SNDT WOMEN'S UNIVERSITY

BMK Knowledge Resource Centre

Vithaldas Vidyavihar, Juhu Tara Road,
Santacruz (West) Mumbai - 400049

Secured IoT Data Transmission with Enhanced Integrated Encryption Techniques with Blockchain Technology (Record no. 132578)

MARC details
000 -LEADER
fixed length control field 02441nam a2200133 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250825b |||||||| |||| 00| 0 eng d
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name S. Joseph
245 ## - TITLE STATEMENT
Title Secured IoT Data Transmission with Enhanced Integrated Encryption Techniques with Blockchain Technology
300 ## - PHYSICAL DESCRIPTION
Extent p1156-1175
520 ## - SUMMARY, ETC.
Summary, etc. biblio.abstract The Internet of Things (IoT) revolutionizes how we interact with smart devices. However, ensuring security in IoT systems presents complex challenges due to their centralized architecture and inherent limitations. The increasing attention towards blockchain technology stems from its decentralized structure, transparency, immutable records, and cryptographic hash functions, particularly when combined with the Internet of Things (IoT). Cryptographic hash algorithms are essential to blockchain technology, ensuring secure data transmission by linking private and public keys through mathematical functions. Existing cryptographic algorithms typically produce variable hash values accessible to a single node and support input key sizes up to 128 bytes. However, larger key sizes can reduce transaction accuracy, lower key entropy, decrease throughput, and increase transaction complexity. Conversely, smaller key sizes increase vulnerability to attacks. To overcome these challenges, several advancements have been proposed. A modified key signature scheme extends the key size to 256 bytes, achieving 82.6% accuracy, a time complexity of 1.68 nanoseconds, and a throughput of 15.24 kilobytes per 200 nanoseconds. However, this scheme operates on a single-node basis, limiting accessibility. These advancements aim to bolster security in IoT data transmission by integrating encryption techniques with blockchain technology. The performance of the modified signature scheme is analyzed through transaction parameters such as accuracy, time complexity, throughput, and hash output with cryptographic hash functions like SHA224, SHA256, SHA384, SHA512, MD5, SHA3-224, SHA3-256, SHA3-384, SHA3-512, and ECDSA. From this analysis, the elliptic curve cryptography algorithm gives higher accuracy and throughput with less time complexity.
654 ## - SUBJECT ADDED ENTRY--FACETED TOPICAL TERMS
Subject <a href="Cryptographic hash algorithms">Cryptographic hash algorithms</a>
-- <a href="Decentralized architecture">Decentralized architecture</a>
-- <a href="Encryption techniques key size extension and multi-signature scheme">Encryption techniques key size extension and multi-signature scheme</a>
-- <a href="Security challenges">Security challenges</a>
-- <a href="Data transmission">Data transmission</a>
-- <a href="Transaction accuracy">Transaction accuracy</a>
773 0# - HOST ITEM ENTRY
Host Biblionumber 80269
Host Itemnumber 113443
Place, publisher, and date of publication New Delhi IETE
Title IETE Journal of Research
International Standard Serial Number 0377-2063
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Journal Article
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Location (home branch) Sublocation or collection (holding branch) Date acquired Koha issues (times borrowed) Piece designation (barcode) Koha date last seen Price effective from Koha item type
    Dewey Decimal Classification     SNDT Juhu SNDT Juhu 25/08/2025   JP865.7 25/08/2025 25/08/2025 Journal Article