IOT TEXNOLOGIYALARIGA BLOKCHEYN ASOSIDA AUTENTIFIKATSIYA USULINI TAKOMILLASHTIRISH

Authors

  • Xudoyqulov Z.T. Muhammad Al-Xorazmiy nomidagi Toshkent axborot texnologiyalari universiteti
  • Seidullayev M. K. Muhammad Al-Xorazmiy nomidagi Toshkent axborot texnologiyalari universiteti

Keywords:

Buyumlar Interneti (IoT), REST, CoAP, MQTT, xavfsizlik, Blokcheyn

Abstract

Hozirgi kunga kelib IoT texnologiyasi juda tez rivojlanayotgan texnologiyalarning biri hisoblanadi. IoT texnologiyasi yordamida juda ko‘plab ma’lumotlar uzatiladi, qabul qilinadi va qayta ishlanadi. IoT texnologiyasiga qaratilgan kiberhujumlar soni ortib bormoqda, natijada xavfsizlikni ta’minlash dolzarb masallardan biriga aylandi. Ushbu moqalada IoT texnologiyasida qo‘llaniladigan protokollar tahlil qilingan. Blokcheyn yordamida IoT ilovalari uchun xavfsiz autentifikatsiya va ma’lumot almashish tizimi arxitekturasi ishlab chiqildi.  Taklif etilayotgan tizim ko‘p qatlamli arxitektura bo‘lib, uchta qatlamdan iborat: qurilma qatlami, boshqaruvchi qatlami va saqlash qatlami. Tizimda autentifikatsiya algoritmni blokcheyn (aqlli shartnoma) yordamida algoritmni takomillashtirildi.

References

HaddadPajouh H. et al. A survey on internet of things security: Requirenents, challenges, and solutions //Internet of Things. -2021. -T.14. -C. 100129

Srivastava, S., Chaurasia, B.K., Singh, D.: Blockchain-based IoT security solutions. In: Distributed Computing to Blockchain, pp. 327–339. Academic Press (2023)

Roy T. Fielding. Chapter 5 of dissertation “Representational State Transfer (REST)”. -2020. https://ics.uci.edu/~fielding/pubs/dissertation/rest_arch_style.htm

RFC 7252, Constrained Application Protocol (CoAP). https://datatracker.ietf.org/doc/html/rfc7252

Bryan Boyd et al. Building Real-time Mobile Solutions with MQTT and IBM MessageSight. IBM Redbooks, 2014

N Akhmedov, H Khujamatov, A Lazarev, M Seidullayev. Application of LPWAN technologies for the implementation of IoT projects in the Republic of Uzbekistan. 2021 International Conference on Information Science and Communications Technologies (ICISCT).

Nasrullayev, N., Seidullaev, M., Khudoykulov, Z., Abdujalilovich, G.A. (2024). Classification of Threats to Information Security of the “Smart Home” System. In: Aliev, R.A., et al. 12th World Conference “Intelligent System for Industrial Automation” (WCIS-2022). WCIS 2022. Lecture Notes in Networks and Systems, vol 718. Springer, Cham. https://doi.org/10.1007/978-3-031-51521-7_9.

Madiyar Seidullayev. Internet of Things security based on blockchain technology. Innovative Development in Educational Activities VOLUME 2 | ISSUE 11 | 2023.

Мадияр Сейдуллаев. Применение блокчейн-технологии в интернете вещей. RESEARCH AND EDUCATION VOLUME 2 | ISSUE 1 | 2023.

Ali Dorri, Salil S. Kanhere, Raja Jurdak, Praveen Gauravaram. LSB: a lightweight scalable blockchain for IoT security and anonymity. J. Parallel Distrib. Comput., 134 (2019), pp. 180-197

Lei Zhang, Mingxing Luo, Jiangtao Li, Man Ho Au, Kim-Kwang Raymond Choo, Tong Chen, Shengwei Tian. Blockchain based secure data sharing system for Internet of vehicles: a position paper. Veh. Commun., 16 (2019), pp. 85-93

Beini Zhou, Hui Li, Li Xu. An authentication scheme using identity-based encryption & blockchain. 2018 IEEE Sympotsium on Computers and Communications, ISCC, IEEE (2018), pp. 00556-00561

Published

2024-08-28

How to Cite

Xudoyqulov , Z., & Seidullayev, M. K. (2024). IOT TEXNOLOGIYALARIGA BLOKCHEYN ASOSIDA AUTENTIFIKATSIYA USULINI TAKOMILLASHTIRISH. DIGITAL TRANSFORMATION AND ARTIFICIAL INTELLIGENCE, 2(4), 39–45. Retrieved from https://dtai.tsue.uz/index.php/dtai/article/view/v2i45