IDEAS home Printed from https://ideas.repec.org/h/wsi/wschap/9789811225079_0008.html
   My bibliography  Save this book chapter

Efficient Secure Image Encryption Using RFID with Blockchain Technology in IIoT

In: The Convergence of Artificial Intelligence and Blockchain Technologies Challenges and Opportunities

Author

Listed:
  • V. R. Elangovan
  • R. Nirmala
  • R. Jayakarthik
  • P. Tamilarasi
  • R. Kiruthiga

Abstract

In industrial methods, cameras and intelligent image sensors are widely used in process design and also in quality control of the resulting product. In the Industrial Internet of Things (IIoT), the sensors are used to generate images that are constantly at risk of reporting and infringement. Given that third-party intrusion occurs, the only way to secure data that fades into IIoT environments is through traditional methods. Currently, blockchain technology is the main solution to trust problems and also to eliminate intrusion from third parties. The objective of this chapter is really to explore the mutual effect on supply chain transparency on Radio Frequency Identification (RFID), the IIoT, and blockchain technologies. Depends on the Number of Pixels per Change Rate (NPCR), and analysis of entropy information, the data can be analyzed. In support of a variety of attacks, we determine the power of an algorithm that is encrypted for image encryption. RFID technology affects all IIoT & blockchain systems strongly and significantly, which in fact will have a significant and positive impact on Supply Chain Transparency (SCT). Through each industrial & blockchain IoT technology, the RFID system has an indirect impact on SCT. This research was the first scientific test of SCT’s influence on RFID, IIoT, and blockchain technologies. To facilitate the generalization of the results, observations from the first wave may be repeated. The most recent measures are designed and tested with precision and consistency for the use of industrial IoT systems, including blockchain technology. This is the first research to examine the cumulative effect on supply chain technology of RFID, IIoT, and blockchain systems, Edwards-curve Digital Signature Algorithm (EdDSA), public key encryption using a variant of the Schnorr signature based on Edwards’ twisted curves. In an IIoT environment, images can be secured by providing an authorized solution based on a private blockchain when the images are encrypted. In this method, the image includes the cryptographic pixel values which are stored in the blockchain, checking the confidentiality and security of the data. We obtained the value of entropy closer to an absolute value of 8, which is protected against the attack of brute force. Thus, the suggested method is very effective in preventing data leakage and the security that is described in the encrypted results.

Suggested Citation

  • V. R. Elangovan & R. Nirmala & R. Jayakarthik & P. Tamilarasi & R. Kiruthiga, 2022. "Efficient Secure Image Encryption Using RFID with Blockchain Technology in IIoT," World Scientific Book Chapters, in: Sam Goundar & G Suseendran & R Anandan (ed.), The Convergence of Artificial Intelligence and Blockchain Technologies Challenges and Opportunities, chapter 8, pages 159-179, World Scientific Publishing Co. Pte. Ltd..
  • Handle: RePEc:wsi:wschap:9789811225079_0008
    as

    Download full text from publisher

    File URL: https://www.worldscientific.com/doi/pdf/10.1142/9789811225079_0008
    Download Restriction: Ebook Access is available upon purchase.

    File URL: https://www.worldscientific.com/doi/abs/10.1142/9789811225079_0008
    Download Restriction: Ebook Access is available upon purchase.
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    More about this item

    Keywords

    Convergence; Blockchains; Artificial; Intelligence; Big Data; Multi-Agent Systems; Internet of Things; 5G; Cloud Security; Mobile Computing; Social Media; Collaborative Governance; Swarm Robotics; e-Government; Supply Chain Management; Smart Contracts; Cryptocurrencies; Industry 4.0; Tamper-Proof Technology;
    All these keywords.

    JEL classification:

    • O32 - Economic Development, Innovation, Technological Change, and Growth - - Innovation; Research and Development; Technological Change; Intellectual Property Rights - - - Management of Technological Innovation and R&D

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wsi:wschap:9789811225079_0008. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Tai Tone Lim (email available below). General contact details of provider: http://www.worldscientific.com/page/worldscibooks .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.