Securing Transaction Records over the IoT Network Using Decentralized Distributed Ledger Technology

Main Article Content

Ramanakar Reddy Danda, Kiran Kumar Maguluri, M. Rajesh Khanna, A Hanumat Prasad, P Jyothi, S. N. V. Jyotsna Devi Kosuru

Abstract

The rapid proliferation of Internet of Things (IoT) devices has ushered in a new era of connectivity and data exchange, revolutionizing various industries. However, the inherent vulnerabilities in traditional centralized transaction systems pose significant security challenges, particularly when dealing with sensitive data generated by IoT devices. This paper introduces an ICAA (Integrity Consensus Authorization Algorithm) for securing transaction records over the IoT network by leveraging Decentralized Distributed Ledger Technology (DDL), integrating the PICA (Proof-of-Integrity Consensus Algorithm) and CTAP (Context-Aware Transaction Authorization Protocol). The proposed system addresses the limitations of centralized architectures by employing a decentralized ledger, ensuring transparency, immutability, and tamper-resistant transaction records. The Proof-of-Integrity Consensus Algorithm enhances the security of the network by validating and confirming transactions based on the integrity of the data stored in the distributed ledger. This consensus mechanism minimizes the risk of fraudulent activities and unauthorized modifications, making it well-suited for the dynamic and distributed nature of IoT environments. Furthermore, the integration of the Context-Aware Transaction Authorization Protocol enhances the adaptability of the system to the diverse contexts in which IoT devices operate. The synergy between the Proof-of-Integrity Consensus Algorithm and the Context-Aware Transaction Authorization Protocol creates a comprehensive and secure framework for managing transaction records in IoT networks. . The proposed HGGC is 5.026% better than the ECMQV-MAC, 0.4215% better than QKD, and 0.0843% better than OTP in the nodes 200. The proposed model contributes to the establishment of a trustworthy and resilient infrastructure for the IoT, laying the foundation for secure and transparent transactions in the connected world.

Article Details

Section
Articles