Combined Digital Signature with SHA Hashing Technique-based Secure System: An Application of Blockchain using IoT
Main Article Content
Abstract
The Internet of Things (IoT) has become a popular computing technology paradigm. It is increasingly being utilized to facilitate human life processes through a variety of applications, including smart healthcare, smart grids, smart finance, and smart cities. Scalability, interoperability, security, and privacy, as well as trustworthiness, are all issues that IoT applications face. Blockchain solutions have recently been created to help overcome these difficulties. Therefore, this work describes the concept of providing security for payment processing involved in IOT devices and their service usage by applying Blockchain technology. Blockchain is a secured distributed cryptographic hashing technique which maintain transaction in a transparent and unalterable format. It maintains block of chained transaction and keeps on validating old and new transaction and if old hash matched then only transaction will be consider as successfully verified. All user’s transaction will be privacy protected and this same technique applied in this project to secure payment process happen between users and company services. All data in this project saved inside Blockchain and authentication and privacy will be performed by using DSA (digital signature algorithm) and SHA hashing technique. In this project there are two users called Service Providers and Service users.
Downloads
Metrics
Article Details
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.