Authors: Navaneetha Krishnan M, Vishnu A
Certificate: View Certificate
The project is entitled Block Chain Based Data Storage\'s privacy and ensures that blockchain-based framework integrated with authentication and privacy schemes are enhanced by secure connections to wireless nerve networks. In this set of program programs transmit the information collected to BS. As a result, BS records all key parameters in a distributed blockchain and large data is transferred to the cloud for storage. Damaged certificates for all malicious nodes are removed from the blockchain by Base Station. Although, the performance of WSNs are specific requests in terms of area of interest and method of delivery, but the purpose is to maintain the monitoring, hearing, dissemination and processing of the information collected. However, the amount of information is huge at an extraordinary rate. When an enemy attacks a network and deliberately threatens nodes, network security becomes a threat. Therefore, it is necessary for WSNs to isolate and remove malicious nodes from a network before it can be active. Adjusted outcomes, comparative analysis and security assurance support the height of the proposed solution than existing methods.
In modern times, Internet of Things (IoTs) is one of the most popular, useful and dominant technologies for wireless communication and information processing. IoTs are the building of ‘objects’ that are fragile, understandable, manageable, and that can be accessed with the help of the internet. In today's world, virtually every object on the IoT can be connected to the Internet because of its ability to communicate with a computer, which is why even the most efficient and convenient applications can be made. Several node sensors are used for monitoring, hearing and automation purposes on IoT. The collection of these nodes is commonly known as Wireless Networks (WSNs) and forms an integral part of the IoT as these technologies can detect and monitor any objects / activities that are visible in a particular area. The above-mentioned sensors, also known as 'motes', are cheap, small and internally connected and are distributed in certain areas. These sensors node integrate many aspects of hearing, computer and communication using wireless medium and therefore in WSNs, material is monitored and heard in real time. Although, the performance of WSNs are specific requests in terms of area of ??interest and method of delivery, but the purpose is to maintain the monitoring, hearing, dissemination and processing of the information collected. However, the amount of information is huge at an extraordinary rate too, which needs to be addressed in the current world of technology. As is well known, WSNs are used in a variety of programs such as military, industry, smart home, health care, surveillance, housing monitoring and agriculture to name a few. Sensors node, the core of WSN, has limited resources such as power, integration power, storage, and network bandwidth. Therefore, as the demand for WSNs grows exponentially in IoT, more challenges are encountered in order to make better use of it. In addition, security is another important factor in WSN-enabled IoT. When an enemy attacks a network and deliberately threatens nodes, network security becomes a threat. Therefore, it is necessary for WSNs to isolate and remove malicious nodes from the network before they can be actively active with IoT infrastructure.
II. LITERATURE REVIEW
Aldowah, H.; Rehman, S.U.; Umar, I. Security in Internet of Things: Issues, Challenges and Solutions. In International Conference of Reliable Information and Communication Technology; Springer: Cham, Switzerland, 2018. In the recent past, Internet of Things (IoT) has been a focus of research. With the great potential of IoT, there come many types of issues and challenges. Security is one of the main issues for IoT technologies, applications, and platforms. In order to cover this key aspect of IoT, this paper reviews the research progress of IoT, and found that several security issues and challenges need to be considered and briefly outlines them. Efficient and functional security for IoT is required to ensure data anonymity, confidentiality, integrity, authentication, access control, and ability to identify, as well as heterogeneity, scalability, and availability must be taken into the consideration. Considering these facts, by reviewing some of the latest researches in the IoT domain, new IoT solutions from technical, academic, and industry sides are provided and discussed. Based on the findings of this study, desirable IoT solutions need to be designed and deployed, which can guarantee: anonymity, confidentiality, and integrity in heterogeneous environments.
Ourad, A.Z.; Belgacem, B.; Salah, K. Using blockchain for IOT access control and authentication management. In International Conference on Internet of Things 2018 June; Springer: Cham, Switzerland, 2018. Securing Access to IOT devices is a challenging task as IoT devices are resource-constrained devices in terms of processing, storage, and networking capacity. Because of their fast spreading and deployment, significant disadvantages are seen in today’s authentication and access control schemes. This paper proposes a blockchain-based solution which allows for authentication and secure communication to IOT devices. Our solution benefits greatly from the intrinsic features of blockchain and also builds on existing authentication schemes. Specifically, our proposed blockchain-based solution, architecture, and design allow for accountability, integrity, and traceability with tamper-proof logs. The paper provides overall system design and architecture, and details on testing and implementation of a realistic scenario as a proof of concept.
