Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges
Abstract
:1. Introduction
- RQ1: What are the current challenges that face BIoT integration?
- RQ2: What recommendations have been provided in the literature to overcome these challenges?
- RQ3: What are the future concerns and research trends for BIoT integration?
2. Background and Related Work
2.1. Blockchain Structure and Architecture
- (1)
- Hardware layer: Actuators, sensors, smart devices, controllers, and edge/fog nodes are all represented in this layer. The IoT is made up of these devices connected by a variety of wireless and wired communication protocols.
- (2)
- Data layer: Blocks, transactions, the hash function, the digital signature, and the Merkle tree are all part of this layer. This layer collects IoT data from the lower layer in the form of transactions and encrypts it using asymmetric cryptographic methods, hashes, and digital signatures.
- (3)
- Network layer: This layer serves as a P2P network on top of the communication layer. Only a network architecture that allows peers to trade resources without the participation of a third party allows for decentralization. While all P2P participants can operate as both a requestor and service providers, they can be divided into categories on the basis of the support services they provide, such as database, routing, and mining.
- (4)
- Consensus layer: The distributed consensus necessary to verify a block’s trustworthiness and guarantees that all peers have an accurate ledger copy are managed by this layer. However, owing to network failures, communication delays, or malevolent nodes, agents and nodes may end up with various perceptions of the system’s status (i.e., forks). As a result, avoiding such forks is one of the problems of a consensus method.
- (5)
- Incentive layer: The incentive layer is the heart of the BC network since it includes economic factors such as Ether (ETH) (a cryptocurrency that was created as a result of the confirmation of transactions on the Ethereum), Zcash (a protocol that provides a decentralized cryptocurrency, to store funds and generate a new private key for every new account [21]), and allocation methods to incentivize nodes to give their time and effort to data verification.
- (6)
- Contract layer: This layer is in charge of digital money, as well as the design and management of smart contracts. Algorithms, smart contracts, and scripts are applied to allow more sophisticated transactions.
- (7)
- Application layer: This layer offers services across a wide range of industries, including logistics, healthcare, IoT, and smart cities.
2.2. Blockchain Platforms
- (1)
- Permissionless: This form of BC, also known as public BC, permits transactions to be viewable to all nodes. To authenticate a transaction, every node in the network can participate in BC consensus. The node does not require authorization, and it may be unknown to the rest of the network. Nodes in a permissionless network support and collaborate on a large scale. Each transaction is associated with a processing fee, which offers an incentive for peers looking to add additional blocks to the BC [37]. Because altering the contents of the permissionless BC would be prohibitively costly, it is immune to hacking. Each transaction comprises an incentive (i.e., transaction fees) to the peer that approves the transaction into a new block because the decentralized consensus involves hundreds of other peers [36]. Bitcoin is the most well-known permissionless cryptocurrency. Another well-known permissionless BC is Ethereum.
- (2)
- Permissioned: This type of BC network may be classified as either private or consortium BCs.
- Private: These BCs are generally located in the heart of a single company that can verify transactions. Transactions may be read by the public or authorized parties. Private BCs operate without the need for money or tokens, and their transactions are fee-free [38]. Because blocks are broadcasted by surrogate nodes, a private BC is not as impenetrable to tampering as a public BC, but the firm may roll back its BC at any point in time. Multichain is an example of a private BC. Multichain is a Bitcoin fork with several features, including rights management, rapid setup, and data streams [39].
- Consortium: This type of BCs is managed by a small cluster of users from outside the group who are not allowed to confirm transactions. While the whole public may view transactions, only members of a limited group can write them. HLF is the most widely used and well-known federated BC. There are two sorts of HLF nodes: validating peers and nonvalidating peers. Validating peers are in charge of verifying transactions, establishing agreements, and keeping the ledger up to date. Nonvalidating peers can examine and verify transactions [36,40].
2.2.1. Bitcoin Platform
2.2.2. Ethereum Platform
2.2.3. Hyperledger Fabric Platform
2.2.4. Multichain Platform
2.2.5. Other Popular Blockchain Platforms
- IOTA: IOTA is a block-less distributed ledger based on the DAG. The tangle that records the transactions in the IOTA DAG is known as the tangle. IOTA can execute a greater number of microtransactions per second without incurring a charge. A new transaction in IOTA must use a PoW method to validate and approve two prior transactions. As the number of users in the IOTA network rises, the tangle becomes more efficient, quicker, more reliable, and secure.
