Next Article in Journal
Ultrasonic Health Monitoring of Lithium-Ion Batteries
Next Article in Special Issue
Blockchain-Based Secure Storage Management with Edge Computing for IoT
Previous Article in Journal
Indoor 3-D RT Radio Wave Propagation Prediction Method: PL and RSSI Modeling Validation by Measurement at 4.5 GHz
Open AccessArticle

Scalable and Secure Internet of Things Connectivity

Department of Future Convergence Technology Engineering, Sungshin University, Seoul 02844, Korea
Department of Computer Science, Sungshin University, Seoul 02844, Korea
Department of Convergence Security Engineering, Sungshin University, Seoul 02844, Korea
Author to whom correspondence should be addressed.
Electronics 2019, 8(7), 752;
Received: 5 June 2019 / Revised: 26 June 2019 / Accepted: 1 July 2019 / Published: 3 July 2019
(This article belongs to the Special Issue IoT Security and Privacy through the Blockchain)
The Internet of things (IoT) technology, which is currently considered the new growth engine of the fourth industrial revolution, affects our daily life and has been applied to various industrial fields. Studies on overcoming the limitations of scalability and stability in a centralized IoT operating environment by employing distributed blockchain technology have been actively conducted. However, the nature of IoT that ensures connectivity with multiple objects at any time and any place increases security threats. Further, it extends the influence of the cyber world into the physical domain, resulting in serious damage to human life and property. Therefore, we aim to study a method to increase the security of IoT devices and effectively extend them simultaneously. To this end, we analyze the authentication methods and limitations of traditional IoT devices and examine cases for improving IoT environments by using blockchain technology. Accordingly, we propose a framework that allows IoT devices to be securely connected and extended to other devices by automatically evaluating security using blockchain technology and the whitelist. The method proposed in this paper restricts the extension of devices vulnerable to security risks by imposing penalties and allows only devices with high security to be securely and quickly authenticated and extended without user intervention. In this study, we applied the proposed method to IoT network simulation environments and observed that the number of devices vulnerable to security was reduced by 48.5% compared with traditional IoT environments. View Full-Text
Keywords: blockchain; IoT; scalability; authentication; whitelist; secure blockchain; IoT; scalability; authentication; whitelist; secure
Show Figures

Figure 1

MDPI and ACS Style

Choi, Y.-J.; Kang, H.-J.; Lee, I.-G. Scalable and Secure Internet of Things Connectivity. Electronics 2019, 8, 752.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map

Back to TopTop