Strategic Approaches to Intrusion Detection in Cloud-IoT Ecosystem
by Partha Ghosh, Rajdeep Chakraborty, Anupam Ghosh, Ahmed A. Elngar
12Immunity against Intrusion: Introducing an Agent-Based Blockchain Mechanism in Cloud IoT Environment
Amitabha Mandal1* and Pramit Ghosh2
1Panihati Mahavidyalaya, West Bengal State University, West Bengal, India
2RCC Institute of Information Technology, Kolkata, West Bengal, India
Abstract
Wireless Sensor Networks (WSNs) were originally designed for specific applications. They were not intended to support modern household devices or provide additional features. Their internet use was limited, and WSNs struggled to meet new demands as technology advanced. Due to these restrictions, the Internet of Things (IoT) was developed, which uses the internet to transmit commands and data between objects. However, the need for extensive infrastructure and high deployment costs has slowed the adoption of IoT solutions. Cloud IoT emerged as a cost-effective alternative, offering data storage, analysis, and web services to connect diverse devices. However, its reliance on public networks exposes it to intrusions and attacks via web service interfaces. Malicious actors can inject fabricated data or overwhelm web services, compromising system reliability. While secret key or passcode-based strategies offer a basic defense, they fail to address insider threats and become unmanageable as the network scales. Blockchain technology provides a robust alternative by utilizing dynamic transaction records for data validation instead of static keys. However, its computational demands exceed the capabilities ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access