- Libra: It is a decentralized BC that enables cryptocurrency and has a consistent value supported by low-volatility reserves such as fiat money. This platform was created to assist unbanked people with quick, safe, and scalable financial services. Libra’s unified auditing services for controllers and validators represent one of its most important features. Libra includes a native programming language called Move that allows the creation of customized transactions and smart contracts that are secure, flexible, and verifiable.
- EOS.IO: It is a new BC protocol that eliminates transaction fees and can handle millions of transactions per second. For enterprise-level DApps, the EOS BC architecture allows both vertical and horizontal scalability. High TPS, low latency, high TPS, enhanced parallel performance, and high sequential performance are all promising aspects of EOS. Inter-BC communication is also supported by EOS (IBC). The consensus algorithm used by EOS is delegate proof-of-stake (DPoS).
- IoT Chain: It is a platform designed to provide a light system for IoT devices’ security and scalability demands. To achieve lightning-fast performance, IoT Chain combines a directed acyclic network with the practical Byzantine fault tolerance (PBFT) consensus method.
- IoTeX: It is a BC-in-BC platform for M2M transactions that require privacy; the architecture consists of a public Rootchain and Subchains, which are managed by the Rootchain. Subchains are made up of either private or public BC and are responsible for controlling groups of linked devices. Subchains communicate with one another via establishing cross-BC transactions with the Rootchain.
- HDAC: IoT contracts and M2M transactions are handled via a Multichain platform. The consensus method for this platform is ePoW, an energy-efficient variant of PoW.
- Atonomi: Atonomi is a platform built on the Ethereum framework that provides immutable identity management services to help develop safe, trustworthy IoT devices.
- Hydrachain: It is an Ethereum platform extension that allows constructing a private ledger.
2.3. Blockchain Consensus Mechanism
2.4. Related Work
3. RQ 1 and RQ 2—Current Challenges and Recommendations to Enhance BIoT Integration
3.1. BC-Based Security Issues
3.1.1. Confidentiality
3.1.2. Integrity
3.1.3. Availability
3.1.4. Authentication
3.1.5. Vulnerabilities
- (1)
- The DDoS attack can abuse the process of authentication and trust by harming the system with an out-of-control number of requests to update and insert new records [4]. Latency and, in some cases, the use of low-performance devices in the BIoT applications will make this architecture exposed to race attacks [85].
- (2)
- The smart contract attack occurs when a customer uses the same cryptocurrency for several transactions. In a PoW-based BC, this type of attack is particularly simple to execute since the attacker may take advantage of the interval between the commencement and confirmation of two transactions to start an attack rapidly [88].
- (3)
- Border gateway mechanism (BGP) hijacking is another attack. BGP is a de facto directing mechanism that controls the delivery of IP packets to their final terminus. Attackers either use or modify BGP routing to intercept BC’s network traffic [88]. Because of the extreme concentration of some Bitcoin mining pools, BGP hijacking will have a significant impact if they are targeted. The attackers can essentially divide the Bitcoin network or slow down block propagation.
- (4)
- Manipulation attacks (i.e., unlawfully intercepting, modifying, or deleting sensitive data while they are being sent or stored) include four types: the eclipse, overlay, man-in-the-middle (MiTM), and tampering attack. (A) The attacker can use the eclipse attack to monopolize the target’s outgoing and incoming networks, thereby separating the victim from the others in the network [88,143]. The attacker can then alter the victim’s awareness of the BC or allow the victim to leftover computational resources on outdated perceptions of the BC. In addition, the attacker can use the victim’s computational capacity to carry out its harmful operations [10,159]. (B) The overlay attack, which utilizes the receiver’s public key, makes use of BC flaws to maliciously wrap an encrypted quantity to a novel transaction [10]. Addressing this attack can be achieved by verifying the timestamps. As a result, diverse inputs underneath the same dealer can be detected and linked to several transactions. (C) MiTM attacks take advantage of flaws such as private key leaks to spoof two parties’ identities and surreptitiously interrupt and manipulate their communications. Some BC frameworks, including Ethereum and Bitcoin, are still vulnerable to this attack [10]. (D) In the tampering attack, the attackers try to change the signed transactions that are being distributed in the network, such as the addresses and other data, before propagating them to the P2P network for validation [10]. Bitcoin, Litecoin, and Monero are PoW cryptocurrency-based ledgers that are particularly vulnerable to this attack.
