Abstract
In recent decades, the Internet of Things (IoT) is transforming into an attractive system to drive a substantive hop on stock and enterprises through physical, computerized, and social spaces. For enhancing the security level of IoT multimedia data, a block-based security model is proposed. At first, from the collected database some clusters are formed for the high-security process; where selecting an optimal group of data as cluster heads to divide the network is done by Dragonfly Optimization Algorithm (DOA). After forming the clusters, a hash function with blockchain technique is utilized to the secure the IoT information. Initially, the data is changed over into many blocks then applies a hash function to each block for an end to end blockchain model. Based on this function the information’s are encrypted and decrypted stored in the cloud by an authenticated person. From the implementation results of data security, the execution time and security levels are analyzed.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Alshehri, M.D., Hussain, F.K. and Hussain, O.K., 2018. Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT). Mobile Networks and Applications, pp.1-13.
Safi, A., 2017. Improving the Security of the Internet of Things Using Encryption Algorithms. World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 11(5), pp.546-549.
Lo’ai, A.T., and Somani, T.F., 2016, November. More secure Internet of Things using robust encryption algorithms against side channel attacks. In Computer Systems and Applications (AICCSA), 2016 IEEE/ACS 13th International Conference of (pp. 1-6). IEEE.
Sundaram, B.V., Ramnath, M., Prasanth, M. and Sundaram, V., 2015, March. Encryption and hash based security in internet of things. In Signal Processing, Communication and Networking (ICSCN), 2015 3rd International Conference on (pp. 1-6). IEEE.
Bhatia, S. and Patel, S., 2015. Analysis on different Data mining Techniques and algorithms used in IOT. Int. J. Eng. Res Appl, 2(12), pp.611-615.
Wang, C., Shen, J., Liu, Q., Ren, Y. and Li, T., 2018. A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things. Security and Communication Networks, 2018.
Chhabra, A., Vashishth, V., Khanna, A., Sharma, D.K. and Singh, J., 2018. An Energy Efficient Routing Protocol for Wireless Internet-of-Things Sensor Networks. arXiv preprint arXiv:1808.01039.
Xingmei, X., Jing, Z. and He, W., 2013, October. Research on the basic characteristics, the key technologies, the network architecture and security problems of the internet of things. In Computer Science and Network Technology (ICCSNT), 2013 3rd International Conference on (pp. 825-828). IEEE.
Srinidhi, N.N., Kumar, S.D. and Venugopal, K.R., 2018. Network optimizations in the Internet of Things: A review. Engineering Science and Technology, an International Journal.
Reyna, A., Martín, C., Chen, J., Soler, E. and Díaz, M., 2018. On blockchain and its integration with IoT. Challenges and opportunities. Future Generation Computer Systems.
Minoli, D. and Occhiogrosso, B., 2018. Blockchain mechanisms for IoT security. Internet of Things, 1, pp.1-13.
Khan, M.A. and Salah, K., 2018. IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, pp.395-411.
Bennani, K. and El Ghanami, D., 2012, November. Particle swarm optimization based clustering in wireless sensor networks: the effectiveness of distance altering. In Complex systems (ICCS), 2012 international conference on (pp. 1-4). IEEE.
Mirjalili, S., 2016. Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Computing and Applications, 27(4), pp.1053-1073.
Jesus, E.F., Chicarino, V.R., de Albuquerque, C.V. and Rocha, A.A.D.A., 2018. A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack. Security and Communication Networks, 2018.
K. Shankar, Mohamed Elhoseny, E. Dhiravida chelvi, SK. Lakshmanaprabu, Wanqing Wu, An Efficient Optimal Key Based Chaos Function for Medical Image Security, IEEE Access, November 2018. https://doi.org/10.1109/ACCESS.2018.2874026
Mohamed Elhoseny, K. Shankar, S. K. Lakshmanaprabu, Andino Maseleno, N. Arunkumar, Hybrid optimization with cryptography encryption for medical image security in Internet of Things, Neural Computing and Applications - Springer, October 2018. https://doi.org/10.1007/s00521-018-3801-x
Lakshmanaprabu SK, K. Shankar, Ashish Khanna, Deepak Gupta, Joel J. P. C. Rodrigues, Plácido R. Pinheiro, Victor Hugo C. de Albuquerque, “Effective Features to Classify Big Data using Social Internet of Things”, IEEE Access, Volume.6, page(s):24196-24204, April 2018.
T. Avudaiappan, R. Balasubramanian, S. Sundara Pandiyan, M. Saravanan, S. K. Lakshmanaprabu, K. Shankar, Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm, Journal of Medical Systems, Volume 42, Issue 11, pp.1-11, November 2018. https://doi.org/10.1007/s10916-018-1053-z
K.Shankar and P.Eswaran. “RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography”, China Communications, Volume. 14, Issue. 2, page(s): 118-130, February 2017.
Nur Aminudin, Andino Maseleno, K. Shankar, S. Hemalatha, K. Sathesh kumar, Fauzi, Rita Irviani, Muhamad Muslihudin, “Nur Algorithm on Data Encryption and Decryption”, International Journal of Engineering & Technology, Volume. 7, Issue-2.26, page(s): 109-118, June 2018.
K. Shankar and P. Eswaran. “RGB Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique”, Journal of Circuits, Systems, and Computers, Volume. 25, No. 11, page(s): 1650138-1 to 23, November 2016.
K. Shankar, Lakshmanaprabu S. K, “Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm”, International Journal of Engineering & Technology, Volume. 7, Issue. 9, page(s): 22-27, 2018.
K. Shankar and P.Eswaran. “A Secure Visual Secret Share (VSS) Creation Scheme in Visual Cryptography using Elliptic Curve Cryptography with Optimization Technique”. Australian Journal of Basic and Applied Sciences. Volume: 9, Issue.36, Page(s): 150-163, 2015.
K. Sathesh Kumar, K. Shankar, M. Ilayaraja, M. Rajesh, “Sensitive Data Security in Cloud Computing Aid of Different Encryption Techniques”, Journal of Advanced Research in Dynamical and Control Systems, Volume. 9, Issue. 18, page(s): 2888-2899, December 2017.
K. Shankar and P.Eswaran. “ECC Based Image Encryption Scheme with aid of Optimization Technique using Differential Evolution Algorithm”, International Journal of Applied Engineering Research, Volume: 10, No.5, pp. 1841–184, 2015.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Maseleno, A., Othman, M., Deepalakshmi, P., Shankar, K., Ilayaraja, M. (2019). Hash Function Based Optimal Block Chain Model for the Internet of Things (IoT). In: Singh, A., Mohan, A. (eds) Handbook of Multimedia Information Security: Techniques and Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-15887-3_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-15887-3_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15886-6
Online ISBN: 978-3-030-15887-3
eBook Packages: Computer ScienceComputer Science (R0)