JETI Admin2
Abstract
The application of Internet of Things (IoT) devices has gained wider acceptance in recent years. Consequently, IoT devices are more susceptible to security challenges due to their small size, low energy consumption, and limited computing capacity. The heterogeneous nature of data transmission further restricts the effectiveness of traditional security measures on these devices. IoT technology involves the integration of different smart devices which communicate and interact via several and different communication lines, thereby increasing the possibility of security attacks. This work reviews existing security challenges inherent in IoT applications and the different security measures that may be used to address the challenges. A decentralized and distributed approach to security challenges in Internet of Things was explored. Emphasis was placed on the use of blockchain technology as a promising solution, being a distributed and decentralized technology. Blockchain technology is known to have a high rate of immutability and has proved to be a model for enhancing the security of network transmissions in Internet of Things applications. This is set to result in better security mechanisms to accelerate users’ acceptability and guarantee the confidentiality, integrity, and availability of data being transmitted.
References
Hopal, E. & Özalp, V. (2018). ‘Internet of Things (IoT) and its Challenges for Usability in Developing Countries’. International Journal of Innovation Engineering and Science Research. Research gate, 2(1). [2] Iqbal, M. A., Olaleye, O. G. & Bayoumi M. A. (2016). ‘A Review on Internet of Things (IoT): Security and Privacy Requirements and the Solution Approaches’. Global. Journal of Computer Science and Technology: E Network, Web & Security, 16(7). [3] Hang, L., Ullah, I., & Kim, D. H. (2020). ‘A secure fish farm platform based on blockchain for agriculture data integrity’. Comput. Electron. Agric., vol. 170. [4] Shahid, A., Almogren, A., Javaid, N., Al-Zahrani, F. A, Zuair, M., & Alam, M. (2020). Blockchain-based agri-food supply chain: a complete solution. IEEE Access, vol. 8. [5] Patel, K. K. & Patel, S. M. (2016). Internet of Things-IOT: Definition, Characteristics, Architecture, Enabling Technologies, Application & Future Challenges. International Journal of Engineering Science and Computing, 6(5). [6] Pranto, T. H., Noman, A. A., Mahmud, A, Haque, A. B. (2021). Blockchain and smart contract for IoT enabled smart agriculture.”PeerJ Comput. Sci. 21(7),1-32. DOI 10.7717/peerj-cs.407 [7] Hannah, S., Deepa, A. J., Varghese, S., Chooralil, S., BrillySangeetha, N., Yuvaraj, R. A., Raja, C., Suresh, R., Vignesh, Y., Abdullah, R. Srihari, K., & Assefa A. (2022). Blockchain-Based Deep Learning to Process IoT Data Acquisition in Cognitive Data. Hindawi BioMed Research International 2022(5038851). https://doi.org/10.1155/2022/503885. [8] Pu, S., & Lam, J. S. L. (2023). The benefits of blockchain for digital certificates: A multiple case study analysis. Technol. Soc., vol. 72, pp 102-176. https://doi.org/10.1016/ j.techsoc.2022.102176 [9] Samala, A. D., Mhlanga, D., Bojic, L., Howard, N. J., Coelho, D. P. (2024). Blockchain Technology in Education: Opportunities, Challenges, and Beyond. International Journal of Interactive Mobile Technologies (iJIM), 18(1), 20–42. https://doi.org/10.3991/ijim.v18i01.46307 [10] Prakash, C. & Saini, R. K. (2021). A Model on IoT Security Method and Protocols for IoT Security Layers. 771-780. https://doi:10.1007/978-981-15-7130-5_63. [11] Kaur, R., & Ali, A. (2022). Implementation of Blockchain in IoT. Research gate https://doi:10.1007/978-981-16-8774-7_13 [12] Hassija, V., Chamola, V., Saxena, V., Jain, D.; Goyal, P., & Sikdar, B. A. (2019). Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. IEEE Access 2019(7), 82721–82743. [13] Mohanta, B. K., Panda, S. S., Satapathy, U., Jena, D., Gountia, D. (2020). Trustworthy Management in Decentralized IoT Application using Blockchain. 10th ICCCNT 2019 July 6-8, 2019, IIT - Kanpur, Kanpur, India, 1-5. [14] Razzag, M., Gill, H., Ullah, S., & Qureshi, M. (2014). Security Issues in the Internet of Things (IoT): A Comprehensive Study. International Journal of Advanced Computer Science and Application, 8(6), 383-388. [15] Eberendu, A. C., & Chinebu, T. I. (2021). Can Blockchain be a Solution to IOT Technical and Security Issues, International Journal of Network Security & Its Applications (IJNSA), 13(6). doi: 10.5121/ijnsa.2021.13609 [16] Ferrag, M. A., Shu, L., Yang, X., Derhab, A., & Leandros, M. (2020). Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges. IEEE Special Section on Green Internet of Things, 8(2020), 32031-32053. [17] Li, L., Ouyang, Y., Zheng, J., & Ye, F. (2024). A hierarchical structure model for blockchain technology adoption. International Journal of Management and Decision Making, 1(1). https://doi.org/10.1504/ijmdm.2024.10051017 [18] Pundlik, M., & Jadhav, P. (2024). Blockchain Technology in Healthcare System for Sharing Confidential Information between Departments and Doctors. International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(12s), pp 01–10 ISSN:2147-67992147-6799 www.ijisae.org [19] Konashevych, O. (2020). Cross-blockchain protocol for public registries. International Journal of Web Information Systems, vol. 16(5), 571–610. https://doi.org/10.1108/IJWIS-07-2020-004. [20] Natalia, T., Pathan, A., Dhaliwal, N., Rajasekhar, N., & Khatkar, M. (2024). Blockchain Integration in Industry 5.0: A Security Experiment for Resilience Assessment. BIO Web of Conferences 86, 01070 (2024). https://doi.org/10.1051/bioconf/20248601070. [21] Jiang, L., (2024). The use of blockchain technology in enterprise financial accounting information sharing. PLoS ONE 19(2): https://doi.org/10.1371/journal.pone.0298210 [22] Atlam, H. F., Alenezi, A., Alassafi, M. O., & Wills, G. B. (2018). Blockchain with Internet of Things: Benefits, Challenges, and Future Directions. I.J. Intelligent Systems and Applications, 06(05), 40-48. http:/dOI: 10.5815/ijisa.2018.06.05 [23] Oriekhoe, O., Ashiwaju, B., Ihemereze, K., Ikwue, U., & Udeh, C. (2024). Blockchain Technology in Supply Chain Management: A Comprehensive Review. International Journal of Management & Entrepreneurship Research P-ISSN: 2664-3588, E-ISSN: 2664-3596 6(1), pp 150-166. doi:10.51594/ijmer.v6i1.714 [24] Ferreira, I. A., Palazzo, G., & Carvalho, H. (2023). Implications of the blockchain technology adoption by additive symbiotic networks: Cleaner Logistics and Supply Chain, 6. https://doi.org/10.1016/j.clscn.2023.100095 [25] M, M., Baptist, L. J., T, S., & K, H. (2024). Utilizing Blockchain Technology to Provide Safety for Smart Home Networks. International Journal of Electronic Security and Digital Forensics, 1(1). https://doi.org/10.1504/ijesdf.2024.10052831 [26] Zheng, P., Zheng, Z., & Chen, L. (2023). Selecting reliable blockchain peers via hybrid blockchain reliability prediction. IET Software. https://doi.org/10.1049/sfw2.12118 [27] Alkurdi, F., Elgendi, I., Munasinghe, K. S., Sharma, D. & Jamalipour, A. (2018). Blockchain in IoT Security: A Survey. 2018 28th International Telecommunication Networks and Applications Conference 978-1-5386-7177-1/18/$31.00, 1-4. [28] Gulen, K. G., & Karaagac, A. (2024). Agricultural Food Supply Chain with Blockchain Technology: A Review on Turkey. Journal Of Global Strategic Management. Https://Doi.Org/10.20460/Jgsm.2023.314 [29] Tao, X., Das, M., Zheng, C., Liu, Y., Wong, P. K. Y., Xu, Y., Liu, H., Gong, X., & Cheng, J. C. P. (2023). Enhancing BIM security in emergency construction projects using lightweight blockchain-as-a-service. Automation in Construction, 150. https://doi.org/10.1016/j.autcon.2023.104846 [30] Altulyan, M., Yao, L., Kanhere, S., & Huang, C. (2023). A blockchain framework data integrity enhanced recommender system. Computational Intelligence, 39(1). https://doi.org/10.1111/coin.12548 [31] Shen, M., Che, Z., Zhu, L. H., Xu, K., Gao, F., Yu, C. C., & Wu, Y. (2023). Anonymity in Blockchain Digital Currency Transactions: Protection and Confrontation. Journal of Computers, 46(1). https://doi.org/10.11897/SP.J.1016.2023.00125 [32] Baudet, C., & Medina, M. J. (2023). “The Paradoxes of Trust and Transparency of Blockchain Technologies,” Journal of Global Information Management, 31(5). https://doi.org/10.4018/JGIM.321111 [33] Saputra, T., & Setiawan, E. (2023). “Information Security System Using Blockchain Technology Implementation,” Jurnal Riset Multidisiplin dan Inovasi Teknologi 1(0), pp 26-30. doi:https://doi.org/10.59653/jimat.v1i01.162. [34] Zhang, B., Ma, X., & Qin, Z. (2011). “Security Architecture on the Trusting Internet of Things,” Journal of Electronic Science and Technology, 9(4). [35] Ting, L., Khan, M., Sharma, A., & Ansari M. D. (2022). “A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing,” Journal of Intelligent Systems 2022(31), pp 221–236 https://doi.org/10.1515/jisys-2022-0012. [36] Sabrina, F., Li, N., & Sohail, S., (2022). “A Blockchain Based Secure IoT System Using Device Identity Management, “ Sensor mdpi Sensors 2022, 22(7535). https://doi.org/10.3390/s22197535