9Blockchain-Based Security Solutions for IoT Systems

Göran Pulkkis, Jonny Karlsson, and Magnus Westerlund

Department of Business Management and Analytics, Arcada University of Applied Sciences, Helsinki, Finland

9.1 Introduction

IoT security issues have many commonalities with IT security in general. However, much more sensitivity and confidentiality are required for IoT systems when these systems enter and digitalize the private lives of individuals. Some of the identified key privacy concerns for IoT related to the collection of individuals' data are unauthorized surveillance, uncontrolled data generation and use, inadequate authentication, and information security risks (Caron et al., 2016). The sensitivity of IoT technologies stems from security requirements such as confidentiality, integrity, authenticity, privacy, availability, and regulation. IoT security has physical and logical issues. The physical issues entail the limited capabilities of IoT devices in terms of computational power and memory and usually also in terms of energy, since most IoT devices are battery powered. The logical issues include authentication, privacy, protection against malware, the standardization of policies, and monitoring (Madakam and Date, 2016).

IoT deployment raises many security issues related to the characteristics of IoT devices, such as the need for lightweight cryptographic algorithms in terms of processing and memory capabilities, and the use of standard protocols, such as the necessity ...

Get Internet of Things A to Z now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.