The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as such organizations are deeply concerned with its security and technical issues. Blockchain system comprises a distributed digital ledger which is shared among community of users on the Internet; validated and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
IoT and Blockchain are two evolving technologies which are gradually realizing immense potential to be a decisive part of future of mankind ecosystem. Blockchain and IoT, both are envisaged to bring in a plethora of advantages including better control, communication, transparency and more significantly realizing digital trust without any third party intervention. Both of these technologieshave immense potential for exploitation in a smart nation concept. The advantages being realized are potent enough for definite implementation ahead but they come with an austere package of security concerns which if not taken care at the design stage can lead to pandemonium beyond control because of the billion plus connected things. Even atdesign stage, one can appreciate that it will be envisaging beyond control to close all security vulnerabilities and zero day’s exploits of future. But then Blockchain is an inexpugnable solution to shut all these securities imperils. This paper builds upon the advantages of the union of these two evolving technology behemoths, their union and solutions vide Blockchain to the challenges in the way ahead
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing.
Secure and Smart IoT using Blockchain and AIAhmed Banafa
The first 29 pages of my book "Secure and Smart IoT Using Blockchain and AI " Including Forward, Preface, Table of Contents , list of Figures, and Chapter 1. https://www.amazon.com/Secure-Smart-Internet-Things-IoT/dp/8770220301/
Second line of defense for cybersecurity : BlockchainAhmed Banafa
With the fact that cybercrime and cyber security attacks hardly seem to be out of the news these days and the threat is growing globally.
Nobody would appear immune to malicious and offensive acts targeting computer networks, infrastructures and personal computer devices.
Firms clearly must invest to stay resilient.
Gauging the exact size of cybercrime and putting a precise US dollar value on it is nonetheless tricky.
Coalition of IoT and Blockchain: Rewards and Challengesanupriti
IoT and Blockchain are two evolving technologies which are gradually realizing immense potential to be a decisive part of future of mankind ecosystem. Blockchain and IoT, both are envisaged to bring in a plethora of advantages including better control, communication, transparency and more significantly realizing digital trust without any third party intervention. Both of these technologieshave immense potential for exploitation in a smart nation concept. The advantages being realized are potent enough for definite implementation ahead but they come with an austere package of security concerns which if not taken care at the design stage can lead to pandemonium beyond control because of the billion plus connected things. Even atdesign stage, one can appreciate that it will be envisaging beyond control to close all security vulnerabilities and zero day’s exploits of future. But then Blockchain is an inexpugnable solution to shut all these securities imperils. This paper builds upon the advantages of the union of these two evolving technology behemoths, their union and solutions vide Blockchain to the challenges in the way ahead
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing.
Secure and Smart IoT using Blockchain and AIAhmed Banafa
The first 29 pages of my book "Secure and Smart IoT Using Blockchain and AI " Including Forward, Preface, Table of Contents , list of Figures, and Chapter 1. https://www.amazon.com/Secure-Smart-Internet-Things-IoT/dp/8770220301/
Second line of defense for cybersecurity : BlockchainAhmed Banafa
With the fact that cybercrime and cyber security attacks hardly seem to be out of the news these days and the threat is growing globally.
Nobody would appear immune to malicious and offensive acts targeting computer networks, infrastructures and personal computer devices.
Firms clearly must invest to stay resilient.
Gauging the exact size of cybercrime and putting a precise US dollar value on it is nonetheless tricky.
The Blockchain Wave in 2019 and BeyondAhmed Banafa
We’re still in the early days of Blockchain as a technology, and so we’re yet to see the full impact that it will have on the world that we live in. Still, it’s already showing potential across a range of industries and started to enter the public consciousness, so the real question is what will happen when Blockchain technology starts to mature.
The following list of predictions (Figure 1) explores the state of IoT in 2019 and covering IoT impact on many aspects business and technology including Digital Transformation, Blockchain, AI, and 5G.
Blockchain, the "distributed ledger" technology, has emerged as an object of intense interest in the tech industry and beyond.
Blockchain technology offers a way of recording transactions or any digital interaction in a way that is designed to be secure, transparent, highly resistant to outages, auditable, and efficient; as such, it carries the possibility of disrupting industries and enabling new business models.
How do Blockchain and IOT work together? The focus of this presentation is to provide an introduction to Blockchain, review why IOT is critical to blockchain success and identify the leading projects you should be using
Seminar of the Web Security and Privacy course of the Master Degree in Engineering in Computer Science (Cyber Security) of the University of Rome "La Sapienza".
The presentation is about a research project called "Smart Home" in which the Block Chain method is applied in a Smart Home environment to assure Privacy and Security in an IoT context.
The year 2018 is the year of blockchain applications with several ongoing use-cases coming to realization and the vendor landscape also gained more depth and a better structure after years of press and vendor hype, fueled equally by commercial self-interest and a genuine desire for innovation.
In this seminar you will listen to in depth explanation of the hottest technologies in 2019 and beyond. Prof. Banafa will discuss each technology its applications and challenges with real life cases. The interaction among all the four technology will be explored with focus on future trends in each of technology. As all technologies can be summarized in one word IBAC (IoT, Blockchain, AI, Cybersecurity) they can be explained with the following words: IoT: senses, Blockchain: remembers, AI: thinks, and Cybersecurity: protects.
IoT and Blockchain Challenges and RisksAhmed Banafa
The biggest challenge facing IoT security is coming from the very architecture of the current IoT ecosystem; it’s all based on a centralized model known as the server/client model. All devices are identified, authenticated and connected through cloud servers that support huge processing and storage capacities. The connection between devices will have to go through the cloud, even if they happen to be a few feet apart. While this model has connected computing devices for decades and will continue to support today IoT networks, it will not be able to respond to the growing needs of the huge IoT ecosystems of tomorrow.
IoT Standardization and Implementation ChallengesAhmed Banafa
The rapid evolution of the IoT market has caused an explosion in the number and variety of IoT solutions.
Additionally, large amounts of funding are being deployed at IoT startups.
Consequently, the focus of the industry has been on manufacturing and producing the right types of hardware to enable those solutions.
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace. Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check
IoT, AI and Blockchain: Catalysts for Digital TransformationAhmed Banafa
The digital revolution has brought with it a new way of thinking about manufacturing and operations. Emerging challenges associated with logistics and energy costs are influencing global production and associated distribution decisions. Significant advances in technology, including big data and analytics, AI, Internet of Things, robotics and additive manufacturing, are shifting the capabilities and value proposition of global manufacturing. In response, manufacturing and operations require a digital renovation: the value chain must be redesigned and retooled and the workforce retrained. Total delivered cost must be analyzed to determine the best places to locate sources of supply, manufacturing and assembly operations around the world. In other words we need a digital transformation.
