Loading…
Ethereum for Internet of Things security
The influence of Internet of Things (IoT) is growing exponentially in the consumer patterns and will continue to increase in the coming years. With millions of interconnected devices over the internet, IoT is currently running into its monumental security and centralization issues that can be resolv...
Saved in:
Published in: | Multimedia tools and applications 2021-05, Vol.80 (12), p.18901-18915 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c319t-48a3f65caf90ea89bc333ba6e0c8e8319cba416025025df8f26c11b91c7eda713 |
---|---|
cites | cdi_FETCH-LOGICAL-c319t-48a3f65caf90ea89bc333ba6e0c8e8319cba416025025df8f26c11b91c7eda713 |
container_end_page | 18915 |
container_issue | 12 |
container_start_page | 18901 |
container_title | Multimedia tools and applications |
container_volume | 80 |
creator | Raj, Aparna Maji, Kavita Shetty, Sujala D. |
description | The influence of Internet of Things (IoT) is growing exponentially in the consumer patterns and will continue to increase in the coming years. With millions of interconnected devices over the internet, IoT is currently running into its monumental security and centralization issues that can be resolved using Blockchain. This paper aims to demonstrate the use of a smart contract on a private Ethereum Blockchain (also known as permission less Blockchain) to check whether a user holds enough tokens to utilize a service. Private in this context implies a private instance of the Ethereum implementation in which we make use of the same security and principles of the Ethereum main chain on a personal network of connected IoT devices which improves the overall privacy and security of the system than the traditional schemes. The proposed model consists of a target IoT device controlled by a Raspberry Pi, running a client application that makes decisions based on the state of the smart contract. With this environment, we are able to achieve the following goals: (1) no data leaves the private network (2) all services are employed with transparency and accountability (3) only registered devices can issue requests for using a service. Although the demonstration is made on a home network, the model presented in this paper can be utilized in commercial environments where any service can be availed from a wide array of smart devices through a mobile application. |
doi_str_mv | 10.1007/s11042-021-10715-4 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2529604951</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2529604951</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-48a3f65caf90ea89bc333ba6e0c8e8319cba416025025df8f26c11b91c7eda713</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWKt_wNOCFy_RmXxsdo9S6gcUvNRzyKaTfmB3a7J76L83dQVvwsDM4XnfgYexW4QHBDCPCRGU4CCQIxjUXJ2xCWojuTECz_MtK-BGA16yq5R2AFhqoSbsft5vKNKwL0IXi7e2p9hSX3ShWG627ToVifwQt_3xml0E95no5ndP2cfzfDl75Yv3l7fZ04J7iXXPVeVkKLV3oQZyVd14KWXjSgJfUZUR3ziFJQidZxWqIEqP2NToDa2cQTlld2PvIXZfA6Xe7rohtvmlFVrUJahanygxUj52KUUK9hC3exePFsGejNjRiM1G7I8Rq3JIjqGU4XZN8a_6n9Q3IUdiDg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2529604951</pqid></control><display><type>article</type><title>Ethereum for Internet of Things security</title><source>ABI/INFORM Global (ProQuest)</source><source>Springer Nature</source><creator>Raj, Aparna ; Maji, Kavita ; Shetty, Sujala D.</creator><creatorcontrib>Raj, Aparna ; Maji, Kavita ; Shetty, Sujala D.</creatorcontrib><description>The influence of Internet of Things (IoT) is growing exponentially in the consumer patterns and will continue to increase in the coming years. With millions of interconnected devices over the internet, IoT is currently running into its monumental security and centralization issues that can be resolved using Blockchain. This paper aims to demonstrate the use of a smart contract on a private Ethereum Blockchain (also known as permission less Blockchain) to check whether a user holds enough tokens to utilize a service. Private in this context implies a private instance of the Ethereum implementation in which we make use of the same security and principles of the Ethereum main chain on a personal network of connected IoT devices which improves the overall privacy and security of the system than the traditional schemes. The proposed model consists of a target IoT device controlled by a Raspberry Pi, running a client application that makes decisions based on the state of the smart contract. With this environment, we are able to achieve the following goals: (1) no data leaves the private network (2) all services are employed with transparency and accountability (3) only registered devices can issue requests for using a service. Although the demonstration is made on a home network, the model presented in this paper can be utilized in commercial environments where any service can be availed from a wide array of smart devices through a mobile application.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-021-10715-4</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Applications programs ; Blockchain ; Computer Communication Networks ; Computer Science ; Cryptography ; Data Structures and Information Theory ; Electronic devices ; Internet of Things ; Mobile computing ; Multimedia Information Systems ; Security ; Special Purpose and Application-Based Systems</subject><ispartof>Multimedia tools and applications, 2021-05, Vol.80 (12), p.18901-18915</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-48a3f65caf90ea89bc333ba6e0c8e8319cba416025025df8f26c11b91c7eda713</citedby><cites>FETCH-LOGICAL-c319t-48a3f65caf90ea89bc333ba6e0c8e8319cba416025025df8f26c11b91c7eda713</cites><orcidid>0000-0002-0094-0444</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2529604951/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2529604951?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,11688,27924,27925,36060,44363,74895</link.rule.ids></links><search><creatorcontrib>Raj, Aparna</creatorcontrib><creatorcontrib>Maji, Kavita</creatorcontrib><creatorcontrib>Shetty, Sujala D.