skip to main content
10.1145/3590837.3590899acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimmiConference Proceedingsconference-collections
research-article

Evaluation of the Effectiveness of a Secure Blockchain Framework for IoT-Based Data Transmission

Published: 30 May 2023 Publication History

Abstract

The rise of the internet of things has revolutionized the way people work and live. It has also created a vast amount of data that can be collected and stored by various devices. Unfortunately, the centralization of this data has raised concerns about its security. With the help of blockchain technology, a secure and decentralized method of transmission can be established. The concept of blockchain technology is a globally distributed ledger that records and transactions using cryptography. Due to the rapid technological development taking place in the field, it is now considered a key component of Web 3.0. It allows applications to run on a secure and stable basis. In terms of tech terms, data stored on a blockchain is immutable. Various sectors where blockchain shows comprehensive success like e-learning Banking & Finance Online shopping. Reason for success of blockchain. These innovations have the potential to transform our daily lives. The Internet of Things is a vast network that collects and transmits vast data. This data is often sensitive and non-critical, raising questions about its ownership and protection of it. The goal of this paper is to explore the potential of blockchain technologies to address the security challenges of the Internet of Things (IoT). It will first introduce the concept of the secure blockchain framework and its various features. The paper will then introduce the framework for implementing secure and decentralized transmission of IoT data. It will discuss the various features of this technology and its selection of appropriate cryptographic methods and consensus algorithms. It will be subjected to a series of tests to evaluate its performance and security. The findings of the tests will be discussed and analyzed, and recommendations for future developments will be provided. The paper also concludes by summarizing the results. The paper will provide an evaluation of the various aspects of secure blockchain technology for the transmission of data from the Internet of Things. It will also explore its potential to improve the security of the networks that are connected to it.

