32
Blockchain Technology
• Managing the network configuration is again a challenge, which has to be
the responsibility of the ledger. In IoT, network identification is an impor
tant process and is the area most prone to attacks. When integrated with
Blockchain, the process of network identification is properly recorded in the
ledger, which makes it more secure.
• Most of the data is captured by the sensors in a network of IoT devices.
3.2 PRINCIPLES FOR SECURE COMMUNICATION IN IOT
Like general information security principles, conventionally, IoT also relies on the
CIA triad, which is referred to as Confidentiality, Integrity and Authentication, or
the AIC triad (Authentication, Integrity and Confidentiality) (Maple, 2017). An IoT
object is secured if it fulfils any of the security principles explained in the follow
ing, and “security attacks” refers to attacks that successfully compromise any of the
security principles.
3.2.1 Confidentiality (C)
This guarantees that exposure to confidential details can be limited to designated
participants, which could be in the form of properties such as computers, internal
artefacts, resources, and human beings. This idea is firmly in line with data pro
tection and its classification policies, as it notes that access to infrastructure and
resources can only be open in the case of a specific need, so that information limited
to a single view can also be publicly available and usable to all network properties.
3.2.2 Integrity (I)
This guarantees the conservation of confidence, precision and coherence over the
whole life cycle, i.e., that data or knowledge cannot be abused when processed on
computers or floated from one end of the network to the other. The confidentiality
of the data is ensured by authentication measures such as hashing, encrypted data
FIGURE 3.4 Layered view of Blockchain and IoT integrated architecture.