Skip to main content
Top

2023 | OriginalPaper | Chapter

Towards a Secured IoT Communication: A Blockchain Implementation Through APIs

Authors : Rajat Verma, Namrata Dhanda, Vishal Nagar

Published in: Proceedings of Third International Conference on Computing, Communications, and Cyber-Security

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Years ago, intercommunication among systems was not at all possible, but with the development of the application programming interface (APIs-traditional) in the 1960s, this was possible. With the evolution from the 1960s, these APIs have advanced, and the birth of APIs (Modern) took place in the initial 2000s. Many conventional techniques and tools that possess diverse security issues and are operating in a fully functional manner can be solved to a greater extent with the help of APIs if integrated with modern and SMART technologies. One such example is a sub-group of artificial intelligence (AI) i.e., IoT, that possesses diverse issues and challenges and can be solved by the peer-to-peer technology blockchain. Here, blockchain is regarded as the SMART solution. The diverse attacks on IoT spectrum are illustrated in this paper to attain a better scope and security for IoT devices. Moreover, the implementation of blockchain is also illustrated in this paper to depict a convenient approach for solving the issues of IoT with decentralization attribute. The reason is that IoT illustrates a centralized architecture.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lee, G. M., Crespi, N., Choi, J. K., & Boussard, M. (2013). Internet of things. In Evolution of telecommunication services (pp. 257–282). Springer. Lee, G. M., Crespi, N., Choi, J. K., & Boussard, M. (2013). Internet of things. In Evolution of telecommunication services (pp. 257–282). Springer.
2.
go back to reference Ilyas, M. U., Ahmad, M., & Saleem, S. (2020). Internet‐of‐things‐infrastructure‐as‐a‐service: The democratization of access to public internet‐of‐things infrastructure. International Journal of Communication Systems, 33, e4562. Ilyas, M. U., Ahmad, M., & Saleem, S. (2020). Internet‐of‐things‐infrastructure‐as‐a‐service: The democratization of access to public internet‐of‐things infrastructure. International Journal of Communication Systems, 33, e4562.
3.
go back to reference Devin, F. (2020). Web‐oriented architecture—How to design a RESTFull API. In TORUS 1—Toward an open resource using services: Cloud computing for environmental data (pp. 191–206). Devin, F. (2020). Web‐oriented architecture—How to design a RESTFull API. In TORUS 1—Toward an open resource using services: Cloud computing for environmental data (pp. 191–206).
4.
go back to reference Gu, X., Zhang, H., Zhang, D., & Kim, S. (2016). Deep API learning. In Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering (pp. 631–642). Gu, X., Zhang, H., Zhang, D., & Kim, S. (2016). Deep API learning. In Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering (pp. 631–642).
5.
go back to reference Palisse, A., Le Bouder, H., Lanet, J. L., Le Guernic, C., & Legay, A. (2016). Ransomware and the legacy crypto API. In International Conference on Risks and Security of Internet and Systems (pp. 11–28). Springer. Palisse, A., Le Bouder, H., Lanet, J. L., Le Guernic, C., & Legay, A. (2016). Ransomware and the legacy crypto API. In International Conference on Risks and Security of Internet and Systems (pp. 11–28). Springer.
6.
go back to reference Kumar, N. M., & Mallick, P. K. (2018). Blockchain technology for security issues and challenges in IoT. Procedia Computer Science, 132, 1815–1823.CrossRef Kumar, N. M., & Mallick, P. K. (2018). Blockchain technology for security issues and challenges in IoT. Procedia Computer Science, 132, 1815–1823.CrossRef
7.
go back to reference Verma, R., Dhanda, N., & Nagar, V. (2020). Addressing the issues & challenges of internet of things using blockchain technology. International Journal of Advanced Science and Technology, 29, 10074–10082. Verma, R., Dhanda, N., & Nagar, V. (2020). Addressing the issues & challenges of internet of things using blockchain technology. International Journal of Advanced Science and Technology, 29, 10074–10082.
8.
go back to reference Soni, A., & Ranga, V. (2019). API features individualizing of web services: REST and SOAP. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 2278–3075. Soni, A., & Ranga, V. (2019). API features individualizing of web services: REST and SOAP. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 2278–3075.
9.
go back to reference Neumann, A., Laranjeiro, N., & Bernardino, J. (2018). An analysis of public REST web service APIs. IEEE Transactions on Services Computing, 1–14. Neumann, A., Laranjeiro, N., & Bernardino, J. (2018). An analysis of public REST web service APIs. IEEE Transactions on Services Computing, 1–14.
