𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Blockchain Technology for IoE: Security and Privacy Perspectives [Team-IRA]

✍ Scribed by Arun Solanki (editor), Anuj Kumar Singh (editor), Sudeep Tanwar (editor)


Publisher
CRC Press
Year
2023
Tongue
English
Leaves
293
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book explores opportunities and challenges in the field of Internet of Everything (IoE) security and privacy under the umbrella of distributed ledger technologies and blockchain technology including distributed consensus mechanisms, crypto-sensors, encryption algorithms, and fault tolerance mechanisms for devices and systems. It focusses on the applicability of blockchain technology, including architectures and platforms for blockchain and IoE, authentication and encryption algorithms for IoE, malicious transactions detection, blockchain for forensics, and so forth.

  • Outlines the major benefits as well as challenges associated with integration of blockchain with IoE;
  • Describes detailed framework to provide security in IoE using blockchain technology;
  • Reviews various issues while using distributed ledger technologies for IoE;
  • Provides comprehensive coverage of blockchain for IoE in securing information including encryption schemes, authentication, security issues, and challenges;
  • Includes case studies in realistic situations like healthcare informatics, smart industry, and smart transportation.

This book is aimed at researchers and graduate students in computing, cryptography, IoT, computer engineering, and networks.

✦ Table of Contents


Cover
Half Title
Series Information
Title Page
Copyright Page
Table of Contents
Preface
Overview of the Book
About the Editors
List of Contributors
Part I Introduction to Security of IoE and Blockchain
1 Internet of Everything and Blockchain: An Introduction
1.1 Introduction to the Blockchain and Internet of Things
1.1.1 Blockchain
1.1.2 Limitations of Blockchain
1.1.3 Internet of Things
1.1.4 Internet of Everything
1.2 Literature Review
1.3 IoE and Blockchain Technology Protection Using Reverse Engineering and Malware Analysis
1.3.1 Introduction to Reverse Engineering
1.3.2 Malware Analysis
1.3.3 Important Aspect of IoT: Firmware and Firmware Analysis
1.4 Case Study 1
1.4.1 Working
1.5 Conclusion
References
2 Security Requirements, Issues, and Challenges in IoE
2.1 Introduction to the Internet of Everything (IoE)
2.2 What Is the Internet of Everything (IoE)
2.3 Definition
2.3.1 Essential Security Requirements in IoE
2.3.2 Confidentiality
2.3.3 Integrity
2.3.4 Availability
2.3.5 Authenticity
2.3.6 Non-Repudiation
2.3.7 Access Control and Authorization
2.3.8 Trustworthy Computing
2.3.9 Denial-Of-Service Protection
2.3.10 Privacy
2.4 IoE Secure Framework
2.4.1 The Process of Authentication
2.4.2 The Process of Authentication Control and Access
2.4.3 The Network Enforce Scheme
2.5 The Top Five Security Protocols
2.5.1 The Message Queen Telemetry Transport Protocol
2.5.2 Constraint-Based Application Protocols
2.5.3 Datagram Security Protocol
2.5.4 IPv6LPAN
2.5.5 ZigBee
2.5.5.1 The Centralized Network Models
2.5.5.2 The Distributed Network Models
2.6 The Major Internet of Everything Security Solution
2.7 The Reason Behind Vulnerability and Requirements of Safety
2.8 Major Security Solutions
2.9 Conclusion and Future Scope
References
3 IoE and Blockchain Convergence for Enhanced Security
3.1 Introduction
3.2 Current Status of IoE in the Market
3.3 Blockchain Technology
3.3.1 Several Kinds of Blockchain Networks
3.3.1.1 Permission-Less Blockchain
3.3.1.2 Permissioned Blockchain
3.3.2 Consensus Algorithms (CA)
3.3.2.1 PoW
3.3.2.2 PoS
3.3.3 Blockchain Standards
3.4 Cyber Resilience of PUFs
3.4.1 Man-In-The-Middle (MITM)
3.4.2 Side Channel Attacks
3.5 Proof-Of-PUF Authentication in the Internet of Everything
3.6 Applications
3.7 Existing Challenges
3.8 Future Prospects
3.9 Advantages of the Study
