Reshaping IOT Through Blockchain: Melkamu Kerebh Kebede, DR Santosh Kumar Pani Spanifcs@kiit - Ac.in
Reshaping IOT Through Blockchain: Melkamu Kerebh Kebede, DR Santosh Kumar Pani Spanifcs@kiit - Ac.in
Reshaping IOT Through Blockchain: Melkamu Kerebh Kebede, DR Santosh Kumar Pani Spanifcs@kiit - Ac.in
Authorized licensed use limited to: Universiti Tun Hussein Onn Malaysia. Downloaded on December 30,2020 at 02:26:35 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2019)
IEEE Xplore Part Number:CFP19OSV-ART; ISBN:978-1-7281-4365-1
Authorized licensed use limited to: Universiti Tun Hussein Onn Malaysia. Downloaded on December 30,2020 at 02:26:35 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2019)
IEEE Xplore Part Number:CFP19OSV-ART; ISBN:978-1-7281-4365-1
Because of a diversified integration of services and network wirelessly to the base station using wi-fi signal. The
the data recorded on a device is vulnerable to attack by receiving computer or server at the base station receives and
compromising nodes existing in associate IoT network. saves the data automatically to the database. Then, the
Moreover attacker accesses the data without owner values are uploaded to the designed website. Then the users
permission. and workers can easily login and can access his/her data
depending on the application service. In the existing model
Data integrity the sensor is used collect data from the outside or inside
environment, then this value is taken by the micro controller
for making further decision. The data obtained from the
In centralized client server model the attacker may gain
sensor displays continuously on the LCD from the micro-
unauthorized access to the network and change the original
controller, while the obtained data is sent wirelessly to the
data or information and forward it. For example, alice sends
base station using wi-fi signal .The receiving computer or
data to bob. Watson the middle guy might get data first and
server at the base station receives and saves the data
forward the data after modification.
automatically to the database. Then, the values are uploaded
to the designed website. Then the users and workers can
Third party easily login and can access his/her data depending on the
application service.
Data collected in centralized environment is stored and
controlled by a third centralized entity that may misuse this
data or provide it to someone else.
Access control
Scalability
In the existing model the sensor is used collect data from the In our proposed model environment internet of things open
outside or inside environment, then this value is taken by the source developing tool will be used to implement a system
micro controller for making further decision. The data that can provide sensor data from IoT devices to
obtained from the sensor displays continuously on the LCD applications and upload data from sensor to a block chain
from the micro-controller, while the obtained data is sent server. on the side of block chain smart contract open source
Authorized licensed use limited to: Universiti Tun Hussein Onn Malaysia. Downloaded on December 30,2020 at 02:26:35 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2019)
IEEE Xplore Part Number:CFP19OSV-ART; ISBN:978-1-7281-4365-1
tool will be used to put the power data on the block chain.
Proposed model will solve many privacy and security issues
of IoT because by default block chain have many
advantages such as removing third party, addressing
space ,fault tolerance, trusted accountability, trusted data
origin, access control, data privacy and data integrity.so
because of the above default advantages we have solved
many IoT security and privacy issues such as data privacy,
data integrity, data security, access control, insurance
concerns, single point of failure, lack of common standard,
third party, scalablity, trusted data origin and technical
concerns. The proposed model is shown below in the figure
with working of the proposed system and how it will solve
the security and privacy issues of existing IoT applications.