</creatorcontrib><title>Ethereum for Internet of Things security</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>The influence of Internet of Things (IoT) is growing exponentially in the consumer patterns and will continue to increase in the coming years. With millions of interconnected devices over the internet, IoT is currently running into its monumental security and centralization issues that can be resolved using Blockchain. This paper aims to demonstrate the use of a smart contract on a private Ethereum Blockchain (also known as permission less Blockchain) to check whether a user holds enough tokens to utilize a service. Private in this context implies a private instance of the Ethereum implementation in which we make use of the same security and principles of the Ethereum main chain on a personal network of connected IoT devices which improves the overall privacy and security of the system than the traditional schemes. The proposed model consists of a target IoT device controlled by a Raspberry Pi, running a client application that makes decisions based on the state of the smart contract. With this environment, we are able to achieve the following goals: (1) no data leaves the private network (2) all services are employed with transparency and accountability (3) only registered devices can issue requests for using a service. Although the demonstration is made on a home network, the model presented in this paper can be utilized in commercial environments where any service can be availed from a wide array of smart devices through a mobile application.</description><subject>Applications programs</subject><subject>Blockchain</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Data Structures and Information Theory</subject><subject>Electronic devices</subject><subject>Internet of Things</subject><subject>Mobile computing</subject><subject>Multimedia Information Systems</subject><subject>Security</subject><subject>Special Purpose and Application-Based Systems</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp9kE1LAzEQhoMoWKt_wNOCFy_RmXxsdo9S6gcUvNRzyKaTfmB3a7J76L83dQVvwsDM4XnfgYexW4QHBDCPCRGU4CCQIxjUXJ2xCWojuTECz_MtK-BGA16yq5R2AFhqoSbsft5vKNKwL0IXi7e2p9hSX3ShWG627ToVifwQt_3xml0E95no5ndP2cfzfDl75Yv3l7fZ04J7iXXPVeVkKLV3oQZyVd14KWXjSgJfUZUR3ziFJQidZxWqIEqP2NToDa2cQTlld2PvIXZfA6Xe7rohtvmlFVrUJahanygxUj52KUUK9hC3exePFsGejNjRiM1G7I8Rq3JIjqGU4XZN8a_6n9Q3IUdiDg</recordid><startdate>20210501</startdate><enddate>20210501</enddate><creator>Raj, Aparna</creator><creator>Maji, Kavita</creator><creator>Shetty, Sujala D.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-0094-0444</orcidid></search><sort><creationdate>20210501</creationdate><title>Ethereum for Internet of Things security</title><author>Raj, Aparna ; Maji, Kavita ; Shetty, Sujala D.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-48a3f65caf90ea89bc333ba6e0c8e8319cba416025025df8f26c11b91c7eda713</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Applications programs</topic><topic>Blockchain</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Data Structures and Information Theory</topic><topic>Electronic devices</topic><topic>Internet of Things</topic><topic>Mobile computing</topic><topic>Multimedia Information Systems</topic><topic>Security</topic><topic>Special Purpose and Application-Based Systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Raj, Aparna</creatorcontrib><creatorcontrib>Maji, Kavita</creatorcontrib><creatorcontrib>Shetty, Sujala D.</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection (ProQuest)</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global (ProQuest)</collection><collection>Computing Database</collection><collection>ProQuest research library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Raj, Aparna</au><au>Maji, Kavita</au><au>Shetty, Sujala D.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Ethereum for Internet of Things security</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2021-05-01</date><risdate>2021</risdate><volume>80</volume><issue>12</issue><spage>18901</spage><epage>18915</epage><pages>18901-18915</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>The influence of Internet of Things (IoT) is growing exponentially in the consumer patterns and will continue to increase in the coming years. With millions of interconnected devices over the internet, IoT is currently running into its monumental security and centralization issues that can be resolved using Blockchain. This paper aims to demonstrate the use of a smart contract on a private Ethereum Blockchain (also known as permission less Blockchain) to check whether a user holds enough tokens to utilize a service. Private in this context implies a private instance of the Ethereum implementation in which we make use of the same security and principles of the Ethereum main chain on a personal network of connected IoT devices which improves the overall privacy and security of the system than the traditional schemes. The proposed model consists of a target IoT device controlled by a Raspberry Pi, running a client application that makes decisions based on the state of the smart contract. With this environment, we are able to achieve the following goals: (1) no data leaves the private network (2) all services are employed with transparency and accountability (3) only registered devices can issue requests for using a service. Although the demonstration is made on a home network, the model presented in this paper can be utilized in commercial environments where any service can be availed from a wide array of smart devices through a mobile application.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-021-10715-4</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0002-0094-0444</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2021-05, Vol.80 (12), p.18901-18915 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2529604951 |
source | ABI/INFORM Global (ProQuest); Springer Nature |
subjects | Applications programs Blockchain Computer Communication Networks Computer Science Cryptography Data Structures and Information Theory Electronic devices Internet of Things Mobile computing Multimedia Information Systems Security Special Purpose and Application-Based Systems |
title | Ethereum for Internet of Things security |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T21%3A53%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Ethereum%20for%20Internet%20of%20Things%20security&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Raj,%20Aparna&rft.date=2021-05-01&rft.volume=80&rft.issue=12&rft.spage=18901&rft.epage=18915&rft.pages=18901-18915&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-021-10715-4&rft_dat=%3Cproquest_cross%3E2529604951%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c319t-48a3f65caf90ea89bc333ba6e0c8e8319cba416025025df8f26c11b91c7eda713%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2529604951&rft_id=info:pmid/&rfr_iscdi=true |