Open Access
Subscription Access
Block chain Technology for IoT Security and Privacy:“The discourse Analysis of a Sensible Home”
Internet of Things (IoT) security and protection re-principle a remarkable check, primarily as a result of the big scale and disseminated nature of IoT systems. Blockchain-based methodologies provide decentralised security and protection, nevertheless they embrace crucial vitality, delay, and procedure overhead that won't affordable for many quality duty-bound IoT gadgets. In our past work, we have a tendency to exhibited a light-weight mental representation of a blockchain particularly designed to be used in IoT by confiscating the Proof of labor (POW) and therefore the plan of coins. Our methodology was exemplified in an exceedingly sensible home setting and contains of 3 elementary levels to be specific: distributed storage, overlay, and keen home. during this paper we have a tendency to dig more and layout the various center components and components of the savvy home level. every savvy house is equipped a perpetually on the net, high quality contrivance, called "mineworker" that's answerable of taking care of all correspondence within and out of doors to the house. The excavator to boot protects a non-public and secure blockchain, used for dominant and reviewing correspondences. we have a tendency to exhibit that our planned BC-based splendid home structure is secure by through and thru gazing its security with relation to the basic security goals of mystery, trait, and availableness. Finally, we have a tendency to gift reenactment results to focus on that the overheads (with relation to traffic, handling time and essentiality usage) displayed by our framework square measure moot in relevancy its security and assurance gains.
User
Font Size
Information
- Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in web of things: The road ahead,” pc Networks, vol. 76, pp. 146–164, 2015.
- Roman, J. Zhou, and J. Lopez, “On the options and challenges of security and privacy in distributed web of things,” pc Networks, vol. 57, no. 10, pp. 2266–2279, 2013.
- Chakravorty, T. Wlodarczyk, and C. Rong, “Privacy conserving information analytics for good homes,” in Security and Privacy Workshops (SPW), 2013 IEEE. IEEE, 2013, pp. 23–27.
- Nakamoto, “Bitcoin: A peer-to-peer electronic money system,” 2008.
- King, “Primecoin: Cryptocurrency with prime proof-of-work,” July 7th, 2013.
- Dorri, S. S. Kanhere, and R. Jurdak, “Blockchain in web of things: Challenges and solutions,” arXiv preprint arXiv:1608.05187, 2016.
- Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and cryptocurrency technologies. university Pres, 2016.
- Bogdanov, M. Knezˇevic´, G. Leander, D. Toz, K. Varıcı, and I. Ver- bauwhede, spongent: a light-weight Hash operate. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 312–325. F.-S. sense, https://sense.f-secure.com/, [Online; accessed 19-November- 2016].
- Delfs, H. Knebl, and H. Knebl, Introduction to cryptography. Springer, 2002, vol. 2.
- Komninos, E. Philippou, and A. Pitsillides, “Survey in good grid and good home security: problems, challenges and countermeasures,” IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1933–1954, 2014.
- wired,https://www.wired.com/2016/10/internet-outage-ddos-dns-dyn/, [Online; accessed 10-December-2016].
- Cooja,http://anrg.usc.edu/contiki/index.php/CoojaSimulator/, [Online; accessed 19-November-2016].
- Notra, M. Siddiqi, H. H. Gharakheili, V. Sivaraman, and R. Boreli,
Abstract Views: 291
PDF Views: 0