11A Study on Security Protocols, Threats and Probable Solutions for Internet of Things Using Blockchain

The Internet of Things (IoT) was invented from various technologies. The development of IoT will improve many everyday processes for both small customers and commercial organizations. Unfortunately, safety remains an ongoing concern in the IoT environment. Since the IoT paradigm encompasses a wide variety of devices and equipment, ranging from small embedded processing chips to large high-end servers, it needs to address security issues at different levels such as low-, intermediate- and high-level security issues. There are probable solutions to address these threats using IoT security algorithms (from common encryption algorithms to lightweight cryptography algorithms) with different requirements. From smart home applications to smart agriculture and from healthcare applications to industrial systems, lightweight cryptography algorithms can be used everywhere by securing devices. Today, IoT systems typically run on a distributed client–server model, where linked devices rely on the central network to determine their behavior. This central hub is typically the key target of IoT-related cyber outbreaks. Whenever there is a security breach at the central authority, the data sent by smart devices can be easily captured by hackers, and most cyber attacks in IoT target this vulnerability. The use of blockchain technology to decentralize the IoT network will make it more scalable, ...

Get Smart Edge Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.