The Internet of Things(IoT)is converting today’s physical world into a complex and sophisticated network of connected devices on an enormous scale.The existing malicious node detection mechanism in traditional approa...The Internet of Things(IoT)is converting today’s physical world into a complex and sophisticated network of connected devices on an enormous scale.The existing malicious node detection mechanism in traditional approaches lacks in transparency,availability,or traceability of the detection phase.To overcome these concerns,we provide a decentralized technique using blockchain technology.Despite the fact that blockchain technology is applicable to create that type of models,existing harmony set of instructions are susceptible to do violence to such as DoS and Sybil,making blockchain systems unfeasible.Here,a new Proof-of-Improved-Participation(PoIP)harmony instruction was suggested that benefits the participation rules to select honest peers for mining while limiting malicious peers.Under an evaluation the PoIP outperforms the Proof-of-Work(PoW)instructions are demonstrated,Proof of Stake(PoS)instructions in terms of energy consumption,accuracy,and bandwidth.To compare the three consensus protocols with respect to efficiency,we build a lightweight mining model andfind that PoIP consensus has greater efficiency than PoW and PoS.PoIP has 25%lower attack risk than existing consensus.As a consequence,our suggested methodology can provide the needed security with minimal attack risk and high accuracy,according to the analysis results.As a result,suggested consensus is more efficient than existing methods in terms of block generation time.Hence we suggest that suggested consensus is very suitable for IoT-based applications especially in healthcare.展开更多
Security is a primary concern in communication for reliable transfer ofinformation between the authenticated members, which becomes more complexin a network of Internet of Things (IoT). To provide security for group c...Security is a primary concern in communication for reliable transfer ofinformation between the authenticated members, which becomes more complexin a network of Internet of Things (IoT). To provide security for group communication a key management scheme incorporating Bilinear pairing technique withMulticast and Unicast key management protocol (BMU-IOT) for decentralizednetworks has been proposed. The first part of the proposed work is to dividethe network into clusters where sensors are connected to and is administered bycluster head. Each sensor securely shares its secret keys with the cluster headusing unicast. Based on these decryption keys, the cluster head generates a common encryption key using bilinear pairing. Any sensor in the subgroup candecrypt the message, which is encrypted by the common encryption key. Theremaining part focuses to reduce communication, computation and storage costsof the proposed framework and the resilience against various attacks. The implementation is carried out and results are compared with the existing schemes thathave given considerably better results. Thus, the lightweight devices of IoT canprovide efficiency and security by reducing their overhead in terms of complexity.展开更多
文摘The Internet of Things(IoT)is converting today’s physical world into a complex and sophisticated network of connected devices on an enormous scale.The existing malicious node detection mechanism in traditional approaches lacks in transparency,availability,or traceability of the detection phase.To overcome these concerns,we provide a decentralized technique using blockchain technology.Despite the fact that blockchain technology is applicable to create that type of models,existing harmony set of instructions are susceptible to do violence to such as DoS and Sybil,making blockchain systems unfeasible.Here,a new Proof-of-Improved-Participation(PoIP)harmony instruction was suggested that benefits the participation rules to select honest peers for mining while limiting malicious peers.Under an evaluation the PoIP outperforms the Proof-of-Work(PoW)instructions are demonstrated,Proof of Stake(PoS)instructions in terms of energy consumption,accuracy,and bandwidth.To compare the three consensus protocols with respect to efficiency,we build a lightweight mining model andfind that PoIP consensus has greater efficiency than PoW and PoS.PoIP has 25%lower attack risk than existing consensus.As a consequence,our suggested methodology can provide the needed security with minimal attack risk and high accuracy,according to the analysis results.As a result,suggested consensus is more efficient than existing methods in terms of block generation time.Hence we suggest that suggested consensus is very suitable for IoT-based applications especially in healthcare.
文摘Security is a primary concern in communication for reliable transfer ofinformation between the authenticated members, which becomes more complexin a network of Internet of Things (IoT). To provide security for group communication a key management scheme incorporating Bilinear pairing technique withMulticast and Unicast key management protocol (BMU-IOT) for decentralizednetworks has been proposed. The first part of the proposed work is to dividethe network into clusters where sensors are connected to and is administered bycluster head. Each sensor securely shares its secret keys with the cluster headusing unicast. Based on these decryption keys, the cluster head generates a common encryption key using bilinear pairing. Any sensor in the subgroup candecrypt the message, which is encrypted by the common encryption key. Theremaining part focuses to reduce communication, computation and storage costsof the proposed framework and the resilience against various attacks. The implementation is carried out and results are compared with the existing schemes thathave given considerably better results. Thus, the lightweight devices of IoT canprovide efficiency and security by reducing their overhead in terms of complexity.