0% found this document useful (0 votes)
9 views13 pages

Information Security 1

The document presents a decentralized IoT device management platform utilizing Ethereum blockchain technology to enhance security, identity management, and scalability. It outlines a system where IoT devices are registered and authenticated through smart contracts, ensuring secure communication and data integrity. The platform aims to provide a robust solution to the challenges of unauthorized access and tampering in increasingly connected IoT environments.

Uploaded by

hemavasanth69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views13 pages

Information Security 1

The document presents a decentralized IoT device management platform utilizing Ethereum blockchain technology to enhance security, identity management, and scalability. It outlines a system where IoT devices are registered and authenticated through smart contracts, ensuring secure communication and data integrity. The platform aims to provide a robust solution to the challenges of unauthorized access and tampering in increasingly connected IoT environments.

Uploaded by

hemavasanth69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Secure IoT Device Management Platform

Anees Sajid Injeti G. Neha Rupsica G. Praneetha Reddy


Department of Computer Science, Department of Computer Science, Department of Computer Science,
Amrita School of Computing, Bengaluru. Amrita School of Computing, Bengaluru. Amrita School of Computing, Bengaluru.
Amrita Vishwa Vidyapeetham, India Amrita Vishwa Vidyapeetham, India Amrita Vishwa Vidyapeetham, India
bl.en.u4cse21016@bl.students.amrita.edu bl.en.u4cse21055@bl.students.amrita.edu bl.en.u4cse21063@bl.students.amrita.edu

Kumaran.U
Department of Computer Science,
Amrita School of Computing, Bengaluru.
Amrita Vishwa Vidyapeetham, India

Abstract—The rapid growth of Internet of Things (IoT) de- frequently an attack target but rather spread across the
vices has introduced challenges in security, identity management, network. This
and scalability, with traditional centralized systems becoming
insufficient. To address these issues, we propose a decentralized
IoT device management system utilizing Ethereum blockchain
technology. In this system, IoT devices are registered and au-
thenticated via smart contracts on the Ethereum network, and
cryptographically signed messages sent by devices are validated
on the blockchain to ensure security, authenticity, and integrity.
Our developed system contains a smart contract, a web interface
for user sign-up, and a platform for communication of devices.
The devices are registered with the web interface, and using an
offered private key, send secure messages towards the platform.
These are verified through the blockchain, where the messages
are kept, thus ensuring that devices are legit, that their
information is safe and cannot be modified or denied later.
Keywords—IoT Security,Device Authentication,Blockchain-
Based Identity Management,Ethereum Smart Contracts,Digital
Certificates

I. INTRODUCTION
Today, most devices are connected to the Internet-from
smart gadgets and wearable fitness trackers to industrial sen-
sors and healthcare equipment. With widespread use, these
devices have dramatically increased security risks. For ex-
ample, for instance if a central server controls thousands of
such devices then unauthorized access to a camera system
to view surveillance video or to access medical monitoring
equipment could violate privacy or cause large-scale
downtime. The more the number of devices getting into these
networks, the more challenging it becomes to handle their
security, track the usage of the device, and ensure adequate
protection. Such applications would be highly sensitive-
potentially with self- driving cars or healthcare applications
where data integrity and accuracy are a requirement.
Therefore, this raises the need for a safer solution in terms of
device management yet scalable as the counts of devices
involved in IoT are growing.
This project utilizes blockchain technology, specifically
the Ethereum blockchain, to improve management security
over IoT devices. One of the key advantages of blockchain is
its decentralized nature; this is where, unlike traditional
systems, control isn’t held by a central server which is most
1|Page
decentralization makes the work of hackers rather difficult
trying to hack into the whole network because each
device in the system verifies and authenticates others
individually. Our system simplifies tracking and verification
by assigning a unique identity to each IoT device on the
blockchain; it ensures that only authorized devices can send
or receive data. Also, there is inherent scalability of
blockchain that supports continuous growth in the number of
devices without ever putting security at stake or performance.