References

[1]
D. Liao, H. Li, W. Wang, X. Wang, M. Zhang, and X. Chen, “Achieving IoT data security based blockchain,” Peerto-Peer Netw. Appl., vol. 14, no. 5, pp. 2694–2707, 2021.
[2]
E. Nehme, R. El Sibai, J. Bou Abdo, A. R. Taylor, and J. Demerjian, “Converged AI, IoT, and blockchain technologies: a conceptual ethics framework,” AI Ethics, vol. 2, no. 1, pp. 129–143, 2022.
[3]
I. Al-Barazanchi, “Blockchain-Technology-Based Solutions for IOT Security,” Iraqi J. Comput. Sci. Math., vol. 3, no. 1, pp. 53–63, 2022.
[4]
10.52866/ijcsm.2022.01.01.006.
[5]
A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “LSB : A Lightweight Scalable Blockchain for IoT security and anonymity,” J. Parallel Distrib. Comput., vol. 134, pp. 180–197, 2019.
[6]
U. Narayanan, V. Paul, and S. Joseph, “Decentralized blockchain-based authentication for secure data sharing in Cloud-IoT: DeBlock-Sec,” J. Ambient Intell. Humaniz.Comput., vol. 13, no. 2, pp. 769–787, 2022.
[7]
R. Kaur and A. Ali, “Performance evaluation of secure blockchain framework for IoT based data communication,” Int. J. Syst. Assur. Eng. Manag., 2021.
[8]
B. Mbarek, N. Jabeur, T. Pitner, and A. U. H. Yasar, “MBS: Multilevel Blockchain System for IoT,” Pers.
[9]
Ubiquitous Comput., vol. 25, no. 1, pp. 247–254, 2021.
[10]
J. Song, J. Nang, and J. Jang, “Design of anomaly detection and visualization tool for IoT blockchain,” Proc. - 2018 Int. Conf. Comput. Sci. Comput. Intell. CSCI 2018, pp. 1464–1465, 2018.
[11]
M. A. Khan and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,” Futur. Gener.Comput. Syst., vol. 82, pp. 395–411, 2018.
[12]
U. Khalid, M. Asim, T. Baker, P. C. K. Hung, M. A. Tariq, and L. Rafferty, “A decentralized lightweight blockchain-based authentication mechanism for IoT systems,” Cluster Comput., vol. 23, no. 3, pp. 2067–2087, 2020.
[13]
H. T. T. Truong, M. Almeida, G. Karame, and C. Soriente, “Towards secure and decentralized sharing of IoT data,” Proc. - 2019 2nd IEEE Int. Conf. Blockchain, Blockchain 2019, pp. 176–183, 2019.
[14]
O. Alfandi, S. Khanji, L. Ahmad, and A. Khattak, “A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues,” Cluster Comput., vol. 24, no. 1, pp. 37–55, 2021.
[15]
A. Deshmukh, N. Sreenath, A. K. Tyagi, and U. V. E. Abhichandan, “Blockchain Enabled Cyber Security: A Comprehensive Survey,” 2022 Int. Conf. Comput. Commun. Informatics, ICCCI 2022, 2022.
[16]
A. Ayub Khan, A. A. Laghari, Z. A. Shaikh, Z. DackoPikiewicz, and S. Kot, “Internet of Things (IoT) Security
[17]
With Blockchain Technology: A State-of-the-Art Review,” IEEE Access, vol. 10, no. November, pp. 122679–122695, 2022.
[18]
P. Patil, M. Sangeetha, and V. Bhaskar, “Blockchain for IoT Access Control, Security and Privacy: A Review,” Wirel. Pers. Commun., vol. 117, no. 3, pp. 1815–1834, 2021.
[19]
A. A. Alfa, J. K. Alhassan, O. M. Olaniyi, and M. Olalere, “Blockchain technology in IoT systems: current trends, methodology, problems, applications, and future directions,” J. Reliab. Intell. Environ., vol. 7, no. 2, pp. 115– 143, 2021.
[20]
A. Attkan and V. Ranga, “Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security,” Complex Intell Syst., vol. 8, no. 4, pp. 3559–3591, 2022.
[21]
L. Tseng, X. Yao, S. Otoum, M. Aloqaily, and Y. Jararweh, “Blockchain-based database in an IoT environment: challenges, opportunities, and analysis,” Cluster Comput., vol. 23, no. 3, pp. 2151–2165, 2020.
[22]
A. Thakkar and R. Lohiya, A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions, vol. 55, no. 1. Springer Netherlands, 2022.
[23]
D. Minoli and B. Occhiogrosso, “Blockchain mechanisms for IoT security,” Internet of Things (Netherlands), vol. 1–2, pp. 1–13, 2018.
[24]
10.1016/j.iot.2018.05.002.
[25]
G. Rathee, M. Balasaraswathi, K. P. Chandran, S. D. Gupta, and C. S. Boopathi, “A secure IoT sensors communication in industry 4.0 using blockchain technology,” J. Ambient Intell. Humaniz. Comput., vol. 12, no. 1, pp. 533–545, 2021.
[26]
C. Industry, “Blockchain — Internet of Things Applications: Opportunities,” 2023.
[27]
N. Adhikari and M. Ramkumar, “IoT and Blockchain Integration: Applications, Opportunities, and Challenges,” Network, vol. 3, no. 1, pp. 115–141, 2023.
[28]
[24] T. Ye, M. Luo, Y. Yang, K. R. Choo, and D. He, “A Survey on Redactable Blockchain: Challenges and Opportunities,” IEEE Trans. Netw. Sci. Eng., pp. 1–15, 2022.
[29]
[Figure 1] Blockchain and IoT (src- google image)
[30]
[Figure 2] Blockchain with IoT on distributed data (src- google image)
[31]
[Figure 3] Five-layers IoT architecture (src – kitrum)

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIMMI '22: Proceedings of the 4th International Conference on Information Management & Machine Intelligence
December 2022
749 pages
ISBN:9781450399937
DOI:10.1145/3590837
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 30 May 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Data Transmission, Decentralization
  2. Keywords – Blockchain, Internet of Things, Security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIMMI 2022

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 44
    Total Downloads
  • Downloads (Last 12 months)23
  • Downloads (Last 6 weeks)2
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media