10.
go back to reference Nakamoto, S. (2019). Bitcoin: A peer-to-peer electronic cash system. Manubot. Nakamoto, S. (2019). Bitcoin: A peer-to-peer electronic cash system. Manubot.
11.
go back to reference Nofer, M., Gomber, P., Hinz, O., & Schiereck, D. (2017). Blockchain. Business & Information Systems Engineering, 59(3), 183–187.CrossRef Nofer, M., Gomber, P., Hinz, O., & Schiereck, D. (2017). Blockchain. Business & Information Systems Engineering, 59(3), 183–187.CrossRef
12.
go back to reference Saini, H., Bhushan, B., Arora, A., & Kaur, A. (2019). Security vulnerabilities in Information communication technology: Blockchain to the rescue (A survey on blockchain technology). In 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT) (Vol. 1., pp. 1680–1684). IEEE. Saini, H., Bhushan, B., Arora, A., & Kaur, A. (2019). Security vulnerabilities in Information communication technology: Blockchain to the rescue (A survey on blockchain technology). In 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT) (Vol. 1., pp. 1680–1684). IEEE.
13.
go back to reference Courtois, N. T., Grajek, M., & Naik, R. (2014). Optimizing SHA256 in bitcoin mining. In International Conference on Cryptography and Security Systems (pp. 131–144). Springer. Courtois, N. T., Grajek, M., & Naik, R. (2014). Optimizing SHA256 in bitcoin mining. In International Conference on Cryptography and Security Systems (pp. 131–144). Springer.
14.
go back to reference Göbel, J., Keeler, H. P., Krzesinski, A. E., & Taylor, P. G. (2016). Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Performance Evaluation, 104, 23–41.CrossRef Göbel, J., Keeler, H. P., Krzesinski, A. E., & Taylor, P. G. (2016). Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Performance Evaluation, 104, 23–41.CrossRef
15.
go back to reference Niranjanamurthy, M., Nithya, B. N., & Jagannatha, S. (2019). Analysis of blockchain technology: Pros, cons and SWOT. Cluster Computing, 22(6), 14743–14757.CrossRef Niranjanamurthy, M., Nithya, B. N., & Jagannatha, S. (2019). Analysis of blockchain technology: Pros, cons and SWOT. Cluster Computing, 22(6), 14743–14757.CrossRef
16.
go back to reference Singh, S., & Singh, N. (2016). Blockchain: Future of financial and cyber security. In 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) (pp. 463–467). IEEE. Singh, S., & Singh, N. (2016). Blockchain: Future of financial and cyber security. In 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I) (pp. 463–467). IEEE.
17.
go back to reference Dalcin, L. D., Paz, R. R., Kler, P. A., & Cosimo, A. (2011). Parallel distributed computing using Python. Advances in Water Resources, 34(9), 1124–1139.CrossRef Dalcin, L. D., Paz, R. R., Kler, P. A., & Cosimo, A. (2011). Parallel distributed computing using Python. Advances in Water Resources, 34(9), 1124–1139.CrossRef
18.
go back to reference Alharby, M., & van Moorsel, A. (2019). Blocksim: A simulation framework for blockchain systems. ACM SIGMETRICS Performance Evaluation Review, 46(3), 135–138.CrossRef Alharby, M., & van Moorsel, A. (2019). Blocksim: A simulation framework for blockchain systems. ACM SIGMETRICS Performance Evaluation Review, 46(3), 135–138.CrossRef
19.
go back to reference Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.CrossRef Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.CrossRef
21.
go back to reference Li, J., Liu, Y., Xie, J., Li, M., Sun, M., Liu, Z., & Jiang, S. (2019). A remote monitoring and diagnosis method based on four-layer IoT frame perception. IEEE Access, 7, 144324–144338.CrossRef Li, J., Liu, Y., Xie, J., Li, M., Sun, M., Liu, Z., & Jiang, S. (2019). A remote monitoring and diagnosis method based on four-layer IoT frame perception. IEEE Access, 7, 144324–144338.CrossRef
22.
go back to reference Sengupta, J., Ruj, S., & Bit, S. D. (2020). A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. Journal of Network and Computer Applications, 149, 102481. Sengupta, J., Ruj, S., & Bit, S. D. (2020). A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. Journal of Network and Computer Applications, 149, 102481.
23.
go back to reference Andrea, I., Chrysostomou, C., & Hadjichristofi, G. (2015). Internet of things: Security vulnerabilities and challenges. In 2015 IEEE Symposium on Computers and Communication (ISCC) (pp. 180–187). IEEE. Andrea, I., Chrysostomou, C., & Hadjichristofi, G. (2015). Internet of things: Security vulnerabilities and challenges. In 2015 IEEE Symposium on Computers and Communication (ISCC) (pp. 180–187). IEEE.
24.
go back to reference Ahemd, M. M., Shah, M. A., & Wahid, A. (2017). IoT security: A layered approach for attacks & defenses. In 2017 International Conference on Communication Technologies (ComTech) (pp. 104–110). IEEE. Ahemd, M. M., Shah, M. A., & Wahid, A. (2017). IoT security: A layered approach for attacks & defenses. In 2017 International Conference on Communication Technologies (ComTech) (pp. 104–110). IEEE.
