Abstract

The Internet of Things (IoT) is a new revolution defined by heterogeneous devices made up of intelligent, omnipresent items that are all hooked up to The internet. These devices are frequently implemented in different areas to offer innovative programs in various industrial applications, including intelligent urban, medicine, and societies. Such Internet of Things (IoT) equipment generates a large volume of private and safety information. Because IoT systems are resource-constrained in terms of operation, memory, and communication capability, safeguarding accessibility to them is a difficult task. In the blockchain concept, the majority, or even all network nodes, check the validity and accuracy of exchanged data before accepting and recording it, whether this data is related to financial transactions, measurements of a sensor, or an authentication message. In evaluating the validity of exchanged data, nodes must reach a consensus in order to perform a special action, in which case the opportunity to enter and record transactions and unreliable interactions with the system is significantly reduced. Recently, in order to share and access management of IoT devices’ information with a distributed attitude, a new authentication protocol based on blockchain has been proposed, and it is claimed that this protocol satisfies user privacy while preserving security. Today’s identification and authentication techniques have substantial shortcomings due to rapidly growing prevalence and implementation. As a result, the protection of such gadgets is critical to guarantee the program’s efficacy and safety. A decentralized authentication and access control method for lightweight IoT systems are proposed in this work and a blockchain-based system that enables identification and secures messaging with IoT nodes. The technique is built on fog information systems and the idea of a blockchain system; when contrasted to something like a blockchain-based verification system, the testing findings show that the suggested mechanism outperforms it. The authentication and verification system undergoes using the blockchain technique. Our method takes advantage of blockchain’s inherent advantages while also associated with development authentication systems. Our suggested blockchain-based approach, structure, and layout, in particular, provide for transparency, consistency, and provenance while also providing tamper-proof records. The article describes the general systems architectural style and the analysis and execution of a real scenario as just a prototype system. The authentication included give as protected prototype that can transmit data with secured protocol and achieves minimum error rate.

Highlights

  • Internet of Things (IoT) in many industries and formats may be installed everywhere

  • We looked at the cons of classic IoT for identification and security services in this article

  • We presented a blockchain paradigm for IoT security and authentication

Read more

Summary

Introduction

IoT in many industries and formats may be installed everywhere. Such gadgets can talk with each other, acquire, share, and process data to provide a service [1]. To preserve data integrity and security, secured IoT applications require an authentication process among IoT devices as well as other platforms If not, these platforms would be subject to a range of security issues, including unauthorized access, theft of data, and information modification [13]. Business processes may have special criteria and complicated procedures that necessitate the use of customizable solutions that limit the participation of outsiders in such processes Aside from these issues, permissionless blockchain has other difficulties, including as scalability, regulatory institutions, and control over evolution. The basic purpose of using events and records is to make it easier for contracts and the programmed that interact with them just to communicate Blockchains features, such as increased dependability, the integrity of the information, and flexibility, make it an excellent solution for identification issues. (1) A revolutionary decentralized technique that enables identification and security systems over IoT applications, allowing them to operate in a safe and trustworthy atmosphere (2) A proof-of-concept of the suggested technique demonstrates its capability to handle IoT security goals (3) Evaluation of the suggested mechanism’s effectiveness against a state-of-the-art IoT biometric identification

Related Works
Problem Definition
Presumptions
Proposed System Architecture and Design
Model of the System
Implementation
Findings
Conclusions and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call