group8
group8
group8
Ø1. Go Language
Ø2. Python
Ø3. Docker
Ø4. Hyperledger Fabric
Key Findings of the Analysis:
1. Security Challenges in IoT
Conventional systems are prone to single points of failure and are less
resilient against attacks. Blockchain’s decentralized nature mitigates
these risks.
3. Real-Time Authentication
With smart contracts automating the authentication process, the system
delivers faster, error-free interactions between devices.
4. Compliance and Traceability
An immutable audit trail helps organizations meet regulatory
requirements while providing full traceability of device interactions.
5. Cost-Effectiveness
Reduces reliance on third-party identity management services, lowering
operational costs and enhancing system autonomy.
❖ Device Authentication Algorithm: Secures IoT devices through blockchain-
based registration, authentication, and response generation.
❖ Digital Signatures: Ensures authentication, integrity, and non-repudiation
in secure communications.
❖ Workflow of Signatures: Uses private keys for signing and public keys for
verification via hash comparison.
❖ Popular DSAs: Includes RSA, DSA, ECDSA, and EdDSA for varying levels of
speed, security, and efficiency.
❖ Encryption Algorithms: Protects data using symmetric (AES) and
asymmetric (public-private key) methods.
❖ Advanced Encryption Standard (AES): Highly secure, widely used, and
efficient for encrypting data in fixed-size blocks.
❖ Applications: Secures blockchain transactions, emails, software distribution,
and legal documents.
In conclusion, the proposed solution for device authentication using
blockchain technology in IoT devices effectively addresses security concerns.
Utilizing Go for backend development ensures high performance and
scalability, while Python simplifies prototyping and data management.
Docker enhances application deployment, and Hyperledger Fabric provides
a secure and private blockchain framework. On the hardware side, ESP32
and Arduino facilitate efficient device communication, while Raspberry Pi
offers powerful processing capabilities. This combination of software and
hardware creates a robust and adaptable system, ensuring secure
authentication and enhancing trust in the growing IoT ecosystem.
• https://ciet.ncert.gov.in/storage/app/public/files/19/Webinar%20ppt/itms
day3.pptx.pdf
• https://www.webology.org/data-
cms/articles/20220310121920pmwebology%2018%20(6)%20-
%20222%20pdf.pdf
• https://www.h-x.technology/blog/how-secure-internet-of-things-with-
blockchain
• https://openaccess.city.ac.uk/id/eprint/32678/
• https://www.mdpi.com/1424-8220/19/10/2228
Words do fall short when it comes to paying off gratitude, still
we would like to convey our sincere thanks to our guide -
Mr.Asim Kumar Panda for allocating us to this project-“
Blockchain Based Device Authentication For The IoT Devices”
and also for guiding us throughout the development process.
We would further like to thank each and every one who directly
or indirectly helping us in doing this project successfully.