This work is licensed under a Creative Commons Attribution 3.0 License.
For more information, see http://creativecommons.org/licenses/by/3.0/.
This article has been accepted for publication in
a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2924045,
IEEE Access
Vikas Hassija et al.: A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
adversary can easily capture, observe or inject data in
the network. Blockchain acts as a promising solution
to prevent such attacks. Each legitimate user or device
is registered on blockchain, and devices can easily
identify and authenticate each other without the need
for central brokers or certification authorities [113].
Being low powered in nature, IoT devices inherit the
risk of losing data. There might be cases where due to
some external environmental issues the data is lost by
both the sender and the receiver. Use of blockchain can
prevent such losses as once the block is added in the
chain there is no way to remove it [114].
5. Blockchain to prevent unauthorized access: Many
IoT applications involve a lot of frequent communi-
cation between various nodes. The communication in
blockchain takes place using the public and private
keys, and therefore only the intended party or node
can access the data. Even if the unintended party is
able to access the data, the contents of the data will be
incomprehensible as the data is encrypted with keys.
Therefore, the blockchain data structure tries to handle
various security issues faced by IoT applications.
6. Proxy-based architecture in blockchain for resource-
constrained devices: Although blockchain provides
various security features for a distributed environment,
IoT has a specific challenge of resource constraints.
Being highly resource-constrained, IoT devices cannot
store large ledgers. There have been various works
in this direction to facilitate the use of blockchain in
IoT. Proxy-based architecture is one of the promising
solutions that can help IoT devices to use blockchain.
Proxy servers can be deployed in the network, to store
the resources in an encrypted form. The encrypted
resources can be downloaded by the client from the
proxy servers [115].
7. Elimination of centralized cloud servers: Blockchain
can enhance the security of IoT systems because it
ultimately eliminates the centralized cloud servers and
makes the network peer-to-peer. Centralized cloud
servers are the prime target of the data thieves. Using
blockchain, the data will be distributed among all the
nodes of the network and will be encrypted using a
cryptographic hash function.
Chia sẻ với bạn bè của bạn: