Author
Listed:
- V. R. Elangovan
- R. Nirmala
- R. Jayakarthik
- P. Tamilarasi
- R. Kiruthiga
Abstract
In industrial methods, cameras and intelligent image sensors are widely used in process design and also in quality control of the resulting product. In the Industrial Internet of Things (IIoT), the sensors are used to generate images that are constantly at risk of reporting and infringement. Given that third-party intrusion occurs, the only way to secure data that fades into IIoT environments is through traditional methods. Currently, blockchain technology is the main solution to trust problems and also to eliminate intrusion from third parties. The objective of this chapter is really to explore the mutual effect on supply chain transparency on Radio Frequency Identification (RFID), the IIoT, and blockchain technologies. Depends on the Number of Pixels per Change Rate (NPCR), and analysis of entropy information, the data can be analyzed. In support of a variety of attacks, we determine the power of an algorithm that is encrypted for image encryption. RFID technology affects all IIoT & blockchain systems strongly and significantly, which in fact will have a significant and positive impact on Supply Chain Transparency (SCT). Through each industrial & blockchain IoT technology, the RFID system has an indirect impact on SCT. This research was the first scientific test of SCT’s influence on RFID, IIoT, and blockchain technologies. To facilitate the generalization of the results, observations from the first wave may be repeated. The most recent measures are designed and tested with precision and consistency for the use of industrial IoT systems, including blockchain technology. This is the first research to examine the cumulative effect on supply chain technology of RFID, IIoT, and blockchain systems, Edwards-curve Digital Signature Algorithm (EdDSA), public key encryption using a variant of the Schnorr signature based on Edwards’ twisted curves. In an IIoT environment, images can be secured by providing an authorized solution based on a private blockchain when the images are encrypted. In this method, the image includes the cryptographic pixel values which are stored in the blockchain, checking the confidentiality and security of the data. We obtained the value of entropy closer to an absolute value of 8, which is protected against the attack of brute force. Thus, the suggested method is very effective in preventing data leakage and the security that is described in the encrypted results.
Suggested Citation
V. R. Elangovan & R. Nirmala & R. Jayakarthik & P. Tamilarasi & R. Kiruthiga, 2022.
"Efficient Secure Image Encryption Using RFID with Blockchain Technology in IIoT,"
World Scientific Book Chapters, in: Sam Goundar & G Suseendran & R Anandan (ed.), The Convergence of Artificial Intelligence and Blockchain Technologies Challenges and Opportunities, chapter 8, pages 159-179,
World Scientific Publishing Co. Pte. Ltd..
Handle:
RePEc:wsi:wschap:9789811225079_0008
Download full text from publisher
As the access to this document is restricted, you may want to
for a different version of it.
More about this item
Keywords
;
;
;
;
;
;
;
;
;
;
;
;
;
;
;
;
;
;
;
JEL classification:
- O32 - Economic Development, Innovation, Technological Change, and Growth - - Innovation; Research and Development; Technological Change; Intellectual Property Rights - - - Management of Technological Innovation and R&D
Statistics
Access and download statistics
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wsi:wschap:9789811225079_0008. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Tai Tone Lim (email available below). General contact details of provider: http://www.worldscientific.com/page/worldscibooks .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.