Article Preview
TopIntroduction
Internet of things (IoT) is a recently trending technology. Owing to the rapid growth of this technology, there is an increasing attention on the security issues faced by this system. IoT is a framework that comprises of multiple smart devices that are connected to a single network using unique identifiers (UID) (Gregorio et al., 2020). Unique identifiers, or UIDs, are numbers and characters that allow items in a computer system to be identified. They show where an object is situated and how to get to it. Within a computer network, unique IDs enable the control and interaction of various objects or abstract datasets. The IoT systems are popularly employed for building dynamic platforms. It comprises of static and mobile objects that are integrated with sensors and actuator devices that are interconnected using internet. The main issues faced by these systems are the privacy issue and the security issue (Jing et al., 2014). All the information in an IoT server are collected and stored in a centralized server unit. Since IoT systems employ centralized server, the chances for the leakage of sensitive information are more (De Montjoye et al., 2014). Blockchain is a paradigm that implements decentralization of data and uses shared and distributed ledger for storage of information. Blockchain system stores data in a decentralized manner without the use of a dedicated centralized server (Novo, 2018). The integration of IoT and blockchain has resulted in a decentralized peer to peer configuration. Users can arrange users into logical various individuals and groups in a peer-to-peer configuration and utilise those groupings to associate certain data or assign tasks to a pre-defined set of members. The chances for fraudulent action in a blockchain are minimal. This is because whenever a new entry is added to the blockchain, the information is transferred to all the nodes in the network. Thus, this system protects from attackers who affect the centralized server to capture the entire network (Reyna et al., 2018). The main security aspect of the blockchain technique is the public key encryption. This comprises of two different keys namely, the public and the private key. The public key is used by nodes to encrypt the data. This key is distributed to all the nodes in the network. The private key is used by a particular node to decrypt the data (Herrera-Joancomartí et al., 2016). In a network that has IoT fused with blockchain, each network entity is equipped with a public key (Sampathkumar et al., 2020). This indicates that every transaction between any two IoT devices can be easily viewed and analysed by other nodes in the network. Thus, the security level is high (Meiklejohn et al., 2013). Every third party can view the transactions that occur in a blockchain enabled IoT system. A public key is a cryptographic code that allows users to receive bitcoins in their accounts by facilitating transactions between parties. The digital signature, which shows ownership of the private key, is verified using the public key. Illegal capture of data by any adversary is completely prohibited by using this decentralized scheme (Garcia, 2020). The additional cost for monitoring such fraudulent actions is minimized by the employment of blockchain in IoT. Thus, the cost of these systems is minimum with enhanced security (Dorri et al., 2017). To further increase the security of these systems, many researchers have merged chaotic systems with the public key cryptography to ensure the security of IoT devices (Zhou et al., 2020). Confusion and diffusion are desired aspects of DES: each bit of ciphertext is reliant on several bits of the key, and altering a single bit of plaintext affects half of the bits of ciphertext on average. DES is reasonably simple to construct because to its Feistel structure and basic logic.