3.10 Conclusion
References
Part II Blockchain-Based Security Mechanisms for IoE
4 Security Model and Access Control Mechanisms for Attack Mitigation in IoE
4.1 Introduction
4.1.1 Background of IoE
4.1.2 Advantage of IoE
4.1.3 Challenges in IoE
4.1.3.1 Authenticity
4.1.3.2 Reliability
4.1.3.3 Stability
4.1.3.4 Security Challenges
4.1.4 Requirement in IoE
4.1.4.1 Security in IoE
4.1.4.2 Privacy in IoE
4.1.5 Main Concepts and Terms in IoE
4.1.5.1 Cyber Security
4.1.5.2 Cyber Threats
4.1.6 Formulating Secure IOE Frameworks
4.1.6.1 Authentication
4.1.6.2 Authorization
4.1.6.3 Network Imposed Strategy
4.1.6.4 Secure Evaluation (Visibility and Control)
4.2 Intruder Detection in IoE
4.2.1 The Ways for an Intruder to Make an Attack in the Organization
4.2.2 Threat Scenarios
4.2.3 Background of Intruder Detection System
4.2.4 Categorization of IDS
4.2.4.1 Based On the Place of Detection
4.2.4.2 Based On Detection Performance
4.3 User Access Security Based On Block Chain Technology
4.3.1 Block Chain Advancements
4.3.2 Blockchain
4.3.3 The Smart Contract
4.4 Role of Artificial Intelligence in Attack Detection Model
4.4.1 Artificial Immune-Based IDSs
4.4.2 Artificial Neural Network Based IDSs
4.4.3 Genetic Algorithm-Based IDSs
4.5 Upcoming Trends in AI Using Optimization Algorithms
4.5.1 Evolutionary Algorithm
4.5.1.1 Genetic Programming (GP)
4.5.1.2 Genetic Calculation
4.5.1.3 Evolution Procedures
4.5.2 Swarm-Based Algorithm
4.5.2.1 Ant Colony Optimization (ACO)
4.5.2.2 Particle Swarm Optimization
4.5.2.3 Bee Colony Algorithm
4.5.2.4 Fish Swarm Algorithm
4.5.2.5 Firefly Algorithm (FA)
4.5.3 Ecology-Based Calculations
4.6 Key Findings
4.7 Conclusion
References
5 Enhancement of Security of Messages in Blockchain-Based IoE With Modified Proof-Of-Authentication (MPoAh)
5.1 Introduction
5.2 Related Works
5.3 Proposed Scheme
5.3.1 Device Identity and Devices Registration Process
5.3.2 Device Intercommunication and Dependable Communications
5.3.3 Modified Proof-Of-Authentication (MPoAh) Algorithm and Transaction Verification
5.4 Implementation of the Proposed Scheme
5.5 Security Analysis, Results, and Comparisons
5.5.1 Analysis of Security
5.5.2 Comparisons and Results
5.6 Conclusion and Future Work
References
6 Machine Learning (ML) and Blockchain for IoE: A Deep Insight Into Framework, Security, and Its Applications With Industrial IoE
6.1 Introduction
6.2 Fundamental Concepts of Machine Learning and Blockchain
6.3 Recent Developments (And Related Works)
6.4 Overview of Tentative Industrial IoE Framework
6.5 Security and Privacy Issues in Industrial IoE
6.6 Future Scope
6.7 Conclusion and Future Scope
References
7 Biometric Authentication in Internet of Everything
7.1 Introduction
7.2 Evolution of IoE
7.3 The Architecture of Two-Factor Authentication Works With Blockchain Technology
7.4 Security and Privacy Challenges of IoE
7.4.1 User Privacy and Data Protection in IoE
7.4.2 Authentication and Identity Management
7.4.3 Trust Management and Policy Integration
7.4.4 Authorization and Access Control
7.4.5 End-To-End Security
7.4.6 Attack Resistant Security Solution
7.5 Applications of IoE
7.6 Use Cases of IOE
7.6.1 Supply Chain
7.6.2 Automotive Industry
7.6.3 Smart Homes
7.6.4 Sharing Economy
7.6.5 Pharmacy Industry
7.6.6 Agriculture
7.6.7 Water Management
7.7 Challenges of IoE
7.8 Conclusion
References
8 High Data Priority Endorsement and Profile Overhaul Using Blockchain Against Remapping Attack in MANET-IoT
8.1 Introduction
8.2 Local Repair
8.2.1 Proactive Approach
8.2.2 Re-Activate Approach
8.3 Important Challenges in MANET
8.3.1 Dynamic Topologies
8.3.2 Routing
8.3.3 Power-Constrained and Operational
8.3.4 Security and Reliability
8.3.5 Quality of Service (QoS)
8.3.6 Inter-Networking
8.3.7 Mobile Routing at the IP Or Routing Layer
8.4 Routing Protocols Overview
8.4.1 Proactive Routing Protocol (Table-Driven)
8.4.2 Reactive Routing (On-Demand)
8.4.3 Hybrid Routing Protocol
