0% found this document useful (0 votes)
3 views14 pages

group8

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 14

SAYANTAN BANERJEE – 11500221018

SOUMIK PAL – 11500222125


SAYAN BHATTACHARYA –11500221042
ARINDAM DANDAPAT – 11500221027
The Internet of Things (IoT) and blockchain are considered new
technologies that have their roots in many applications. The rise of new
technologies such as the Internet of Things has also led to an increase in
data sharing between connected devices. The heterogeneity of IoT devices
should be taken into account in the implementation of security and
privacy solutions. Therefore, devices and information will be more secure
with the integration of Blockchain technology into the Internet of Things.
Therefore, a new way of recognizing, authorizing and examining the device
and the data produced by this device will pave the way for the digital world
to change in a secure way again.
Ø1.Esp32
Ø2. Arduino
Ø3. RASPBERRY PI
Ø4. Microcontroller

Ø1. Go Language
Ø2. Python
Ø3. Docker
Ø4. Hyperledger Fabric
Key Findings of the Analysis:
1. Security Challenges in IoT
Conventional systems are prone to single points of failure and are less
resilient against attacks. Blockchain’s decentralized nature mitigates
these risks.

2. Scalability and Performance


Hyperledger Fabric's modular design and efficient transaction processing
support large-scale IoT networks without compromising performance.

3. Real-Time Authentication
With smart contracts automating the authentication process, the system
delivers faster, error-free interactions between devices.
4. Compliance and Traceability
An immutable audit trail helps organizations meet regulatory
requirements while providing full traceability of device interactions.

5. Cost-Effectiveness
Reduces reliance on third-party identity management services, lowering
operational costs and enhancing system autonomy.
❖ Device Authentication Algorithm: Secures IoT devices through blockchain-
based registration, authentication, and response generation.
❖ Digital Signatures: Ensures authentication, integrity, and non-repudiation
in secure communications.
❖ Workflow of Signatures: Uses private keys for signing and public keys for
verification via hash comparison.
❖ Popular DSAs: Includes RSA, DSA, ECDSA, and EdDSA for varying levels of
speed, security, and efficiency.
❖ Encryption Algorithms: Protects data using symmetric (AES) and
asymmetric (public-private key) methods.
❖ Advanced Encryption Standard (AES): Highly secure, widely used, and
efficient for encrypting data in fixed-size blocks.
❖ Applications: Secures blockchain transactions, emails, software distribution,
and legal documents.
In conclusion, the proposed solution for device authentication using
blockchain technology in IoT devices effectively addresses security concerns.
Utilizing Go for backend development ensures high performance and
scalability, while Python simplifies prototyping and data management.
Docker enhances application deployment, and Hyperledger Fabric provides
a secure and private blockchain framework. On the hardware side, ESP32
and Arduino facilitate efficient device communication, while Raspberry Pi
offers powerful processing capabilities. This combination of software and
hardware creates a robust and adaptable system, ensuring secure
authentication and enhancing trust in the growing IoT ecosystem.
• https://ciet.ncert.gov.in/storage/app/public/files/19/Webinar%20ppt/itms
day3.pptx.pdf
• https://www.webology.org/data-
cms/articles/20220310121920pmwebology%2018%20(6)%20-
%20222%20pdf.pdf
• https://www.h-x.technology/blog/how-secure-internet-of-things-with-
blockchain
• https://openaccess.city.ac.uk/id/eprint/32678/
• https://www.mdpi.com/1424-8220/19/10/2228
Words do fall short when it comes to paying off gratitude, still
we would like to convey our sincere thanks to our guide -
Mr.Asim Kumar Panda for allocating us to this project-“
Blockchain Based Device Authentication For The IoT Devices”
and also for guiding us throughout the development process.
We would further like to thank each and every one who directly
or indirectly helping us in doing this project successfully.

You might also like