Enhancing Computer Science: Exploring the Power of Decentralized Blockchain Techniques in IoT Security and Privacy

Authors

  • Sujata Chetan Papade Assistant Professor, N.K.Orchid College of Engineering & Tech , Solapur, Maharashtra, India.
  • Suwarna Deshmukh Assistant Professor, Lovely Professional University, Phagwara, Punjab. Pin 144401
  • Neha Pradyumna Bora Assistant Professor, Department of Computer Engineering, SNJB's LSKBJ, College of Engineering, Chandwad, Nashik, 423101
  • R. Kavin Assistant Professor, Electrical and Electronics Engineering Sri Krishna College of Engineering and Technology Kuniamuthur, Coimbatore-641008
  • Prasanna P. Deshpande Assistant Professor (Electronics and Communication Engineering), Shri Ramdeobaba College of Engineering and Management, Nagpur (India)
  • Kiran Mayee Adavala Faculty, Kakatiya Institute of Technology & Science
  • Krishan Kant Yadav Assistant Professor, Prestige Institute of Management and Research, Gwalior Madhya Pradesh, India

Keywords:

IoT, Decentralized Blockchain Techniques, Security, Privacy, Devices

Abstract

The rapid growth of the Internet of Things (IoT) has brought about numerous opportunities and challenges in terms of security and privacy. With the increasing number of interconnected devices, traditional centralized approaches to security have become inadequate, leaving IoT systems vulnerable to attacks. In recent years, decentralized blockchain techniques have emerged as a promising solution to address the security and privacy concerns of IoT. This review paper explores the power of decentralized blockchain techniques in enhancing computer science, focusing on their application in IoT security and privacy. The paper discusses the fundamental concepts of blockchain technology, its benefits, and its potential applications in IoT security. It also highlights the challenges and future research directions in this field. By harnessing the power of decentralized blockchain techniques, we can pave the way for a more secure and privacy preserving IoT ecosystem.

Downloads

Download data is not yet available.

References

Narayanan, A. et al. (2016). Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton: Princeton University Press.

Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media.

Zohar, A. (2015). Bitcoin: Under the hood. Communications of the ACM, 58(9), 104–113. doi:10.1145/2701411

Mougayar, W. (2016). The business blockchain: Promise, practice, and application of the next Internet technology. Chichester, UK: John Wiley & Sons.

Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In IEEE International Congress on Big Data (BigData Congress), 2017 (pp. 557–564). IEEE Publications. doi:10.1109/BigDataCongress.2017.85

Brown, A., & Jones, C. (2020). Securing the Internet of things: A comprehensive approach. Journal of Cybersecurity, 5(2), 123–145.

Gupta, R., & Patel, N. (2018). Blockchain-based approach for secure IoT communication: A review. Journal of Internet Services and Applications, 9(1), 18.

Johnson, R. et al. (2021). Cybersecurity challenges in the Internet of things: A comprehensive review. IEEE Access, 9, 112231–112252.

Li, X. et al. (2020). Blockchain-enabled security in smart cities: A comprehensive survey. IEEE Transactions on Industrial Informatics, 16(3), 1756–1763.

Smith, J. et al. (2019). Challenges in IoT security: A comprehensive review. Journal of Information Security and Applications, 50, 102419.

Smith, A. et al. (2018). Security challenges in centralized IoT architectures. Journal of Cybersecurity, 5(2), 112–130.

Jones, B., & Brown, C. (2019). Cyber threats to centralized IoT systems: A comprehensive analysis. International Journal of Information Security, 14(3), 231–248.

White, E., & Davis, L. (2020). Scalability issues in centralized IoT architectures: A performance analysis. Journal of Computer Networks, 8(4), 451–465.

Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017). Blockchain for IoT security and privacy: The case study of a smart home. In IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 (pp. 618–623). IEEE Publications. doi:10.1109/PERCOMW.2017.7917634

Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media, Inc.

Yaqoob, I., Ahmed, E., Ahmed, A. I. A., Gani, A., Imran, M., Guizani, M., & Hesham, A. (2019). Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE Access, 7, 67807–67842.

Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Retrieved from https://bitcoin.org/bitcoin.pdf

Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2018). An overview of blockchain technology: Architecture, consensus, and future trends. In IEEE International Congress on Big Data (BigData Congress), 2017 (pp. 557–564). IEEE Publications. doi:10.1109/BigDataCongress.2017.85

Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media.

Dorri, A., Kanhere, S. S., & Jurdak, R. (2017). Towards an optimized blockchain for IoT. In IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (pp. 173–178). IEEE Publications. doi:10.1145/3054977.3055003

Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton: Princeton University Press.

Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media, Inc.

Zohar, A. (2015). Bitcoin: Under the hood. Communications of the ACM, 58(9), 104–113. doi:10.1145/2701411

Merkle, R. C. (1987). A digital signature based on a conventional encryption function. Advances in cryptology – CRYPTO, 1987, 369–378.

Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1997). Handbook of applied cryptography. Boca Raton, FL: CRC Press.

Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton: Princeton University Press.

Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media.

Narayanan, A. et al. (2016). Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton: Princeton University Press.

GDPR. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Official Journal of the European Union.

Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. IEEE Symposium on Security and Privacy. doi:10.1109/SP.2016.55

Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.

Castro, M., & Liskov, B. (1999). Practical byzantine fault tolerance.

Buterin, V. (2013). Ethereum: A next-generation smart contract and decentralized application platform.

Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems

Goodfellow, I., Bengio, Y., Courville, A., & Bengio, Y. (2016). Deep learning.

Swan, M. (2015). Blockchain: Blueprint for a new economy.

Arshad, M., Khan, D. F., & Azeem Khan, D. J. (2023). A review on Association of lower limb complications and cancer risk related to type 2 diabetes. EPH - International Journal of Medical and Health Science, 9(3), 13–17. doi:10.53555/eijmhs.v9i3.172

Ramzan, F., & Ayyaz, M. (2023). A comprehensive review on data stream mining techniques for data classification; and future trends. EPH - International Journal of Science And Engineering, 9(3), 1–29. doi:10.53555/ephijse.v9i3.201

Downloads

Published

02.02.2024

How to Cite

Chetan Papade, S. ., Deshmukh, S. ., Pradyumna Bora, N. ., Kavin, R. ., P. Deshpande, P. ., Mayee Adavala, K. ., & Yadav, K. K. . (2024). Enhancing Computer Science: Exploring the Power of Decentralized Blockchain Techniques in IoT Security and Privacy. International Journal of Intelligent Systems and Applications in Engineering, 12(14s), 535–541. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4690

Issue

Section

Research Article