100% found this document useful (2 votes)
889 views8 pages

Blockchain A Game Changer For Securing IoT Data

Blockchain technology has emerged as a possible solution for creating more secure IoT systems. Blockchain allows for a decentralized, transparent and secure system by removing central servers, providing transparency, and encrypting all data. The paper proposes using blockchain for IoT security by having nodes maintain a distributed ledger of all transactions, ensuring data integrity and preventing unauthorized access or tampering of data. This could help address current security issues with IoT by strengthening security and eliminating vulnerabilities.

Uploaded by

Rakshi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
889 views8 pages

Blockchain A Game Changer For Securing IoT Data

Blockchain technology has emerged as a possible solution for creating more secure IoT systems. Blockchain allows for a decentralized, transparent and secure system by removing central servers, providing transparency, and encrypting all data. The paper proposes using blockchain for IoT security by having nodes maintain a distributed ledger of all transactions, ensuring data integrity and preventing unauthorized access or tampering of data. This could help address current security issues with IoT by strengthening security and eliminating vulnerabilities.

Uploaded by

Rakshi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Block chain: A Game Changer for Securing IoT Data

ABSTRACT:
Internet of Things (IoT) is now in its initial stage but very soon, it
is going to influence almost every day-to-day items we use. The more it
will be included in our lifestyle, more will be the threat of it being
misused. There is an urgent need to make IoT devices secure from
getting cracked. Very soon IoT is going to expand the area for the cyber-
attacks on homes and businesses by transforming objects that were used
to be offline into online systems. Existing security technologies are just
not enough to deal with this problem. Blockchain has emerged as the
possible solution for creating more secure IoT systems in the time to
come. In this paper, first an overview of the blockchain technology and
its implementation has been explained; then we have discussed the
infrastructure of IoT which is based on Blockchain network and at last a
model has been provided for the security of internet of things using
blockchain.

ARCHITECTURE:
EXISTING SYSTEM:
Blockchain technology is now getting too much of attention from
software scientists since it has been cre- ated. Fig 1 shows the basic
pillars of blockchain technology in internet world. Actually, it has the
ability to revolutionize and optimize the global infrastructure of the
technologies connected with each other through internet. It has mainly
two fields that are going to be influenced by it which are: By creating
a decentralized system, it removes the indulgence of central servers and
provides peer-to-peer interaction. It can create a fully transparent and
open to all database, which could bring transparency to the governance
and elections. Blockchain technology basically has 4 pillars, first,
Consensus, which provides the proof of work (PoW) and verifies the
action in the networks, second is ledger, which provides the complete
details of transaction within networks. Third, Cryptography, it makes
sure that all data in ledger and networks gets encrypted and only
authorized user can decrypt the information and fourth is smart contract,
it is used to verify and validate the participants of the network.

PROPOSED SYSTEM:
The purpose of this research paper is to provide guidance for the use of
blockchain technology, through cases to make a more secure and
trustable IoT model IoT has numerous applications, for example: in
making smart homes, Smart City, Improving Health, Autonomous
Vehicles, etc. Some IoT devices are currently available in the market
like Wearables, Smart Thermostat Systems, Air Conditioners, and
refrigerators that use Wi-Fi for remote monitoring. Apart from all these
benefits, IoT has some serious issues, which should be sorted out before
it gets implemented, like the technologies on which the foundations of
IoT have been established have several bugs, so if hackers get access to
the system through these bugs then they can compromise the privacy of
the customer or even can cause harm to them. Thus before implementing
IoT, the security of these systems should be strengthened and made free
from any bugs. Keeping the IoT device secure is one of the most
difficult tasks to accomplish. In making these devices cheap, small and
easy to use many security policies are compromised which increases the
risk of security breach.
MODULES:
1. Network of Nodes:
All the nodes connected through the internet maintain all of the
transactions made on a blockchain network collaboratively. The
authenticity of the transaction is checked by the protocol, which
eliminates the involvement of a trusted third party for validation
purpose . When a transaction is done, its records are added to the
ledger of past transaction, this process is known as 'mining'. The
proof of work has to be verified by the other nodes present on the
network.
2. Distributed database system:
The database, which is composed of blocks of information, is
copied to every node of the system. Each block contains the
following data in itself: A list of transactions; a timestamp;
Information, which links it to the previous chain of the blocks.
3. Shared ledger:
The ledger is updated every time a transaction is made. It is
publicly available and is incorruptible which introduces
transparency to the system.
4. Cryptography:
It binds the data with the very strong crypto mechanism, which is
not easy to track or tampered by unauthorized users.
ALGORITHM:
Block chain Technique:

A blockchain, originally block chain, is a growing list of records, called


blocks, which are linked using cryptography. Each block contains a
cryptographic hash of the previous block, a timestamp, and transaction
data. By design, a blockchain is resistant to modification of the data.

The emergence and popularity of blockchain techniques will


significantly change the way of digital system operation and
management. Blockchain is essentially a digital public ledger that
securely records and automatically verifies high volume transactions
digitally. By allowing digital information to be distributed, blockchain
technology created the backbone of a new type of internet.Originally
devised for the digital currency, Bitcoin, the tech community is now
finding other potential uses for the technology. The application of
blockchain will exhibit a variety of complicated problems and new
requirements, which brings more open issues and challenges for research
communities.

REQUIREMENT ANALYSIS

The project involved analyzing the design of few applications so as


to make the application more users friendly. To do so, it was really
important to keep the navigations from one screen to the other well
ordered and at the same time reducing the amount of typing the user
needs to do. In order to make the application more accessible, the
browser version had to be chosen so that it is compatible with most of
the Browsers.

REQUIREMENT SPECIFICATION

Functional Requirements

 Graphical User interface with the User.


Software Requirements

For developing the application the following are the Software


Requirements:

1. Python

2. Django

3. MySql

4. MySqlclient

5. WampServer 2.4

Operating Systems supported

1. Windows 7

2. Windows XP
3. Windows 8

Technologies and Languages used to Develop

1. Python

Debugger and Emulator


 Any Browser (Particularly Chrome)
Hardware Requirements

For developing the application the following are the Hardware


Requirements:

 Processor: Pentium IV or higher


 RAM: 256 MB
 Space on Hard Disk: minimum 512MB

CONCLUSION:
In this article, we have provide guidance for the use of blockchain
technology, through cases to make a more secure and trustable IoT
model. Because of the high-end hardware requirements for the internet
of things, we concluded that internet of things is not going to be a full
member of a blockchain network. But internet of things is definitely
going to be benefited from the functionalities introduced by the
blockchain technology through the APIs offered by the nodes of the
network or by any specialized intermediaries. Through these
functionalities internet of things could be made highly secure. We have
discussed the new and emerging blockchain technology cybersecurity
point. Blockchain technology mostly using and concentrating the finance
area research work, as we know Bitcoin is a cryptocurrency which is
based on blockchain technology. But in our article we try to introduce
blockchain technology for internet of things to make secure data
transmission between the internet connected devices. For this we have
provide oview of blockchain technology, security issues on IoT
environment and also discuss and propose blockchain is as a solution of
IoT Security.

You might also like