The problem with IoT and blockchain is that they are inherently insecure and unintentionally designed that way. The IoT has no device to device authentication and has been the source of numerous hacks. An extreme example is a casino that was hacked through a fishtanks thermostat. Blockchain secures the ledger, but does nothing to secure or authenticate the endpoints that contribute to the ledger. We frequently confuse user authentication with device authentication. Our authentication paradigm today rests on a 40 year old process -- PKI, which was never intended for authentication. We incorporate the human factor in our information systems and because of that we cannot keep secret the keys to our security. This is why phishing and other social engineering attacks are so successful. Our private keys last for years and are static. That means that any attacker possessing the "secret" key is treated as a trusted user. Keys should last no longer than seconds and should be ever changing in the background.
You can start by reading some good survey papers in this area published in reputed journals like IEEE Surveys and Tutorials. This will give you an idea of the existing works currently being discussed in the research community.
I think you should read about smart contracts and how you can employ it in authentication and access control for the IoT. but first, I would recommend to read more about the integration of blockchain with IoT and focus on challenges encountered.
Before going to start research in such a field, you have to study the following techniques and understand it one by one. Tehn you can easily start your research in this area.
1. Advanced Encryption Standard (AES)
2. Block-Based Transformation
3. Self-Invertible Key Matrix of Hill Cipher Algorithm
4. Combination of Permutation Technique Followed by Encryption
5. Hill Cipher Algorithm
6. Digital image encryption algorithm (DES)
7. Hash Function
8. Chaotic Logistic Maps
9. Affine Transform and XOR Operation
10. Permutation
11. Genetic Algorithm
12. Differential Evolution
13. S-box in image encryption
Similarly, I am ready to guide you in the attach technique. Very simple and can easily be used for IoT data transmission.
I would gain a thorough understanding of the threat surface and where the vulnerabilities lie. In today's information ecosystem the vulnerabilities are not in the technology, per se, but in the user interface -- where social engineering is applied. Any system that relies in any way on secrecy (passwords, etc.) is building in a vulnerability -- because we cannot securely protect those secrets and when exposed, they become powerful tools in the hands of the attacker. I would try and gain a full understanding of the security paradigm before attacking the technologic components.
The Blockchain technology has grown exponentially. The IoT also, known, as the Internet of Things has also taken off with great power. These both are a part of our current lives. According to a study, Blockchain will make 3.1$ Trillion in the business value of 2030. And also, the IoT will make 457$ Billion by 2020. Wow! That is a huge number indeed.
So, yes, it is clear that they have grown for a decade, and will continue to grow further. And Blockchain and IoT are going hand in hand. These applications are bound to disrupt the existing processes across almost every industry starting from the financial, healthcare, trading and shipping, and manufacturing sectors. They might have mushroomed successfully, but there is only one problem, they are concerned with; the security. The IoT ecosystem is open to all and it exposes multiple devices, data to its security breaches. That means, the health care privacy can be easily accessed. Privacy is utmost important in the healthcare platform. The IoT devises used in the healthcare sector has everything related to the patient’s medical data. And it’s the job of the healthcare, to protect this data at all cost.
Learn Blockchain Online Training.
Also, read Why Blockchain will Transform the Global Market?
Blockchain and IoT
IoT devices are increasing year over year, but they often lack the authentication to keep the user data safe. If the hackers get what they want, the infrastructure will be damaged. And to protect its IoT devices, IoT has taken some important steps. It is using Blockchain to protect its devices. How? Let me further elaborate.
· The Blockchain will track the sensor data management. Therefore, it prevents duplication with other data.
· The IoT devices can be complex when deploying them, and the Blockchain provides a distributed ledger to provide an identification and authentication to the IoT devices, thus securing their data transfer.
· Blockchain can be used to exchange data without the use of any third-party in the IoT devices.
· The distributed ledge in the Blockchain will eliminate any source of failure within the IoT ecosystem, and hence it will protect the IoT devices.
· Blockchain will also help the devices with maintaining an individual’s identity, integration of the data, peer to peer communications. This is done by getting rid of the technical bottlenecks.
· The blockchain is useful for reducing the cost of IoT deployment.
In conclusion, the IoT uses Blockchain to its advantage, making it a secure and reliable technology. It is best for any business. It also improves the customer experience and helps in maintaining a low cost for the IoT.