IJSTR

International Journal of Scientific & Technology Research

Home Contact Us
ARCHIVES
ISSN 2277-8616











 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

IJSTR >> Volume 9 - Issue 3, March 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Blockchain Technology For Security And Privacy Issues In Internet Of Things

[Full Text]

 

AUTHOR(S)

Anuska Gupta, Bhumika Gupta, Kamal Kumar Gola

 

KEYWORDS

IoT, security threats and challenges, application layer, MQTT, smart device, next generation networks, cryptography, bitcoin, blockchain technology, application of blockchain.

 

ABSTRACT

Blockchain technology is a secure way of holding the record of data. It support distributed public ledger. Blockchain support data storage, real estate, asset manager other financial transaction. If we are talking about Blockchain in India Telangana is first state of India which support this technology for huge incubator and a world class facility for promoting research. This paper presents the use of blockchain technology in internet of technology in terms of security and privacy.

 

REFERENCES

[1] A. Zanella, N. Bui, A. Castellani, L. Vangelista and M. Zorzi, (2014) "Internet of Things for Smart Cities.”IEEE Internet of Things Journal1(1):22-32, Feb. 2014. doi: 10.1109/JIOT.2014.2306328
[2] Amos O. Olagunju, Farouk Samu, In search of effective honeypot and honeynet systems for real-time intrusion detection and prevention, in: Proceedings of the 5th Annual Conference on Research in Information Technology (RIIT '16), ACM, New York, NY, USA, 2016, pp. 41–46
[3] D.H. Sharma, C.A. Dhote, M.M. Potey, Implementing intrusion management as security-as-a-service from cloud, in: 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), 2016, pp. 363–366. Bangalore.
[4] Economics, Oxford. “Global Infrastructure Outlook.” Global Infrastructure Hub. 2017.
[5] F. Cadet, D.T. Fokum, Coping with denial-of-service attacks on the IP telephony system, in: SoutheastCon 2016, 2016, pp. 1–7. Norfolk, VA.
[6] J. Granjal, E. Monteiro, and J. S. Silva, “Security for the internet of things: A survey of existing protocols and open research issues,” IEEE Communications Surveys Tutorials, vol. 17, no. 3, pp. 1294– 1312, thirdquarter 2015
[7] Jayavardhana Gubbi, RajkumarBuyya, Slaven Marusic, MarimuthuPalaniswami (2013)“Internet of Things (IoT): A vision, architectural elements, and future directions.”Future Generation ComputerSystem29(7):1645-1660
[8] Mair, Robert. "Transforming infrastructure, transforming lives building on 200 years." Proceedings of the Institution of Civil Engineers-Civil Engineering. Vol. 171. No. 1. 2018.
[9] Miorandi, Daniele, Sabrina Sicari, Francesco De Pellegrini, and Imrich Chlamtac. "Internet of things: Vision, applications and research challenges." Ad Hoc Networks, Vol. 10, no. 7. 2012.
[10] Mandrita Banerjee,Junghee Lee, Kim-Kwang Raymond Choo,“Digital Communications and Networks,”2352-8648/© 2018
[11] National Infrastructure Commission. “Data for the Public Good.” UK Government. 2017.
[12] Nikhil Kumar Koditala, “Water Quality Monitoring System using IoT and Machine Laarning,”978-1-5386-2599-6/18/ ©2018IEEE
[13] Nallapaneni Manoj Kumara,Pradeep Kumar Mallick, “Blockchain technology for security issues and challenges in IoT,”1877-0509 © 2018 The Authors. Published by Elsevier Ltd.
[14] Nallapaneni Manoj Kumar, Archana Dash (2017) “The Internet of Things: An Opportunity for Transportation and Logistics.” Proceedings of the International Conference on Inventive Computing and Informatics (ICICI 2017), pp. 194-197, Coimbatore, Tamil Nadu, India
[15] Nallapaneni Manoj Kumar, Karthik Atluri, Sriteja Palaparthi(2018)“Internet of Things in Photovoltaic Systems.” In Proceedings of IEEE National Power Engineering Conference (NPEC-2018), Madurai, Tamil Nadu, India.
[16] Nallapaneni Manoj Kumar, Archana Dash, Neeraj Kumar Singh (2018) “Internet of Things (IoT): An Opportunity for Energy -Food-Water Nexus.” 2018 1st IEEE International Conference on Power Energy, Environment & Intelligent Control (PEEIC2018), 13th and 14th April, GL Bajaj, Greater Noida, India. Up 30 Percent From 2015,”
[17] Q.K.A. Mirza, G. Mohi-Ud-Din, I. Awan, A cloud-based energy efficient system for enhancing the detection and prevention of modern malware, in: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), 2016, pp. 754–761. Crans-Montana.
[18] Rothballer, Christoph, and Hanseul Kim. “Strategic Infrastructure Steps to Prepare and Accelerate Public- Private Partnerships.” World Economic Forum. 2013.
[19] Rothballer, Christoph, and Hanseul Kim. “Strategic Infrastructure Steps to Prepare and Accelerate Public- Private Partnerships.” World Economic Forum. 2013.
[20] Reem Abdul Rahman and Babar Shah. “Security analysis of IoT protocols: A focus in CoAP”. By MEC international conference.
[21] Raghavendra K1, Sumith Nireshwalya “Application Layer Security Issues and Its Solutions “ISSN 2231-0711 vol 2 issue 6 1266-1269.
[22] Research Directions for the Internet of Things,John A. Stankovic, Life Fellow, IEEE
[23] Susanto, Heru, Mohammad Nabil Almunawar, and Yong Chee Tuan. "Information security management system standards: A comparative study of the big five." International Journal of Electrical Computer Sciences Vol. 11, no. 5. 2011.
[24] S. L. Keoh, S. S. Kumar, and H. Tschofenig, “Securing the internet of things: A standardization perspective,” IEEE Internet of Things Journal, vol. 1, no. 3, pp. 265–275, June 2014.
[25] “Security Issues in Wireless Sensor Networks”, Tanveer Zia and Albert Zomaya, Systems and Networks Communications, 2006. ICSNC '06. International Conference onDate of Conference: Oct. 2006.
[26] “Security in Wireless Sensor Networks: Issues and Challenges” Al-Sakib Khan pathan, Hyung-Woo Lee,Choong Seon Hong ,Kyung Hee Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference
[27] Shahid Raza, Hossein Shafagh, Kasun Hewage, Ren Hummen, Thiemo Voigt, Lithe:Lightweight Secure CoAP for the Internet of Things, Sensors Journal, IEEE 13(10), Oct. 2013, pp. 3711-3720.
[28] “Security in Internet of Things :Challenges, Solution and Future Direction”Sathish Alampalayam Kumar Harshit Srivastava 1530-1605/16©2016 IEE
[29] XVIII. Web links
[30] https://nptel.ac.in/courses/106105184/
[31] https://onlinecourses.nptel.ac.in/noc18_cs47/preview
[32] https://nptel.ac.in/noc/individual_course.php?id=noc18-cs47
[33] www.owasp.org intel proprietary