Abstract
The world is moving along with the technical advancement where smart home and smart cities are creating smart lifestyle and Internet of things (IoT) is being one of the most popular technologies in this decade.Ā IoT is making life better by connecting devices and producing billions of data. But for the heterogeneous connectivity, smaller size, memory, storage and less security measurement, it is easy to hack and manipulate the IoT devices. To have a safe and secured connection, it is a must to ensure the data security in IoT too.Ā This research proposes a novel method to secure the IoT devices using blockchain technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zaslavsky A, Jayaraman PP (2015) Discovery in the internet of things. Ubiquity 1ā10. https://doi.org/10.1145/2822529
HP Study Finds Alarming Vulnerabilities with Internet of Things (IoT) Home Security Systems. https://www8.hp.com/us/en/hp-news/press-release.html?id=1909050. Last accessed 11 Dec 2018
Khan MA, Salah K (2017)IoT security: Review, blockchain solutions, and open challenges. Fut Gener Comput Syst 395ā411. https://doi.org/10.1016/j.future.2017.11.022
Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. J Network Comput Appl 8:10ā28. https://doi.org/10.1016/j.jnca.2017.04.002
Granjal J, Monteiro E, Sa Silva J (2015) Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues. IEEE Commun Surv Tutor 17(3):1294ā1312. https://doi.org/10.1109/comst.2015.238855
Roman R, Alcaraz C, Lopez J, Sklavos N (2011) Key management systems for sensor networks in the context of the internet of things. Mod Trends Appl Secur Architect Implement Appl 37(2):147ā159
Granjal J, Silva R, Monteiro E, Silva JS, Boavida F (2008) Why is IPSec a viable option for wireless sensor networks. In: 2008 5th IEEE international conference on mobile ad hoc and sensor systems, pp 802ā807. https://doi.org/10.1109/MAHSS.2008.4660130
Cirani S, Ferrari G, Veltri L (2013) Enforcing security mechanisms in the IP-based internet of things: an algorithmic overview. Algorithms 6(2):197ā226. https://doi.org/10.3390/a6020197
Sicari S, Rizzardi A, Grieco L, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76(Suppl. C):146ā164. https://doi.org/10.1016/j.comnet.2014.11.008
Zhang Z-K, Cho MCY, Wang C-W, Hsu C-W, Chen C-K, Shieh S (2014) IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th international conference on service-oriented computing and applications. https://doi.org/10.1109/soca.2014.58
Huh S, Cho S, Kim S (2017) Managing IoT devices using blockchain platform. In:2017 19th international conference on advanced communication technology (ICACT). https://doi.org/10.23919/icact.2017.7890132
Kosba A, Miller A, Shi E, Wen Z, Papamanthou C (2016) Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE symposium on security and privacy (SP). https://doi.org/10.1109/sp.2016.55
Azaria A, Ekblaw A, Vieira T, Lippman A (2016) MedRec: using blockchain for medical data access and permission management. In: 2016 2nd international conference on open and big sata (OBD). https://doi.org/10.1109/obd.2016.11
Biswas K., Muthukkumarasamy V (2016) Securing smart cities using blockchain technology. In:2016 IEEE 18th international conference on high performance computing and communications. https://doi.org/10.1109/hpcc-smartcity-dss.2016.0198
Kshetri N (2017) Can blockchain strengthen the internet of things? IT Profess 19(4):68ā72. https://doi.org/10.1109/mitp.2017.3051335
Kiayias A, Russell A David B, Oliynykov R (2017) Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Lecture notes in computer science, pp 357ā388. https://doi.org/10.1007/978-3-319-63688-7-12
Pass R, Seeman L, Shelat A (2017) Analysis of the blockchain protocol in Asyn-chronous networks. Adv Cryptol ( EUROCRYPT) 2017:643ā673. https://doi.org/10.1007/978-3-319-56614-6-22
Puthal D, Malik N, Mohanty SP, Kougianos E, Yang C (2018) The bockchain as a decentralized security framework [future directions]. IEEE Consum Electron Mag 7(2):18ā21. https://doi.org/10.1109/mce.2017.2776459
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Oyshi, M.T., Bonny, M.Z., Saha, S., Tumpa, Z.N. (2021). IoT Security Issues and Possible Solution Using Blockchain Technology. In: Tripathy, A., Sarkar, M., Sahoo, J., Li, KC., Chinara, S. (eds) Advances in Distributed Computing and Machine Learning. Lecture Notes in Networks and Systems, vol 127. Springer, Singapore. https://doi.org/10.1007/978-981-15-4218-3_12
Download citation
DOI: https://doi.org/10.1007/978-981-15-4218-3_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4217-6
Online ISBN: 978-981-15-4218-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)