day and predicting 50 billion connected devices by 2022. These devices are deployed through the Internet, called the Internet of Things (IoT). Applications of IoT devices are weather prediction, monitoring surgery in hospitals, identification of animals using biochips, providing tracking connectivity in automobiles, smart home appliances, etc. IoT devices have limitations related to security at both the software and hardware ends. Secure user interfaces can overcome software-level limitations like front-end-user interfaces are accessed easily through public and private networks. The front-end interfaces are connected to the localized storage to contain data produced by the IoT devices. Localized storage deployed in a closed environment connected to IoT devices is more efficient than online servers from a security perspective. Blockchain has emerged as a technology or technique with capabilities to achieve secure administrational authentication and accessibility to IoT devices and their computationally produced data in a decentralized way with high reliability, interrogation, and resilience. In this paper, we propose device, end-user, and transactional authentication techniques using blockchain-embedded algorithms. The localized server interacts with the user interface to authenticate IoT devices, end-users, and their access to IoT devices. The localized server provides efficiency by reducing the load on the IoT devices by carrying out end-user heavy computational data, including end-user, IoT device authentication, and communicational transactions. Authentication data are placed on the public ledger in block form, distributed over the system nodes through blockchain algorithms.

Highlights

  • With the rapid growth of smart gadgets and high-speed networks that are used for communication for these smart devices, the Internet of ings (IoT) has gained human attention and popularity in the past few years. ese embedded devices or Internet of things (IoT) devices connect through public or private networks, are accessed remotely, and perform the desired functionality

  • (1) We present a reliable, scalable, and authentic decentralized end-user and IoT device authentication technique that utilizes a graphical user interface with connectivity to blockchain algorithms. ese algorithms consist of the logic that authenticates end-user access to IoT devices and they authenticate the devices that are accessible by the enduser. rough these, issues of a centralized third party and the double dependency problem can be removed

  • We discussed the details of IoT device security issues and presented the system participants, architecture, interactions between system participants, and encrypted message exchanges among participants including the graphical user interface and MySQL server

Read more

Summary

Introduction

With the rapid growth of smart gadgets and high-speed networks that are used for communication for these smart devices, the Internet of ings (IoT) has gained human attention and popularity in the past few years. ese embedded devices or IoT devices connect through public or private networks, are accessed remotely, and perform the desired functionality. Internet of things (IoT) are resource-consuming appliances and are not capable of fixing and protecting themselves against malicious attacks like Man in the middle attack, masquerading, DOS attacks, etc., and can be hacked by hackers Due to this deficiency, everybody can access IoT devices and perform computations . To reduce the flaws of the centralized (trusted third party) authentication of IoT devices, a decentralized enduser, IoT devices, and transaction authentication scheme are proposed using algorithms that provide blockchain technology. We present a whole system that consists of a design and architecture involving IoT devices, end-users, and blockchain algorithms that apply authentication rules and deploy the blockchain algorithmic logic into the public area network. (1) We present a reliable, scalable, and authentic decentralized end-user and IoT device authentication technique that utilizes a graphical user interface with connectivity to blockchain algorithms.

Security Issues in IoT
Solutions to Security Issues
Experimental Setup
Admin Authorities and End-User Registration and Authentication
Evaluation and Results
IoT Security Analysis
Key Points Status From To Input
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call