Search In this Thesis
   Search In this Thesis  
العنوان
Internet of Things Security Based on Blockchain /
المؤلف
Abo Emira, Hosny Hossam Mohamed Hosny.
هيئة الاعداد
باحث / حسني حسام محمد حسني أبوعميرة
hosny.aboemira@gmail.com
مشرف / محمد سيد قايد
مشرف / محمد محمود ثروت
مشرف / أحمد عبدالرحمن النجار
الموضوع
Internet of Things. Blockchain.
تاريخ النشر
2023.
عدد الصفحات
119 p. :
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
Computer Science (miscellaneous)
الناشر
تاريخ الإجازة
31/12/2023
مكان الإجازة
جامعة بني سويف - كلية العلوم - الرياضيات وعلوم الحاسب
الفهرس
Only 14 pages are availabe for public view

from 133

from 133

Abstract

In conclusion, this study addresses the burgeoning security challenges posed by the escalating number of Internet of Things (IoT) nodes. The study combines the strengths of the LEACH (Low Energy Adaptive Clustering Hierarchy) algorithm and blockchain technology, recognizing the potential of blockchain technology to fortify IoT network security through its decentralized and distributed nature. This integration enhances IoT networks’ security by facilitating energy-efficient data management and transaction integrity, thereby extending network lifespan and bolstering protection.
The devised security model incorporates the LEACH algorithm, which forms clusters of IoT devices with designated cluster heads responsible for data aggregation and forwarding. This model operates on two main layers: the LEACH clustering-based routing protocol and a blockchain simulator module. By adhering to blockchain technology’s core principles and cryptographic foundations, the model introduces additional security measures.
Experimental results and discussions, conducted through simulations in MATLAB 2018a, validate the efficacy of the proposed clustering algorithm. The simulation, comprising one hundred randomly generated nodes in a 2-D network, demonstrates the algorithm’s ability to reduce total network energy. Comparative analyses with different protocols, including Simple LEACH, I-LEACH, Modified LEACH, and Enhanced LEACH, underscore the superiority of the proposed Enhanced LEACH protocol in terms of network lifespan and energy utilization.
Furthermore, the study investigates the impact of consensus and network characteristics on the integrity, efficiency, and mining aspects of blockchain systems. The proposed simulator, compared with Ethereum, a common public blockchain, outperforms other simulators in terms of generating blocks, stale rate, and throughput. Validation runs using Ethereum data ensure the accuracy and reliability of the simulator, providing valuable insights for optimizing energy consumption, network longevity, and mining decentralization in wireless sensor networks and blockchain technology.
In summary, the contributions of this study encompass a two-layered blockchain security model, an enhanced LEACH algorithm, and a blockchain-based authentication framework. These innovations exhibit great promise in addressing IoT network security concerns. Future research endeavors may explore the scalability and practical implementation of these proposed models in real-world IoT environments, solidifying their significance in the evolving landscape of IoT security.