Efficient Secure Image Encryption Using RFID with Blockchain Technology in IIoT
V. R. Elangovan,
R. Nirmala,
R. Jayakarthik,
P. Tamilarasi and
R. Kiruthiga
Chapter 8 in The Convergence of Artificial Intelligence and Blockchain Technologies:Challenges and Opportunities, 2022, pp 159-179 from World Scientific Publishing Co. Pte. Ltd.
Abstract:
In industrial methods, cameras and intelligent image sensors are widely used in process design and also in quality control of the resulting product. In the Industrial Internet of Things (IIoT), the sensors are used to generate images that are constantly at risk of reporting and infringement. Given that third-party intrusion occurs, the only way to secure data that fades into IIoT environments is through traditional methods. Currently, blockchain technology is the main solution to trust problems and also to eliminate intrusion from third parties. The objective of this chapter is really to explore the mutual effect on supply chain transparency on Radio Frequency Identification (RFID), the IIoT, and blockchain technologies. Depends on the Number of Pixels per Change Rate (NPCR), and analysis of entropy information, the data can be analyzed. In support of a variety of attacks, we determine the power of an algorithm that is encrypted for image encryption. RFID technology affects all IIoT & blockchain systems strongly and significantly, which in fact will have a significant and positive impact on Supply Chain Transparency (SCT). Through each industrial & blockchain IoT technology, the RFID system has an indirect impact on SCT. This research was the first scientific test of SCT’s influence on RFID, IIoT, and blockchain technologies. To facilitate the generalization of the results, observations from the first wave may be repeated. The most recent measures are designed and tested with precision and consistency for the use of industrial IoT systems, including blockchain technology. This is the first research to examine the cumulative effect on supply chain technology of RFID, IIoT, and blockchain systems, Edwards-curve Digital Signature Algorithm (EdDSA), public key encryption using a variant of the Schnorr signature based on Edwards’ twisted curves. In an IIoT environment, images can be secured by providing an authorized solution based on a private blockchain when the images are encrypted. In this method, the image includes the cryptographic pixel values which are stored in the blockchain, checking the confidentiality and security of the data. We obtained the value of entropy closer to an absolute value of 8, which is protected against the attack of brute force. Thus, the suggested method is very effective in preventing data leakage and the security that is described in the encrypted results.
Keywords: Convergence; Blockchains; Artificial; Intelligence; Big Data; Multi-Agent Systems; Internet of Things; 5G; Cloud Security; Mobile Computing; Social Media; Collaborative Governance; Swarm Robotics; e-Government; Supply Chain Management; Smart Contracts; Cryptocurrencies; Industry 4.0; Tamper-Proof Technology (search for similar items in EconPapers)
JEL-codes: O32 (search for similar items in EconPapers)
Date: 2022
References: Add references at CitEc
Citations:
Downloads: (external link)
https://www.worldscientific.com/doi/pdf/10.1142/9789811225079_0008 (application/pdf)
https://www.worldscientific.com/doi/abs/10.1142/9789811225079_0008 (text/html)
Ebook Access is available upon purchase.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:wsi:wschap:9789811225079_0008
Ordering information: This item can be ordered from
Access Statistics for this chapter
More chapters in World Scientific Book Chapters from World Scientific Publishing Co. Pte. Ltd.
Bibliographic data for series maintained by Tai Tone Lim ().