Ahsan, Talha and Khan, Farrukh Zeeshan and Iqbal, Zeshan and Ahmed, Muneer and Alroobaea, Roobaea and Baqasah, Abdullah M. and Ali, Ihsan and Raza, Muhammad Ahsan (2022) IoT devices, user authentication, and data management in a secure, validated manner through the blockchain system. Wireless Communications & Mobile Computing, 2022. ISSN 1530-8669, DOI https://doi.org/10.1155/2022/8570064.
Full text not available from this repository.Abstract
Advancement in technology has led to innovation in equipment, and the number of devices is increasing every day. Industries are introducing new devices every day and predicting 50 billion connected devices by 2022. These devices are deployed through the Internet, called the Internet of Things (IoT). Applications of IoT devices are weather prediction, monitoring surgery in hospitals, identification of animals using biochips, providing tracking connectivity in automobiles, smart home appliances, etc. IoT devices have limitations related to security at both the software and hardware ends. Secure user interfaces can overcome software-level limitations like front-end-user interfaces are accessed easily through public and private networks. The front-end interfaces are connected to the localized storage to contain data produced by the IoT devices. Localized storage deployed in a closed environment connected to IoT devices is more efficient than online servers from a security perspective. Blockchain has emerged as a technology or technique with capabilities to achieve secure administrational authentication and accessibility to IoT devices and their computationally produced data in a decentralized way with high reliability, interrogation, and resilience. In this paper, we propose device, end-user, and transactional authentication techniques using blockchain-embedded algorithms. The localized server interacts with the user interface to authenticate IoT devices, end-users, and their access to IoT devices. The localized server provides efficiency by reducing the load on the IoT devices by carrying out end-user heavy computational data, including end-user, IoT device authentication, and communicational transactions. Authentication data are placed on the public ledger in block form, distributed over the system nodes through blockchain algorithms.
Item Type: | Article |
---|---|
Funders: | Taif University, Taif, Saudi Arabia [TURSP-2020/36], Faculty of Computer Science and Information Technology, University of Malaya under Postgraduate Research Grant [PG035-2016A] |
Uncontrolled Keywords: | Internet of Things; IoT; Blockchain; Transactional authentication; Weather prediction; Monitoring surgery in hospitals; Identification of animals using biochips; Tracking connectivity in automobiles; Smart home appliances |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science T Technology > TA Engineering (General). Civil engineering (General) T Technology > TK Electrical engineering. Electronics Nuclear engineering |
Divisions: | Faculty of Computer Science & Information Technology > Department of Computer System & Technology |
Depositing User: | Ms. Juhaida Abd Rahim |
Date Deposited: | 17 Aug 2022 05:44 |
Last Modified: | 17 Aug 2022 05:44 |
URI: | http://eprints.um.edu.my/id/eprint/33364 |
Actions (login required)
View Item |