Research Article

IoT Devices, User Authentication, and Data Management in a Secure, Validated Manner through the Blockchain System

Table 6

Security issues addressed by the proposed system.

Security IssuesResolved by the proposed solution

Jamming adversariesIn the proposed solution, unique hash key values are assigned for end-users and IoT devices. In this respect, no redundancy occurs. One to one communication takes place between end-users and IoT devices. Therefore, the proposed solution mitigates the effect of jamming adversaries.
Sybil node attackUnique hash key values are assigned to end-users. Therefore, only authenticated users that are part of the system can access the system IoT devices. There is no chance for sybil nodes to access IoT devices in the system.
Man-in-the-middle attackMitigate the effect of Man-in-the-Middle attack in the same way as the sybil node attack
Insecure physical interfaceVirtual private network is created in terms of xamp, MySQL, which hold all records in the distributed ledger. Therefore, each end-user needs hash key values to access the system IoT devices. So any intruder or hacker cannot access the system IoT devices through the interface directly.
Double dependency problemProposed solution consists of decentralized architecture. De-centralized architecture is achieved through the blockchain technique. With the help of decentralized architecture, double dependency problem is removed from the system.