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
Internet of Things (IoT) security and privacy remain
a major challenge, mainly due to the massive scale and
distributed nature of IoT networks. Blockchain-based approaches
provide decentralized security and privacy, yet they involve
significant energy, delay, and computational overhead that is
not suitable for most resource-constrained IoT devices. In our
previous work, we presented a lightweight instantiation of a
BC particularly geared for use in IoT by eliminating the Proof
of Work (POW) and the concept of coins. Our approach was
exemplified in a smart home setting and consists of three main
tiers namely: cloud storage, overlay, and smart home. In this
paper we delve deeper and outline the various core components
and functions of the smart home tier. Each smart home is
equipped with an always online, high resource device, known
as ”miner” that is responsible for handling all communication
within and external to the home. The miner also preserves
a private and secure BC, used for controlling and auditing
communications. We show that our proposed BC-based smart
home framework is secure by thoroughly analysing its security
with respect to the fundamental security goals of confidentiality,
integrity, and availability. Finally, we present simulation results
to highlight that the overheads (in terms of traffic, processing
time and energy consumption) introduced by our approach are
insignificant relative to its security and privacy gains.
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Tyrone Systems
Blockchain offers the potential of greatly improving the overall security of the IoT environment. The verifiable, secure and permanent method of recording data processed by “smart” machines in the IoT.
When it comes to the Internet of Things, a blockchain can be provide a platform to handle device authentication process and thereby prevent a spoofing attack by malicious parties who may impersonate some other device to launch an attack to steal data or cause some other mayhem.Blockchain will allowdirect communication between two or more devices so that they are able to transact without going through a third-party intermediary, and in effect make spoofing more cost prohibitive. This White Paper explains how blockchain can improve the security of IOT devices.
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
The Blockchain Wave in 2019 and BeyondAhmed Banafa
We’re still in the early days of Blockchain as a technology, and so we’re yet to see the full impact that it will have on the world that we live in. Still, it’s already showing potential across a range of industries and started to enter the public consciousness, so the real question is what will happen when Blockchain technology starts to mature.
The following list of predictions (Figure 1) explores the state of IoT in 2019 and covering IoT impact on many aspects business and technology including Digital Transformation, Blockchain, AI, and 5G.
Blockchain, the "distributed ledger" technology, has emerged as an object of intense interest in the tech industry and beyond.
Blockchain technology offers a way of recording transactions or any digital interaction in a way that is designed to be secure, transparent, highly resistant to outages, auditable, and efficient; as such, it carries the possibility of disrupting industries and enabling new business models.
How do Blockchain and IOT work together? The focus of this presentation is to provide an introduction to Blockchain, review why IOT is critical to blockchain success and identify the leading projects you should be using
Seminar of the Web Security and Privacy course of the Master Degree in Engineering in Computer Science (Cyber Security) of the University of Rome "La Sapienza".
The presentation is about a research project called "Smart Home" in which the Block Chain method is applied in a Smart Home environment to assure Privacy and Security in an IoT context.
The year 2018 is the year of blockchain applications with several ongoing use-cases coming to realization and the vendor landscape also gained more depth and a better structure after years of press and vendor hype, fueled equally by commercial self-interest and a genuine desire for innovation.
In this seminar you will listen to in depth explanation of the hottest technologies in 2019 and beyond. Prof. Banafa will discuss each technology its applications and challenges with real life cases. The interaction among all the four technology will be explored with focus on future trends in each of technology. As all technologies can be summarized in one word IBAC (IoT, Blockchain, AI, Cybersecurity) they can be explained with the following words: IoT: senses, Blockchain: remembers, AI: thinks, and Cybersecurity: protects.
IoT and Blockchain Challenges and RisksAhmed Banafa
The biggest challenge facing IoT security is coming from the very architecture of the current IoT ecosystem; it’s all based on a centralized model known as the server/client model. All devices are identified, authenticated and connected through cloud servers that support huge processing and storage capacities. The connection between devices will have to go through the cloud, even if they happen to be a few feet apart. While this model has connected computing devices for decades and will continue to support today IoT networks, it will not be able to respond to the growing needs of the huge IoT ecosystems of tomorrow.
IoT Standardization and Implementation ChallengesAhmed Banafa
The rapid evolution of the IoT market has caused an explosion in the number and variety of IoT solutions.
Additionally, large amounts of funding are being deployed at IoT startups.
Consequently, the focus of the industry has been on manufacturing and producing the right types of hardware to enable those solutions.
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
The Internet of things (IoT) is growing rapidly and 2018 will be a fascinating year for the IoT industry. IoT technology continues to evolve at an incredibly rapid pace. Consumers and businesses alike are anticipating the next big innovation. They are all set to embrace the ground-breaking impact of the Internet of Things on our lives like ATMs that report crimes around them, forks that tell you if you are eating fast, or IP address for each organ of your body for doctors to connect and check
IoT, AI and Blockchain: Catalysts for Digital TransformationAhmed Banafa
The digital revolution has brought with it a new way of thinking about manufacturing and operations. Emerging challenges associated with logistics and energy costs are influencing global production and associated distribution decisions. Significant advances in technology, including big data and analytics, AI, Internet of Things, robotics and additive manufacturing, are shifting the capabilities and value proposition of global manufacturing. In response, manufacturing and operations require a digital renovation: the value chain must be redesigned and retooled and the workforce retrained. Total delivered cost must be analyzed to determine the best places to locate sources of supply, manufacturing and assembly operations around the world. In other words we need a digital transformation.
Blockchain for IoT Security and Privacy: The Case Study of a Smart HomeKishor Datta Gupta
Internet of Things (IoT) security and privacy remain
a major challenge, mainly due to the massive scale and
distributed nature of IoT networks. Blockchain-based approaches
provide decentralized security and privacy, yet they involve
significant energy, delay, and computational overhead that is
not suitable for most resource-constrained IoT devices. In our
previous work, we presented a lightweight instantiation of a
BC particularly geared for use in IoT by eliminating the Proof
of Work (POW) and the concept of coins. Our approach was
exemplified in a smart home setting and consists of three main
tiers namely: cloud storage, overlay, and smart home. In this
paper we delve deeper and outline the various core components
and functions of the smart home tier. Each smart home is
equipped with an always online, high resource device, known
as ”miner” that is responsible for handling all communication
within and external to the home. The miner also preserves
a private and secure BC, used for controlling and auditing
communications. We show that our proposed BC-based smart
home framework is secure by thoroughly analysing its security
with respect to the fundamental security goals of confidentiality,
integrity, and availability. Finally, we present simulation results
to highlight that the overheads (in terms of traffic, processing
time and energy consumption) introduced by our approach are
insignificant relative to its security and privacy gains.
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Tyrone Systems
Blockchain offers the potential of greatly improving the overall security of the IoT environment. The verifiable, secure and permanent method of recording data processed by “smart” machines in the IoT.
