Beyond Boundaries:Strengthening the Fabric of IoT Security through Blockchain Innovations

Blockchain technology has been utilized to bypass regulations on IoT security. Blockchain technology provides numerous benefits that can improve the security of Internet of Things devices with limited resources, such as decentralization, shared resources, immutable data transfer, dispersed network t...

Full description

Saved in:
Bibliographic Details
Published in2024 11th International Conference on Computing for Sustainable Global Development (INDIACom) pp. 1414 - 1418
Main Authors Nisa, Khair Ul, Alqahtani, Hanan Saad, Fatima, Ummatul, Lhioui, Chahira, Helali, Rasha Gaffer Mohammed, Hussain, Gousiya
Format Conference Proceeding
LanguageEnglish
Published Bharati Vidyapeeth, New Delhi 28.02.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Blockchain technology has been utilized to bypass regulations on IoT security. Blockchain technology provides numerous benefits that can improve the security of Internet of Things devices with limited resources, such as decentralization, shared resources, immutable data transfer, dispersed network topology, and shared resources. The study delves into the advantages of blockchain technology for identity management, authentication, data integrity, availability, and confidentiality. The research findings have improved the accessibility of this study. This investigation has revealed research on using blockchain technology to address cybersecurity issues. This study has focused solely on the subject of cyber security. The advantages of blockchain technology are clear. Here is a point of concern due to the system's instability and decentralization, which limits its capacity to tackle potential problems in the information security field. The increase in blockchain applications has enhanced compliance with current security protocols and discouraged cyber criminals from attempting security breaches. The study's findings may inspire further exploration of cybersecurity in fields beyond those closely linked to the Internet of Things. Ensuring the integrity of the cryptography and certification processes is vital, especially as end users depend on encryption for various daily tasks, especially with the increasing use of HTTPS encryption on the internet.
DOI:10.23919/INDIACom61295.2024.10498953