Handbook of IoT and Blockchain
eBook - ePub

Handbook of IoT and Blockchain

Methods, Solutions, and Recent Advancements

  1. 192 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

About this book

Handbook of IoT and Blockchain: Methods, solutions, and Recent Advancements includes contributions from around the globe on recent advances and findings in the domain of Internet of Things (IoT) and Blockchain. Chapters include theoretical analysis, practical implications, and extensive surveys with analysis on methods, algorithms, and processes for new product development.

IoT and Blockchain are the emerging topics in the current manufacturing scenario.This handbook includes recent advances; showcases the work of research around the globe; offers theoretical analysis and practical implications; presents extensive surveys with analysis, new contributions, and proposals on methods, algorithms, and processes; and also covers recent advances from quantitative and qualitative articles, case studies, conceptual works, and theoretical backing.

This handbook will be of interest to graduate students, researchers, academicians, institutions, and professionals that are interested in exploring the areas of IoT and Blockchain.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Handbook of IoT and Blockchain by Brojo Kishore Mishra, Sanjay Kumar Kuanar, Sheng-Lung Peng, Daniel D. Dasig, Jr., Brojo Kishore Mishra,Sanjay Kumar Kuanar,Sheng-Lung Peng,Daniel D. Dasig, Jr. in PDF and/or ePUB format, as well as other popular books in Computer Science & Cryptography. We have over one million books available in our catalogue for you to explore.

Information

1 Blockchain-Enabled Security and Privacy Schemes in IoT Technologies

Siddhant Banyal1, Mayank Saxena2, and Deepak Kumar Sharma3
1Department of Instrumentation and Control, Netaji Subhas University of Technology
(Formerly known as Netaji Subhas Institute of Technology), New Delhi, India
2Department of Electronics and Communications Engineering, Netaji Subhas University of Technology
(Formerly known as Netaji Subhas Institute of Technology), New Delhi, India
3Department of Information Technology, Netaji Subhas University of Technology
(Formerly known as Netaji Subhas Institute of Technology), New Delhi, India

CONTENTS

1.1Introduction and Motivation
1.1.1Internet of Things
1.1.1.1IoT Architecture
1.1.1.2Distinguishing IoT from Conventional Networks
1.1.2Blockchain: An Overview
1.1.3Generations of Blockchain
1.1.3.1Blockchain 1.0: Bitcoin and Cryptocurrency
1.1.3.2Blockchain 2.0: Smart Contracts and Ethereum
1.1.3.3Blockchain 3.0: Convergence toward Decentralized Applications
1.1.3.4Blockchain 4.0: Seamless Integration with Industry 4.0
1.2IoT Architecture and Systemic Challenges
1.2.1Sensing Layer: Introduction and Challenges in End Nodes
1.2.2Threat Based on Network Layer
1.2.3Service-Layer Based Threats
1.2.4Application Interface Layer
1.2.5Cross-Layer Challenges
1.3Challenge to Implementation of Blockchain in IoT
1.3.1Absence of IoT-Centric Consensus Protocol
1.3.2Transaction Validation Rules
1.3.3Scalability Challenges
1.3.3.1Storage Capacity
1.3.3.2Inherent Latency Blockchain
1.3.4IoT Device Integration Challenges
1.3.5Protection of Devices against Malware and Content Execution Attacks
1.3.6Secure and Synchronized Software Updates
1.4Application of Blockchain in IoT Sector
1.4.1Autonomous Decentralized Peer-to-Peer Telemetry
1.4.2Blockchain-Enabled Security for Smart Cities
1.4.3Blockchain-Enabled Smart Home Architecture
1.4.4Blockchain-Based Self-Managed VANETS
1.4.5Security and Privacy of Data
1.5Conclusion and Future Scope of Work
1.6References

1.1Introduction and Motivation

1.1.1Internet of Things

The last two decades have been catalyzed by developments on a myriad of technological fronts and these developments have severely affected the way in which society functions. Technology has been increasingly integrated with our way of living and daily life, ranging from the moment we wake up at home and use smart home appliances to the usage of integrated technology in the workplace to health monitoring and analytics of our sleep. This development has asymmetrically changed the way industries perceive and use technology and with the incumbent developments they have been trying more and more to integrate them into their operations for efficiency. The reports suggest that the estimated count of connected IoT devices is set to rise to 50 billion by the end of this decade [1]. The ecosystem involves a myriad of elements such as: IoT devices, sensors, actuators, network elements (servers, routers etc.) and associated industrial machinery. In this pursuit of connecting conventional devices across networks and over the internet, the Internet of Things and Web of Things (WoT) have been pivotal in catalyzing and catering to this need. IoT as an emerging technology offers novel solutions and optimizing paradigms to both conventional and unconventional industrial operations. One such example of this innovative behavior is the case of innovative transportation in the field of Intelligent Transportation Systems (ITS) where IoT and associated technology have provided the ability for smart traffic management and traffic prediction through monitoring and predicting traffic location.
As discussed above, the Internet of Things or IoT encompasses a global network of nodes and devices that are addressable uniquely via standard communication protocols. The Internet of Things, which has witnessed a dramatic surge in the recent past, has had an immense impact on every aspect of human lives, ranging from wearable gear to sensors monitoring ecological changes in remote locations to regulating physical metrics in manufacturing processes. The set of devices or the “Things” which share a common resemblance in order to directly or indirectly connect to the Internet, operate within the confines of their functionality and exchange, analyze, process and deliver data in the common language; these sets of devices working in tandem are defined as “Internet of Things”. Although large swathes in advancement in technology have unequivocally reduced human intervention and have significantly integrated devices with the real world, the big question of privacy and protection in IoT devices has been left largely unaddressed and now presents a potential threat to the cyber landscape. The lack of a standard IoT framework safeguarding privacy across all platforms has been attributed to varied communication protocols, a multitude of programming languages and differing levels of distributed computing in devices, networking and perceiving data in real-time systems [2].
The developers and research community have been meticulously working to develop tailor-made frameworks and structures for specific platforms. In its pursuit of this, the community has encountered several challenges pertaining to hardware which involve energy efficiency, ranging from the lightweight computation of devices and sensors to virtual threats including encryption attacks which occur on system vulnerabilities and tend to impede system integrity. Privacy is another concern that many nations across the globe have echoed. Policy measures such as the EU’s General Data Protection Regulation (EU GDPR) have already been enforced with stringent rules for privacy yet there exist several challenges on the regulatory and technological front which this chapter touches upon in its first section. Industries such as healthcare, which incorporates one of the largest numbers of IoT devices, are especially under threat as revealed in the analysis by the Ponemon Institute and IBM. The most severe example of this is the case of Singapore, when an attack on SingHealth exposed the data of more than 1.5 million patients. The aforementioned cyber threats present us with a unique conundrum.

1.1.1.1IoT Architecture

Every IoT system implemented globally is different; however, the data process flow and general architecture have some similarity. The first element is “Things”; this entails the nodes/devices that sense data from the environment via embedded sensors and actuators and are connected to the internet via appropriate gateways. The second layer includes the data acquisition systems and gateways that are responsible for gathering large amounts of raw and processed data (filtration, amplification and other associated electronic signal conditioning), and convert it into a digital form that is ready for further analysis. The third layer is where data visualization and intelligent control steps in, through which the processed data is transferred for long-term storage to data centers and cloud-based facilities which form the fourth layer.
These four layers are illustrated in Figure 1.1 of this chapter. The figures entail a five-layer architecture that comprises of:
1.Business Layer
2.Application Layer
3.Service Management Layer
4.Object Abstraction Layer
5.Perception Layer
The business layer is responsible for the management of all activities, services and development of business models, graphs, and flowcharts based on the data it receives from the application layer. Further, this layer is responsible for supporting the decision-making aspect, based on big data analysis and determining the course of action. The application layer is responsible for service delivery and acts as an interface to the business layer. Furthermore, it is responsible...

Table of contents

  1. Cover
  2. Half Title
  3. Series Information
  4. Title Page
  5. Copyright Page
  6. Table of Contents
  7. Preface
  8. 1 Blockchain-Enabled Security and Privacy Schemes in IoT Technologies
  9. 2 Application and Challenges of IoT in Healthcare
  10. 3 “IoT”: Bright Future in Healthcare Industry
  11. 4 Putting Blockchain into Practice
  12. 5 Object Detection System with Image and Speech Recognition
  13. 6 Blockchain Applications and Implementation
  14. 7 Internet of Things (IoT) Applications with Blockchain Technique
  15. 8 Security and Privacy-Enhancing Technologies for Blockchain and Cryptocurrency
  16. 9 Security and Privacy in IoT
  17. 10 Geospatial Data Classification using Sequential Pattern Mining with Modified Deep Learning Architecture
  18. 11 Starring Role of Internet of Things (IoT) in the Field of Biomedical Peregrination for Modern Society
  19. Index