INTERNET OF THINGS SECURITY BASED ON BLOCKCHAIN TECHNOLOGY
Keywords:
Internet of Things, Blockchain, Security, Cyber-securityAbstract
Blockchain, a distributed tabulation system, rose to fame as the foundation of the Bitcoin currency. In terms of exploration and operationally successful businesses, it has experienced tremendous expansion throughout the years. Blockchain technology, which is decentralized and uses encryption as its foundation, can elegantly solve the difficult Generals Problem. For applications that require decentralized agreements among untrusted peers without the use of a centralized authority, it is therefore a solid option. The Internet of effects, a technical paradigm in which various little biases, such as detectors, actual bluffs, and RFID tags, are connected by a common dispatching medium, makes it possible for a whole new range of activities and operations.
References
Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Christidis, К., Devetsikiotis, М.: Blockchains and smart contracts for the Internet of Things. IEEE Access 4, 2292-2303 (2016)
Conoscenti, М., Vetr6, А., Martin, J.C.D.: Вlockchain for the Internet of Things: а systematic literature review. ln: 2016 IEEE/ ACS 13th International Conference of Computer Systems and Applications (AICCSA), рр. 1-6, November 2016
Worner, D., von Bomhard, Т.: When your sensor earns money: exchanging data for cash with Bitcoin. In: Proceedings of the 2014 АСМ International Joint Conference on Pervasive and Ublquitous Computing: Adjunct PuЬlication, UЬiComp 2014 Adjunct, рр. 295-298. АСМ, New York (2014)
Zhang, У., Wen, J.: The IoT electric business model: using Ыockchain technology for the Internet of Things. Peer-to-Peer Netw. Appl. 10(4), 983-994 (2017)
Zyskind, G., Nathan, О., Pentland, А.: Enigma: decentralized computation platform with guaranteed privacy. arXiv preprint arXiv:1506.03471 (2015)
Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., Kikiras, P.: On the security and privacy of Internet of Things architectures and systems. In: 2015 International Workshop on Secure Internet of Things, pp. 49–57 (2015)
William, S.: Computer Security: Principles and Practice. Pearson Education India, Delhi (2008)
Kumar, S.: Survey of current network intrusion detection techniques. Washington University in St. Louis (2007)
Rodrigues, B., et al.: A blockchain-based architecture for collaborative DDoS mit-igation with smart contracts. In: Tuncer, D., Koch, R., Badonnel, R., Stiller, B.(eds.) AIMS 2017. LNCS, vol. 10356, pp. 16–29. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60774-0 2
Lee, B., Lee, J.H.: Blockchain-based secure firmware update for embedded devices in an Internet of Things environment. J. Supercomput. 73(3), 1152–1167 (2017)
Hernandez, G., Arias, O., Buentello, D., Jin, Y.: Smart nest thermostat: a smart spy in your home. Black Hat USA (2014)
Wurm, J., Hoang, K., Arias, O., Sadeghi, A.R., Jin, Y.: Security analysis on con-sumer and industrial IoT devices. In: Design Automation Conference (ASP-DAC), 2016 21st Asia and South Pacific, pp. 519–524. IEEE (2016)
Ronen, E., Shamir, A., Weingarten, A.O., O‘Flynn, C.: IoT goes nuclear: creating a ZigBee chain reaction. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 195–212. IEEE (2017)
Swan, M.: Blockchain: Blueprint for a New Economy. O‘Reilly Media, Inc., Sebastopol (2015)
Kshetri, N.: Can blockchain strengthen the Internet of Things? IT Prof. 19(4), 68–72 (2017)
Nurshod Akhmedov, Halim Khujamatov, Amir Lazarev, Madiyar Seidullayev. Application of LPWAN technologies for the implementation of IoT projects in the Republic of Uzbekistan // 2021 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan –2021.
Bakhodir, Y., N. Nurbek, and Z. Odiljon. "Methods for applying of scheme of packet filtering rules." International Journal of Innovative Technology and Exploring Engineering 8.11 (2019): 1014-1019.
Yakubdjanovna, Irgasheva Durdona, Nasrullayev Nurbek Bakhtiyarovich, and Xolimtayeva lqbol Ubaydullayevna. "Implementation of intercorporate correlation of information security messages and audits." 2020 International Conference on Information Science and Communications Technologies (ICISCT). IEEE, 2020.
Baxtiyorovich, Nasrullaev Nurbek, and Holimtaeva Ikbol Ubaydullaevna. "Method of analyzing of antivirus errors when audit provides." 2019 International Conference on Information Science and Communications Technologies (ICISCT). IEEE, 2019.