8.5 Block Chain Security Considerations in MANET-IoT
8.6 Types of Attack in MANET-IoT
8.6.1 The Active Attack
8.6.2 Passive Attack
8.6.2.1 External Attack
8.6.2.2 Internal Attack
8.6.3 Security Threats in MANET
8.7 Literature Review
8.8 Problem Statement
8.9 Proposed Block Chain Technique for Remapping Attack
8.9.1 Proposed Algorithm to Hash Generation for Block Chain-Based Security
8.9.2 Proposed Working Architecture
8.10 Simulation Tool, Parameters and Performance Metrics
8.10.1 Simulation Parameters to Be Used in the Case Study
8.10.2 Performance Metrics
8.11 Simulation Outcomes
8.11.1 Analysis of the UDP End Data Stream
8.11.2 Analysis of the Routing Packets Flooding
8.11.3 TCP PDR Analysis
8.11.4 End-To-End Delay Analysis
8.11.5 Routing Load Analysis
8.11.6 An Examination of the Flooding of Attackers
8.11.7 Analysis of Drops Caused By Congestion
8.12 Conclusion and Future Work
References
Part III Application Areas Integrating Blockchain and IoE
9 Block Chain Applications and Case Studies for IoE
9.1 Introduction
9.1.1 Block
9.1.2 Chain
9.1.3 System
9.2 Background
9.3 Applications of Block Chain
9.3.1 Cryptocurrency
9.3.2 Being Aware
9.3.3 Strategy
9.3.4 Food Industry
9.3.5 Mobile Commerce
9.3.6 Big Data
9.4 Bitcoin for IoT
9.5 Internet of Everything (IoE)
9.6 Applications of the Internet of Everything
9.6.1 IoE in Smart Airports
9.6.2 IoE in Smart District
9.6.3 Environmental Surveillance
9.6.4 Smart Cities
9.6.5 Energy Sector
9.6.6 Blockchain in the IoE
9.6.7 Smart Water Management
9.6.8 Smart Apartments
9.7 Components to an IoE Environment
9.7.1 People
9.7.2 Processes
9.7.3 Data
9.7.4 Things
9.8 Characteristics of Internet of Everything
9.8.1 Connectivity
9.8.2 Intelligence
9.8.3 Dynamic Nature
9.8.4 Security
9.8.5 Sensing
9.8.6 Heterogeneity
9.8.7 Enormous Scale
9.9 Advantages of IoT
9.10 Key Features of IoE
9.11 Conclusion
References
10 An Anti-Counterfeiting Architecture Ensuring Authenticity and Traceability for Expensive Medicines Using QR Codes
10.1 Introduction
10.2 Related Works
10.3 Preliminaries
10.3.1 Encryption
10.3.2 QR Codes
10.3.3 Website and Database
10.3.4 Blockchain
10.3.4.1 Blockchain Functionalities
10.3.4.2 Smart Contract
10.3.4.3 Types of Blockchain
10.3.5 Hyperledger Fabric
10.3.5.1 Hyperledger Fabric Architecture
10.3.6 Security Definition
10.4 Proposed Method
10.4.1 Working Procedure
10.4.2 Data Transition Overview
10.5 Security Analysis
10.6 Implementation Details
10.6.1 Workflow
10.6.2 Blockchain Implementation
10.7 Result Analysis
10.7.1 Centralized Database Analysis
10.7.2 Blockchain Analysis
10.7.3 Centralized Database Vs Blockchain
10.7.4 Cryptographic Functions
10.8 Conclusion
References
11 Reducing Counterfeit Medicine Through Blockchain
11.1 Introduction
11.1.1 Drivers in the Pharmaceutical Industry
11.1.2 Design Issues in the Pharmaceutical Business Logistics Chain
11.2 Blockchain Technology in the Pharmaceutical Industry
11.2.1 Counterfeit Prevention
11.2.2 Merchandise Issuance Channel
11.2.3 Tracking and Tracing
11.2.4 Safety and Security
11.3 Challenges in Current Blockchain
11.3.1 Agility in Mitigating Drug Shortage
11.4 Counterfeit Drug Prevention: A Critical Review and Some Insights
11.5 Design of Drug Supplychain Framework for Optimization
11.5.1 Development Environment
11.5.2 Building Component of Business Network
11.5.3 Smart Contract Modeling of Drug Business Logistics Management
11.5.4 Planning and Scheduling of Drug Supply Chain Management
11.6 Digital Medicine and Blockchain: New Research Avenues
11.6.1 Open Challenges
11.7 Conclusion
References
12 Home Automation Using Block Chain-Enabled Cyber Physical System
12.1 Introduction
12.2 Background
12.3 The Proposed System Design
12.3.1 The Architecture of the Proposed System
12.3.2 Mapping of Proposed System With 5C Protocol
12.3.3 The Proposed System Operation
12.3.4 The Implementation Details of the Proposed System
12.4 Conclusion
12.5 Challenges and Future Aspects
References
Index