25.
go back to reference Atlam, H. F., & Wills, G. B. (2019). Technical aspects of blockchain and IoT. In Advances in computers (Vol. 115, pp. 1–39). Elsevier. Atlam, H. F., & Wills, G. B. (2019). Technical aspects of blockchain and IoT. In Advances in computers (Vol. 115, pp. 1–39). Elsevier.
26.
go back to reference Deogirikar, J., & Vidhate, A. (2017). Security attacks in IoT: A survey. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) (pp. 32–37). IEEE. Deogirikar, J., & Vidhate, A. (2017). Security attacks in IoT: A survey. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) (pp. 32–37). IEEE.
27.
go back to reference Ning, J., Xu, J., Liang, K., Zhang, F., & Chang, E. C. (2018). Passive attacks against searchable encryption. IEEE Transactions on Information Forensics and Security, 14(3), 789–802.CrossRef Ning, J., Xu, J., Liang, K., Zhang, F., & Chang, E. C. (2018). Passive attacks against searchable encryption. IEEE Transactions on Information Forensics and Security, 14(3), 789–802.CrossRef
28.
go back to reference Khoo, B. (2011). RFID as an enabler of the internet of things: Issues of security and privacy. In 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing (pp. 709–712). IEEE. Khoo, B. (2011). RFID as an enabler of the internet of things: Issues of security and privacy. In 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing (pp. 709–712). IEEE.
29.
go back to reference Navas, R. E., Le Bouder, H., Cuppens, N., Cuppens, F., & Papadopoulos, G. Z. (2018). Do not trust your neighbors! A small IoT platform illustrating a man-in-the-middle attack. In International Conference on Ad-Hoc Networks and Wireless (pp. 120–125). Springer. Navas, R. E., Le Bouder, H., Cuppens, N., Cuppens, F., & Papadopoulos, G. Z. (2018). Do not trust your neighbors! A small IoT platform illustrating a man-in-the-middle attack. In International Conference on Ad-Hoc Networks and Wireless (pp. 120–125). Springer.
30.
go back to reference Wang, A., Liang, R., Liu, X., Zhang, Y., Chen, K., & Li, J. (2017). An inside look at IoT malware. In International Conference on Industrial IoT Technologies and Applications (pp. 176–186). Springer. Wang, A., Liang, R., Liu, X., Zhang, Y., Chen, K., & Li, J. (2017). An inside look at IoT malware. In International Conference on Industrial IoT Technologies and Applications (pp. 176–186). Springer.
31.
go back to reference Litoussi, M., Kannouf, N., El Makkaoui, K., Ezzati, A., & Fartitchou, M. (2020). IoT security: Challenges and countermeasures. Procedia Computer Science, 177, 503–508.CrossRef Litoussi, M., Kannouf, N., El Makkaoui, K., Ezzati, A., & Fartitchou, M. (2020). IoT security: Challenges and countermeasures. Procedia Computer Science, 177, 503–508.CrossRef
32.
go back to reference Verma, R., Dhanda, N., & Nagar, V. (2022). Security concerns in IoT systems and its blockchain solutions. In J. M. R. S. Tavares, P. Dutta, S. Dutta, & D. Samanta (Eds.), Cyber intelligence and information retrieval. Lecture Notes in Networks and Systems (Vol. 291, pp. 485–495). Springer. http://doi.org/10.1007/978-981-16-4284-5_42 Verma, R., Dhanda, N., & Nagar, V. (2022). Security concerns in IoT systems and its blockchain solutions. In J. M. R. S. Tavares, P. Dutta, S. Dutta, & D. Samanta (Eds.), Cyber intelligence and information retrieval. Lecture Notes in Networks and Systems (Vol. 291, pp. 485–495). Springer. http://​doi.​org/​10.​1007/​978-981-16-4284-5_​42
33.
go back to reference Hao, W., Zeng, J., Dai, X., Xiao, J., Hua, Q. S., Chen, H., Li, K. C., & Jin, H. (2020). Towards a trust-enhanced blockchain P2P topology for enabling fast and reliable broadcast. IEEE Transactions on Network and Service Management, 17(2), 904–917.CrossRef Hao, W., Zeng, J., Dai, X., Xiao, J., Hua, Q. S., Chen, H., Li, K. C., & Jin, H. (2020). Towards a trust-enhanced blockchain P2P topology for enabling fast and reliable broadcast. IEEE Transactions on Network and Service Management, 17(2), 904–917.CrossRef
34.
go back to reference Pham, H. A., Le, T. K., & Le, T.V. (2019). Enhanced security of IoT data sharing management by smart contracts and blockchain. In 2019 19th International Symposium on Communications and Information Technologies (ISCIT) (pp. 398–403). IEEE. Pham, H. A., Le, T. K., & Le, T.V. (2019). Enhanced security of IoT data sharing management by smart contracts and blockchain. In 2019 19th International Symposium on Communications and Information Technologies (ISCIT) (pp. 398–403). IEEE.
Metadata
Title
Towards a Secured IoT Communication: A Blockchain Implementation Through APIs
Authors
Rajat Verma
Namrata Dhanda
Vishal Nagar
Copyright Year
2023
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-1142-2_53