When it comes to the Internet of Things, a blockchain can be provide a platform to handle device authentication process and thereby prevent a spoofing attack by malicious parties who may impersonate some other device to launch an attack to steal data or cause some other mayhem.Blockchain will allowdirect communication between two or more devices so that they are able to transact without going through a third-party intermediary, and in effect make spoofing more cost prohibitive. This White Paper explains how blockchain can improve the security of IOT devices.
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
When Internet of Things (IoT) applications become a part of people’s daily life, security issues in IoT have caught substantial attention in both academia and industry. Compared to traditional computing systems, IoT systems have more inherent vulnerabilities, and in the intervening time, could have higher security requirements. However, the current design of IoT does not successfully address the higher security requirements postured by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to defend this emerging system. This paper purposes to examine security challenges resulted from the special characteristics of the IoT systems and the new features of the IoT applications. This could help pave the road to better security solution design. Furthermore, three architectural security designs are suggested and analyzed. Examples of how to implement these designs are discussed. Finally, for each layer in IoT architecture, open issues are also identified.
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSIJCNCJournal
Internet of things (IoT) is the integration of computer-based systems and the physical world in which things
interact with each other. Due to heterogeneity and resource-constrained feature of IoT devices, there are
many privacy and security challenges resulting in many threat vulnerabilities in IoT environments. After
reviewing and analyzing the recent IoT security, privacy, and authentication protocols, we will withdraw
research gaps focused on the elimination of human factors in IoT authentication. In order to fill these
research gaps, this paper proposes a privacy-preserving machine authenticated key agreement based on
IoT, denoted as IoTMAKA. IoTMAKA uses dynamic identity and machine fingerprint to provide security and
privacy. Security analysis shows that IoTMAKA provides anonymity and untraceability, provides freshness,
and is secure against passive and active attacks. IoTMAKA reduces communication overheads by 20% and
computational overheads by 25% on average as compared to the previous related works.
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
A pervasive network architecture that interconnect heterogeneous objects, devices, technologies and services called
Internet of Things has prompted a drastic change in demand of smart devices which in turn has increased the rate of
data exchange. These smart devices are built with numerous sensors which collect information from other interacting
devices, process it and send it to remote locations for storage or further processing. Although this mechanism of data
processing and sharing has contributed immensely to the information world, it has recently posed high security risk
on privacy and data confidentiality. This paper therefore analyses different security threats to data at different
architectural layers of Internet of Things, possible countermeasures and other in-depth security measures for Internet
of Things. The paper identifies device authentication on IoT network to be of paramount impo rtance in securing IoT
systems. This paper also suggests some essential technologies of security such as encryption for securing IoT
devices and the data shared over IoT network
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT combines smart devices to provide smart services and applications like smart cities, smart healthcare, smart home, and digital farm etc. But it is very crucial to secure connected IoT devices and networks because of the nature of IoT system. In this paper, the existing works are analyzed and an IoT based
healthcare system architecture is proposed. An authentication scheme to enhance the security of the proposed healthcare system is also present.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn significant attention during the past few years, the pace at which new devices are being integrated into the system will profoundly impact the world in a good way but also poses some severe queries about security and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most significant concerns of IoT is to provide security assurance for the data exchange because data is vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where each layer provides a service. The security needs vary from layer to layer as each layer serves a different purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks have been discussed along with some existing and proposed countermeasures.
SECURITY& PRIVACY THREATS, ATTACKS AND COUNTERMEASURES IN INTERNET OF THINGSIJNSA Journal
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of
the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating
interaction among these connected things. Though the term IoT was introduced in 1999 but has drawn
significant attention during the past few years, the pace at which new devices are being integrated into the
system will profoundly impact the world in a good way but also poses some severe queries about security
and privacy. IoT in its current form is susceptible to a multitudinous set of attacks. One of the most
significant concerns of IoT is to provide security assurance for the data exchange because data is
vulnerable to some attacks by the attackers at each layer of IoT. The IoT has a layered structure where
each layer provides a service. The security needs vary from layer to layer as each layer serves a different
purpose. This paper aims to analyze the various security and privacy threats related to IoT. Some attacks
have been discussed along with some existing and proposed countermeasures.
Comprehensive Survey on Security Problems and Key Technologies of the Interne...RSIS International
Internet of things (IoT) is a collection of many
interconnected objects, services, humans, and devices that can
communicate, share data, and information to achieve a common
goal in different areas and applications. The vision of IoT is to
enable devices to collaborate with each other on the Internet. IoT
security focuses on authentication and access control protocols.
IoT security is the area with protection connected devices and
networks. There are many key challenges in designing a secure
IoT: Privacy, Authentication, Access Control, Trust,
Confidentiality, Mobile Security, etc. Attacks on IoT security
devices are physical attacks, side channel attacks, cryptanalysis
attacks, software attacks, network attacks. This paper describes
Security Problems of IoT, Security issues and Key Technologies
of IoT.
Comprehensive survey on security problems and key technologies of the interne...RSIS International
Internet of things (IoT) is a collection of many
interconnected objects, services, humans, and devices that can
communicate, share data, and information to achieve a common
goal in different areas and applications. The vision of IoT is to
enable devices to collaborate with each other on the Internet. IoT
security focuses on authentication and access control protocols.
IoT security is the area with protection connected devices and
networks. There are many key challenges in designing a secure
IoT: Privacy, Authentication, Access Control, Trust,
Confidentiality, Mobile Security, etc. Attacks on IoT security
devices are physical attacks, side channel attacks, cryptanalysis
attacks, software attacks, network attacks. This paper describes
Security Problems of IoT, Security issues and Key Technologies
of IoT.
IBchain: Internet of Things and Blockchain Integration Approach for Secure Co...AlAtfat
Introducing IBchain, a new blockchain architecture with the Internet of Things (IoT), could be an
attractive framework regarding improvements in connectivity implementation through the smart cities.
Instead of meriting innovation and security, the IoT links people, sites, and products and provides
opportunities. Everything that transfers information to the IoT system is integrated by advanced
microchips, sensors, and actuators in actual things. The analytical ability of the IoT converts observations
into actions, impacting business advancements and significant ways of activity. IoT enables connected
objects to transmit information to personal blockchain systems to create tamper-resistant transaction
records. The information from sensors and microchips is progressing rapidly with blockchain ledgers,
making them more portable and relevant for immediate conversations. In IBchain methodology, the smart
objects are permissible to connect securely with other smart objects in diverse situations. IBchain creates
an innovative blockchain-based processing configuration through the IoT. The IBchain could analyze
blockchain to the main expertise or supports the IoT validation and trustworthiness. It reinforces
blockchain and cloud to build an empowering IoT ubiquitous situation for secure communication among
the smart devices.
