Integrating Blockchain with IoT: A Survey of Security Techniques and Future Directions

Year : 2024 | Volume : | : | Page : –
By

Salunke Gauri Dattatraj,

Bhushan M. Borhade,

Salunkhe Sakshi Sandip,

Sankalp Yogesh Ashok,

Deshmukh Suyash Dilip,

  1. Assistant Professor, Shri Chhatrapati Shivajiraje College of Engineering, Maharashtra, India
  2. Student, Shri Chhatrapati Shivajiraje College of Engineering, Maharashtra, India
  3. Student, Shri Chhatrapati Shivajiraje College of Engineering, Maharashtra, India
  4. Student, Shri Chhatrapati Shivajiraje College of Engineering, Maharashtra, India
  5. Student, Shri Chhatrapati Shivajiraje College of Engineering, Maharashtra, India

Abstract

Data is a resource that is more crucial than ever for each company that comes to mind. The ability to swiftly and efficiently collect data anywhere is made possible by current breakthroughs and trends such as cloud computing, IoT, data analytics, and others. One of those concerns is the need to strike a balance between privacy and the use of data for security in applications such as IOT, counterterrorism, and health, food, and water security. Another factor is the growth in privacy worries about data use. Cybercrime has a greater impact on casualties in the modern world. Since the internet is open, it is incredibly easy to target and obtain information or financial data from anyone, public or private organisation, etc. Because the cyber world is so open, it is very easy to target and obtain information or financial data from anyone, public or private organisations, etc. Additionally, because the web is open, it is very easy to obtain information through an unsecured channel. As a result, advanced security measures are needed to prevent cybercrime and ensure that wrongdoing information is not compromised. One of the most important and remarkable methods to protect information from cybercriminals is information assurance. In this study, a novel block chain-based cryptography method for combating cybercrime is discussed.

Keywords: IoT, Blockchain, cybercrime, cryptography, CPS, PDP, Dam surveillance, CSS, AES

How to cite this article: Salunke Gauri Dattatraj, Bhushan M. Borhade, Salunkhe Sakshi Sandip, Sankalp Yogesh Ashok, Deshmukh Suyash Dilip. Integrating Blockchain with IoT: A Survey of Security Techniques and Future Directions. Recent Trends in Electronics Communication Systems. 2024; ():-.
How to cite this URL: Salunke Gauri Dattatraj, Bhushan M. Borhade, Salunkhe Sakshi Sandip, Sankalp Yogesh Ashok, Deshmukh Suyash Dilip. Integrating Blockchain with IoT: A Survey of Security Techniques and Future Directions. Recent Trends in Electronics Communication Systems. 2024; ():-. Available from: https://journals.stmjournals.com/rtecs/article=2024/view=166970



