Skip to main content
Taylor & Francis Group Logo
    Advanced Search

    Click here to search products using title name,author name and keywords.

    • Login
    • Hi, User  
      • Your Account
      • Logout
      Advanced Search

      Click here to search products using title name,author name and keywords.

      Breadcrumbs Section. Click here to navigate to respective pages.

      Chapter

      Secured IoT Device Management in Cloud-Fog Environment using Blockchain
      loading

      Chapter

      Secured IoT Device Management in Cloud-Fog Environment using Blockchain

      DOI link for Secured IoT Device Management in Cloud-Fog Environment using Blockchain

      Secured IoT Device Management in Cloud-Fog Environment using Blockchain book

      Secured IoT Device Management in Cloud-Fog Environment using Blockchain

      DOI link for Secured IoT Device Management in Cloud-Fog Environment using Blockchain

      Secured IoT Device Management in Cloud-Fog Environment using Blockchain book

      ByAsutosh Kumar Biswal, Sourav Kanti Addya, Bibhudatta Sahoo, Ashok Kumar Turuk
      BookCloud Security

      Click here to navigate to parent product.

      Edition 1st Edition
      First Published 2021
      Imprint CRC Press
      Pages 14
      eBook ISBN 9780367821555
      Share
      Share

      ABSTRACT

      The integration of Internet of Things (IoT) with cloud and fog computing makes people’s lives simpler. Resiliency is measured in order to observe how the IoT-cloud-fog environment will cope with the changes when any of the devices is compromised. The blockchain is essentially an append-only data structure that records all the activities in transactions and creates an immutable and distributed ledger of blocks when all participants in the peer-to-peer network agree without requiring trust on a central authority. The chapter discusses the performance evaluation of our proposed model. It emphasizes the need of the blockchain to solve key compromise problem. Using the Balanced Incomplete Block Design (BIBD) model, the keys are generated and efficiency of the network is evaluated. BIBD key generation is done using JMP tool and imported into python for key distribution and gateway selection. To overcome this problem, we deployed a blockchain-based solution to protect the compromised node, which is not achievable using the BIBD model.

      T&F logoTaylor & Francis Group logo
      • Policies
        • Privacy Policy
        • Terms & Conditions
        • Cookie Policy
        • Privacy Policy
        • Terms & Conditions
        • Cookie Policy
      • Journals
        • Taylor & Francis Online
        • CogentOA
        • Taylor & Francis Online
        • CogentOA
      • Corporate
        • Taylor & Francis Group
        • Taylor & Francis Group
        • Taylor & Francis Group
        • Taylor & Francis Group
      • Help & Contact
        • Students/Researchers
        • Librarians/Institutions
        • Students/Researchers
        • Librarians/Institutions
      • Connect with us

      Connect with us

      Registered in England & Wales No. 3099067
      5 Howick Place | London | SW1P 1WG © 2022 Informa UK Limited