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
‘Internet of Things (IoT)’emerged as an intelligent collaborative computation and communication between a set of objects capable of providing on-demand services to other objects anytime anywhere. A large-scale deployment of data-driven cloud applications as well as automated physical things such as embed electronics, software, sensors and network connectivity enables a joint ubiquitous and pervasive internet-based computing systems well capable of interacting with each other in an IoT. IoT, a well-known term and a growing trend in IT arena certainly bring a highly connected global network structure providing a lot of beneficial aspects to a user regarding business productivity, lifestyle improvement, government efficiency, etc. It also generates enormous heterogeneous and homogeneous data needed to be analyzed properly to get insight into valuable information. However, adoption of this new reality (i.e., IoT) by integrating it with the internet invites a certain challenges from security and privacy perspective. At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws. Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT. It also extracts some open research problems that could affect the future research track of IoT arena.
A signature-based data security and authentication framework for internet of...IJECEIAES
Internet of things (IoT) is the next big revolution in modernized network technologies connecting a massive number of heterogeneous smart appliances and physical objects. Owing to these technologies' novelty, various issues are characterized by security concerns are the most prioritized issue. A review of existing security approaches highlights that they are very particular about the solution towards a specific attack and cannot resist any unknown attacker. Therefore, this manuscript presents a novel computational model that introduces a unique authentication process using a simplified encryption strategy. The simulated study outcome shows that the proposed system offers efficient security and efficient data transmission performance in the presence of an unknown adversary. Hence, the study outcome exhibits better effects than frequently used security solutions when implemented in a vulnerable IoT environment.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security, management, and privacy.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It
extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates
opportunities in numerous domains. However, this increase in connectivity creates many prominent
challenges. This paper provides a survey of some of the major issues challenging the widespread adoption
of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the
IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
Similar to CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES (20)
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
1. International Journal of Network Security & Its Applications (IJNSA) Vol.13, No.6, November 2021
DOI: 10.5121/ijnsa.2021.13609 123
CAN BLOCKCHAIN BE A SOLUTION TO IOT
TECHNICAL AND SECURITY ISSUES
Adanma Cecilia Eberendu1
, Titus Ifeanyi Chinebu2
1
Department of Computer Science, Madonna University,
Nigeria Elele Rivers State, Nigeria
2
Department of Physical Sciences, Federal College of Dental Technology
and Therapy, P. M. B. 01473 Trans Ekulu Enugu, Nigeria.
ABSTRACT
The Internet of Things (IoT) is a growing trend in technology that interconnects millions of physical
devices from any location anytime. Currently, IoT devices have become an integral part of human lives, as
such organizations are deeply concerned with its security and technical issues. Blockchain system
comprises a distributed digital ledger which is shared among community of users on the Internet; validated
and recorded transactions in the ledger which cannot be altered or removed. We presented the challenges
of IoT devices and how blockchain can be used to alleviate these problems. An outline of how to integrate
blockchain with IoT was tackled, highlighting the challenges of IoT and how blockchain can remedy the
issues. It was concluded that blockchain has the capability to curb the challenges posed by IoT devices.
KEYWORDS
Internet of things, blockchain, IoT security, technical and security issues, IoT devices.
1. INTRODUCTION
Recent advancements in semiconductor technology have had tremendous impact on solutions that
allow for the direct integration of wireless network connectivity in embedded processors, sensors,
and actuators. These innovations and advancements have also contributed to increased interest in
Internet of Things (IoT) applications. IoT comprises the ubiquitous existence of different objects
(mobile telephones, RFID, actuators, sensors, tablets, laptops, etc.) that interact with one another
to achieve common objectives [1]. IoT stands for a global network interconnection of everyday
things [2], that are uniquely addressable based on some special communication protocols. IoT
interconnects people and things anytime, anywhere with anything and anyone using available
network and service and involves device that have capability of sensing, actuating and
communicating so as to link information and physical world.
The purpose of IoT is to connect things (devices, communication and services) anytime,
anywhere with anyone using networks.
Chang et al. [3] discovered that smart devices top the chart for potential IoT deployment. The
major factors affecting the adoption of IoT are the will of home users to acquire the devices,
security of these devices, and expediency of use [4]. IoT devices are increasing and growing
exponentially and this rapid growth has rendered the existing security measures inadequate [5].
Also, scalability due to over-dependence on a cloud server for identification, authentication, and
2. International Journal of Network Security & Its Applications (IJNSA) Vol.13, No.6, November 2021
124
connection of smart devices created concerns for security such that an attack on such cloud server
involves the entire system.
Arabo [6] explained that there are lots of security and privacy concerns about these IoT devices
and appliances despite the benefits associated with them. Razzag et al. [5] reported that
consumers spend over $2 trillion annually on IoT devices. Dorri, et al [7] noted that in most cases
the user of IoT devices within IoT environments generates good amount of data without the
consent of the consumer. IoT devices provide many benefits to consumers but are also vulnerable
to attacks. Most of these consumers are not completely aware of the implications of sharing these
devices or their personal data, as such, connected devices pose security risk to them. Consumers
usually assume that devices and appliances work perfectly well because they rely on devices’
default configurations without taking note of the technical manuals and documents. There are
some challenging factors that are inherent in IoT – interoperability [8] resource constraints
(signalling, bandwidth, power consumption) [9], privacy and vulnerability [10].
One of the causes of security challenges in IoT system is that manufacturers release IoT devices
to the market without given consideration to hardware issues, guessable-weak password and
unsecure update mechanism. Also, social engineering attacks is the order of the day since most
users are unaware of the functionality of IoT devices thereby putting everything at risk. IoT
devices updates are not released frequently as new vulnerabilities are discovered, as such most
IoT devices are endangered from the time of manufacturing. According to Abdelghaffar and
Abousteit [8], lack of standard or the interoperability is the cause of interconnection of objects so
that manufacturers can increase market share and then make more profit. Malware also threats
and attacks IoT devices by performing unwanted actions without the consent of the consumer
thereby resulting in data damages and theft. Some of the threats are device and information
modification, data filtering message reproduction, and network or system or device failure [11].
Attacks might be botnet, ransomware, espionage or eavesdropping, rouge devices, etc. According
to Dai et al [10], IoT systems are built on a client/server model which may not be able to spread
over the system. To move IoT forward, a distributed model that will extend over distributed
system is encouraged and blockchain technology which has decentralized capability is needed to
expand the IoT. The main problem with IoT is that all devices are connected centrally in form of
client/server model where the server authenticate the devices. In other to surmount this problem,
blockchain, as a distributed ledger technology provides decentralized approach that will
overcome this flaw.
Blockchain has no single vulnerability as such it provides military-based security for IoT devices.
It is capable of addressing these security challenges of IoT because users in blockchain maintain
a copy of their ledger and authenticate all new contracts communally through an agreed process
before accepting them on to the ledger [12].
