Abstract
Over the last few years, IoT progressed exponentially in field of automation by providing M2M communication. With increase in popularity of IoT, number of devices connected to the internet has also increased. These devices share confidential information and are vulnerable to attacks. However, securing the IoT is challenging because of its resource-constrained and heterogeneous environment. This paper discusses about the challenges and implementation of blockchain technology in IoT which can withstand cybercrime and network flaws.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Marr, B.: The 4rth industrial revolution is here are you ready. https://www.forbes.com/sites/bernardmarr/2018/08/13/the-4th-industrial-revolution-is-here-are-you-ready/#2ba2805a628b
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013). https://doi.org/10.1016/j.future.2013.01.010
Gartner says 6.4 billion connected things will be in use in 2016, up 30 percent from 2015. https://www.gartner.com/newsroom/id/3165317
Chakraborty, S., Jaychandran, P.: Blockchain Architecture and design and usecase. https://onlinecourses.nptel.ac.in/noc18_cs47/preview
Marr, B.: A very brief history of blockchain technology everyone should read. https://www.forbes.com/sites/bernardmarr/2018/02/16/a-very-brief-history-of-blockchain-technology-everyone-should-read/#2f06b38c7bc4
Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)
Khan, M.A., Salah, K.: IoT security: review, block chain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2017)
Sehgal, A., Perelman, V., Kuryla, S., Schönwälder, J.: Management of resource constrained devices in the internet of things. Commun. Mag. IEEE 50(12), 144–149 (2012)
Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., Schönwälder, J.: Using the RPL protocol for supporting passive monitoring in the internet of things. In: NOMS 2016 – 2016 IEEE/IFIP Network Operations and Management Symposium, pp. 366–374 (2016)
Abdmeziem, M.R., Tandjaoui, D.: An end-to-end secure key management protocol for e-health applications. Comput. Electr. Eng. 44, 184–197 (2015)
Chakrabarty, S., Engels, D.W.: A secure IoT architecture for smart cities. In: 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC) (2016)
Zhang, Y., Wen, J.: An IoT electric business model based on the protocol of bitcoin. In: ICIN. IEEE, pp. 184–191 (2015)
Lunardi, R.C., Michelin, R.A., Neu, C.V., Zorzo, A.F.: Distributed access control on IoT ledger-based architecture. In: IEEE/IFIP Network Operations and Management Symposium: Cognitive Management in a Cyber World, NOMS, pp. 1–7 (2018)
Banerjee, M., Lee, J., Raymond Choo, K.-K.: A blockchain future for internet of things security: a position paper. Dig. Comm. Netw. 4(3), 149–160 (2018). https://doi.org/10.1016/j.dcan.2017.10.006
Wazid, M., Kumar Das, A., Kumar, N., Vasilakos, A.V.: Design of secure key management and user authentication scheme for fog computing services. Future Gener. Comput. Syst. 91, 475–492 (2019). https://doi.org/10.1016/j.future.2018.09.017
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Deepthi, S., Apoorva (2023). Securing IoT Using Blockchain. In: Prabhu, S., Pokhrel, S.R., Li, G. (eds) Applications and Techniques in Information Security . ATIS 2022. Communications in Computer and Information Science, vol 1804. Springer, Singapore. https://doi.org/10.1007/978-981-99-2264-2_21
Download citation
DOI: https://doi.org/10.1007/978-981-99-2264-2_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-2263-5
Online ISBN: 978-981-99-2264-2
eBook Packages: Computer ScienceComputer Science (R0)