Loading…

Ethereum for Internet of Things security

The influence of Internet of Things (IoT) is growing exponentially in the consumer patterns and will continue to increase in the coming years. With millions of interconnected devices over the internet, IoT is currently running into its monumental security and centralization issues that can be resolv...

Full description

Saved in:
Bibliographic Details
Published in:Multimedia tools and applications 2021-05, Vol.80 (12), p.18901-18915
Main Authors: Raj, Aparna, Maji, Kavita, Shetty, Sujala D.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c319t-48a3f65caf90ea89bc333ba6e0c8e8319cba416025025df8f26c11b91c7eda713
cites cdi_FETCH-LOGICAL-c319t-48a3f65caf90ea89bc333ba6e0c8e8319cba416025025df8f26c11b91c7eda713
container_end_page 18915
container_issue 12
container_start_page 18901
container_title Multimedia tools and applications
container_volume 80
creator Raj, Aparna
Maji, Kavita
Shetty, Sujala D.
description The influence of Internet of Things (IoT) is growing exponentially in the consumer patterns and will continue to increase in the coming years. With millions of interconnected devices over the internet, IoT is currently running into its monumental security and centralization issues that can be resolved using Blockchain. This paper aims to demonstrate the use of a smart contract on a private Ethereum Blockchain (also known as permission less Blockchain) to check whether a user holds enough tokens to utilize a service. Private in this context implies a private instance of the Ethereum implementation in which we make use of the same security and principles of the Ethereum main chain on a personal network of connected IoT devices which improves the overall privacy and security of the system than the traditional schemes. The proposed model consists of a target IoT device controlled by a Raspberry Pi, running a client application that makes decisions based on the state of the smart contract. With this environment, we are able to achieve the following goals: (1) no data leaves the private network (2) all services are employed with transparency and accountability (3) only registered devices can issue requests for using a service. Although the demonstration is made on a home network, the model presented in this paper can be utilized in commercial environments where any service can be availed from a wide array of smart devices through a mobile application.
doi_str_mv 10.1007/s11042-021-10715-4
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2529604951</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2529604951</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-48a3f65caf90ea89bc333ba6e0c8e8319cba416025025df8f26c11b91c7eda713</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWKt_wNOCFy_RmXxsdo9S6gcUvNRzyKaTfmB3a7J76L83dQVvwsDM4XnfgYexW4QHBDCPCRGU4CCQIxjUXJ2xCWojuTECz_MtK-BGA16yq5R2AFhqoSbsft5vKNKwL0IXi7e2p9hSX3ShWG627ToVifwQt_3xml0E95no5ndP2cfzfDl75Yv3l7fZ04J7iXXPVeVkKLV3oQZyVd14KWXjSgJfUZUR3ziFJQidZxWqIEqP2NToDa2cQTlld2PvIXZfA6Xe7rohtvmlFVrUJahanygxUj52KUUK9hC3exePFsGejNjRiM1G7I8Rq3JIjqGU4XZN8a_6n9Q3IUdiDg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2529604951</pqid></control><display><type>article</type><title>Ethereum for Internet of Things security</title><source>ABI/INFORM Global (ProQuest)</source><source>Springer Nature</source><creator>Raj, Aparna ; Maji, Kavita ; Shetty, Sujala D.</creator><creatorcontrib>Raj, Aparna ; Maji, Kavita ; Shetty, Sujala D.</creatorcontrib><description>The influence of Internet of Things (IoT) is growing exponentially in the consumer patterns and will continue to increase in the coming years. With millions of interconnected devices over the internet, IoT is currently running into its monumental security and centralization issues that can be resolved using Blockchain. This paper aims to demonstrate the use of a smart contract on a private Ethereum Blockchain (also known as permission less Blockchain) to check whether a user holds enough tokens to utilize a service. Private in this context implies a private instance of the Ethereum implementation in which we make use of the same security and principles of the Ethereum main chain on a personal network of connected IoT devices which improves the overall privacy and security of the system than the traditional schemes. The proposed model consists of a target IoT device controlled by a Raspberry Pi, running a client application that makes decisions based on the state of the smart contract. With this environment, we are able to achieve the following goals: (1) no data leaves the private network (2) all services are employed with transparency and accountability (3) only registered devices can issue requests for using a service. Although the demonstration is made on a home network, the model presented in this paper can be utilized in commercial environments where any service can be availed from a wide array of smart devices through a mobile application.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-021-10715-4</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Applications programs ; Blockchain ; Computer Communication Networks ; Computer Science ; Cryptography ; Data Structures and Information Theory ; Electronic devices ; Internet of Things ; Mobile computing ; Multimedia Information Systems ; Security ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2021-05, Vol.80 (12), p.18901-18915</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-48a3f65caf90ea89bc333ba6e0c8e8319cba416025025df8f26c11b91c7eda713</citedby><cites>FETCH-LOGICAL-c319t-48a3f65caf90ea89bc333ba6e0c8e8319cba416025025df8f26c11b91c7eda713</cites><orcidid>0000-0002-0094-0444</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2529604951/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2529604951?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,11688,27924,27925,36060,44363,74895</link.rule.ids></links><search><creatorcontrib>Raj, Aparna</creatorcontrib><creatorcontrib>Maji, Kavita</creatorcontrib><creatorcontrib>Shetty, Sujala D.