Our designed platform makes use of the Ethereum


blockchain for the management of IoT devices. This brings
about a more secure decentralized control for clients. The
system can be divided into several parts: the part that exists
on the blockchain is the smart contract; also, there is a user-
friendly web interface designed for controlling devices; and
finally, a platform with a messaging style that assures safety.
Registered devices are given unique identities and are
recorded in the blockchain’s smart contract via the web
interface. After registration, devices can send encrypted
messages to the platform through message signing using a
private key. The idea makes sure that each interaction is
trustworthy and verifiable by using the blockchain in
validating authenticity and integrity of these messages.

This project will henceforth let IoT devices be


managed in the most secure and reliable manner. Long-term
solutions toward problems of tampering and unauthorized
access will be possible. The ledger of Blockchain maintains a
permanent and secure record, as it is immutable and
transparent. Thereby, eliminating the requirement of a central
authority and using blockchain in its security and scalability,
this system possesses a robust approach toward the
management of IoT devices. The decentralized model has
significant promise to improve the security of IoT, as such
networks keep on increasing, providing a safe and efficient
environment for varied appli- cations of IoT. Further with
the growth of IoT ecosystems, the value of blockchain
technology for enhanced security and efficiency could
become indispensable in establishing trust, reliability, and
seamless integration across different connected environments.
Therefore, this model constitutes a promising step forward for
the secure evolution of IoT in an increasingly connected
world.

