Intelligent IoT Communication System Based on Block Chain
Keywords:
phenomenon facilitates, bypassed, firewall systemAbstract
The Internet of Things (IoT) is a sophisticated form of networking that uses unique identifiers for each device. IoT integrates various technologies such as hand-held digital devices, industrial machinery, animals (or) people, or any physical-digital entities to work together to achieve the application's purpose. However, there are several security concerns. Among them are denial-of-service (DoS) attacks, data theft (or) data breaches, and botnet attacks, in which several systems take control of the victim's system to extract the victim's confidential data. Unsecured devices are the primary security concern in edge computing and IoT frameworks because they are used to increase network coverage. There are also devices within an IoT that can migrate from one network to another, posing a serious security risk. The conventional IoT network now considers the concept of zero trust, which is a mechanism for safeguarding the internet infrastructure and the IT system. It also implies that it allows any device to join a network or access resources within a network, assuming they are also authorized. As a result, once a firewall system in an IoT has been bypassed, it is easy for attackers to function concurrently with the normal node and could be difficult because there are numerous IoT devices, most of which are highly vulnerable and unsecured. This phenomenon facilitates an adversary's use of the gateway system in an IoT environment.
References
Alam T, Benaida M. CICS: Cloud–Internet Communication Security Framework for the Internet of Smart Devices. International Journal of Interactive Mobile Technologies (iJIM). 2018 Nov 1;12(6):74-84. DOI: https://doi.org/10.3991/ijim.v12i6.6776
Alam T, Benaida M. The Role of Cloud-MANET Framework in the Internet of Things (IoT). International Journal of Online Engineering (iJOE). 2018;14(12):97-111. DOI: https://doi.org/10.3991/ijoe.v14i12.8338
Alam, Tanweer, Arun Pratap Srivastava, Sandeep Gupta, and Raj Gaurang Tiwari. "Scanning the Node Using Modified Column Mobility Model." Computer Vision and Information Technology: Advances and Applications 455 (2010).
Alam, Tanweer. (2018) "A reliable framework for communication in internet of smart devices using IEEE 802.15.4." ARPN Journal of Engineering and Applied Sciences 13(10), 3378- 3387
Alphand, Olivier, et al. "IoTChain: A blockchain security architecture for the Internet of Things." Wireless Communications and Networking Conference (WCNC), 2018 IEEE. IEEE, 2018.
Gubbi, Jayavardhana, et al. "Internet of Things (IoT): A vision, architectural elements, and future directions." Future generation computer systems 29.7 (2013): 1645-1660. DOI: https://doi.org/10.1016/j.future.2013.01.010
Haber, Stuart, and W. Scott Stornetta. "How to time-stamp a digital document." Conference on the Theory and Application of Cryptography. Springer, Berlin, Heidelberg, 1990.
Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system." (2008).
Reyna, Ana, et al. "On Blockchain and its integration with IoT. Challenges and opportunities." Future Generation Computer Systems (2018). DOI: https://doi.org/10.1016/j.future.2018.05.046
Zheng, Zibin, et al. "Blockchain challenges and opportunities: A survey." International Journal of Web and Grid Services 14.4 (2018): 352-375. DOI: https://doi.org/10.1504/IJWGS.2018.095647
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.