Page 55 - 2023
P. 55

Ph.D.
                                                                                (Computer Applications)
        NETWORK SECURITY FOR
        IOT DEVICE USING BLOCKCHAIN TECHNOLOGY

        Ph.D. Scholar :  Goswami Sachinkumar Anandpal
        Research Supervisor : Dr. Ketan D. Patel



                                                                              Regi. No.: 18276211002
        Abstract :
        The  explosion  of  Internet  of  Things  (IoT)  devices  has  transformed  several  industries,
        providing  unparalleled  ease  and  connectedness.  However,  the  fast  expansion  of  IoT
        networks has prompted serious worries about security flaws and data breaches. In this
        study, researchers investigate the potential of blockchain technology to overcome these
        issues and improve the security of IoT networks.

        This  study  begins  with  an  analysis  of  the  fundamental  security  issues  faced  by  IoT
        networks, including device authentication, data integrity, and secure communication. The
        researcher  then  delved  into  the  principles  and  mechanisms  of  blockchain  technology,
        highlighting its decentralized nature, immutability, and cryptographic security features. By
        leveraging  these  attributes,  blockchain  technology  can  provide  a  robust  foundation  for
        securing IoT networks.
        The fast expansion of Internet of Things (IoT) devices has created several benefits as well
        as concerns, notably in network security. Traditional security techniques have a difficult
        time dealing with the unique traits and risks inherent in IoT systems. This study looks at
        the use of blockchain technology in conjunction with Base64 encoding, SHA-256 hashing,
        and filtering approaches to improve the security of IoT networks.

        The proposed approach leverages the decentralized nature of blockchain to establish a
        trusted  and  tamper-resistant  distributed  ledger  for  recording  and  verifying  IoT  device
        transactions  and  interactions.  By  utilizing  smart  contracts,  authentication  and
        authorization mechanisms can be enforced, ensuring secure device communication and
        access control within the network.

        To safeguard data integrity, Base64 encoding is employed to convert binary IoT data into
        ASCII format, making it resistant to corruption during transmission. Additionally, the SHA-
        256  hashing  algorithm  is  utilized  to  generate  unique  hash  values  for  data  packets,
        enabling tamper detection and prevention.
        Filtering  techniques are  applied at various network  layers  to  mitigate  potential threats.
        Traffic filtering at the network perimeter helps identify and block suspicious or malicious
        traffic,  preventing  unauthorized  access.  Content  filtering  is  employed  to  detect  and

                                                                                           30
   50   51   52   53   54   55   56   57   58   59   60