Xu, R.; Chen, Y.; Blasch, E.; Chen, G. Blendcac: A blockchain-enabled decentralized capability-based access control for iots. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018. The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide smart services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird or Smart Cities, IoTs also incur more concerns on privacy and security. Among the top security challenges that IoTs face, access authorization is critical in resource sharing and information protection. One of the weaknesses in today’s access control (AC) is the centralized authorization server, which can be the performance bottleneck or the single point of failure. In this paper, BlendCAC, a blockchain-enabled decentralized capability-based AC is proposed for the security of IoTs. The BlendCAC aims at an effective access control processes to devices, services and information in large scale IoT systems. Based on the blockchain network, a capability delegation mechanism is suggested for access permission propagation. A robust identitybased capability token management strategy is proposed, which takes advantage of smart contract for registering, propagation and revocation of the access authorization. In the proposed BlendCAC scheme, IoT devices are their own master to control their resources instead of being supervised by a centralized authority. Implemented and tested on a Raspberry Pi device and on a local private blockchain network, our experimental results demonstrate the feasibility of the proposed BlendCAC approach to offer a decentralized, scalable, lightweight and fine-grained AC solution to IoT systems.
M. Wang and Q. Zhang, “Optimized data storage algorithm of IoT based on cloud computing in distributed system,” Computer Communications, vol. 157, pp. 124–131, 2020. In addition to an in-depth review of these threats, we also summarize the corresponding defense strategies. In addition, we discuss future research guidelines on new safety threats, especially those related to in-depth learning based on self-driving vehicles. By providing safety guidelines in this early phase, we aim to promote new strategies and projects related to AVs from both academic and industry, and promote the development of safe driving.
Protecting Shared Learning: Reducing Toxic Attacks through Client Acquisition, L. Zhao et al., "Protecting collaborative learning: Reducing toxic attack through client acquisition", IEEE Trans. Depend. Secure Comput., Apr. 2020. In this article, we introduce a new defense system to get amazing updates on both IID and non-IID settings. Our main focus is to get the opposite side of the client side, where each update is evaluated with the local data of other clients. The server will adjust the weights of the updates based on the test results when performing the integration. In order to accommodate the unequal distribution of data in non-IID settings, the flexible client allocation method is designed to assign the most appropriate clients the diagnostic functions. During the acquisition process, we also protect client-level privacy to prevent malicious clients from being able to participate in other clients, by combining different privacy with our design without compromising adoption performance. Our experimental experiments on three real-world databases show that our system is extremely resilient to two toxic attacks.
M. Wang and Q. Zhang, “Optimized data storage algorithm of IoT based on cloud computing in distributed system,” Computer Communications, vol. 157, pp. 124–131, 2020 The existing Internet of Things(IoT) uses cloud computing data access storage algorithms, that is, the hash algorithm has defects of low data processing efficiency and low fault tolerance rate. Therefore, HDFS is introduced to optimize cloud computing data access storage algorithms. HDFS is first used to optimize the data access storage architecture according to problems of data access storage architecture in the Internet of Things, in which factors of data access storage distribution in the IoT are fully considered, and hash values are used to optimize the configuration of data access information storage locations, so that data access storage distribution strategy can be optimized. Then, the topology of the IoT is optimized, and data block size is also optimized with effect algorithm. Finally, the design of file storage is optimized. Through simulation experiments, it is proved that the optimized cloud storage method has obvious performance advantages in file read and write speed as well as memory usage. Compared with the traditional hash algorithm, optimization algorithm proposed in the paper greatly improves file upload and download efficiency, data processing efficiency and fault tolerance rate, which fully demonstrates that the proposed cloud computing data access storage optimization algorithm is more superior.