2|Page
learning in managing energy and cybersecurity mechanisms.
This would elevate security as well as efficiency in energy
II. LITERATURE REVIEW delivery across DC microgrids.
Kornaros et al. [1] reports the zero-trust framework based Garah et al. [10] reports a lightweight cryptography to-
on SPIFFE/SPIRE for authenticating IoT devices and limit gether with the Autonomic Computing paradigm for self-
participation in the network communications to trusted devices management are proposed for IoT data confidentiality. In their
only. This approach addresses headless security gaps for IoT approach, encryption algorithms are dynamically adapted for
devices as well as the challenges of dynamic infrastructure strategy and security improvement and performance and IoT
managed by Kubernetes. device lifespan increase.
Tejaswi et al. [2] reports the number of vulnerabilities Srivastava et al. [11] reports an amalgam of real-time
on 52 IoT management platforms will be analyzed. Impor- attack detection, blockchain integration, machine learning, and
tant vulnerabilities are broken authentication and unauthorized hardware-based security IoT framework in this paper to pro-
access on 33 platforms. Their findings therefore suggest that vide robust protection. They approach to ensure data integrity,
account takeover, data exposure, and remote code execution rapid threat mitigation, and resilient IoT networks.
are important weaknesses in need of strong security controls
Kumar et al. [12] reports a blockchain-based security
in the IoT management context.
model in Hyperledger Fabric, securing data propagations in
Hrit, can et al. [3] reports an IoT platform architecture cross- organization IoT networks while ensuring integrity and
that’s secure, protected by a double reverse proxy, powered privacy through permissioned access as well as robust
by Oracle Cloud VPS, NGINX Proxy Manager, Cloudflare, encryption, thus showing scalability, security, and high
and P2P Tunnelling by Tailscale. This solution will therefore performance in IoT environments.
provide increased security resilience to the IoT device behind
CGNAT protection from DDoS attacks, while also providing Datiri et al. [13] reports a three-tiered Blockchain-based
data integrity by encrypted communication. data management system for IoT, combining Blockchain,
Edge Computing, and Clustering, in order to promote security,
Sathyaraj et al. [4] reports a safe and secure IoT device resource optimization, as well as latency reduction. Their
onboarding solution with a focus on cryptographic protocols, proposed model ensures tamper-resistant data management
identity management, and security communication relating to with improved QoS and scalability for IoT systems.
unauthorized access of a particular system and data breaches.
This approach stresses the requirement of authentic and re- Victoria et al. [14] reports security protocols for healthcare
liable authentication and network bootstrapping processes to data management in fog and IoT networks with authentication
securely integrate devices in an IoT network. techniques and performance metrics, the paper identifies gaps
in research with a focus on the necessity of developing
Ghosh et al. [5] reports the blockchain-based device iden- efficient security solutions in healthcare applications from the
tity management and authentication framework is proposed for perspective of fog-assisted networks.
CPSs by combining SSI with blockchain to bestow enhanced
security, privacy, and resilience. Their approach will help Kim et al. [15] reports an IoT device-trusted remote attes-
devices to autonomously manage identities, minimizing risks tation framework and verifies the trustworthiness of devices in
from unauthorized accesses as well as data breaches. order to cut the malware and firmware forgery problem that
contributes to heterogeneous IoT platforms, which allows real-
Aiello et al. [6] reports the mash-up of cloud-native time detection and recovery of malfunctioning devices.
security services like CASBs or Zero Trust, as part of the
integration of SASE and SD-WAN, can improve network
III. METHODOLOGY
security. The framework by the authors addresses critical
security con- cerns, especially concerning the management of This section explains the design and implementation ap-
identity and protection of data, particularly in remote and proach of the Ethereum blockchain-based IoT device man-
hybrid work environments. agement system. The four key components of the system,
namely Device Identity, Message Authentication, Firmware
Yuan et al. [7] reports the mash-up of cloud-native security
Integrity, and Device Reputation, would ensure decentralized
services like CASBs or Zero Trust, as part of the integration
authentication and trust if each module were designed inde-
of SASE and SD-WAN, can improve network security. The
pendently to solve some of the most common security and
framework by the authors addresses critical security con-
management problems in an IoT network. In general, the
cerns, especially concerning the management of identity and
system is composed of four main constituents: IoT Devices,
protection of data, particularly in remote and hybrid work
Web Interface, IoT Platform, and Ethereum Blockchain. The
environments.
constituents communicate with each other to allow for de-
Katta et al. [8] reports a blockchain-based distributed hy- centralized management and authentication of IoT devices.
brid cloud identity management system to secure IoT devices This ensures all messages a device sends are authenticated
while overcoming scalability and security issues. Their work and reliable. Fig. 1 shows how the four constituents work
enhances privacy and reliability and counteracts risks against together to conceptualize an efficient system in the protection
centralized identity management. and management of networked devices in the IoT network.
Campos-Sanchez et al. [9] reports an IoT-based architec- IoT Platform: This serves as the back-end system for
ture for decentralized smart microgrids incorporating machine authenticating all incoming messages from devices against
3|Page
C. Message Verification :
The platform verifies the signed message by the smart
contract and checks the public key for the device’s identity

D. Event Logging :
On the platform, the message verification and device reg-
istration are logged on the blockchain.

E. Web Interface
The users access the web interface; it is utilized to control
devices, view historical events, and monitor the status of the
network.

Fig. 1. High level System Design

their trustworthiness, storing all metadata, and computing


reputation based on the Web of Trust principle.
IoT Devices: These devices register on the blockchain
and can send signed messages over to the platform. Although
containing private keys to sign messages sent, these devices
also bear hashes of their firmware-a security check against
integrity alterations.
Ethereum Blockchain: These will be achieving by the
decentralised ledger called blockchain, providing storage for
device identity, registration details, firmware hashes, and rep-
utation information. Business rules such as device registra-
tion, message validation, and reputation scoring are enforced
through Ethereum smart contracts.g
Web Interface: The interface provides a way whereby
users-for example, device administrators-can interact with this
system. It allows registration of the device, monitoring of
status, historical events tracking, and integrity checking of the
firmware. Fig. 2. System Flow Diagram

Data Flow in the System


F. Device Identity Management
A. Device Registration: This system has the important attribute to form a unique
The device registration process wherein it registers itself and verifiable identity to each and every device on IoT. It
to the smart contract of Ethereum by submitting the identifier aimed for this purpose by using Merkle Trees, which have
and metadata. The smart contract stores the data of the device generated a secure identity of a device without showing any
on the blockchain. private property of the same.the given below Fig 3 is
Architecture.
B. Device Message :
G. Merkle Tree for Device Identity
The device signs a message with its private key and
submits it to the platform. The Merkle tree would hash the device metadata - manu-
4|Page
facture origin, location, and public key - into a Merkle root.
This would, then, serve as an identifier for the device
securely.

5|Page
Fig. 4. Message Authentication

Fig. 3. Architecture By using blockchain for message validation, the system


ensures that no unauthorized party can inject fake data or
modify messages, providing non-repudiation and data
The public key, or rather its format, acts as an ID of the integrity.
device within a blockchain.
The Merkle tree also assured the confidentiality of private J. Firmware Integrity
device information while providing an identity that was unique One other significant component of security is guarantee-
and verifiable. ing that the hardware-deployed device contains the correct,
unadulterated firmware. The system does this by storing on
H. Device Registration the blockchain a firmware hash for any given device to be
periodically retrieved for verification.
The devices register to the blockchain via the Web Inter-
face. Once registered, it submits the public key of the device, 1) Firmware Hashing: Every device makes a hash of its
metadata describing the location, manufacturer, etc., and hash firmware and writes it to an Ethereum blockchain at registra-
of the firmware to the contract. tion. For every communication from the device, the platform
checks if the then firmware hash of the device is valid with
Once registered, the identity of the device is securely a stored value. If those hashes are the same, its firmware is
stored on a blockchain. Such information, once entered, valid.
becomes immutable, so no unauthorized party can ever alter
2) Firmware Update Validation: The moment the
the device’s identity.
firmware update is installed in a device, the updated firmware
hash is again generated from that device, and the entire
I. Message Authentication blockchain of Ethereum gets updated. This also allows only
authorized firmware updates to be applied and ensures that the
Message authentication allows for affirming that messages device works with trusted and verified firmware.
coming from IoT devices are indeed authentic and tamper-
free. Here, a device digitally signs its messages with its private This would ensure that the firmware of the device had not
key, and the platform authenticates those messages by been changed or compromised and guaranteed the content’s
comparing them to the previously registered public key of the integrity and security.
device on the blockchain.
1) Message Signing: Every IoT device utilizes its private K. Device Reputation Management
key in order to produce a cryptographic signature; that sig- The reputation management system evaluates the trustwor-
nature is then attached to every message the device sends, thiness of a device based on interactions of the same device
weather it is sensor data or status updates. with other devices. The reputation score is computed using the
Web of Trust principle.
The format of the message contains a key from the device
itself, signed data-for example, sensor readings, commands- 1) Web of Trust: It applies the web of trust principle to
and metadata (a timestamp, for instance). rate the reliability of devices. Devices build up their level of
trust through successful validation of messages with trusted
2) Message Validation: A signed message to the IoT devices. Devices that send valid messages in regularity and
Platform forces it to retrieve, from the Ethereum blockchain, interact with other trusted devices will amass reputation
the public key saved in relation to the device. The platform points, making them more trustworthy in the network.
verifies the cryptographic signature by using that public key
thus generated. According to the validity or otherwise of 2) Reputation Calculation: The IoT platform grades the
that signature, the message itself is accepted as valid by the reputation score of every device based on the interaction
platform.The below Fig 4 is Detail message Authentication history with successful message validation and the number
process. of trusted signatures received by it. This reputation score is
6|Page
updated regularly in the Ethereum smart contract,
enabling

7|Page
the network to make well-informed decisions about devices screenshot of the home and network status.
to trust.
More reputation scores result in more trust the other
devices could have in the devices with a higher reputation,
while lower scores result in flagging and even banning the
device from participating in certain activities on the network.

