Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/515446
Title: | network security for iot device using blockchain technology |
Researcher: | Goswami Sachinkumar Anandpal |
Guide(s): | Dr. Ketan D. Patel |
Keywords: | Computer Science Computer Science Interdisciplinary Applications Engineering and Technology |
University: | Ganpat University |
Completed Date: | 2023 |
Abstract: | The explosion of Internet of Things (IoT) devices has transformed several industries, providing unparalleled ease and connectedness. However, the fast expansion of IoT networks has prompted serious worries about security flaws and data breaches. In this study, researchers investigate the potential of blockchain technology to overcome these issues and improve the security of IoT networks. newlineThis study begins with an analysis of the fundamental security issues faced by IoT networks, including device authentication, data integrity, and secure communication. The researcher then delved into the principles and mechanisms of blockchain technology, highlighting its decentralized nature, immutability, and cryptographic security features. By leveraging these attributes, blockchain technology can provide a robust foundation for securing IoT networks. newlineThe fast expansion of Internet of Things (IoT) devices has created several benefits as well as concerns, notably in network security. Traditional security techniques have a difficult time dealing with the unique traits and risks inherent in IoT systems. This study looks at the use of blockchain technology in conjunction with Base64 encoding, SHA-256 hashing, and filtering approaches to improve the security of IoT networks. newlineThe proposed approach leverages the decentralized nature of blockchain to establish a trusted and tamper-resistant distributed ledger for recording and verifying IoT device transactions and interactions. By utilizing smart contracts, authentication and authorization mechanisms can be enforced, ensuring secure device communication and access control within the network. newlineTo safeguard data integrity, Base64 encoding is employed to convert binary IoT data into ASCII format, making it resistant to corruption during transmission. Additionally, the SHA-256 hashing algorithm is utilized to generate unique hash values for data packets, enabling tamper detection and prevention. newlineFiltering techniques are applied at various network layers to mitigate potential threats. Traff |
Pagination: | 4701 KB |
URI: | http://hdl.handle.net/10603/515446 |
Appears in Departments: | Faculty of Computer Applications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
10. list of tables.pdf | Attached File | 30.7 kB | Adobe PDF | View/Open |
11. abbreviations.pdf | 84.46 kB | Adobe PDF | View/Open | |
12. chapter-1.pdf | 1.27 MB | Adobe PDF | View/Open | |
13. chapter-2.pdf | 279.25 kB | Adobe PDF | View/Open | |
14. chapter-3.pdf | 607.66 kB | Adobe PDF | View/Open | |
15. chapter-4.pdf | 973.87 kB | Adobe PDF | View/Open | |
16. chapter-5.pdf | 220.28 kB | Adobe PDF | View/Open | |
1. thesis_front_page.pdf | 146.95 kB | Adobe PDF | View/Open | |
2. certificate by research guide.pdf | 51.53 kB | Adobe PDF | View/Open | |
5. declaration by candidate.pdf | 46.11 kB | Adobe PDF | View/Open | |
6. table of content.pdf | 207.26 kB | Adobe PDF | View/Open | |
7. acknowledgement.pdf | 36.47 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 239.18 kB | Adobe PDF | View/Open | |
8. abstract.pdf | 36.19 kB | Adobe PDF | View/Open | |
9. list of figures.pdf | 46.34 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: