چکیده
مقدمه
مرور مطالعات پیشین
نتیجه گیری
منابع
Abstract
Introduction
Literature Review
Conclusion
References
چکیده
بلاک چین به دلیل ویژگی غیرمتمرکز و امنیتی آن، امروزه موضوع پرطرفداری است. استفاده از اینترنت از سوی دیگر همراه با افزایش تهدیدات و حملات به سرعت در حال افزایش است. اینترنت اشیا یا IOT مجموعه ای از میلیاردها دستگاه فیزیکی در سراسر جهان است که به منظور جمع آوری و به اشتراک گذاری داده ها در سراسر جهان به اینترنت متصل هستند. لوازم و دستگاه های اینترنت اشیا رونق فناوری هستند اما بزرگترین نگرانی در دستگاه های اینترنت اشیا امنیت آن است. بسیاری از حملات در اینترنت اشیا مورد بحث قرار می گیرند. فناوری های موجود برای ایمن سازی کامل دستگاه های IoT کافی نیستند. BIoT یا Blockchain IoT مکانیزم استفاده از ویژگی امنیتی بلاک چین در اینترنت اشیا است تا آن را در برابر حملات ارتباطی ایمن تر و کمتر آسیب پذیرتر کند. در این مقاله ما اصول اولیه بلاک چین، اینترنت اشیاء و اینکه چگونه کارهای مختلف بر روی BIoT متنوع شده است را مورد بحث قرار داده ایم.
توجه! این متن ترجمه ماشینی بوده و توسط مترجمین ای ترجمه، ترجمه نشده است.
Abstract
Blockchain is the trending topic now-a-days due to its decentralized and security feature. Internet usage on the other hand is increasing rapidly along with the increase in threats and attacks. The Internet of Things, or IoT, is the arrangement of billions of physical devices around the world that are connected to the internet for the purpose of collecting and sharing data, worldwide. IoT appliances and devices are the boom in the technology but the biggest concern in IoT devices is its security. A lot of attacks are discussed on IoT. Existing technologies are not enough to secure the IoT devices completely. BIoT or Blockchain IoT is the mechanism of using security feature of Blockchain in IoT to make it more secure and vulnerable to communication attacks. In this paper we have discussed the basics of Blockchain, IoT and How various work have been varied out on BIoT.
Introduction
Blockchain is a distributed ledger that contains data in an interconnected form of chains that are secured. Or one can easily understand it as a database that stores some kind of information in the interconnected blocks. Whenever any new data arrives then it is to be inserted into a new block. Once the block is ready with data it is to be inserted and interconnected with the previous existing blocks in that Blockchain in chronological order, by the help of hash techniques. The following figure shows the network of Blockchain.
In Blockchain we can store different types of information or data that may be inter-related or totally different from each other. It is the emerging technique with wide variety of applications. Blockchain is gaining popularity because of its decentralized and secure nature. It uses Hashing technique to store hash of previous data is stored and a secure chain is formed that’s hard to manipulate. People are investing in Bitcoins and accepting the concept of Blockchain.
Conclusion
Clearly it’s seen and observed that we are using BIoT in various applications and in coming years it will be scaled more in other application areas also. IoT is an emerging technique but in it security and privacy is not maintained. Blockchain is also a current emerging technique that is famous for its secure and decentralized nature. Together Blockchain IoT (BIoT) is used to make smart appliance more secure and private. In this paper we have reviewed the existing work and techniques in contribution to making IoT more secure in various applications like agriculture, automobile and healthcare etc.