32

Blockchain Technology

• Managing the network configuration is again a challenge, which has to be

the responsibility of the ledger. In IoT, network identification is an impor­

tant process and is the area most prone to attacks. When integrated with

Blockchain, the process of network identification is properly recorded in the

ledger, which makes it more secure.

• Most of the data is captured by the sensors in a network of IoT devices.

3.2  PRINCIPLES FOR SECURE COMMUNICATION IN IOT

Like general information security principles, conventionally, IoT also relies on the

CIA triad, which is referred to as Confidentiality, Integrity and Authentication, or

the AIC triad (Authentication, Integrity and Confidentiality) (Maple, 2017). An IoT

object is secured if it fulfils any of the security principles explained in the follow­

ing, and “security attacks” refers to attacks that successfully compromise any of the

security principles.

3.2.1  Confidentiality (C)

This guarantees that exposure to confidential details can be limited to designated

participants, which could be in the form of properties such as computers, internal

artefacts, resources, and human beings. This idea is firmly in line with data pro­

tection and its classification policies, as it notes that access to infrastructure and

resources can only be open in the case of a specific need, so that information limited

to a single view can also be publicly available and usable to all network properties.

3.2.2  Integrity (I)

This guarantees the conservation of confidence, precision and coherence over the

whole life cycle, i.e., that data or knowledge cannot be abused when processed on

computers or floated from one end of the network to the other. The confidentiality

of the data is ensured by authentication measures such as hashing, encrypted data

FIGURE 3.4  Layered view of Blockchain and IoT integrated architecture.