Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/515446
Title: network security for iot device using blockchain technology
Researcher: Goswami Sachinkumar Anandpal
Guide(s): Dr. Ketan D. Patel
Keywords: Computer Science
Computer Science Interdisciplinary Applications
Engineering and Technology
University: Ganpat University
Completed Date: 2023
Abstract: The explosion of Internet of Things (IoT) devices has transformed several industries, providing unparalleled ease and connectedness. However, the fast expansion of IoT networks has prompted serious worries about security flaws and data breaches. In this study, researchers investigate the potential of blockchain technology to overcome these issues and improve the security of IoT networks. newlineThis study begins with an analysis of the fundamental security issues faced by IoT networks, including device authentication, data integrity, and secure communication. The researcher then delved into the principles and mechanisms of blockchain technology, highlighting its decentralized nature, immutability, and cryptographic security features. By leveraging these attributes, blockchain technology can provide a robust foundation for securing IoT networks. newlineThe fast expansion of Internet of Things (IoT) devices has created several benefits as well as concerns, notably in network security. Traditional security techniques have a difficult time dealing with the unique traits and risks inherent in IoT systems. This study looks at the use of blockchain technology in conjunction with Base64 encoding, SHA-256 hashing, and filtering approaches to improve the security of IoT networks. newlineThe proposed approach leverages the decentralized nature of blockchain to establish a trusted and tamper-resistant distributed ledger for recording and verifying IoT device transactions and interactions. By utilizing smart contracts, authentication and authorization mechanisms can be enforced, ensuring secure device communication and access control within the network. newlineTo safeguard data integrity, Base64 encoding is employed to convert binary IoT data into ASCII format, making it resistant to corruption during transmission. Additionally, the SHA-256 hashing algorithm is utilized to generate unique hash values for data packets, enabling tamper detection and prevention. newlineFiltering techniques are applied at various network layers to mitigate potential threats. Traff
Pagination: 4701 KB
URI: http://hdl.handle.net/10603/515446
Appears in Departments:Faculty of Computer Applications

Files in This Item:
File Description SizeFormat 
10. list of tables.pdfAttached File30.7 kBAdobe PDFView/Open
11. abbreviations.pdf84.46 kBAdobe PDFView/Open
12. chapter-1.pdf1.27 MBAdobe PDFView/Open
13. chapter-2.pdf279.25 kBAdobe PDFView/Open
14. chapter-3.pdf607.66 kBAdobe PDFView/Open
15. chapter-4.pdf973.87 kBAdobe PDFView/Open
16. chapter-5.pdf220.28 kBAdobe PDFView/Open
1. thesis_front_page.pdf146.95 kBAdobe PDFView/Open
2. certificate by research guide.pdf51.53 kBAdobe PDFView/Open
5. declaration by candidate.pdf46.11 kBAdobe PDFView/Open
6. table of content.pdf207.26 kBAdobe PDFView/Open
7. acknowledgement.pdf36.47 kBAdobe PDFView/Open
80_recommendation.pdf239.18 kBAdobe PDFView/Open
8. abstract.pdf36.19 kBAdobe PDFView/Open
9. list of figures.pdf46.34 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: