International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1364 An Approach to Authenticating Devise in IoT using Blockchain Jayant Dilip Dabhade 1 , Dr. Deepak Singh Tomar 2 1 Mtech Scholar, Maulana Azad National Institute of Technology, Bhopal 2 Associate Professor, CSE Dept Maulana Azad National Institute of Technology, Bhopal -----------------------------------------------------------------------------***------------------------------------------------------------------------------ Abstract - The Internet of things is a technology having extensive scope and can become a major part of our daily lives the future. In the recent years, the growth in the field of IoT and its applications have been relentless. Although it is still in its infancy, it has gained a massive interest of even the big players like IBM and Amazon. Different items that are used every moment are fitted with electronic devices and protocols to bind them to the Internet. Nonetheless, the IoT has a few major security issues that need to be addressed to ensure its steady and bright future. In IoT, as things process and exchange information without human interference, human participation is minimal. This complete autonomy obviously makes the malicious developers target these organizations evidently. It brings a drastic need to acknowledge and authenticate the entities and guarantee the integrity of their information exchanged. Because of IoT's comprehensive scope and other characteristics, creating an efficient centralized encryption scheme is almost unlikely. Now, another promising technology that might just resolve the security problems in IoT is Blockchain. In this approach, an initial decentralized system is suggested to resolve this restriction, which guarantees solid device identification and authentication. It also preserves the integrity and accessibility of information. This strategy is based on the safety elements granted by the blockchains in order to achieve such a objective and helps to generate safe virtual areas where items can define and trust each other. Major security issues that have been encountered in the IoT have been addressed and resolved using Blockchain. 1. Introduction The Internet of Things (IoT) is advancing rapidly in the research areas and in the industrial fields. Nonetheless, it still must deal with security and privacy issues as it is highly vulnerable. Existing privacy and security approaches are mostly proven to be unsuitable for IoT, primarily because of its decentralized ecosystem and the lack of resources to its devices. Blockchain have recently been used to ensure privacy and security in peer-to-peer networks with similar structure to IoT [1]. Blockchain involve high bandwidth delays and overhead and are computationally expensive, which seems unsuitable for IoT devices. This paper proposes a novel secure and private framework for IoT, based on Blockchain technology that enables most of its security and privacy benefits. The ideology in IoT and its multiple applications is its ubiquity of a diversity of things where they can cooperate and interact, in order to enable a wide range of services. However, safety problems remain a significant barrier to IoT's vast ranging adaptation in different fields. It is therefore immensely prominent that only the authenticated users are enabled to make use of the system, otherwise the system will be vulnerable to security issues like information theft, identity usurpation and data altercation. The attackers can easily target IoT systems primarily for two reasons Majority of the interactions and communications are wireless making them more prone to various attacks such as identity spoofing, message tampering and message eavesdropping. Most of the devices involved in the system have limited resources in terms of energy, processing capacity and memory because of which advanced security solutions are less likely to be applied [2]. Authentication, confidentiality and information data integrity are critical to ensuring the proper running of each portion of such ecosystems. Because of the resource constraints and the heterogeneous nature of IoT, existing safety alternatives are not fully taken into account. In order to cope up, a mixtureof multiple security solutions is needed which may lead to extra high costs. Furthermore, efficient security solutions like the Public key infrastructure (PKI) are centralized limiting the scalability of the system. Thus, there is a grave need to propose new security solutions for the system-of-systems.