Review on Physically Unclonable Functions and Chaotic Maps in Providing Authentication in Blockchain Based Internet of Things

Main Article Content

Bharati B Pannyagol , S. L. Deshpande

Abstract

The IoT is the latest generation of Internet technology that promises to drastically improve life in several areas, including clever homes and intelligent transit, smart cities, and smart health. With all these applications it introduces several problems, including data integrity, security, privacy, and single points of failure. Future advancements in IoT applications are hampered by these difficulties. Recently, BC   has drawn an abundance of scholarly interest from researchers outside of the financial sector. IoT’s applications can benefit from the use of BC   technology to establish a decentralized, dependable, and secure environment. IoT applications using BC   are still in their infancy, especially when it comes to tiny computing devices. Given that prior to engaging in communication, every component of an Internet of Things network needs to authenticate itself, authentication is the foundation of the system. As a result, protecting authentication is crucial. This paper offers a thorough analysis of integration of BC   technology with IoT systems. We have concentrated on IoT security, specifically on their authentication protocols. It provides an analysis of the available literature on IoT and BC   integration and authentication by using Chaotic maps, Physically Unclonable Functions (PUF). In this paper, we first attempt to explore the key problems of IoT protocol stack and investigated the different chaotic maps, PUF used so far to overcome the authentication challenge in IoT.

Article Details

Section
Articles