IoT Devices, User Authentication, and Data Management in a Secure, Validated Manner through the Blockchain System
Table 6
Security issues addressed by the proposed system.
Security Issues
Resolved by the proposed solution
Jamming adversaries
In the proposed solution, unique hash key values are assigned for end-users and IoT devices. In this respect, no redundancy occurs. One to one communication takes place between end-users and IoT devices. Therefore, the proposed solution mitigates the effect of jamming adversaries.
Sybil node attack
Unique hash key values are assigned to end-users. Therefore, only authenticated users that are part of the system can access the system IoT devices. There is no chance for sybil nodes to access IoT devices in the system.
Man-in-the-middle attack
Mitigate the effect of Man-in-the-Middle attack in the same way as the sybil node attack
Insecure physical interface
Virtual private network is created in terms of xamp, MySQL, which hold all records in the distributed ledger. Therefore, each end-user needs hash key values to access the system IoT devices. So any intruder or hacker cannot access the system IoT devices through the interface directly.
Double dependency problem
Proposed solution consists of decentralized architecture. De-centralized architecture is achieved through the blockchain technique. With the help of decentralized architecture, double dependency problem is removed from the system.