Blockchain for IoT Edge Devices and Data Security

Authored by: Anubhav Singh , Swaroop S. Sonone , Mahipal Singh Sankhla , Kapil Parihar , Mansi Saxena

Handbook of Green Computing and Blockchain Technologies

Print publication date:  December  2021
Online publication date:  December  2021

Print ISBN: 9780367620110
eBook ISBN: 9781003107507
Adobe ISBN:

10.1201/9781003107507-11

 Download Chapter

 

Abstract

SRAM gadgets show genuine dangers. Many edge gadgets can be forged or cloned; the chain is inadequately secure. Doubts can be raised about the quality of sent gadgets in light of the fact that they may be fake or cloned. It is an unquestionable requirement to distinguish edge gadgets’ sourcing extraordinarily and check their legitimacy intermittently at run-time. All the world coordinates blockchain innovation to validate asset-compelled, minimal effort edge gadgets. SRAM-based devices use genuinely unclonable capacities (PUFs) to produce one of a kind “advanced fingerprint” (gadget IDs). Enlisted producers transfer a cryptographic hash of every gadget ID to an “all around the world available” blockchain case (key-esteem store or shrewd agreement). While enlisting/assigning a gadget locally, the end-client checks whether the hash is available in that blockchain. We use a “locally permissioned” blockchain framework (which is as yet a worldwide oversaw blockchain or, in future, a sidechain) to validate edge gadgets for a safeguard inside and out methodology. Gadgets can be validated occasionally to forestall gadget cloning. Target situations can be enormous and have differed trust among clients and come up short on a particular border; this “nearby” blockchain procedure is consequently relevant, particularly since blockchains gain security after some time. Our methodology lessens the potential for classes of data spillage and kinds of treachery in a basic foundation or huge scope sending, (for example, a savvy city) arising from fraud gadgets. This strategy ensures against such shams in portable settings inside an IoT framework as well.

 Cite
Search for more...
Back to top

Use of cookies on this website

We are using cookies to provide statistics that help us give you the best experience of our site. You can find out more in our Privacy Policy. By continuing to use the site you are agreeing to our use of cookies.