69

Blockchain for IoT Security

Development

of

blockchain-based

IoT

communication

protocols

(Makhdoom et al. 2019): IoT devices are often placed in limited network

bandwidth areas. Thus, a protocol needs to be developed, which is custom­

ized to support limited bandwidth and is aligned to blockchain’s decentral­

ized nature. Multiple peer-to-peer (P2P) protocols have been proposed to

enable this (“Telehash – Wikipedia” n.d.).

Secure authentication: IoT devices are physically vulnerable; thus, the

chances of malicious nodes are high. Blockchain offers multiple security

features, such as smart contracts to enable authentication of valid devices.

The blockchains can develop an independent platform that unifies a hetero­

geneous IoT environment and provides a secure authentication and commu­

nication medium (Biswas and Muthukkumarasamy 2017).

4.12  CONCLUSION

The challenges and the opportunities around IoT security have been discussed. With

multiple technological and resource limitations in IoT devices, conventional security

measures are impractical to implement. However, as discussed, blockchain offers

opportunities to address these challenges and also catch up with the technological

advancement in this domain. With the research community continuously evolving

this subject, blockchain is probably the future of IoT security.

REFERENCES

5G and IoT: The Mobile Broadband Future of IoT. (n.d.) Accessed January 9, 2021. https://

www​.i​-scoop​.eu​/internet​-of​-things​-guide​/5g​-iot/.

ADEPT: An IoT Practitioner Perspective. (2015) Accessed January 10, 2021. https://static1​.

squarespace​.com​/static​/55f​7374​3e4b​051c​fcc0b02cf​/55f​73e5​ee4b​09b2​bff5b2eca​/55f​

73e7​2e4b​09b2​bff5b3267​/1442266738638​/IBM​-ADEPT​-Practictioner​-Perspective​-Pre​-

Publication​-Draft​-7​-Jan​-2015​.pdf​%3Fformat​%3Dorigina

Al-Fuqaha, Ala, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, & Moussa

Ayyash. (2015). Internet of Things: A Survey on Enabling Technologies, Protocols, and

Applications. IEEE Communications Surveys and Tutorials, 17(4), 2347–76. https://doi​.

org​/10​.1109​/COMST​.2015​.2444095.

Aniello, Leonardo, Roberto Baldoni, Edoardo Gaetani, Federico Lombardi, Andrea

Margheri, & Vladimiro Sassone. (2017). A Prototype Evaluation of a Tamper-Resistant

High Performance Blockchain-Based Transaction Log for a Distributed Database. In

Proceedings – 2017 13th European Dependable Computing Conference, EDCC 2017

(pp. 151–54). Institute of Electrical and Electronics Engineers Inc. https://doi​.org​/10​.

1109​/EDCC​.2017​.31.

Antonopoulos, Andreas M. (2017). Mastering Bitcoin: Programming the Open Blockchain.

https://books​.google​.co​.in​/books​/about​/Mastering​_Bitcoin​.html​?id​=tponDwAAQBAJ​

&source​=kp​_book​_description​&redir​_esc​=y.

Atzori, Luigi, Antonio Iera, & Giacomo Morabito. (2010). The Internet of Things: A Survey.

Computer Networks, 54(15), 2787–2805. https://doi​.org​/10​.1016​/j​.comnet​.2010​.05​.010.