Manuscript Number : IJSRST16241013
Enhancing IoT Security through Advanced Blockchain Technology
Authors(1) :-Harisha K S
The proliferation of Internet of Things (IoT) devices has transformed various sectors, improving efficiency and connectivity. However, this rise also significantly amplifies security vulnerabilities, exposing IoT ecosystems to various cyber threats. Traditional security mechanisms often fall short in addressing these vulnerabilities due to their centralized nature and scalability issues. Blockchain technology, recognized for its robust security features such as decentralization, transparency, and immutability, offers a promising alternative. This paper explores the application of advanced blockchain technologies, such as smart contracts, zero-knowledge proofs, and off-chain transactions, to enhance IoT security. Through theoretical analysis and empirical data, we demonstrate how blockchain can resolve critical security issues in IoT networks, including data integrity, device authentication, and secure communication. The findings suggest that integrating blockchain technology into IoT frameworks can significantly mitigate risks and bolster security. This research contributes to the academic discourse by highlighting practical implementations, challenges, and future perspectives on the convergence of blockchain and IoT technologies.
Harisha K S
IoT Security, Blockchain Technology, Decentralization, Data Integritym Smart Contracts, Zero-Knowledge Proofs, Cybersecurity, IoT Devices, Blockchain Implementation, Secure IoT Communication. Publication Details
Published in : Volume 2 | Issue 4 | July-August 2016 Article Preview
Assistant Professor, Department of Electronics and Communication, Government Engineering College Haveri, Karnataka, India
Date of Publication : 2016-07-30
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 366-381
Manuscript Number : IJSRST16241013
Publisher : Technoscience Academy
Journal URL : https://ijsrst.com/IJSRST16241013
Citation Detection and Elimination |
|
|