AY : 2024-25 VII SEMESTER
Emerging Technologies
BLOCKCHAIN TECHOLOGY FOR IOT SECURITY
ENHANCEMENT AND DATA INTEGRITY
Name: Baddam Sri Varsha Rollno: 21261A6608
Computer Science & Engineering(AI&ML)
Contents:
Introduction
Need for security in IoT
How Blockchain provides security to IoT
Challenges and Limitations
Applications
Conclusion
Introduction
IoT: The Internet of Things, is a
I
concept that revolves around
connecting physical objects and
devices to the internet, allowing
them to collect and exchange data.
These objects can range from
everyday items like household
appliances to industrial machinery to
more specialized sensors and
actuators.
Blockchain: It is a technology which is
decentralized and distributed ledger
system that allows for the secure and
transparent recording of transactions
across a network of computers. It
was originally developed as the
underlying technology for
Literature Review
A comprehensive literature review on blockchain technology,
summarizing significant works and contributions.
1. Foundational Concepts:
• Nakamoto's Bitcoin White Paper (2008): Introduced blockchain as a
decentralized ledger for Bitcoin, using proof-of-work for security
(Nakamoto, 2008).
• Buterin ’s Ethereum White Paper (2013): Expanded blockchain
beyond cryptocurrency to support decentralized applications and
smart contracts (Buterin, 2013).
2. Technical Foundations:
• "Bitcoin and Cryptocurrency Technologies" (2016):
Comprehensive overview of Bitcoin, including cryptographic
principles and consensus mechanisms (Narayanan et al., 2016).
• "Mastering Blockchain" (2018): In-depth technical guide
covering consensus algorithms, cryptographic techniques, and
decentralized applications (Bashir, 2018).
Need for security in IoT:
Lack of encryption: One of the greatest
threats to IoT security is the lack of
encryption on regular transmissions.
Data Protection:IoT devices collect and
transmit sensitive data, so ensuring
security of this data is essential to protect
user privacy and business interests.
Unauthorized Access: Security measures,
like authentication and access controls,
are necessary to prevent unauthorized
access which lead to data breaches,
tampering, and misuse .
Network Security: IoT devices are often
connected to the internet, and insecure
devices can serve as entry points for
cyberattacks.
Malware and Botnets: Insecure IoT
devices can be compromised and can be
Architecture: How Blockchain provides security to IoT:
Immutable Data: Blockchain ensures the
immutability of data. Once data is added to a
blockchain, it cannot be altered or deleted. Even
without encryption, this property makes it
extremely difficult for an attacker to manipulate or
tamper with the data generated by IoT devices. In
this way it protects when there is lack of
encryption.
Data Integrity Verification:
With blockchain, users
and devices can verify the integrity of data. By
comparing the data with the information stored
on the blockchain, any unauthorized changes
can be easily detected, even without
encryption. Access Control ,Decentralization
also help in protection of data.
Access Control: Blockchain can be used for identity
management and access control in IoT. Each device
or participant can have a unique identity on the
blockchain, and cryptographic keys can be used to
control access to data and network functions. This
ensures that only authorized parties can interact
with IoT devices and access sensitive data.
Supply Chain Security: In IoT applications
related to supply chain management,
blockchain can be used to track the
movement and condition of products. This
provides a secure and transparent way to
protect data about the origin, authenticity,
and handling of goods.
Decentralization: IoT networks often
involve numerous devices and sensors,
which can make them vulnerable to a single
point of failure. Blockchain is a decentralized
technology, meaning that data is stored on
multiple nodes across the network. This
decentralization makes it difficult for an
attacker to compromise the entire system by
targeting a single point.
Secure Firmware Updates: Security
patches and firmware updates are critical for
IoT devices. Blockchain can be used to
securely distribute and verify these updates,
reducing the risk of unauthorized
modifications to device software.
Resilience to Attacks: Blockchain's
Advantages : Limitations :
Decentralization Scalability
Enhanced Latency
Authentication Interoperability
Data Integrity Complexity
Tamper Resistance High Cost
Secure Data
Exchange
Applications and Future
Prospects:
IoT security and data integrity through
blockchain" offers a range of applications
across various industries.
Healthcare
Smart Cities
Identity Management
Industrial IoT (IIoT)
Energy Grids
Privacy Enhancements
Scalability Solutions
Hybrid and Consortium Blockchains
Scalability Solutions
Conclusion:
In conclusion, As our world becomes increasingly interconnected,
the security and integrity of IoT data are paramount to
safeguarding user privacy. Blockchain, with its decentralized and
immutable ledger, encryption, offers a robust solution to the
security challenges posed by the proliferation of IoT devices.
The fusion of IoT and blockchain represents not just a
technological advancement, but a commitment to a more secure
and trustworthy digital future. With the right strategies and
continued research, we can harness the power of these two
technologies to create a safer, more reliable, and interconnected
world.
References:
• https:
//www.sciencedirect.com/science/article/pii/S1566253523003767 “A
Comprehensive Survey on Attacks, Security Issues and Blockchain
Solutions for IoT and IIoT”.
• https:
//www.sciencedirect.com/science/article/pii/S0167739X18314134
“Enhancing Security of IoT by Using Blockchain”.
• https: //doi.org/10.1016/j.future.2019.09.028 “Blockchain data-
based cloud data integrity protection mechanism”.
• https:
//www.sciencedirect.com/science/article/pii/S0167739X18313578
“Internet of Things (IoT) Security With Blockchain Technology: A
State-of-the-Art Review”
Thank you!