Page 55 - 2023
P. 55
Ph.D.
(Computer Applications)
NETWORK SECURITY FOR
IOT DEVICE USING BLOCKCHAIN TECHNOLOGY
Ph.D. Scholar : Goswami Sachinkumar Anandpal
Research Supervisor : Dr. Ketan D. Patel
Regi. No.: 18276211002
Abstract :
The explosion of Internet of Things (IoT) devices has transformed several industries,
providing unparalleled ease and connectedness. However, the fast expansion of IoT
networks has prompted serious worries about security flaws and data breaches. In this
study, researchers investigate the potential of blockchain technology to overcome these
issues and improve the security of IoT networks.
This study begins with an analysis of the fundamental security issues faced by IoT
networks, including device authentication, data integrity, and secure communication. The
researcher then delved into the principles and mechanisms of blockchain technology,
highlighting its decentralized nature, immutability, and cryptographic security features. By
leveraging these attributes, blockchain technology can provide a robust foundation for
securing IoT networks.
The fast expansion of Internet of Things (IoT) devices has created several benefits as well
as concerns, notably in network security. Traditional security techniques have a difficult
time dealing with the unique traits and risks inherent in IoT systems. This study looks at
the use of blockchain technology in conjunction with Base64 encoding, SHA-256 hashing,
and filtering approaches to improve the security of IoT networks.
The proposed approach leverages the decentralized nature of blockchain to establish a
trusted and tamper-resistant distributed ledger for recording and verifying IoT device
transactions and interactions. By utilizing smart contracts, authentication and
authorization mechanisms can be enforced, ensuring secure device communication and
access control within the network.
To safeguard data integrity, Base64 encoding is employed to convert binary IoT data into
ASCII format, making it resistant to corruption during transmission. Additionally, the SHA-
256 hashing algorithm is utilized to generate unique hash values for data packets,
enabling tamper detection and prevention.
Filtering techniques are applied at various network layers to mitigate potential threats.
Traffic filtering at the network perimeter helps identify and block suspicious or malicious
traffic, preventing unauthorized access. Content filtering is employed to detect and
30