Blockchain originally known as chain-of-blocks is a group of computers that keeps immutable
records of data called distributed ledger or blocks that are linked together using cryptography. It
is a time-stamped series of data that entered into the chain at intervals known as blocks with
verified transactions and order. Cui et al [11] said that the blocks contain transaction information,
such as amount, date and time of purchase, distinctive algorithmic code for differentiating one
block from another and identity of each party associated with the transaction. (A blockchain is a
distributed tamper-resistant ledger which is readable to certain parties only. Blockchain is a
distributed, incorruptible and tamper-resistant ledger that has the potential to address security
challenges of IoT, especially on data integrity and reliability [13]. Minoli and Occhiogrosso [14]
described blockchain as a cryptographically-linked list of blocks conceived from different points.
Blockchain is widely accepted and is mainly used in smart contracts, digital assets, and
distributed storage. The purpose of this work is to provide an overview of how blockchain
3. International Journal of Network Security & Its Applications (IJNSA) Vol.13, No.6, November 2021
125
technology can solve inherent challenges of Internet of Things systems. The discussion of how
Blockchain’s incorporation into IoT would curb the inadequacies of centralization, scalability,
security, and privacy concerns will be carried out too.
2. RELATED LITERATURE
The two concepts which are making waves in the technology circle as well as business world are
blockchain and Internet of Things (IoT). Jesus et al [15] said that integrating them will
revolutionize the way we do things, while Alamri et al [16] pointed out that the two are already
on every lip in technological profession and there are more to talk about them. IoT involves the
continuous increase in the number of data-gathering devices coming into the business activities or
private homes. Blockchain is an encrypted, distributed ledger system drawn to establish tamper-
proof, real-time registers. Apart from centralization problem, Dorri, et al [7] identified that most
IoT devices have limited resources and privacy issues which makes them less compatible with
the requirements of complex automated systems. They proposed a blockchain based solution for
the IoT security and privacy issues and to curb the shortcomings of the earlier viewed
propositions. They argued that the Blockchain is an effective and efficient technology for
tackling issues of security and privacy in IoT. Not with standing, blockchain has issues of
bandwidth, latency overheads and scalability. To address these issues, Dorri et al.,[7] used smart
home setting to develop lightweight scalable blockchain (LSB) for IoT security and privacy.
Atlam, et al., [17] combined blockchain with IoT to accentuate the challenges and expected
benefits. They concluded that this combination can considerably resulted new business models
and distributed applications because it will allow peer-to-peer messaging, file distribution and
autonomous coordination between devices.
Shouran, et al., [18] looked at the security requirements for smart homes in a smart environment
and services provided over the wireless network. Kshetri [19] agreed that combining blockchain
and IoT will enable IoT devices to carry out autonomous transactions through smart contract and
also produce more significant impact with artificial intelligence and big data solution. Dai et
al.,[10] outlined the issues associated with IoT and opined that integrating blockchain with IoT
will be a perfect solution to inherent problems of IoT. They then proposed blockchain of things
(BCoT) with these merits that blockchain-composite layer encourages interoperability among IoT
systems. Also, cryptographic mechanisms are characteristics of blockchain that enforces data
integrity and each data block in the blockchain has a historic timestamp that enables data
traceability. Kouzinopoulos et al., [20] discovered that integrating blockchain into IoT will give
organizations a verifiable, secured and permanent method of recording data processed by IoT
devices. Hashemi, et al., [21] proposed a BC-based multiple tier IoT architecture that allows data
sharing among devices. It comprised three major components: data management protocol, store
system and message service. Data management provides a platform for the user (data owner, data
requester or source of data), the messaging system increases network scalability using the
publish-subscribe model while stores data private use the Blockchain. Duroc and Tedjini [22]
suggested that radio frequency identification (RFI) could be used to make this possible.
Furthermore, Popescul and Georgescu [23] described a world where every single electronic
device or component would be interconnected and other items or object are all labelled with
information linked to it. Ibarra-Esquer, et al., [24] identified the tags to allow for the possibility
to obtain information in remote and seamlessly contact-less technique. This makes them qualify
to be called nodes in the inter-networked physical world that is homologous or similar to the
Internet and itemized as another type of Internet of Things.
Also, Skarzauskiene and Kalinauskas [25] were of the opinion that the majority of IoT devices
circle around a connected network and this network houses things, objects, and other sensor-
based devices to facilitate communication among one another. Trusted IoT alliance (TIoT) [26]
4. International Journal of Network Security & Its Applications (IJNSA) Vol.13, No.6, November 2021
126
was formed by 17 organizations as a working group to integrate IoT and Blockchain in order to
solve the problems of security, privacy, reliability, heterogeneity, and flexibility inbuilt into IoT
framework [26]. Apart from TIoT many other groups have been formed to look into IoT and
Blockchain integration, such as Hyperledger Project, EthEmbeded, LO3ENERGY, and CoT
(Chain of Things).
3. BLOCKCHAIN AND IOT ISSUES
Table 1: The Major challenges of IoT
Challenge Causes
Security.
[5], [7], [20], [23],
[27]
Changing information from remote devices
Using infected devices
Inability to keep track of all connected devices on the network
IoT devices lack security updates
As connected devices increases, endpoint vulnerability increases
Centralization
[28], [29], [15],
[30]
Identification and authentication of all devices
Connected devices exclusively traverse the internet irrespective of their
distance
Client/Server model – many clients attached to a single server
Transparency [3] Inaccurate and inaccessible data inventories [31]
Unavailability of data confidentiality policy [32]
Interoperability
[8], [33], [34]
IoT devices are connected to actual applications, so standardization is
difficult.
IoT devices framework and the standard does not exist. IoT devices
are proprietary-based, highly heterogeneous as to core communication
protocols, data formats, and technologies
3.1. Blockchain and IoT Security Issues
According to Sezer [27], security is one of the issues stalling IoT devices from been extensively
deployed. Attacks that affect most IoT devices are those that make network resources unavailable
to potential users, interrupt communication between systems, spy and cause intrusion that
compromises personal data, and infect the botnets with the intention of mining the
cryptocurrency of the consumers [12]. One of the major challenges is when numerous computer
systems send voluminous requests for data or information to centralized server, thus causing
denial of service for clients of the intended system. IoT devices that are not secured give cyber-
criminals the opportunity to hack the system and launch distributed denial of service attacks.
Cui et al., [11] said that integrating blockchain into IoT will provide extra security, since
blockchain ledger cannot be controlled or corrupted and there is no interception of single thread
of communication. Blockchain also provides direct payment services in crypto currencies without
any third-party manager; for example, Bitcoin. Therefore, this sovereign security solution makes
it a faultless component for IoT solutions.