L. Technologies Used
Key technologies utilized in the course of developing the
system are outlined below.
1) Ethereum: This is the blockchain platform that avails
decentralized registration and authentication of IoT devices.
2) Solidity: This is a programming language used to de-
velop smart contracts that control the management of device
registration, message validation, and scoring of reputation.
3) Truffle Framework: This is an Ethereum framework
that helps in easier testing, deploying, and even management
of smart contracts.
4) Web3.js: This is a JavaScript library that allows the web
interface to communicate with the Ethereum blockchain.
5) React: Frontend Framework Designed frontend frame-
work to constitute a web interface through which the system
allows users interaction towards device management and mon-
itoring.
This methodology is an end-to-end overview of the design
and implementation of the IoT device management system
using Ethereum blockchain. In brief, all these components
come together to make sure the device registration is secure,
validates messages, ensures the integrity of firmware, and
reputation that offers decentralized and robust IoT device
security solution.

IV. RESULTS AND ANALYSIS


A blockchain-based IoT device management system was
developed and tested with its web interface and core function-
alities. Clearly, results show the effectiveness of the system in
the secure and transparent management of IoT devices with
the help of Ethereum smart contracts. Detailed outcomes for
the functionalities of the web interface and system components
are described in the following sections.

A. Web Interface Functionalities


It was the web interface through which most of the
commu- nication events between users, devices, and
blockchain were realized. Under this, the following
functionalities were tested:

B. Home and Network Status


It displayed the current status of all registered devices,
along with their activity logs.
Provision for general overview of the device network,
including the total number of devices, operation states of the
devices, and net alerts.The below shown Fig 5 is the
8|Page
Fig. 5. Home and network status

C. Historical Events for Entity


Demonstrated a chronological timeline of all action per-
formed by a registered entity, including device registrations
as well as interactions with the blockchain.
Result: The system fulfilled traceability at the entity-level
of all activities.The below shown Fig 6 is the screenshot of
the historical events for entity.

Fig. 6. Historical Events for Entity

D. Device Registration
1) Identifier: The users successfully registered the devices
with unique identifiers, which were bounded with their
respec- tive public keys. The below shown Fig 7 is unique
device identifier that is public key.

Fig. 7. Unique Device Identifier

2) Metadata: Users could enter metadata of the device,


which included location, manufacturer, and specifications.
Metadata hashes were secured in the blockchain.The below
shown Fig 8 is Merkle root hash .

9|Page
Fig. 11. Download Option

Fig. 8. Merkle root hash

3) Firmware: During the device registration process, users


upload firmware hashes so that integrity validation was
ensured later on.The below shown Fig 9 is a hash of actual
firmware hash.
Fig. 12. List Option

7) Edit Device: Allowed users to update metadata for a


device or upload new firmware hashes if required. Outcome:
Successfully stored updates in the blockchain, thus creating
an irrevocable history of changes.The below shown Fig 13 is
about edit option.

Fig. 9. Firmware Hash

4) Confirm: Submitted the data to the blockchain as a


consequence, and thereby, generates a transaction hash as
proof.The below shown Fig 10 is about confirming the trans-
action hash. Fig. 13. Edit Option

8) Historical events for device: Offered an intricate log of


all events connected to a particular device, such as
registration, firmware updates and message validation results.
Outcome: Increased traceability at the device level for tracing
and au- dits.The below shown Fig 14 is about History option.

