International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1364
An Approach to Authenticating Devise in IoT using Blockchain
Jayant Dilip Dabhade
1
, Dr. Deepak Singh Tomar
2
1
Mtech Scholar, Maulana Azad National Institute of Technology, Bhopal
2
Associate Professor, CSE Dept Maulana Azad National Institute of Technology, Bhopal
-----------------------------------------------------------------------------***------------------------------------------------------------------------------
Abstract - The Internet of things is a technology having extensive scope and can become a major part of our daily lives the future.
In the recent years, the growth in the field of IoT and its applications have been relentless. Although it is still in its infancy, it has
gained a massive interest of even the big players like IBM and Amazon. Different items that are used every moment are fitted with
electronic devices and protocols to bind them to the Internet. Nonetheless, the IoT has a few major security issues that need to be
addressed to ensure its steady and bright future. In IoT, as things process and exchange information without human interference,
human participation is minimal. This complete autonomy obviously makes the malicious developers target these organizations
evidently. It brings a drastic need to acknowledge and authenticate the entities and guarantee the integrity of their information
exchanged. Because of IoT's comprehensive scope and other characteristics, creating an efficient centralized encryption scheme is
almost unlikely. Now, another promising technology that might just resolve the security problems in IoT is Blockchain. In this
approach, an initial decentralized system is suggested to resolve this restriction, which guarantees solid device identification and
authentication. It also preserves the integrity and accessibility of information. This strategy is based on the safety elements
granted by the blockchains in order to achieve such a objective and helps to generate safe virtual areas where items can define
and trust each other. Major security issues that have been encountered in the IoT have been addressed and resolved using
Blockchain.
1. Introduction
The Internet of Things (IoT) is advancing rapidly in the research areas and in the industrial fields. Nonetheless, it still must
deal with security and privacy issues as it is highly vulnerable. Existing privacy and security approaches are mostly proven to
be unsuitable for IoT, primarily because of its decentralized ecosystem and the lack of resources to its devices. Blockchain
have recently been used to ensure privacy and security in peer-to-peer networks with similar structure to IoT [1].
Blockchain involve high bandwidth delays and overhead and are computationally expensive, which seems unsuitable for IoT
devices. This paper proposes a novel secure and private framework for IoT, based on Blockchain technology that enables most
of its security and privacy benefits.
The ideology in IoT and its multiple applications is its ubiquity of a diversity of things where they can cooperate and interact,
in order to enable a wide range of services. However, safety problems remain a significant barrier to IoT's vast
ranging adaptation in different fields. It is therefore immensely prominent that only the authenticated users are enabled to
make use of the system, otherwise the system will be vulnerable to security issues like information theft, identity usurpation
and data altercation. The attackers can easily target IoT systems primarily for two reasons
Majority of the interactions and communications are wireless making them more prone to various attacks such as identity
spoofing, message tampering and message eavesdropping.
Most of the devices involved in the system have limited resources in terms of energy, processing capacity and memory because
of which advanced security solutions are less likely to be applied [2].
Authentication, confidentiality and information data integrity are critical to ensuring the proper running of each portion of
such ecosystems. Because of the resource constraints and the heterogeneous nature of IoT, existing safety alternatives are not
fully taken into account. In order to cope up, a mixtureof multiple security solutions is needed which may lead to extra high
costs. Furthermore, efficient security solutions like the Public key infrastructure (PKI) are centralized limiting the scalability of
the system. Thus, there is a grave need to propose new security solutions for the system-of-systems.