</creatorcontrib><title>Ethereum for Internet of Things security</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>The influence of Internet of Things (IoT) is growing exponentially in the consumer patterns and will continue to increase in the coming years. With millions of interconnected devices over the internet, IoT is currently running into its monumental security and centralization issues that can be resolved using Blockchain. This paper aims to demonstrate the use of a smart contract on a private Ethereum Blockchain (also known as permission less Blockchain) to check whether a user holds enough tokens to utilize a service. Private in this context implies a private instance of the Ethereum implementation in which we make use of the same security and principles of the Ethereum main chain on a personal network of connected IoT devices which improves the overall privacy and security of the system than the traditional schemes. The proposed model consists of a target IoT device controlled by a Raspberry Pi, running a client application that makes decisions based on the state of the smart contract. With this environment, we are able to achieve the following goals: (1) no data leaves the private network (2) all services are employed with transparency and accountability (3) only registered devices can issue requests for using a service. Although the demonstration is made on a home network, the model presented in this paper can be utilized in commercial environments where any service can be availed from a wide array of smart devices through a mobile application.</description><subject>Applications programs</subject><subject>Blockchain</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Data Structures and Information Theory</subject><subject>Electronic devices</subject><subject>Internet of Things</subject><subject>Mobile computing</subject><subject>Multimedia Information Systems</subject><subject>Security</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp9kE1LAzEQhoMoWKt_wNOCFy_RmXxsdo9S6gcUvNRzyKaTfmB3a7J76L83dQVvwsDM4XnfgYexW4QHBDCPCRGU4CCQIxjUXJ2xCWojuTECz_MtK-BGA16yq5R2AFhqoSbsft5vKNKwL0IXi7e2p9hSX3ShWG627ToVifwQt_3xml0E95no5ndP2cfzfDl75Yv3l7fZ04J7iXXPVeVkKLV3oQZyVd14KWXjSgJfUZUR3ziFJQidZxWqIEqP2NToDa2cQTlld2PvIXZfA6Xe7rohtvmlFVrUJahanygxUj52KUUK9hC3exePFsGejNjRiM1G7I8Rq3JIjqGU4XZN8a_6n9Q3IUdiDg</recordid><startdate>20210501</startdate><enddate>20210501</enddate><creator>Raj, Aparna</creator><creator>Maji, Kavita</creator><creator>Shetty, Sujala D.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-0094-0444</orcidid></search><sort><creationdate>20210501</creationdate><title>Ethereum for Internet of Things security</title><author>Raj, Aparna ; Maji, Kavita ; Shetty, Sujala D.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-48a3f65caf90ea89bc333ba6e0c8e8319cba416025025df8f26c11b91c7eda713</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Applications programs</topic><topic>Blockchain</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Data Structures and Information Theory</topic><topic>Electronic devices</topic><topic>Internet of Things</topic><topic>Mobile computing</topic><topic>Multimedia Information Systems</topic><topic>Security</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Raj, Aparna</creatorcontrib><creatorcontrib>Maji, Kavita</creatorcontrib><creatorcontrib>Shetty, Sujala D.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global (ProQuest)</collection><collection>Computing Database</collection><collection>ProQuest research library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Raj, Aparna</au><au>Maji, Kavita</au><au>Shetty, Sujala D.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Ethereum for Internet of Things security</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2021-05-01</date><risdate>2021</risdate><volume>80</volume><issue>12</issue><spage>18901</spage><epage>18915</epage><pages>18901-18915</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>The influence of Internet of Things (IoT) is growing exponentially in the consumer patterns and will continue to increase in the coming years. With millions of interconnected devices over the internet, IoT is currently running into its monumental security and centralization issues that can be resolved using Blockchain. This paper aims to demonstrate the use of a smart contract on a private Ethereum Blockchain (also known as permission less Blockchain) to check whether a user holds enough tokens to utilize a service. Private in this context implies a private instance of the Ethereum implementation in which we make use of the same security and principles of the Ethereum main chain on a personal network of connected IoT devices which improves the overall privacy and security of the system than the traditional schemes. The proposed model consists of a target IoT device controlled by a Raspberry Pi, running a client application that makes decisions based on the state of the smart contract. With this environment, we are able to achieve the following goals: (1) no data leaves the private network (2) all services are employed with transparency and accountability (3) only registered devices can issue requests for using a service. Although the demonstration is made on a home network, the model presented in this paper can be utilized in commercial environments where any service can be availed from a wide array of smart devices through a mobile application.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-021-10715-4</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0002-0094-0444</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2021-05, Vol.80 (12), p.18901-18915
issn 1380-7501
1573-7721
language eng
recordid cdi_proquest_journals_2529604951
source ABI/INFORM Global (ProQuest); Springer Nature
subjects Applications programs
Blockchain
Computer Communication Networks
Computer Science
Cryptography
Data Structures and Information Theory
Electronic devices
Internet of Things
Mobile computing
Multimedia Information Systems
Security
Special Purpose and Application-Based Systems
title Ethereum for Internet of Things security
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T21%3A53%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Ethereum%20for%20Internet%20of%20Things%20security&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Raj,%20Aparna&rft.date=2021-05-01&rft.volume=80&rft.issue=12&rft.spage=18901&rft.epage=18915&rft.pages=18901-18915&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-021-10715-4&rft_dat=%3Cproquest_cross%3E2529604951%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c319t-48a3f65caf90ea89bc333ba6e0c8e8319cba416025025df8f26c11b91c7eda713%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2529604951&rft_id=info:pmid/&rfr_iscdi=true