Become a Readings Member to make your shopping experience even easier. Sign in or sign up for free!

Become a Readings Member. Sign in or sign up for free!

Hello Readings Member! Go to the member centre to view your orders, change your details, or view your lists, or sign out.

Hello Readings Member! Go to the member centre or sign out.

Improving the Security and Privacy of Edge Devices Through Blockchain
Paperback

Improving the Security and Privacy of Edge Devices Through Blockchain

$55.99
Sign in or become a Readings Member to add this title to your wishlist.

This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.

The world of IoT existence is wholly being built on the communication and the interconnection

of things. Thing are nothing but edge devices which form the core element of IoT. From device

that have sensors in the farm that accept data as input to mobile in our pockets or to pacemakers

in the human heart are all innovative IoT devices that have today integrated in our lives. The idea

of designing an edge device would moves form a mechanical electrical machine or device to an

automatized electronic device. The electronic device soon transcended to use digital signal for its

working and were programmed to become smart devices. The electronic embedded device was

attached to the Internet thus developing the IoT network. IoT network has a continuum to data

transiting for one device to the next. Initially most of this data is open, unprotected and in the

clear text form since these devices are low level computing device with less power and memory.

The 6LoWPAN, NFC, RFID, Bluetooth, Wi-Fi or Zigbee were the types of the communication

used by them. It has been seen that in spite of various message protocols the basic commination

between the edge device has been the TCP and the UDP Communication protocol. The data was

always venerable to attack by malicious users. One of the solutions to provide protection to the

data was encryption of the plain text by encryption techniques before the data could be send for

one device to another. The research work is aimed to find out different was to improve and

implement security on the edge devices. This is done by creating a proposed prototype which

consist of raspberry pi that implemented smart homes. Experiments were carried out to check

communication between them, encrypting the data on transit, using symmetric and will a

lightweight cryptographic algorithm. The experiments use PRESENT and AES algorithms to

prove it. The system was breached to test the Ping of death and Smurf attack as DOS attack. The

Sniffing for the password was done by Wireshark that also helped in the monitoring of the

network. Thus, proving that encryption was a good solution for implementing security but the

network was venerable to DOS and DDOS attack. In the objective to improving the security and

privacy of edge device the research work opened avenue of using block chain a concept of

implementing security by constructing two contract that were linked with each other. One was a

device contract that would automatically get an agreement contract by a miner what could be

another device attached to it. It would act an authenticator and generate a key for the device. If

the device would want to communicate it would with the key. The transactions of the device and

well as the agreement were stored in the local store. The concept help to encrypt the data within

the transaction while the sender and the receiver addresses are hashed which is the security

benefits of the block chain.

Read More
In Shop
Out of stock
Shipping & Delivery

$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout

MORE INFO
Format
Paperback
Publisher
Ary Publisher
Date
21 December 2022
Pages
272
ISBN
9785316593507

This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.

The world of IoT existence is wholly being built on the communication and the interconnection

of things. Thing are nothing but edge devices which form the core element of IoT. From device

that have sensors in the farm that accept data as input to mobile in our pockets or to pacemakers

in the human heart are all innovative IoT devices that have today integrated in our lives. The idea

of designing an edge device would moves form a mechanical electrical machine or device to an

automatized electronic device. The electronic device soon transcended to use digital signal for its

working and were programmed to become smart devices. The electronic embedded device was

attached to the Internet thus developing the IoT network. IoT network has a continuum to data

transiting for one device to the next. Initially most of this data is open, unprotected and in the

clear text form since these devices are low level computing device with less power and memory.

The 6LoWPAN, NFC, RFID, Bluetooth, Wi-Fi or Zigbee were the types of the communication

used by them. It has been seen that in spite of various message protocols the basic commination

between the edge device has been the TCP and the UDP Communication protocol. The data was

always venerable to attack by malicious users. One of the solutions to provide protection to the

data was encryption of the plain text by encryption techniques before the data could be send for

one device to another. The research work is aimed to find out different was to improve and

implement security on the edge devices. This is done by creating a proposed prototype which

consist of raspberry pi that implemented smart homes. Experiments were carried out to check

communication between them, encrypting the data on transit, using symmetric and will a

lightweight cryptographic algorithm. The experiments use PRESENT and AES algorithms to

prove it. The system was breached to test the Ping of death and Smurf attack as DOS attack. The

Sniffing for the password was done by Wireshark that also helped in the monitoring of the

network. Thus, proving that encryption was a good solution for implementing security but the

network was venerable to DOS and DDOS attack. In the objective to improving the security and

privacy of edge device the research work opened avenue of using block chain a concept of

implementing security by constructing two contract that were linked with each other. One was a

device contract that would automatically get an agreement contract by a miner what could be

another device attached to it. It would act an authenticator and generate a key for the device. If

the device would want to communicate it would with the key. The transactions of the device and

well as the agreement were stored in the local store. The concept help to encrypt the data within

the transaction while the sender and the receiver addresses are hashed which is the security

benefits of the block chain.

Read More
Format
Paperback
Publisher
Ary Publisher
Date
21 December 2022
Pages
272
ISBN
9785316593507