C. Feng, M. Adnan, A. Ahmad, A. Ullah, and H. U. Khan, “Towards Energy-Efficient Framework for IoT Big Data Healthcare Solutions,” Scientific Programming, vol. 2020, pp. 1–9, 2020. The aim of the Internet of things (IoT) is to bring every object (wearable sensors, healthcare sensors, cameras, home appliances, smart phones, etc.) online. These different objects generate huge data which consequently lead to the need of requirements of efficient storage and processing. Cloud computing is an emerging technology to overcome this problem. However, there are some applications (healthcare) which need to process data in real time to improve its performance and require low latency and delay. Fog computing is one of the promising solutions which facilitate healthcare domain in terms of reducing the delay multihop data communication, distributing resource demands, and promoting service flexibility. In this study, a fog-based IoT healthcare framework is proposed in order to minimize the energy consumption of the fog nodes. Experimental results reveal that the performance of the proposed framework is efficient in terms of network delay and energy usage. Furthermore, the authors discussed and suggested important services of big data infrastructure which need to be present in fog devices for the analytics of healthcare big data.
III. EXISTING SYSTEM
In Existing System, One Session cannot fully utilize network capacity due to network root. The second difference is the definition of throughput. In a multi-channel system, all sessions are subject to the same data, and only one block of data can be considered valid while other packets are no longer active. Existing, data transmission is intentionally repeated or delayed by malicious or fraudulent notes. A refusal attack represents a denial or objection and a location tracking attack may occur.
IV. PROPOSED SYSTEM
In the proposed system, a blockchain-based solution for privacy and cloud storage authentication, Base Station provides a certificate for all sensodes nodes, a certificate key for all nodes stored in an immovable key and a large amount of sensitive information stored in the cloud. The proposed system provides promising results in terms of delays and power consumption with the appropriate combination of traffic and processing. The proposed scheme can prevent re-playing, denial attacks and counterfeit attacks. It is necessary for each sensor to constantly transmit information about location, motion speed and information collected. Detection privacy detection ensures that no one was able to disclose the actual data passing through the wireless sensor network..
Location description is the official description of a system, organized in a way that supports thinking about system structures. It defines system components or building blocks and provides a system in which products can be purchased, as well as advanced systems, that will work together to run the entire system.
VI. TECHNOLOGY USED
Microsoft .NET is a set of Microsoft software technologies for rapidly building and integrating XML Web services, Microsoft Windows-based applications, and Web solutions. The .NET Framework is a language-neutral platform for writing programs that can easily and securely interoperate. There’s no language barrier with .NET: there are numerous languages available to the developer including Managed C++, C#, Visual Basic and Java Script. The .NET framework provides the foundation for components to interact seamlessly, whether locally or remotely on different platforms. It standardizes common data types and communications protocols so that components created in different languages can easily interoperate. “.NET” is also the collective name given to various software components built upon the .NET platform. These will be both products (Visual Studio.NET and Windows.NET Server, for instance) and services (like Passport, .NET My Services, and so on).
B. The .Net Framework
The .NET Framework has two main parts:
The Common Language Runtime (CLR)
A hierarchical set of class libraries.
The CLR is described as the “execution engine” of .NET. It provides the environment within which programs run. The most important features are
The set of classes is pretty comprehensive, providing collections, file, screen, and network I/O, threading, and so on, as well as XML and database connectivity. The class library is subdivided into a number of sets (or namespaces), each providing distinct areas of functionality, with dependencies between the namespaces kept to a minimum.
6. Languages Supported By .Net:
VII. EXPERIMENTAL RESULTS AND DISCUSSION
A. Registration Phase
All node information such as speed, volume, and performance, residual power is registered to the server, to the base station and shared to all other cluster heads available on the network. The Cluster Head maintains all of these parameters and also transmits the parameters to the corresponding sensor nodes. After collecting key information in the cluster head sensor node, each common sensor node stores the information in its memory and uses that information for additional verification purposes.
B. Packet Signing and Capture
At this stage, the signing and confirmation of the packages is done by the cluster head. The Base station needs to decide whether to deliver the package to its destination at the current time. In that case, the base station needs to select a single sensor area (possibly the source node itself) with a copy of the package at the beginning of the timelot, and set up a radio broadcast to transfer this packet to its destination within the same timelot, using. possible multi-hop transfers. If this happens successfully, we say that the selected sensor node successfully captured the packet location.
With the p packet not delivered successfully, the base station needs to determine whether to duplicate the packet p to other nodes that do not have a packet at the beginning of the timeline. The basic channel also needs to determine which nodes to be transferred to and from, and how. All transmissions can be made to a wireless sensor network or to infrastructural mode.