- (5)
- Identity-based attacks: The adversary’s goal here is to create a false identity, pose as a genuine user, and obtain access to and influence the targeted system. Several attacks can be listed under identity-based attacks [10,75]. (1) Replay attacks are designed to spoof two parties’ identities, interrupt their data, and repeat them to their intended terminuses. Such attacks come as a result of the disorientation that certain nodes may suffer during a soft or a hard fork, and they are frequently carried out via vulnerable cryptocurrency-based protocols. (2) Key attacks (which make use of flaws in key schemes) allow unauthorized users to control the identities of the nodes that are participating through improper usage or storage of the keys. (3) In Sybil attacks, the attacker uses leaked keys to build a large number of false identities that may serve as authenticating nodes and undertake malicious transactions to boost or decrease the reputation level of the nodes that are being targeted. (4) In impersonation attacks, opponents can use weak or leaked private keys to impersonate genuine users and undertake unauthorized operations in the system.
- (6)
- Whitewashing attacks: In these attacks, nodes with a bad reputation take advantage of several system flaws to re-enter the BC with new identities. There is currently no formal solution to this assault; instead, TrustChain gives nodes with new identities lesser priorities and capabilities [10].
- (7)
- Quantum computing may be viewed as a danger to Bitcoin, since the computational capacity of these machines may be sufficient to compromise the integrity of digital signatures. It will just take a few minutes for a brute-force attack to crack the encryption and get the encryption keys [10]. Furthermore, technology advances with time, and new vulnerabilities and security flaws are discovered every day [46].
- (8)
- The liveness attack is another attack described in the literature that allows a low-mining-power attacker to interrupt communications between subgroups with equivalent mining power for a short period [160]. The balance attack against PoW-based BC is another attack [161], in which an attacker can temporarily disrupt communications between subgroups.
3.1.6. Trust Management
- (1)
- (2)
- Another challenge related to trust is granularity (i.e., resolution of the measured and recorded physical quantity), which is the amount of confidence that should be placed in the party providing the service and the extent to which the service receiver to pay for is trusted. For example, if an electric grid service provider wishes to be paid for every watt of electricity provided as it is provided, this may place undue stress on the system [107].
- (3)
- Another related problem is that it is difficult to implement real transaction validation. For example, a service provider could send out 10 W of electricity, but the receiver might only report 9 W. What is the best way to deal with this collision? The meters must be calibrated. Then, an independent method of determining the quantity of power sent and received is required [69].
- (4)
- Lastly, because of the trust difficulties, rating agencies may be able to give information on trust. This is similar to how online marketplaces like eBay employ ratings for sellers and customers. The resolution of trust takes place outside of the BC environment. As a result, while sending and receiving a specific quantity of Bitcoin is guaranteed, the service it may represent is not [69].
3.1.7. Learned Lessons
3.2. BC-Based Privacy
3.2.1. Identity Privacy
3.2.2. Data Privacy
3.2.3. Location Privacy
3.2.4. Usage Privacy
3.2.5. Learned Lessons
3.3. BC-Based Technical Considerations
3.3.1. Consensus Algorithms
3.3.2. Smart Contracts
3.3.3. Unstable Communication
3.3.4. IoT-Based Heterogeneous Devices
3.3.5. IoT-Based Network Bandwidth
3.3.6. Cryptographic Mechanism
3.3.7. Cryptographic Keys
3.3.8. Learned Lessons
3.4. BC-Based Scalability
3.4.1. Storage
3.4.2. Block Size
3.4.3. Cost and Transaction Fees
3.4.4. Learned Lessons
3.5. Computational Processing
3.5.1. Time
3.5.2. Power
3.5.3. Throughput
- Segregated witness, commonly known as SegWit, is where digital signatures are separated from the rest of the transactions and moved to the end of the block. As a result, transaction sizes are smaller, and one block may carry more transactions.
- Off-chain transactions: Here, if nodes make several transactions, off-chain micropayment channels are formed between them to carry out serval transactions off the chain rapidly, and BC only processes the final payment transaction.
- Sharding is a useful method for enhancing the horizontal scalability of BC systems. Nodes are partitioned into shards using BC sharding. Only a tiny percentage of all transactions are processed by each shard. Transactions are handled in parallel in this manner. Two examples of sharding BC systems are Elastico and OmniLedger.
