Hash Function Based Optimal Block Chain Model for the Internet of Things (IoT)

In recent decades, the Internet of Things (IoT) is transforming into an attractive system to drive a substantive hop on stock and enterprises through physical, computerized, and social spaces. For enhancing the security level of IoT multimedia data, a block-based security model is proposed. At first, from the collected database some clusters are formed for the high-security process; where selecting an optimal group of data as cluster heads to divide the network is done by Dragonfly Optimization Algorithm (DOA). After forming the clusters, a hash function with blockchain technique is utilized to the secure the IoT information. Initially, the data is changed over into many blocks then applies a hash function to each block for an end to end blockchain model. Based on this function the information’s are encrypted and decrypted stored in the cloud by an authenticated person. From the implementation results of data security, the execution time and security levels are analyzed.

[1]  Kartik Shankar,et al.  Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm , 2018 .

[2]  Mohamed Elhoseny,et al.  An Efficient Optimal Key Based Chaos Function for Medical Image Security , 2018, IEEE Access.

[3]  Jian Shen,et al.  A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things , 2018, Secur. Commun. Networks.

[4]  Seyedali Mirjalili,et al.  Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems , 2015, Neural Computing and Applications.

[5]  Joel J. P. C. Rodrigues,et al.  Effective Features to Classify Big Data Using Social Internet of Things , 2018, IEEE Access.

[6]  P. Eswaran,et al.  RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique , 2016, J. Circuits Syst. Comput..

[7]  K. R. Venugopal,et al.  Network optimizations in the Internet of Things: A review , 2019, Engineering Science and Technology, an International Journal.

[8]  K. Bennani,et al.  Particle swarm optimization based clustering in wireless sensor networks: The effectiveness of distance altering , 2012, 2012 IEEE International Conference on Complex Systems (ICCS).

[9]  Turki F. Al-Somani,et al.  More secure Internet of Things using robust encryption algorithms against side channel attacks , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[10]  Manuel Díaz,et al.  On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[11]  M. Prasanth,et al.  Encryption and hash based security in Internet of Things , 2015, 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN).

[12]  R. Balasubramanian,et al.  Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm , 2018, Journal of Medical Systems.

[13]  Zhou Jing,et al.  Research on the basic characteristics, the key technologies, the network architecture and security problems of the Internet of things , 2013, Proceedings of 2013 3rd International Conference on Computer Science and Network Technology.

[14]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[15]  Antônio A. de A. Rocha,et al.  A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack , 2018, Secur. Commun. Networks.

[16]  Andino Maseleno,et al.  Nur algorithm on data encryption and decryption , 2018 .

[17]  Mohamed Elhoseny,et al.  Hybrid optimization with cryptography encryption for medical image security in Internet of Things , 2018, Neural Computing and Applications.

[18]  Amirhossein Safi,et al.  Improving the security of internet of things using encryption algorithms , 2017, 2017 International Conference on IoT and Application (ICIOT).

[19]  K. Shankar,et al.  RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography , 2017, China Communications.

[20]  Farookh Khadeer Hussain,et al.  Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT) , 2018, Mobile Networks and Applications.

[21]  Daniel Minoli,et al.  Blockchain mechanisms for IoT security , 2018, Internet Things.