πŸ“œ SIMILAR VOLUMES


Blockchain and Digital Twin Enabled IoT
✍ Randhir Kumar (editor), Prabhat Kumar (editor), Sobin C C (editor) πŸ“‚ Library πŸ“… 2024 πŸ› CRC Press 🌐 English

<p><span>This book reviews research works in recent trends in blockchain, AI, and Digital Twin based IoT data analytics approaches for providing the privacy and security solutions for Fog-enabled IoT networks. Due to the large number of deployments of IoT devices, an IoT is the main source of data a

Blockchain for Information Security and
✍ Udai Pratap Rao (editor), Piyush Kumar Shukla (editor), Chandan Trivedi (editor) πŸ“‚ Library πŸ› Auerbach Publications 🌐 English

<p><span>Distributed and peer-to-peer (P2P) applications are increasing daily, and cyberattacks are constantly adopting new mechanisms to threaten the security and privacy of users in these Internet of Things (IoT) environments. Blockchain, a decentralized cryptographic-based technology, is a promis

Blockchain for 5G Healthcare Application
✍ Sudeep Tanwar (editor) πŸ“‚ Library πŸ“… 2022 πŸ› The Institution of Engineering and Technology 🌐 English

<p>A secured system for Healthcare 4.0 is vital to all stakeholders, including patients and caregivers. Using the new Blockchain system of trusted ledgers would help guarantee authenticity in the multi-access system that is Healthcare 4.0. This is the first comprehensive book that explores how to ac

Blockchain Technology for IoT Applicatio
✍ Seok-Won Lee (editor), Irish Singh (editor), Masoud Mohammadian (editor) πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<span><p></p><p>This book explores recent advances in the Internet of things (IoT) via advanced technologies and provides an overview of most aspects which are relevant for advance secure, distributed, decentralized blockchain technology in the Internet of things, their applications, and industry Io

Blockchain Technology for IoT Applicatio
✍ Seok-Won Lee (editor), Irish Singh (editor), Masoud Mohammadian (editor) πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p></p><p>This book explores recent advances in the Internet of things (IoT) via advanced technologies and provides an overview of most aspects which are relevant for advance secure, distributed, decentralized blockchain technology in the Internet of things, their applications, and industry IoT. The

IoT: Security and Privacy Paradigm (Inte
✍ Souvik Pal (editor), Vicente GarcΓ­a DΓ­az (editor), Dac-Nhuong Le (editor) πŸ“‚ Library πŸ“… 2020 πŸ› CRC Press 🌐 English

<p><strong><em>IOT: Security and Privacy Paradigm</em></strong> covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to thi