Open Access
A Blockchain-based Security Architecture for the Internet of Things
Author(s) -
Kelechi G. Eze,
Cajetan M. Akujuobi,
Shermar Hunter,
Shumon Alam,
Sarhan M. Musa,
Justin Foreman
Publication year - 2022
Publication title -
wseas transactions on information science and applications
Language(s) - English
Resource type - Journals
eISSN - 2224-3402
pISSN - 1790-0832
DOI - 10.37394/23209.2022.19.2
Subject(s) - computer security , computer science , blockchain , internet of things , vulnerability (computing) , smart grid , architecture , pace , engineering , art , visual arts , electrical engineering , geodesy , geography
The Internet of Things (IoT) is growing at a very fast pace and being increasingly adopted in many scenarios of industrial applications such as energy (smart grid), automobile (smart cars), healthcare (smart healthcare), manufacturing (smart manufacturing and supply chain) and other application such as homes (smart home) and cities (smart city). Nonetheless, these IoT technologies (devices, systems, protocols, and applications) are faced with many security-related issues. IoT Systems have different layers that are vulnerable to various kinds of attacks. To defend against these attacks, one must consider appropriate security approaches and mechanisms to ensure privacy, security, and trust within the various components and layers that make up the IoT system. Appropriate security mechanism is needed at every layer of an IoT system to keep them secure. Hence, finding suitable mechanism for each IoT layer is a necessity to keep IoT systems secure in the 21st-century applications and implementations. The paper first investigates the IoT layers and protocols, their vulnerability issues, and methods to resolve the issues from existing literatures. We then present a blockchain-based security architecture for the internet of things and practically investigated its security feature through implementation of various security mechanism. Analysis and discussion of the blockchain implementation results are carried for the purpose of meeting the security, privacy, and trust requirements of IoT.