Skip to main content

2021 | OriginalPaper | Buchkapitel

A Comprehensive Study of Pros and Cons on Implementation of Blockchain for IoT Device Security

verfasst von : Indraneel Mukhopadhyay

Erschienen in: The "Essence" of Network Security: An End-to-End Panorama

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT) one of the biggest buzz words is going around. The question arises what is it? Is it a group of computable devices and appliances connected using sensors, which use the Internet for data exchange? You might be right. We have to remember that if we are going for wireless transmission as we normally do in IoT solutions then the risk in these networks is very high. In this world of IoT 4.0 every device is connected with every device and these devices are used in all kinds of applications starting from the Military, Healthcare, Education, Home and list go on. One has to keep in mind that an IoT solution relies on wired, cellular, or adhoc communication networks. IoT is considered to play a very important role in the next decade or two. There is also an exponential rise of IoT-based devices so that there is a seamless exchange of data between the connected devices and hence decided to be taken based on the data that can be taken faster for the betterment of mankind. As the number of devices has increased it has given rise to various security concerns. We have to remember that confidentiality, authentication, access control, and integrity should never be compromised in the IoT environment. Currently, researchers are trying to develop efficient security and privacy protocols in IoT networks. IoT creates new security challenges for enterprises in scope and scale-like device identity, secure network scale, data security and physical security. This chapter deals with the issues and challenges of IoT devices and the prevention of security loopholes via Blockchain implementation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kumar JS, Patel DR (2014) A survey on internet of things: Security and privacy issues. Int J Comput Appl 90(11) Kumar JS, Patel DR (2014) A survey on internet of things: Security and privacy issues. Int J Comput Appl 90(11)
2.
Zurück zum Zitat Abomhara M, Køien GM (2014) Security and privacy in the internet of things: current status and open issues. In: International conference on privacy and security in mobile systems (PRISMS). IEEE, pp 1–8 Abomhara M, Køien GM (2014) Security and privacy in the internet of things: current status and open issues. In: International conference on privacy and security in mobile systems (PRISMS). IEEE, pp 1–8
3.
Zurück zum Zitat A web article published in Fortune Business Insight, Report ID: FBI100307 July 2019 A web article published in Fortune Business Insight, Report ID: FBI100307 July 2019
4.
Zurück zum Zitat Statista Research Department (2020) Number of internet of things (IoT) connected devices worldwide in 2018, 2025 and 2030, 19th Feb 2020 Statista Research Department (2020) Number of internet of things (IoT) connected devices worldwide in 2018, 2025 and 2030, 19th Feb 2020
5.
Zurück zum Zitat Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. In: 2015 IEEE world congress on services (SERVICES). IEEE, pp 21–28 Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. In: 2015 IEEE world congress on services (SERVICES). IEEE, pp 21–28
6.
Zurück zum Zitat Paul stokes, 4 Stages of IoT architecture explained in simple words December 2018 Paul stokes, 4 Stages of IoT architecture explained in simple words December 2018
7.
Zurück zum Zitat Ravi S, Raghunathan A, Kocher P, Hattangady S (2004), Security in embedded systems: design challenges. Trans Embed Comput Syst (TECS) (ACM) 3(3) Ravi S, Raghunathan A, Kocher P, Hattangady S (2004), Security in embedded systems: design challenges. Trans Embed Comput Syst (TECS) (ACM) 3(3)
8.
Zurück zum Zitat Paar C, Weimerskirch A (2007) Embedded security in a pervasive world. Inf Secur Tech Rep (Elsevier) 12(3):155–161 Paar C, Weimerskirch A (2007) Embedded security in a pervasive world. Inf Secur Tech Rep (Elsevier) 12(3):155–161
9.
Zurück zum Zitat Eby M, Werner J, Karsai G, Ledeczi A (2007) Embedded systems security co-design. SIGBED Rev (ACM) 4(2) Eby M, Werner J, Karsai G, Ledeczi A (2007) Embedded systems security co-design. SIGBED Rev (ACM) 4(2)
11.
Zurück zum Zitat Qureshi MA, Aziz A, Ahmed B, Khalid A, Munir H (2012) Comparative analysis and implementation of efficient digital image water-marking schemes. Int J Comput Electr Eng 4(4):558CrossRef Qureshi MA, Aziz A, Ahmed B, Khalid A, Munir H (2012) Comparative analysis and implementation of efficient digital image water-marking schemes. Int J Comput Electr Eng 4(4):558CrossRef
12.
Zurück zum Zitat AbdurRazzaq M, Sheikh RA, Baig A, Ahmad A (2017) Digital image security: fusion of encryption, steganography and watermarking. Int J Adv Comput Sci Appl (IJACSA) 8(5) AbdurRazzaq M, Sheikh RA, Baig A, Ahmad A (2017) Digital image security: fusion of encryption, steganography and watermarking. Int J Adv Comput Sci Appl (IJACSA) 8(5)
13.
Zurück zum Zitat Conoscenti M, Torino D, Vetr A, Torino D, De Martin JC (2016) Blockchain for the Internet of Things: a systematic literature review. In: IEEE/ACS 13th international conference of computer systems and applications (AICCSA) Conoscenti M, Torino D, Vetr A, Torino D, De Martin JC (2016) Blockchain for the Internet of Things: a systematic literature review. In: IEEE/ACS 13th international conference of computer systems and applications (AICCSA)
15.
Zurück zum Zitat Liang X, Zhao J, Shetty S, Li D (2017) Towards data assurance and resilience in IoT using blockchain. In: Conference Paper Liang X, Zhao J, Shetty S, Li D (2017) Towards data assurance and resilience in IoT using blockchain. In: Conference Paper
Metadaten
Titel
A Comprehensive Study of Pros and Cons on Implementation of Blockchain for IoT Device Security
verfasst von
Indraneel Mukhopadhyay
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-9317-8_4

Neuer Inhalt