Fig. 10. Confirm Transaction Hash

5) Download Configuration: After registration, the users


could download configuration files containing device-specific
details such as identifiers, public keys, and metadata.The
below shown Fig 11 is about download option. Fig. 14. Historical events for device

6) List Devices: Presented a list of all registered devices The results and analysis of the blockchain-based IoT de-
which included their status in the current time along with vice management system exhibit that it meets the essential
metadata and firmware hashes. Outcome: This enabled challenges of security, transparency, and decentralized control
efficient device management and monitoring.The below of IoT networks. The system incorporates Ethereum smart
shown Fig 12 is about List of devices. con- tracts into a user-friendly web interface for
10 | P a g
e
functionalities like

11 | P a g
e
device registration, message authentication, firmware integrity IEEE Access, vol. 11, pp. 137083-137098, 2023, doi: 10.1109/AC-
verification, and detailed historical logs. CESS.2023.3338170.

In this regard, testing outcome shows it indeed remains


very strong on data integrity, authentication, and traceability,
hence ideal for all scenarios that call for security as well
as transparency as paramount concerns. Challenges such as
blockchain latency and transaction costs point to the urgent
need for optimization-often much needed for large deploy-
ments.
In general, the system achieves its main objectives and
has shown the potential of blockchain technology to further
enhance the reliability and trustworthiness of IoT ecosystems.
Further improvements should include the adoption of scala-
bility solutions and the refinement of reputation mechanisms,
as these would further improve the capabilities of the system,
making it applicable in real-world conditions.

V. CONCLUSION
The rapid proliferation of IoT devices brings new chal-
lenges in terms of management and security, with traditional
centralized approaches being incompatible owing to scalabil-
ity, security risks, and having a single point of failure in
handling thousands of connected devices. Our project shows
how blockchain technology, in the form of the Ethereum
blockchain, is able to bring more secure and decentralized
solutions for the management of IoT devices. The approach
guarantees the integrity, trust, and scalability required in mod-
ern IoT systems through registering devices on a blockchain,
authentication by means of smart contracts, and validating
their communications using cryptographic techniques. In this
respect, this approach not only enhances security but also
provides a clear and tamper-proof system that adapts well to
the increasing needs of the applications in healthcare, smart
cities, and industrial automation. Future Work would include
real-time tracking of the IoT devices in terms of voltage level,
operational status, and location for enhanced reliability. User
activity logs detailing access patterns can strengthen security
by showing tailored authentication and promoting unusual
behavior. Predictive analytics integration would, therefore, en-
sure optimized performance even with trending issues, thereby
being able to prevent problems beforehand. All this would
strengthen trust and scalability in IoT ecosystems, making the
whole platform even more secure and efficient.

REFERENCES
[1] G. Kornaros, D. Bakoyiannis, O. Tomoutzoglou and M. Coppola,
”From Cloud to IoT Device Authenticity under Kubernetes
Management,” 2024 11th International Conference on Internet of
Things: Systems, Management and Security (IOTSMS), Malmo¨,
Sweden, 2024, pp. 218- 223, doi:
10.1109/IOTSMS62296.2024.10710195.
[2] B. Tejaswi, M. Mannan and A. Youssef, ”Security Weaknesses in IoT
Management Platforms,” in IEEE Internet of Things Journal, vol. 11,
no. 1, pp. 1572-1588, 1 Jan.1, 2024, doi: 10.1109/JIOT.2023.3289754.
[3] D. -F. Hri¸tcan and D. Balan, ”Exposing IoT Platforms Securely and
Anonymously Behind CGNAT,” 2024 23rd RoEduNet Conference:
Net- working in Education and Research (RoEduNet), Bucharest,
Romania, 2024, pp. 1-4, doi:
10.1109/RoEduNet64292.2024.10722287.
[4] A. L. Mart´ınez, M. G. Pe´rez and A. Ruiz-Mart´ınez, ”A Comprehensive
Model for Securing Sensitive Patient Data in a Clinical Scenario,” in

