Page 56 - 2023
P. 56
remove potentially harmful payloads within the IoT data stream.
The research methodology involves designing and implementing a prototype IoT network
comprising multiple devices, a blockchain-based network infrastructure, and security
mechanisms utilizing Base64 encoding, SHA-256 hashing, and filtering techniques.
Performance evaluations are conducted to assess the effectiveness and efficiency of the
proposed security enhancements.
The expected outcomes of this research include improved security and trustworthiness
of IoT networks through the integration of blockchain technology, Base64 encoding, SHA-
256 hashing, and filtering techniques. The results will contribute to the development of
robust and scalable security solutions for IoT deployments, safeguarding critical data and
infrastructure from potential threats.
To evaluate the effectiveness of the proposed solution, researchers conducted a series of
experiments using representative IoT scenarios. The results demonstrate the capability
of blockchain technology to enhance IoT network security by mitigating common attack
vectors, such as denial-of-service attacks. Furthermore, our solution exhibits scalability
and efficiency, making it suitable for large-scale IoT deployments.
Finally, researchers address the limitations and challenges associated with the adoption
of blockchain technology for IoT network security. They discuss scalability concerns and
the need for standardized protocols and interoperability among heterogeneous IoT
devices. They also outline potential avenues for future research to overcome these
obstacles and further optimize the proposed solution.
Key words: IoT, network security, blockchain technology, Base64 encoding, SHA-256
hashing, filtering techniques.
31