Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/3267
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBiswal, Asutosh Kumar-
dc.contributor.authorAddya, Sourav Kanti-
dc.contributor.authorSahoo, Bibhudatta-
dc.contributor.authorTuruk, Ashok Kumar-
dc.date.accessioned2019-03-25T04:29:19Z-
dc.date.available2019-03-25T04:29:19Z-
dc.date.issued2019-03-
dc.identifier.citation1st International Conference on Machine Learning, Image Processing, Network Security and Data Sciences (MIND), Kurukshetra, India, 3 - 4 March 2019en_US
dc.identifier.urihttp://hdl.handle.net/2080/3267-
dc.descriptionCopyright of this document belongs to proceedings publisher.en_US
dc.description.abstractInternet of Things (IoT) is a remarkable innovation where all the physical articles are associated over the web and are dispensed with a unique self-recognizing capacity to find other potential items to transmit information. However, the secure communication is a challenge among the IoT devices and detecting the compromised node form network is also difficult. In this paper, a key based communication model with different user groups has been proposed. To communicate among the user groups a gateway node is selected from the IoT nodes. For this model, we adopted a combinatorial BIBD (Balanced Incomplete Block Design) which offers unique and few keys to the IoT nodes. It is also possible that the selected gateway device or any IoT device can be compromised which hampers the efficiency of the network as well as communication data. To detect that compromised node we use a blockchain based solution mainly bitcoin’s proof-of-work is further used to provide more security to the key-distribution technique with its decentralization property at the same time it provides immutability and strong cryptographic verification. We experimented the proposed model and found out the efficiency by compromising random nodes of the network in terms of resiliency. To make the deployment unique hash values for each device was found and updated at the gateway node or blockchain miners so that we can match to the hash values with any compromised hash value whenever there is a change in the node attributes.en_US
dc.subjectClouden_US
dc.subjectFogen_US
dc.subjectBlockchainen_US
dc.subjectSecure communicationen_US
dc.subjectBlock designen_US
dc.titleSecured IoT devices management in Cloud-Fog Environment using Blockchainen_US
dc.typeArticleen_US
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
2019_MIND_AKBiswal_SecuredIoT.pdfConference paper1.15 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.