Cyber Security for Secured Smart Home Applications Using Internet of Things, Dark Web, and Blockchain Technology in the Future

Cyber Security for Secured Smart Home Applications Using Internet of Things, Dark Web, and Blockchain Technology in the Future

Vinod Mahor, Sujit Kumar Badodia, Anil Kumar, Sadhna Bijrothiya, Ankit Temurnikar
DOI: 10.4018/978-1-6684-3942-5.ch014
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The need for more comfortable and humane living spaces has accelerated the development of smart homes. Many extremely intelligent houses are part of the internet of things. It operates with the dark web and ensures the privacy of incognito relays and massive data to properly manage customer requests. This increased demand gives rise to a great deal of concern regarding scalability, efficiency, and safety for a smart home system. Detailed data or the lowest levels that can be in a target set are granular data. In this chapter, the authors present the combination of integrating block-chain technology, dark web, and cloud computing in an effective manner. Blockchain technology is decentralized because it can serve processing services. To ensure the safety of the smart home network, the model employs multivariate correlation analysis and the detection of correlations between traffic functions. The performance of the architecture was evaluated with various performance parameters, and blockchain was found to be an effective security solution for future networks on the internet.
Chapter Preview
Top

Introduction

The “Internet of Things” (IoT) is a collection of devices that “produce,” “analyse,” and “communicate” massive amounts of vital data and information concerning security and secrecy. Many new IoT networkable gadgets are small and energy-efficient. Because the bulk of available energy and computer systems must be used to develop core applications, providing inexpensive security and privacy support is extremely difficult. (Alam et al., 2012) Robust authentication systems are sometimes too expensive for “Internet of Things” applications due to energy consumption and overhead processes (IoT). Lately, the Dark Web has been discovered as a significant source of high-quality cyber-security data that can be recognised, studied, and transformed into meaningful cyber threat data using the correct methodologies and technology.

Security and data protection must be lightweight, scalable, and distributed to meet IoT requirements. To safeguard users' security, existing approaches frequently expose noisy or partial data, which might hinder some IoT apps from providing personalised services (Xu et al., 2016). Furthermore, numerous cutting-edge security frameworks emphasise the traffic nature and single point of failure, which are not necessarily ideal for IoT due to the scale's difficulties (Lutolf et al., 1992). Blockchain (BC) technology (Shin et al., 2017) potentially addresses Bitcoin's first crypto-currency system's issues in terms of distribution, security, and privacy.

Public Keys are produced and communicated to the network by Bitcoin users identified by changing monetary transactions. This block is where users divide transactions. When a block is completed, BC adds a mining procedure. Miners; attempt to answer a cryptographic riddle that costs resources called the Proof of Work (POW), which first solves the problem by blocking the new BC block (Song et al., 2016). According to (Pishva et al., 2008), introducing BC into IoT is complex. It poses several significant challenges, including high resource demands for the solution of POW, long transaction confirmation latency, and low scalability due to transactions and blocks broadcast across the network. We proposed a new instantiation of BC because the POW concert has been eliminated, and the coins are required. Our suggested framework is built on and distributed on hierarchical structure confidence, keeping with the safety and privacy of BC while being better fitted to the particular demands of the IoT.

We have demonstrated our concepts in a bright house, but we have an agnostic framework that m may apply in different IoT contexts (Singh et al., 2017). The design has three levels: intelligent home, minefield, and minefield centres indicated in Figure 1, service providers, cloud storage, cellphones, and personal PCs form an Overlay network of Smart Homes (Manojkumar et al., 2018.) The Overlay network provides functionality to our design in a peer-to-peer fashion similar to the Bitcoin network. The overlay nodes are based on clusters (CH) to decrease overtime and overtime for the network. The CHS keeps a BC public overlay and two other crucial entries. On the Dark web, cyber attackers plan, organise and discuss attacks. This method allows us to access several sources that malicious attackers choose and uncover issues in real-time, including zero-day issues (Rawat et al., 2021).

Complete Chapter List

Search this Book:
Reset