Authorized licensed use limited to: Universiti Tun Hussein Onn Malaysia. Downloaded on December 30,2020 at 02:26:35 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Third International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC 2019)
IEEE Xplore Part Number:CFP19OSV-ART; ISBN:978-1-7281-4365-1
cannot be modified. Data will not be erased because data modernization of human live. I came to know so many
will be deleted by changing the status in the database. single things about this technologies and i am really thankful to my
point of failure will not be evolved because operations are adviser. I would also like to thank My friends who have
separated means all tasks done by dividing roles. Trusted helped me a lot in identifying security and privacy issues of
data origin will be created because we know where we internet of things technology.
found the data. Decentralization is also occurred as we see
in the above diagram all works are separated and the data is REFERENCE
stored in two places that is in the block chain server and the [1] Abdi Sultan, Muhammad Sheraz, A. M., and Mushtaq,
database server so decentralization is implemented here. A. “Internet of things security issues and their solutions with
Data privacy is implemented here because no one can access blockchain technology”. American Journal of Computer
others data and also everyone will access data depending on Science and Information Technology 6, 2 (2018), 3–27.
their username and password. Data integrity and data [2] Chan Hyeok Lee, K.-H. K. “Implementation of IoT
security also assured. There will not be lack of common system using blockchain with authentication and data
standard because we already defined how to access and protection”. International Conference on Information
store data. Networking (ICOIN) (2018).
[3] Chan Hyeok Lee, K.-H. K. “Implementation of iot
CONCLUSION system using blockchain with authentication and data
protection”. IEEE(Institute of Electrical and Electronics
In this research article we have given an introduction of Engineers) 2 (2018), 936–940.
existing IoT technology, block chain technology, advantages [4] Donhee Han, Hongjin Kim, J. J. “Blockchain based
of block chain technology, security and privacy issues of smart door lock system”. International Conference on
IoT and we have also showed a block chain based model for Information Networking (ICOIN)(2017).
developing IoT applications by using block chain [5] Francesco Restuccia, Salvatore D’Oro, S. S. K. T. M.,
technology. The model have also positive impact on the and Das,S. K. “Blockchain for the internet of things”.
integration of Blockchain and IoT technologies. This model IEEE(Institute of Electrical and Electronics Engineers) 1
has potential to have a complete paradigm shift of the (2018), 7773–7775.
current IoT system and it will solve the security and privacy [6] Minhaj Ahmad Khan, K. S. “IOT security review,
issues of IoT by using block chain technology, We would blockchain solutions,and open challenges”.
like to investigate further in the future to propose and [7] Mirza Abdur Razzaq, Sajid Habib Gill, M. A. Q. S. U.
implement IoT system by using block chain technology “Security issues in the internet of things (IoT)”. IJACSA)
using zero knowledge proof of work to protect information International Journal of Advanced Computer Science and
from accessed by unauthorized persons. Zero knowledge Applications 8, 6 (2017), 383–388.
proof of work technology will be implemented to keep [8] Y. Zhang, S. Kasahara, Y. S. X. J., and Wan, J. “Smart
individuals who are out of the system from proofing the contract-based access control for the internet of things”.
users main data through block fetching, to remove falseness IEEE Internet of Things Journal (2018), arXiv preprint
and involvement of information and problems that will be arXiv:1802.04410.
occurred in accessing the data obtained from the sensors. [9] Xiaohui, X. “Study on security problems and key
technologies of the inter net of things”. American Journal
FUTURE WORK of Computer Science and Information Technology 4 (2013),
619–632.
[10] Stefanizzi, M., and Novo, L. T. O. “Blockchain meets
In the future we will implement the proposed model in the iot: An architecturefor scalable access management in iot”.
case of smart water billing system and we will propose and IEEE Internet of Things Journal5 (2018), 1184–1195.
implement a smart water billing system by using a system [11] P. K. Sharma, S. Y. M., and Park, J. H. “A distributed
for keeping individual information from being accessed and blockchain based vehicular network architecture in smart
used by others with out the knowledge of owners by using city”. Journal of Information Processing Systems 13 (2017),
proof of zero knowledge which can proof data is correct 84.
without giving data to the verifier. [12] https:// I. community.iotandus.com.
[13] https://I. developers.iotocean.org.
ACKNOWLEDGMENT [14] https:// I. thesai.org.
Authorized licensed use limited to: Universiti Tun Hussein Onn Malaysia. Downloaded on December 30,2020 at 02:26:35 UTC from IEEE Xplore. Restrictions apply.