12 | P a g
e
[5] U. Ghosh, D. Das, S. Banerjee and S. Mohanty, ”Blockchain-Based
Device Identity Management and Authentication in Cyber-Physical
Systems,” 2024 IEEE 21st Consumer Communications Network-
ing Conference (CCNC), Las Vegas, NV, USA, 2024, pp. 1-6, doi:
10.1109/CCNC51664.2024.10454888.
[6] S. Aiello and B. P. Rimal, ”Secure Access Service Edge Convergence:
Recent Progress and Open Issues,” in IEEE Security Privacy, vol. 22,
no. 2, pp. 8-16, March-April 2024, doi: 10.1109/MSEC.2023.3326811.
[7] B. Yuan et al., ”Leakage of Authorization-Data in IoT Device Sharing:
New Attacks and Countermeasure,” in IEEE Transactions on Depend-
able and Secure Computing, vol. 21, no. 4, pp. 3196-3210, July-Aug.
2024, doi: 10.1109/TDSC.2023.3323713.
[8] S. Katta, K. Alrawashdeh, J. Adebayo, M. Tulasi and M. Dokka,
”Blockchain-Based Distributed Hybrid Cloud Identity Management
for Securing IoT Devices in the Cloud,” NAECON 2023 - IEEE
National Aerospace and Electronics Conference, Dayton, OH, USA,
2023, pp. 67-72, doi: 10.1109/NAECON58068.2023.10365929.
[9] R. Campos-Sanchez, L. Hernandez-Martinez and C. Feregrino-Uribe,
”IoT Architecture and Security Mecanisms for an Energy Manage-
ment System in a Smart Microgrid,” 2023 20th International Con-
ference on Electrical Engineering, Computing Science and Auto-
matic Control (CCE), Mexico City, Mexico, 2023, pp. 1-6, doi:
10.1109/CCE60043.2023.10332842.
[10] A. Garah, N. Mbarek and S. Kirgizov, ”IoT Data Confidentiality
Self-Management,” 2023 IEEE Intl Conf on Dependable,
Autonomic and Secure Computing, Intl Conf on Pervasive
Intelligence and Computing, Intl Conf on Cloud and Big
Data Computing, Intl Conf on Cyber Science and Technology
Congress (DASC/PiCom/CBDCom/CyberSciTech),
Abu Dhabi, United Arab Emirates, 2023, pp. 0395-
0400, doi: 10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361375.
[11] A. Srivastava and U. Jain, ”Securing the Future of IoT: A Compre-
hensive Framework for Real-Time Attack Detection and
Mitigation in IoT Networks,” 2023 14th International Conference on
Computing Communication and Networking Technologies
(ICCCNT), Delhi, India, 2023, pp. 1-6, doi:
10.1109/ICCCNT56998.2023.10307306.
[12] R. Kumar and R. Sharma, ”Blockchain-based Model for Secure and
Trusted IoT System,” 2023 International Conference on Advanced
Computing Communication Technologies (ICACCTech), Banur,
India, 2023, pp. 743-750, doi:
10.1109/ICACCTech61146.2023.00123.
[13] D. D. Datiri and M. Li, ”A Cluster enabled Blockchain-based Data
management for IoT systems,” 2023 24th International Carpathian
Control Conference (ICCC), Miskolc-Szilva´sva´rad, Hungary, 2023, pp.
88-92, doi: 10.1109/ICCC57093.2023.10178949.
[14] ] A. Tina Victoria and M. Kowsigan, ”Secure Management of Health-
care Data in Fog and IoT Networks: A Short Survey on Existing Secu-
rity Protocols,” 2022 3rd International Conference on Smart
Electronics and Communication (ICOSEC), Trichy, India, 2022, pp.
512-518, doi: 10.1109/ICOSEC54921.2022.9952038.
[15] K. T. Kim, J. D. Lim and J. -N. Kim, ”An IoT Device-trusted
Remote Attestation Framework,” 2022 24th International Conference
on Advanced Communication Technology (ICACT), PyeongChang
KwangwoonDo, Korea, Republicof, 2022, pp.218 − 223, doi :
10.23919/ICACT 53585.2022.9728853.

13 | P a g
e

You might also like