International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 177 | Monthly Hits: ⮙1

Informative Article | Computer Science & Engineering | India | Volume 6 Issue 5, May 2017


Block Chain for Securing Internet of Things

Astha Kumari, Sayed Sohail, Ritwik Giri


Abstract: More than a billion intelligent, connected devices already comprise todays Internet of Things. IoT is bringing more and more things into the digital fold every day, which will likely make IoT a multitrillion dollar industry in the near future. However the rapid evolution of IoT market has caused an urgent need for secure IoT model. In this paper we discuss the current architecture of IoT which is based on centralized model and its inability to provide security to IoT devices. We simultaneously propose architecture of IoT ecosystem based on Blockchain model. A Blockchain is a type of distributed ledger, comprised of unchangeable, digitally recorded data in packages called blocks (rather like collating them on to a single sheet of paper). Each block is then chained to the next block, using a cryptographic signature. This allows block chains to be used like a ledger, which can be shared and accessed by anyone with the appropriate permissions. This decentralized implementation coupled with encryption can provide us the missing link to settle scalability, privacy, reliability and security concerns in the Internet of Things.


Keywords: Block Chain, IoT, Centralized Model, Blocks, Decentralized Model, Miners, Ethereum Virtual Machine EVM, Public Key Cryptography


Edition: Volume 6 Issue 5, May 2017,


Pages: 341 - 343


How to Cite this Article?

Astha Kumari, Sayed Sohail, Ritwik Giri, "Block Chain for Securing Internet of Things", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20173154, Volume 6 Issue 5, May 2017, 341 - 343

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Block Chain'

Downloads: 118

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1082 - 1085

Secure Image Transmission using Cipher Block Chaining Mode & Visual Steganography

Manoj Dhande, Arjun Mudaliyar, Vineeta Pandey, Pranali Dalvi

Share this Article

Downloads: 126 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 8, August 2020

Pages: 600 - 606

Efficient Methods to Avoid Smart Contract Vulnerabilities Using Block Chain

B. Ratnakanth, M. Sahiti, Dr. K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'IoT'

Downloads: 3 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 720 - 724

Review on Deep Learning and IoT Techniques on Corono Virus

Mansi Kambli

Share this Article

Downloads: 4

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 627 - 631

A Survey based IoT Model to Maintain Social Distancing

Deepa Sonal

Share this Article

Similar Articles with Keyword 'Blocks'

Downloads: 6

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 314 - 318

Parkinson Disease Detection Using Machine Learning Algorithms

Yatharth Nakul, Ankit Gupta, Hritik Sachdeva

Share this Article

Downloads: 73

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Similar Articles with Keyword 'Miners'

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2134 - 2138

Mining Web using Hyper Induced Topic Search Algorithm

Manali Gupta, Shweta Rathour

Share this Article

Downloads: 114

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 2179 - 2183

A Survey on Forensic Analysis of Android Memory

Kousthubha Balachandra, Dr Aravinda C V

Share this Article

Similar Articles with Keyword 'Public Key Cryptography'

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1952 - 1957

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1934 - 1936

Trapping Unauthorized Signals in Jammer

Meena Kudande, D. C. Mehetre

Share this Article

Similar Articles with Keyword 'Block'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'Chain'

Downloads: 156

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 7, July 2021

Pages: 662 - 665

Optimal Inventory Allocation in Supply Chain Using Decision Optimization

S Suraj, Dr. K Badari Nath

Share this Article
Top