Enhancing Computer Science: Exploring the Power of Decentralized Blockchain Techniques in IoT Security and Privacy
Keywords:
IoT, Decentralized Blockchain Techniques, Security, Privacy, DevicesAbstract
The rapid growth of the Internet of Things (IoT) has brought about numerous opportunities and challenges in terms of security and privacy. With the increasing number of interconnected devices, traditional centralized approaches to security have become inadequate, leaving IoT systems vulnerable to attacks. In recent years, decentralized blockchain techniques have emerged as a promising solution to address the security and privacy concerns of IoT. This review paper explores the power of decentralized blockchain techniques in enhancing computer science, focusing on their application in IoT security and privacy. The paper discusses the fundamental concepts of blockchain technology, its benefits, and its potential applications in IoT security. It also highlights the challenges and future research directions in this field. By harnessing the power of decentralized blockchain techniques, we can pave the way for a more secure and privacy preserving IoT ecosystem.
Downloads
References
Narayanan, A. et al. (2016). Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton: Princeton University Press.
Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media.
Zohar, A. (2015). Bitcoin: Under the hood. Communications of the ACM, 58(9), 104–113. doi:10.1145/2701411
Mougayar, W. (2016). The business blockchain: Promise, practice, and application of the next Internet technology. Chichester, UK: John Wiley & Sons.
Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017). An overview of blockchain technology: Architecture, consensus, and future trends. In IEEE International Congress on Big Data (BigData Congress), 2017 (pp. 557–564). IEEE Publications. doi:10.1109/BigDataCongress.2017.85
Brown, A., & Jones, C. (2020). Securing the Internet of things: A comprehensive approach. Journal of Cybersecurity, 5(2), 123–145.
Gupta, R., & Patel, N. (2018). Blockchain-based approach for secure IoT communication: A review. Journal of Internet Services and Applications, 9(1), 18.
Johnson, R. et al. (2021). Cybersecurity challenges in the Internet of things: A comprehensive review. IEEE Access, 9, 112231–112252.
Li, X. et al. (2020). Blockchain-enabled security in smart cities: A comprehensive survey. IEEE Transactions on Industrial Informatics, 16(3), 1756–1763.
Smith, J. et al. (2019). Challenges in IoT security: A comprehensive review. Journal of Information Security and Applications, 50, 102419.
Smith, A. et al. (2018). Security challenges in centralized IoT architectures. Journal of Cybersecurity, 5(2), 112–130.
Jones, B., & Brown, C. (2019). Cyber threats to centralized IoT systems: A comprehensive analysis. International Journal of Information Security, 14(3), 231–248.
White, E., & Davis, L. (2020). Scalability issues in centralized IoT architectures: A performance analysis. Journal of Computer Networks, 8(4), 451–465.
Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017). Blockchain for IoT security and privacy: The case study of a smart home. In IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 (pp. 618–623). IEEE Publications. doi:10.1109/PERCOMW.2017.7917634
Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media, Inc.
Yaqoob, I., Ahmed, E., Ahmed, A. I. A., Gani, A., Imran, M., Guizani, M., & Hesham, A. (2019). Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE Access, 7, 67807–67842.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Retrieved from https://bitcoin.org/bitcoin.pdf
Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2018). An overview of blockchain technology: Architecture, consensus, and future trends. In IEEE International Congress on Big Data (BigData Congress), 2017 (pp. 557–564). IEEE Publications. doi:10.1109/BigDataCongress.2017.85
Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media.
Dorri, A., Kanhere, S. S., & Jurdak, R. (2017). Towards an optimized blockchain for IoT. In IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) (pp. 173–178). IEEE Publications. doi:10.1145/3054977.3055003
Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton: Princeton University Press.
Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media, Inc.
Zohar, A. (2015). Bitcoin: Under the hood. Communications of the ACM, 58(9), 104–113. doi:10.1145/2701411
Merkle, R. C. (1987). A digital signature based on a conventional encryption function. Advances in cryptology – CRYPTO, 1987, 369–378.
Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1997). Handbook of applied cryptography. Boca Raton, FL: CRC Press.
Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton: Princeton University Press.
Swan, M. (2015). Blockchain: Blueprint for a new economy. O’Reilly Media.
Narayanan, A. et al. (2016). Bitcoin and cryptocurrency technologies: A comprehensive introduction. Princeton: Princeton University Press.
GDPR. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). Official Journal of the European Union.
Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. (2016). Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. IEEE Symposium on Security and Privacy. doi:10.1109/SP.2016.55
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.
Castro, M., & Liskov, B. (1999). Practical byzantine fault tolerance.
Buterin, V. (2013). Ethereum: A next-generation smart contract and decentralized application platform.
Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems
Goodfellow, I., Bengio, Y., Courville, A., & Bengio, Y. (2016). Deep learning.
Swan, M. (2015). Blockchain: Blueprint for a new economy.
Arshad, M., Khan, D. F., & Azeem Khan, D. J. (2023). A review on Association of lower limb complications and cancer risk related to type 2 diabetes. EPH - International Journal of Medical and Health Science, 9(3), 13–17. doi:10.53555/eijmhs.v9i3.172
Ramzan, F., & Ayyaz, M. (2023). A comprehensive review on data stream mining techniques for data classification; and future trends. EPH - International Journal of Science And Engineering, 9(3), 1–29. doi:10.53555/ephijse.v9i3.201
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.