References

] K. Kshetri, Can Blockchain Strengthen the Internet of Things?, IT Professional, vol. 19, no. 4, pp. 68-72, 2017. [2] K. Christidis, and M. Devetsikiotis, Blockchain and Smart Contracts for the Internet of Thing, IEEE Access, vol. 4, pp. 2292-2303, 2016. [3] Y. Liu, J. E. Fieldsend and G. Min, “A Framework of Fog Computing: Architecture, Challenges, and Optimization,” in IEEE Access, vol. 5, pp. 25445-25454, 2017. [4] M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, “The Case for VM-Based Cloudlets in Mobile Computing,” IEEE Pervasive Computing, vol. 8, no. 4, pp. 14–23, Oct. 2009. [5] P. K. Sharma, M. Y. Chen and J. H. Park, “A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT,” in IEEE Access, vol. 6, pp. 115-124, 2018. [6] C. Mouradian, D. Naboulsi, S. Yangui, R. H. Glitho, M. J. Morrow and P. A. Polakos, “A Comprehensive Survey on Fog Computing: State-of-the-art and Research Challenges,” in IEEE Communications Surveys & Tutorials, vol. PP, no. 99, pp. 1-1., 2017 [7] A. M. M. Ali, N. M. Ahmad and A. H. M. Amin, “Cloudlet-based cyber foraging framework for distributed video surveillance provisioning,” 2014 4th World Congress on Information and Communication Technologies (WICT 2014), Bandar Hilir, pp. 199- 204, 2014. [8] A. H. M. Amin, N. M. Ahmad and A. M. M. Ali, “Decentralized face recognition scheme for distributed video surveillance in IoT-cloud infrastructure,” 2016 IEEE Region 10 Symposium (TENSYMP), Bali, pp. 119-124, 2016. [9] N. Powers et al., “The Cloudlet Accelerator: Bringing Mobile-Cloud Face Recognition into Real-Time,” 2015 IEEE Globecom Workshops (GC Wkshps), San Diego, CA, pp. 1-7, 2015. [10] Y. Shi, S. Abhilash and K. Hwang, “Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks,” 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, San Francisco, CA, pp. 109-118, 2015. [11] H. Zhijun, R. E. De Grande and A. Boukerche, “Towards efficient data access in mobile cloud computing using pre-fetching and caching,” 2017 IEEE International Conference on Communications (ICC), Paris, pp. 1-6, 2017. [12] C. Colin, J. Abdulai, K. Apietu, K. Adu-Manu, “Resilient Framework for Distributed Computation Offloading: Overview, Challenges and Issues,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 11, 2017 [13] S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani and R. Buyya, “CloudBased Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges,” in IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 337-368, First Quarter 2014. [14] S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, Internet: https://bitcoin.org/bitcoin.pdf, [March 1, 2018] [15] G. Zyskind, O. Nathan, and A. S. Pentland, Decentralizing Privacy: Using Blockchain to Protect Personal Data, IEEE Security and Privacy Workshops, pp. 180-184, 2015. [16] H. Okada, S. Yamasaki, and V. Bracamonte, Proposed Classification of Blockchains based on Authority and Incentive Dimensions, Int. Conf. on Advanced Comm. Tech., pp. 593-597, 2017. [17] Ethereum Homestead, What is Ethereum?, Internet: http://www.ethdocs.org/en/latest/introduction/what-is-ethereum.html, 2016, [March 2, 2018]. [18] N. Szabo, Smart Contracts: Building Blocks for Digital Markets, Internet: http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDRO M/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contrac ts_2.html, 1996, [March 2, 2018] [19] Smart Contracts Alliance, Smart Contracts: 12 Use Cases for Business & Beyond, Internet: https://bloq.com/assets/smart-contracts-whitepaper.pdf, 2016, [March 2, 2018] [20] C. Allen, The Path to Self-Sovereign Identity, Internet: https://www.coindesk.com/path-self-sovereign-identity/, Apr 27, 2016, [March 11, 2018]. [21] M. Niforos, V. Ramachandran, and T. Rehermann, Block Chain: Opportunities for Private Enterprises in Emerging Market, International Finance Corporation, 2017. [22] A. Bahga, and V. K. Madisetti, Blockchain platform for industrial Internet of Things, Journal of Software Engineering and Applications, vol. 9, no. 10, pp. 533, 2016. [23] Slock.it, Rent, Sell, or Share Anything, Internet: https://slock.it/, 2015, [March 10, 2018] [24] HYPR Corp, Bitcoin Biometrics & Blockchain Security, Internet: https://www.hypr.com/biometric-bitcoin-blockchain/, [March 9, 2018] [25] M. Ruubel, Guardtime Announces BLT, New Blockchain Standard for Digital Identity, Internet: https://guardtime.com/blog/blt-newblockchain-standard-for-digital-identity, May 21, 2015, [March 1, 2018]. [26] T. Ahonen, A. Hadid, and M. Pietik¨ainen, “Face Recognition with Local Binary Patterns,” in Computer vision-eccv 2004. Springer, 2004, pp. 469–481. [27] R. Lienhart and J. Maydt, “An Extended Set of Haar-like Features for Rapid Object Detection,” in Image Processing. 2002. Proceedings. 2002 International Conference on, vol. 1. IEEE, 2002, pp. I–900. [28] C. P. Papageorgiou, M. Oren, and T. Poggio, “A General Framework for Object Detection,” in Computer vision, 1998. sixth international conference on. IEEE, 1998, pp. 555–562. [29] P. Jones, P. Viola, and M. Jones, “Rapid Object Detection using a Boosted Cascade of Simple Features,” in University of Rochester. Charles Rich. Citeseer, 2001. [30] G. Bradski, “OpenCV library,” Dr. Dobb’s Journal of Software Tools, 2000


Ahead of Print Subscription Review Article
Volume
Received May 27, 2024
Accepted July 17, 2024
Published August 14, 2024

Check Our other Platform for Workshops in the field of AI, Biotechnology & Nanotechnology.
Check Out Platform for Webinars in the field of AI, Biotech. & Nanotech.