D. Packet Transmission
Since the p packet was not successfully delivered, the primary channel needs to determine whether to duplicate the packet p to other nodes that do not have the packet at the beginning of the timeline. The primary channel also needs to determine which nodes to transfer or return, and how. All transmissions can be made to a wireless sensor network or to infrastructural mode.
E. Preventing Packet Modification
Different types of packages in the proposed scheme are cluster head to cluster head packet, cluster head to BS packet, BS to BS packet and key update packet. If the attacker wishes to change or modify packets, they need to get the key from the server, but it is not possible to get such important information. Therefore, the proposed system provides protection against package attacks Simulation or modification. All the sensor nodes are connected to the fake ID and each broadcast packet and skip confirming who you are using the table.
VIII. FUTURE ENHANCEMENT
In the future, we will strive to improve data management and framework resources for effective outcomes. We would like to point out that, similar to the unicast case, our one-sided travel models reach greater capacity than the two-sided models under the multi-channel traffic pattern. The advantage of low dimensional mobility is that it is simple and predictable, thus increasing the level of communication between. Although nodes are limited in motion only horizontally or vertically, the range of motion in their rotation lines is not limited. We plan to study the power enhancements that this hybrid dimensional model will bring in the future.
A blockchain-based security verification system for data sharing and storage is successfully implemented on WSN. A large amount of audible data is then shared with the clouds to maintain reliable and efficient data. Key parameters are also recorded in emerging blockchain technology to improve the consistency and transparency of the acquired data. A blockchain-based information storage system is used. Important information about all the sensor nodes is stored in the blockchain which is very difficult to break the attacker. Sharing a large amount of information in cloud storage ensures the reliability and efficiency of the proposed system.
 Y. A. Abdulrahman, M. Kamalrudin, S. Sidek, and M. A. Hassan,”Internet of things: Issues and challenges,” Journal of Theoretical andApplied Information Technology, vol. 94, no. 1, pp. 52–60, 2016.  SK Lo, Y Liu, SY Chia, X Xu, Q Lu, L Zhu, H Ning, Analysis of blockchain solutions for IoT: A systematic literature review, IEEE Access, vol. 7, 2019, pp. 58822-58835.  R. V Kulkarni, S. Member, A. F¨orster, and G. K. Venayagamoorthy, ”Computational Intelligence in Wireless Sensor Networks: A Survey,” Communications Surveys & Tutorials, IEEE, vol. 13, no. 1, pp. 68–96, 2011.  A. H. Bagdadee, M. Z. Hoque, and L. Zhang, ”IoT Based Wireless Sensor Network for Power Quality Control in Smart Grid,” Procedia Computer Science, vol. 167, pp. 1148–1160, 2020.  J. Wang, Y. Cao, B. Li, H. jin Kim, and S. Lee, ”Particle swarm optimization based clustering algorithm with mobile sink for WSNs,” Future Generation Computer Systems, vol. 76, pp. 452–457, 2017.  Z. Song-Juan and Y. Jian, ”Distributed data storage strategy in wireless sensor networks,” International Journal of Online Engineering, vol. 12, no. 11, pp. 52–57, 2016.  L. Buttyan, D. Gessner, A. Hessler, and P. Langendoerfer, ”Application of wireless sensor networks in critical infrastructure protection: challenges and design options Security and Privacy in Emerging Wireless Networks,” IEEE Wireless Communications, vol. 17, no. 5, pp. 44–49,2010.  R. Singh, D. K. Singh, and L. Kumar, ”A review on security issues in wireless sensor network,” vol. 2, no. 7, pp. 28–34, 2010.  H. Cai, B. Xu, L. Jiang, and A. V. Vasilakos, “IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges,” IEEE Internet of Things Journal, vol. 4, no. 1, pp. 75–87, 2017.  M. Wang and Q. Zhang, “Optimized data storage algorithm of IoT based on cloud computing in distributed system,” Computer Communications, vol. 157, pp. 124–131, 2020.  C. Feng, M. Adnan, A. Ahmad, A. Ullah, and H. U. Khan, “Towards Energy-Efficient Framework for IoT Big Data Healthcare Solutions,” Scientific Programming, vol. 2020, pp. 1–9, 2020.
Copyright © 2022 Navaneetha Krishnan M, Vishnu A. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.