Dynamic Cryptography Integrated Secured Decentralized Applications with Blockchain Programming
DOI:
https://doi.org/10.31185/wjcm.Vol1.Iss2.41Keywords:
Blockchain, Security in Blockchain, Dynamic CryptographyAbstract
Blocks and chains are the building blocks of the blockchain, which is a community network. Blocks and chains are two terms used to describe collections of data information. The most fundamental need for a blockchain is that these postings be connected by cryptography, which is the case here. Cryptography. the entries in each block are added to as the list grows. Although the concept of blockchain cryptography is difficult, we have made it easier for you to understand. Asymmetric-key cryptography and hash functions are used in blockchains. Hash functions provide participants with a complete image of the internet. The SHA-256 hashing algorithm is often used in blockchains. In Bitcoin, where addresses are tracked by public-private key pairs, blockchains are often used. The public key in blockchain cryptography is a person's address. All participants have access to the participant's public key. The private key is used to get access to the address database and to authorise activities using the address. To ensure the integrity of the blockchain ledger, encryption plays a key role. Each event on the blockchain is recorded using encrypted data. As long as each user has access to their cryptographic keys, they may buy or trade cryptocurrencies. The root hashes of all transactions are stored in blockchains via cryptographic hashing. If somebody attempts to tamper with any data upon that blockchain, the main hash will have a completely new hash. Root hash comparisons may be performed on any other system to check whether the data is safe.
References
T. Dvir, L. Holczer, and Buttyan, “VeRA - Version number and rank authentication in RPL,” in Proceedings of the 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, pp. 2709–2723, 2011.
F. Álonso, L. Fernández, J. Marco, and Salvachúa, “IAACaaS: IoT Application-Scoped Access Control as a Service,” Futur Internet, vol. 9, no. 4, pp. 64–64, 2017.
H. Liu, B. Yang, and T. Liu, “Efficient Naming, Addressing and Profile Services in Internet-Of-Things Sensory Environments,” Ad Hoc Networks, vol. 18, pp. 85–101, 2014.
T. Conzon, P. Bolognesi, A. Brizzi, R. Lotito, M. A. Tomasi, and Spirito, “The Virtus Middleware: An Xmpp Based Architecture for Secure Iot Communications,” in Proceedings of the 21st International Conference on Computer Communications and Networks (ICCCN), 2012.
G. Lally and D. Sgandurra, “Towards a framework for testing the security of IoT devices consistently,” in Proceedings of the First International Workshop on ETAA 2018, 2018.
J. Granjal, E. Monteiro, and J. S. Silva, “Network-layer security for the internet of things using TinyOS and BLIP,” International Journal of Communication Systems, vol. 27, no. 10, pp. 1938–1963, 2014.
L. Luu, D. H. Chu, H. Olickel, P. Saxena, and A. Hobor, “Making smart contracts smarter,” Proceedings of the ACM Proceedings - ACM Conference on Computer and Communications Security, pp. 254–69, 2016.
M. A. Khan and K. Salah, “IoT security: review, blockchain solutions, and open challenges,” Future Generation Computer Systems, vol. 82, pp. 395–411, 2018.
M. Adil, M. A. Almaiah, A. O. Alsayed, and O. Almomani, “An anonymous channel categorization scheme of edge nodes to detect jamming attacks in wireless sensor networks,” Sensors, vol. 20, pp. 1–19, 2020.
M. Adil, M. A. Almaiah, A. O. Alsayed, and O. Almomani, “An anonymous channel categorization scheme of edge nodes to detect jamming attacks in wireless sensor networks,” Sensors, vol. 20, no. 8, pp. 2311–2311, 2020.
M. H. Ibrahim, “Octopus: an edge-fog mutual authentication scheme,” International Journal on Network Security, vol. 18, pp. 1089 1101, 2016.
M. Jamshidi, E. Zangeneh, M. Esnaashari, A. M. Darwesh, and M. R. Meybodi, “A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it,” Wireless Personal Communications, vol. 105, no. 1, pp. 145–173, 2019.
N. Park, “Mutual authentication scheme in secure internet of things technology for comfortable lifestyle,” Sensors (Switzerland), vol. 16, pp. 1–16, 2015.
P. N. Mahalle, B. Anggorojati, N. R. Prasad, and R. Prasad, “Identity authentication and capability based access control (iacac) for the internet of things,” J. Cyber Secur. Mobil, vol. 1, pp. 309–348, 2013.
R. Almadhoun, M. Kadadha, M. Alhemeiri, M. Alshehhi, and K. Salah, “A user authentication scheme of IoT devices using blockchain-enabled fog nodes 2018,” in Proceedings of the 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), pp. 1–8, 2018.
R. Riaz, K. H. Kim, and H. F. Ahmed, “Security Analysis Survey and Framework Design for Ip Connected Lowpans,” in Proceedings of the 2009 International Symposium on Autonomous Decentralized Systems (IEEE), pp. 1–6, 2009.
S. Dong, X. Zhang, and W. G. Zhou, “A security localization algorithm based on DV-hop against Sybil attack in wireless sensor networks,” Journal of Electrical Engineering & Technology, vol. 15, no. 2, pp. 919–926, 2020.
S. Mishra and A. Paul, “A critical analysis of attack detection schemes in IoT and open challenges,” in Proceedings of the 2020 IEEE International Conference on Computing, Power and Communication Technologies (GUCON), pp. 57–62, 2020.
S. Raza, S. Duquennoy, T. Voigt, and U. Roedig, “Demo abstract: securing communication in 6LoWPAN with compressed IPsec,” in Proceedings of the 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011.
S. Zulkarnain and S. Idrus, “Soft Biometrics for Keystroke Dynamics,” in Proceedings of the International Conference Image Analysis and Recognition, 2015.
A. H. M. Alaidi, R. A. M. Al_airaji, H. T. ALRikabi, I. A. Aljazaery, and S. H. Abbood, “Dark Web Illegal Activities Crawling and Classifying
Using Data Mining Techniques,” International Journal of Interactive Mobile Technologies, vol. 16, no. 10, 2022.
G. Zyskind and A. S. Pentland, “Decentralizing Privacy: Using Blockchain to Protect Personal Data,” 2015.
B. Benshoof, A. Rosen, A. G. Bourgeois, and R. W. Harrison, “Distributed decentralized domain name service Proc,” 2016 IEEE 30th Int. Parallel Distrib. Process. Symp, vol. 2016, pp. 12791287–12791287, 2016.
A. Ouaddah, A. A. Elkalam, and A. Ouahman, “FairAccess: a new blockchain-based access control framework for the Internet of Things,” Secur. Commun. Networks, vol. 9, no. 18, pp. 59435964–59435964, 2016.
M. Ali, “Blockstack: A global naming and storage system secured by blockchains,” USENIX Annu. Tech. Conf, pp. 181194–181194, 2016.
K. Christidis and M. Devetsikiotis, “Blockchains and Smart Contracts for the Internet of Things.” IEEE Access.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Jamal Kh-Madhloom
This work is licensed under a Creative Commons Attribution 4.0 International License.