Integration of Blockchain Technology in IoT for High Level Security
Siva Naga Lakshmi Pavani Kallam1, BVNR Siva Kumar2
1Siva Naga Lakshmi Pavani Kallam, Electronics and Communication Engineering, Lakireddy Bali Reddy College of Engineering, Mylavaram, India.
2BVNR Siva Kumar, Associate Professor, Electronics and Communication Engineering, Lakireddy Bali Reddy College of Engineering, Mylavaram, India.
Manuscript received on 02 July 2019 | Revised Manuscript received on 07 July 2019 | Manuscript published on 30 August 2019 | PP: 491-497 | Volume-8 Issue-10, August 2019 | Retrieval Number: J88150881019/2019©BEIESP | DOI: 10.35940/ijitee.J8815.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: IoT (Internet of Things) made headway from Machine to Machine communication without human intrusion for number of machines to connect with the aid of network. There is esteem; by 2020 there will be 26 times more connected things than people. Hence, the concern of security rises along with the high installments. The Block Chain Technology takes place of all central entities, which is peer to peer communication with the distributed network. In this paper, two Arduino boards as nodes and a Raspberry Pi as server are to be configured to connect to the Wi-Fi using ESP8266(node mc). To make data transmission from the two nodes to server, integration of temperature and humidity sensor in one node and RFID (Radio Frequency Identification) reader in other node is to be done. Data should be in the form of blocks and integration of data is in the form of a chain, forming it a Blockchain. All the blocks are linked in the chain manner of which the current hash of the previous block must match with the previous hash of the next block. Then only the blocks of data are secured. While receiving data every time from nodes to server, the previous hash is to be checked such that the arrival of the information is being verified to know if it’s really genuine. If the cryptographic hash does not match then data manipulation is happened. So, in this paper, we will see, along with how practically the security is highly offered by the blockchain technology and how can we easily identify if the data has been tampered along the way it reaches to us. Henceforth, we will found a way of application to secure our IoT data without any regrets in this paper.
Keywords: Blockchain Technology, Cryptographic hash, IoT, peer to peer communication
Scope of the Article: IoT