Blockchain has more robust level of encryption than IoT as such parties cannot overwrite existing
records on the network [35]. IoT data stored in blockchain will create additional layer in the IoT
security to block cyber-criminals from gaining easy access to the network[36]. Viriyasitavat et
al., [34] opined that encryption and distributed storage of blockchain allow securely recording of
data in IoT machines as such all detailed transactions are carried out without any human
interference. With this the data integrity is preserved and all parties in the supply chain will trust
5. International Journal of Network Security & Its Applications (IJNSA) Vol.13, No.6, November 2021
127
it. Every participant in blockchain technology has a unique identity which is linked to the account
and this ensures that the owner operates the transactions. The encryption on blockchain makes it
difficult to hack or disturb the traditional setup of the chain [30]. Minors monitor all transactions
on the blockchain system, thus maintaining the integrity of the blockchain. For the purpose of
security, any block or transaction added to the blockchain program cannot be edited. Hackers
have been unable to succeed on attacking or threating blockchain, proving that blockchain is
trustworthy, tamper-proof, and resistant to technical failures and malicious attacks [37]. This is
achievable through decentralization
3.2. Blockchain and IoT Centralization Issues
The centralized client-server system is a major problem with IoT systems which makes it
vulnerable to failure. Blockchain tackles this issue by distributing requests to all devices on the
network. Centralization is still one of the hitches experienced by IoT due to the large amounts of
data that network of sensors gathered with possibly low processing speeds [32]. The centralized
server should be authenticated, authorized, and connect numerous users in the network thereby
causing congestion along the line. In order to overcome this, Alam [28] suggested that
organization have to invest huge amount into the centralized server that can accommodate the
massive amount of data or information flow expected within the network. IoT network can
handle transactions across various devices from different organizations, if any attack occurs it
becomes difficult to trace the source of information leakages [15]. Also determining the owners
of the generated data is always difficult.
According to Popescul and Georgescu [23], in IoT technology, a hacker only needs access to the
server with the information in order to add, modify and delete any data. Data in blockchain is
shared among nodes. Distributed system will disseminate accepted legal amendments of new
information among other parties in the network. When processing large requests, the server in
IoT network can breakdown while distributed-ledger is significantly resistant to pressure on the
network because the requests are distributed on the whole network rather than on a particular
node[38]. The failure of the server in IoT network causes failure to the entire network, thus
inconveniencing the parties but the blockchain network has large number of connected devices,
as such failure may not occur unless the capacity of the devices is higher than that of the network.
Ghuli et al.,[39] discovered that the connection with the server in IoT network can be problematic
when the server is located remotely, blockchain network allows the client to choose any path to
follow and disseminate the required information. IoT Server has the duty of storing all data,
receiving request, amending, updating and deleting data and the load might exceed the limit
during peak period [31]. All clients are connected to the server which has limited capacity, finite
resources and traffic in the IoT network. Therefore, scaling vertically up after the limit will
decrease the performance drastically even with increase in hardware and software capabilities.
Blockchain shares its load among several participants. Blockchain allows trusted data to be
pooled and shared directly among participants without intermediaries, thereby eliminating third-
party in the value chain transaction. Mohanta et al., [40] opined that with blockchain’s smart
contract, IoT devices automate payments and transactions across different devices. Blockchain
keeps track of unchangeable historical records of IoT devices and this improves the performance
of IoT devices on the network without centralization. Organizations can store smart contracts in
the blockchain to allow the execution of contractual arrangements among parties provided they
satisfy laydown criteria. For instance, automatic authorization of contract payment without third
party intervention [34]. In blockchain technology, transaction data is distributed across a chain of
multiple devices, and there is no specific managing node. Single point of vulnerability or failure
does not exist, and so data are highly resistant to hacking, theft, and forgery[41]. Failure of a
single node does not affect the functionality of other nodes on the network. Participants are
dependent on blockchains for not relying on a single node throughout the transaction process. As
6. International Journal of Network Security & Its Applications (IJNSA) Vol.13, No.6, November 2021
128
soon as the participants agree on a transaction, the system proffers the information to other
network nodes instead of a single server as the case of traditional transaction systems [39]. Thus,
preventing cyberattacks, theft, and other malicious crimes as the transaction is openly distributed.
Decentralized capability of blockchain eliminates the need for third-party through verification
and validation mechanisms[19]. Blockchain distributed ledger records each transaction in a way
that they are available to all blockchain participants. So, the ledgers are shared publicly, creating
transparency and trust in the whole system. Thus, blockchain technology monitors all transaction
data and almost indecipherable to fraud.
3.3. Blockchain and IoT Transparency Issues
Transparency is one of the capabilities of Blockchain that allows authorized parties to access the
network and track previous transactions. With this, data leakages can easily be identified and
remedial action taken immediately before hackers take advantage of it [17]. The transparent
nature of blockchain records enables authorized parties to track and analyse ongoing network
activities. Organizations generate huge data transactions among multiple networks, immutable
ledger record as a protector tracks data or goods along the nodes in the supply chain [41].
Blockchain secures the data from IoT sensors thereby making blockchain a more useful ledger.
The nodes in blockchain technology are similar to the objects in IoT system, thus making
connected objects more secured and reliable. Blockchain-based IoT systems simplify business
transactions thereby enhancing transparency for better client experience. Ibarra-Esquer et al., [24]
agreed that integrating blockchains into IoT network enables secure distrusted messaging among
devices on a network, so blockchain handles messages in the same way it handles financial
transactions on Bitcoin network. The ability of blockchain to offer smart contract-based networks
(e.g. Ethereum) allows IoT devices to interconnect and trade with one another confidently that
the transaction will be treated according to the predefined rules of engagement. With distributed
ledger capability of blockchain system no one can interfere with blockchain transactions, as such
trust among the stakeholders are eliminated [37]. Blockchain processes large volume of
transactions faster than IoT system and can manage millions of connected devices even when the
number increases [20]. Inbuilt trust in blockchain allows organizations to reduce costs of
processing overheads related to IoT gateways such as communication or hardware overhead [19]
3.4. Blockchain and IoT Interoperability Issues
Interoperability occurs when two or more heterogeneous systems or devices on the networks
communicate with each other to attain a common purpose [33]. IoT systems and devices are
disintegrated and cannot share their data with each other due to lack of communication protocols,
data formats, and technologies [42]. This means that data cannot be switched across
interconnected devices. Many IoT devices are still designed to work on a predefined hardware
configuration, so they hinder effective incorporation of new devices that can attack other
operational issues. According to Amjad et al.,[ 43], IoT devices experience interoperability
challenges when they communicate services to the cloud or combining data or information from
different devices. Interoperability can also be undermined when different devices reuse services
generated by another IoT device [8].With the aid of cross-chain technology, blockchain has the
ability to share information across different systems, devices and networks. Cross-chain
technology focuses on chain interoperability across private networks or between public
blockchains and private networks [42]. Blockchain also uses tools like atomic swaps and multi-
chain protocols to facilitate interoperability.
7. International Journal of Network Security & Its Applications (IJNSA) Vol.13, No.6, November 2021
129
3.5. Stability Strengths of Blockchain
If a block has been approved, it will be difficult to reverse, which means that all registered data
into the blockchain are extremely hard to eliminate or modify [15]. Blockchain technology stores
transaction data where an audit trail is required so as to track every modification and permanently
keep a record on a distributed and public ledger. Blockchain is designed to easily locate and
correct any problem and also creates an irreversible audit trail [36]. Also, distrustful transaction
cannot be hidden. It is no longer necessary to create multiple ledgers for various participants, one
stable ledger is distributed among all participants with least deceitful activities [14].
3.6. Scalability in Blockchain and IoT
IoT device is said to be scalable when it has the ability to agree with the changes within its
environment and future requirements [38] while in blockchain scalability means that the system
has high transaction per second than other systems. It is an important quality of systems with the
capability of handling growing amount of work [44]. In blockchain, scalability means that the
platform supports increasing load of transactions, in addition to the increasing number of nodes
within the network. IoT scalability. Blockchain system is distributed and verification of
transactions in each node is significant. The number of transactions in each node is regulated.
According to Reyna et al., [29], it might take a user several hours to complete a procedure as such
it is impractical to increase the number of active participants due to the transaction speed. The
more participants join the blockchain network, the slower the transaction speed. Blockchains are
as scalable as centralized system, so blockchain completes transaction depending on the
congestion of the network [34]. In order to solve the scalability problem of blockchain,
researchers suggested performing transactions outside the blockchain, and then store and access
information in it. Also, approved networks can be used to solve the problem of scalability in
blockchain technology. Scalability is necessary to achieve success of the IoT[45]. Scalability can
be overwhelmed through efficiency, robustness, and standardization services on the device,.
4. CONCLUSION
In conclusion, blockchain and IoT are new trends in technologies with huge potential, however,
companies are skeptical of adopting them due to technical and security reasons. Though some are
combining them to ascertain the possibility of minimizing the security and other associated
business risks, Blockchain and IoT will continue to develop into globally acceptable standard.
There might be challenges along the line but more businesses are leveraging into blockchain-
based IoT systems.
Finally, blockchain will pave way for a lot of possibilities to implement IoT system. Despite
these few drawbacks, blockchain technology presents some unique benefits though its adoption in
the industry still have a long way.
REFERENCES
[1] L. Atzori, A. Iera, and G. Morabito. "The internet of things: A survey." Computer networks Vol. 54
No.15. 2010 pp. 2787-2805.
[2] F. K. Santoso and N. CH Vun. "Securing IoT for smart home system." In 2015 international
symposium on consumer electronics (ISCE), pp. 1-2. IEEE, June. 2015.
[3] Y. Chang, X. Dong, and W. Sun. "Influence of characteristics of the Internet of Things on consumer
purchase intention." Social Behavior and Personality: an international journal vol. 42, no. 2 March,
2014: pp 321-330.
8. International Journal of Network Security & Its Applications (IJNSA) Vol.13, No.6, November 2021
130
[4] L Sang-Hyun, J. G. Lee and M. Kyung-Il. "Smart home security system using multiple
ANFIS." International Journal of Smart Home vol 7. no.3. May 2013: pp. 121-132.
[5] M. Razzag, H. Gill, S. Ullah, and M. Qureshi. Security Issues in the Internet of Things (IoT): A
Comprehensive Study. International Journal of Advanced Computer Science and Application, vol. 8.
No. 6 2014. pp.383-388
[6] A. Arabo. "Cyber security challenges within the connected home ecosystem futures." Procedia
Computer Science vol. 61 Jan. 2015: pp. 227-232.
[7] A. Dorri, S. S. Kanhere, R.Jurdak, and P.Gauravaram. "Blockchain for IoT security and privacy: The
case study of a smart home." In 2017 IEEE international conference on pervasive computing and
communications workshops (PerCom workshops), March. 2017. pp. 618-623. IEEE.
[8] H. Abdelghaffar and M. Abousteit. "Internet of Things (IoT) Interoperability Success
Criteria." International Journal of Enterprise Information Systems (IJEIS) vol. 17, no. 1 Jan. 2021:
pp. 85-105.
[9] A. S Pradeep, T. W. Yiu, and R. Amor. "Leveraging blockchain technology in a BIM workflow: A
literature review." In International Conference on Smart Infrastructure and Construction 2019
(ICSIC) Driving data-informed decision-making, 2019. pp. 371-380. ICE Publishing.
[10] Y. Dai, D. Xu, K. Zhang, S. Maharjan, and Y. Zhang. "Deep reinforcement learning and
permissioned blockchain for content caching in vehicular edge computing and networks." IEEE
Transactions on Vehicular Technology vol. 69, no. 4. February, 2020: pp. 4312-4324.
[11] P. Cui, U. Guin, A. Skjellum, and D. Umphress. "Blockchain in IoT: current trends, challenges, and
future roadmap." Journal of Hardware and Systems Security vol.3, no. 4. Dec. 2019: pp. 338-364.
[12] A. P. Joshi, M. Han and Y. Wang. "A survey on security and privacy issues of blockchain
technology." Mathematical foundations of computing vol.1, no. 2. 2018. p. 121.
[13] X. Wang, X. Zha, W. Ni, R. P. Liu, Y. J Guo, X Niu, and K Zheng. "Survey on blockchain for
Internet of Things." Computer Communications vol. 136. February, 2019: pp.10-29.
[14] D.Minoli, and B. Occhiogrosso. "Blockchain mechanisms for IoT security." Internet of Things Vol. 1
Sep, 2018: pp. 1-13.doi:10.1016/j.iot.2018.05.002
[15] E. F. Jesus, V. R.L Chicarino, C.V.N De Albuquerque, and A A. de A. Rocha. "A survey of how to
use blockchain to secure internet of things and the stalker attack." Security and Communication
Networks April, 2018.
[16] M. Alamri, N. Z. Jhanjhi, and M. Humayun. "Blockchain for Internet of Things (IoT) research issues
challenges & future directions: A review." Int. J. Comput. Sci. Netw. Secur vol. 19 May, 2019: pp.
244-258.
[17] H. F. Atlam, A.Alenezi, M. O. Alassafi, and G. Wills. "Blockchain with internet of things: Benefits,
challenges, and future directions." International Journal of Intelligent Systems and Applications vol.
10, no. 6. 2018: pp. 40-48.
[18] Z. Shouran, A.Ashari and T.Priyambodo. "Internet of things (IoT) of smart home: privacy and
security." International Journal of Computer Applications vol. 182, no. 39 February, 2019: pp. 3-8.
[19] N. Kshetri, “Can blockchain strengthen the internet of things?" IT professional vol. 19, no. 4 August,
2017: pp. 68-72.
[20] C.S. Kouzinopoulos, G. Spathoulas, K. M. Giannoutakis, K. Votis, P. Pandey, D. Tzovaras, S. K.
Katsikas, A. Collen, and N. A. Nijdam. "Using blockchains to strengthen the security of internet of
things." In International ISCIS Security Workshop, February, 2018pp. 90-100. Springer, Cham.
[21] S. H. Hashemi, F.Faghri, P. Rausch, and R. H. Campbell. "World of empowered IoT users." In 2016
IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI),
2016.pp. 13-24. IEEE,
[22] Duroc, Yvan, and SmailTedjini. "RFID: A key technology for Humanity." ComptesRendus
Physique vol. 19, no. 1-2 Jan, 2018: pp. 64-71.
[23] M. Georgescu, and D, Popescul, Security, privacy and trust in internet of things: A straight
road? International Business Information Management Association, IBIMA. 2015.
[24] J. E. Ibarra-Esquer, F. F. González-Navarro, B. L. Flores-Rios, L. Burtseva, and M A. Astorga-
Vargas. "Tracking the evolution of the internet of things concept across different application
domains." Sensors vol. 17, no. 6 June, 2017: p. 1379.
[25] A. Skaržauskienė, and M. Kalinauskas. "The internet of things: when reality meets
expectations." International Journal of Innovation and Learning 17, no. 2. Jan. 2015: pp. 262-274.
9. International Journal of Network Security & Its Applications (IJNSA) Vol.13, No.6, November 2021
131
[26] V.K. Aggarwal, N. Sharma, Ila Kaushik, and B. Bhushan. "Integration of Blockchain and IoT (B-
IoT): Architecture, Solutions, & Future Research Direction." In IOP Conference Series: Materials
Science and Engineering, vol. 1022, no. 1, 2021.p. 012103. IOP Publishing,
[27] S. Sezer. "T1C: IoT Security: -Threats, Security Challenges and IoT Security Research and
Technology Trends." In 2018 31st IEEE International System-on-Chip Conference (SOCC),
September, 2018. pp. 1-2. IEEE.
[28] T. Alam. "Blockchain and its Role in the Internet of Things (IoT)." International Journal of Scientific
Research in Computer Science, Engineering and Information Technology vol. 5, no. 1. 2019.
[29] A. Reyna, C. Martín, J. Chen, E. Soler, and M. Díaz. "On blockchain and its integration with IoT.
Challenges and opportunities." Future generation computer systems vol. 88 Nov., 2018: pp.173-190.
[30] S. Sahraoui, and A. Bilami. "Compressed and distributed host identity protocol for end-to-end
security in the IoT." In 2014 International Conference on Next Generation Networks and Services
(NGNS), 2014. pp. 295-301. IEEE.
[31] A. Pal, H. K. Rath, S. Shailendra, and A. Bhattacharyya. “IoT standardization: The road ahead.
Internet of Things - technology, applications and standardization.”. 2018.
doi:10.5772/intechopen.75137.
[32] A. Al Sadawi, M. S. Hassan, and M. Ndiaye. "A Survey on the Integration of Blockchain with IoT to
enhance performance and eliminate challenges." IEEE Access vol. 9 April, 2021: pp. 54478-54497.
[33] H. Derhamy, J. Eliasson, and J. Delsing. "IoT interoperability—on-demand and low latency
transparent multiprotocol translator." IEEE Internet of Things Journal vol. 4, no. 5 April, 2017: pp.
1754-1763.
[34] W. Viriyasitavat, T. Anuphaptrirong, and D. Hoonsopon. "When blockchain meets Internet of
Things: Characteristics, challenges, and business opportunities." Journal of industrial information
integration vol. 15 September, 2019: pp. 21-28.
[35] S. Roy, M. Ashaduzzaman, M. Hassan, and A. R. Chowdhury. "Blockchain for IoT security and
management: Current prospects, challenges and future directions." In 2018 5th International
Conference on Networking, Systems and Security (NSysS), December, 2018: pp. 1-9. IEEE.
[36] U. Tariq, A. Ibrahim, T. Ahmad, Y. Bouteraa, and A. Elmogy. "Blockchain in internet-of-things: a
necessity framework for security, reliability, transparency, immutability and liability." IET
Communications vol. 13, no. 19. December, 2019: pp. 3187-3192.
[37] Y. Yu, Y. Li, J. Tian, and J. Liu. "Blockchain-based solutions to security and privacy issues in the
internet of things." IEEE Wireless Communications vol.25, no. 6 Dec. 2018: pp.12-18.
[38] S. Arif, M. A Khan, S U Rehman, M A Kabir, and M Imran. "Investigating smart home security: Is
blockchain the answer?" IEEE Access vol. 8 June, 2020: pp. 117802-117816.
[39] P. Ghuli, U P Kumar, and R Shettar. "A review on blockchain application for decentralized decision
of ownership of IoT devices." Advances in Computational Sciences and Technology 10, no. 8. 2017:
pp. 2449-2456.
[40] B.K. Mohanta, S S. Panda, and D. Jena. "An overview of smart contract and use cases in blockchain
technology." In 2018 9th International Conference on Computing, Communication and Networking
Technologies (ICCCNT), July, 2018.pp. 1-4. IEEE,
[41] Y. Lee, S. Rathore, J H Park, and J H Park. "A blockchain-based smart home gateway architecture for
preventing data forgery." Human-centric Computing and Information Sciences vol. 10, no. 1 Dec.,
2020: pp. 1-14.
[42] M. Noura, M.Atiquzzaman, and M Gaedke,. Interoperability in Internet of Things: Taxonomies and
Open Challenges. Mobile Network Application vol.24, 2019: pp.796–809
https://doi.org/10.1007/s11036-018-1089-9
[43] A.Amjad, F. Azam, M. W Anwar, and W H Butt. "A Systematic Review on the Data Interoperability
of Application Layer Protocols in Industrial IoT." July, 2021. IEEE Access
[44] A. Gupta, R. Christie, and P. R. Manjula. "Scalability in internet of things: features, techniques and
research challenges." Int. J. Comput. Intell. Res 13, no. 7. 2017: pp.1617-1627.
[45] S. Li, L D Xu, and S. Zhao. "The internet of things: a survey." Information Systems Frontiers vol.17,
no. 2 April, 2015: pp. 243-259.
10. International Journal of Network Security & Its Applications (IJNSA) Vol.13, No.6, November 2021
132
AUTHORS
Adanma Cecilia Eberendu is a Senior Lecturer at Madonna University, Nigeria. She
received the Ph.D. degree in Software Project Management and her research area is
focused on software vulnerability. She has published many articles on software projects
management and software vulnerability. She teaches courses in of Software Engineering,
Cyber Security and Forensics. She is the corresponding author of this article and can be
reached on aceberendu@gmail.com
Titus Ifeanyi Chinebu received the B.Sc.Ed degree in Education/Mathematics, M.Sc.
and Ph.D. degrees in Mathematical Modeling from the Department of Mathematics,
University of Nigeria Nsukka. From 2013 to 2020 he was a lecturer with the Madonna
University Nigeria, Elele Rivers State. He is currently a lecturer in the Department of
Applied Sciences, Federal College of Dental Technology and Therapy, Trans Ekulu,
Enugu. His research includes Epidemiological Modeling, Biomathematics,
Computational Mathematics, Computer/Mobile Malware Model and Financial Mathematics. He has over
18 publications