Abstract:
Many approaches have been used to secure the Internet of Things (IoT) deployments or applications in recent years. These approaches enable the security system in complex ...Show MoreMetadata
Abstract:
Many approaches have been used to secure the Internet of Things (IoT) deployments or applications in recent years. These approaches enable the security system in complex IoT devices or applications, which is the basis of applying practical security algorithms to detect device threats, related patterns, or vulnerabilities. Day by day, the small computing devices have made many technological improvements at an advanced level, which implements over the Internet, named IoT devices. The blockchain has been recently introduced as an alternative solution to complex and challenging security devices or applications. It prefers to security area due to its distributed structure and the cryptographic hash algorithm. These issues arise from the restriction of hardware used in devices. One of the leading security issues is that the attackers now quickly attack/hack our passwords. We use the encryption method to encrypt the communication between nodes to avoid this risk, creating an authentic system. We use a system to secure passwords/transactions from the attacker. This system secures the password through Blockchain technology by generating hash passwords and ciphers that encrypt the original password.
Date of Conference: 12-15 September 2022
Date Added to IEEE Xplore: 13 December 2022
ISBN Information: