Next Article in Journal
Ultrasonic Health Monitoring of Lithium-Ion Batteries
Next Article in Special Issue
Blockchain-Based Secure Storage Management with Edge Computing for IoT
Previous Article in Journal
Indoor 3-D RT Radio Wave Propagation Prediction Method: PL and RSSI Modeling Validation by Measurement at 4.5 GHz
Article Menu
Issue 7 (July) cover image

Export Article

Open AccessArticle

Scalable and Secure Internet of Things Connectivity

1
Department of Future Convergence Technology Engineering, Sungshin University, Seoul 02844, Korea
2
Department of Computer Science, Sungshin University, Seoul 02844, Korea
3
Department of Convergence Security Engineering, Sungshin University, Seoul 02844, Korea
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(7), 752; https://doi.org/10.3390/electronics8070752
Received: 5 June 2019 / Revised: 26 June 2019 / Accepted: 1 July 2019 / Published: 3 July 2019
(This article belongs to the Special Issue IoT Security and Privacy through the Blockchain)
  |  
PDF [1821 KB, uploaded 6 July 2019]
  |  

Abstract

The Internet of things (IoT) technology, which is currently considered the new growth engine of the fourth industrial revolution, affects our daily life and has been applied to various industrial fields. Studies on overcoming the limitations of scalability and stability in a centralized IoT operating environment by employing distributed blockchain technology have been actively conducted. However, the nature of IoT that ensures connectivity with multiple objects at any time and any place increases security threats. Further, it extends the influence of the cyber world into the physical domain, resulting in serious damage to human life and property. Therefore, we aim to study a method to increase the security of IoT devices and effectively extend them simultaneously. To this end, we analyze the authentication methods and limitations of traditional IoT devices and examine cases for improving IoT environments by using blockchain technology. Accordingly, we propose a framework that allows IoT devices to be securely connected and extended to other devices by automatically evaluating security using blockchain technology and the whitelist. The method proposed in this paper restricts the extension of devices vulnerable to security risks by imposing penalties and allows only devices with high security to be securely and quickly authenticated and extended without user intervention. In this study, we applied the proposed method to IoT network simulation environments and observed that the number of devices vulnerable to security was reduced by 48.5% compared with traditional IoT environments. View Full-Text
Keywords: blockchain; IoT; scalability; authentication; whitelist; secure blockchain; IoT; scalability; authentication; whitelist; secure
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Choi, Y.-J.; Kang, H.-J.; Lee, I.-G. Scalable and Secure Internet of Things Connectivity. Electronics 2019, 8, 752.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Electronics EISSN 2079-9292 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top