Analysis of Preventions of Attacks on IOT Using Block Chain: Review
Main Article Content
Abstract
The increasing acceptance and integration of the Internet of Things (IoT) has made it a prominent element in our everyday existence. Regrettably, a significant level of vulnerability is present in Internet of Things (IoT) devices, which might potentially be abused by malicious actors. The predominant source of security vulnerabilities in IoT systems originates from their centralized architecture. The lack of adequate authentication and access control systems for managing access to information generated by Internet of Things (IoT) devices is a significant concern. Consequently, the issue of verifying the identification of the equipment or communication node arises. The decentralized nature of Blockchain serves as a viable alternative for ensuring secure operations inside a trustless environment. Extensive research has been conducted in the domain of the convergence of Internet of Things (IoT) and Blockchain, yielding notable progress in addressing several significant challenges encountered in the IoT realm. This study investigates the challenges and vulnerabilities associated with the Internet of Things (IoT), as well as explores the potential benefits of integrating Blockchain technology.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.