- Reduced block interval time: Block generation in BC systems consists of two processes: transaction serialization and leader selection. The selection of one or more leader nodes is the responsibility of the leader election. Transaction serialization refers to the validation of transactions and the generation of new blocks by the chosen leader nodes. Leader nodes are picked at a low pace to reduce collisions during leader elections. Every 10 min, for example, the Bitcoin BC leader node is chosen. Each leader election in a typical BC system can only create one new block. Transaction validation and block creation are delayed due to the connection of leader election and transaction serialization. Rapid transaction serialization and slow leader selection need to be separated to minimize block interval time and enhance throughput. Many alternatives, including ByzCoin, Bitcoin-NG, and Solida, have incorporated the concept.
- Systems based on TDAG: TDAG is the next step of BC’s development. In a TDAG-based system, transactions are immediately added to a graph, creating a graph of transactions. IOTA is an example of a TDAG system. IOTA’s underlying technology is Tangle. When a new transaction is added to the IOTA Tangle, it selects between two prior transactions to approve. When a transaction is authorized by a large number of other transactions, it is said to be confirmed. Because transactions are added quickly in blocks, IOTA outperforms traditional BC systems in terms of throughput.
3.5.4. Learned Lessons
3.6. Regulations and Guidelines
3.6.1. Lack of Standards
3.6.2. Incentive and Punishment Mechanisms
3.6.3. Lack of Awareness
3.6.4. Learned Lessons
3.7. BIoT Design
3.7.1. BIoT Architecture
3.7.2. Blockchain Platform
3.7.3. Learned Lessons
4. RQ 3—BIoT Integration: Future Concerns and Trends
4.1. Big Data
4.2. New Business Mode Based on Blockchain
4.3. Artificial Intelligence
4.4. Quantum Computing
4.5. Double-Chained IoT Security Scheme
4.6. Interoperability of IoT and Blockchain
4.7. IoT, Blockchain, and Edge Computing Integration
5. Discussion and Limitations
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Elbasi, E.; Topcu, A.E.; Mathew, S. Prediction of COVID-19 risk in public areas using IoT and machine learning. Electronics 2021, 10, 1677. [Google Scholar] [CrossRef]
- Thakur, N.; Han, C.Y. Indoor localization for personalized ambient assisted living of multiple users in multi-floor smart environments. Big Data Cogn. Comput. 2021, 5, 42. [Google Scholar] [CrossRef]
- Alzoubi, Y.I.; Osmanaj, V.H.; Jaradat, A.; Al-Ahmad, A. Fog computing security and privacy for the internet of thing applications: State-of-the-art. Secur. Priv. 2021, 4, e145. [Google Scholar] [CrossRef]
- Fernández-Caramés, T.M.; Fraga-Lamas, P. A review on the use of blockchain for the internet of things. IEEE Access 2018, 6, 32979–33001. [Google Scholar] [CrossRef]
- Ismail, S.; Almayouf, R.; Chehab, S.; Alghamdi, S.; Almutairi, A.; Alasmari, B.; Altherwy, R. Edge IoT-cloud framework based on blockchain. In Proceedings of the 2020 2nd International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia, 13–15 October 2020; pp. 1–7. [Google Scholar]
- Powell, W.; Foth, M.; Cao, S.; Natanelov, V. Garbage in garbage out: The precarious link between IoT and blockchain in food supply chains. J. Ind. Inf. Integr. 2022, 25, 100261. [Google Scholar] [CrossRef]
- Al-Ahmad, A.S.; Kahtan, H. Cloud computing review: Features and issues. In Proceedings of the 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE), Shah Alam, Malaysia, 11–12 July 2018; pp. 1–5. [Google Scholar]
- Abdelmaboud, A.; Ahmed, A.I.A.; Abaker, M.; Eisa, T.A.E.; Albasheer, H.; Ghorashi, S.A.; Karim, F.K. Blockchain for IoT Applications: Taxonomy, Platforms, Recent Advances, Challenges and Future Research Directions. Electronics 2022, 11, 630. [Google Scholar] [CrossRef]
- Bala, K.; Kaur, P.D. Changing trends of blockchain in IoT: Benefits and challenges. In Proceedings of the 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 27–28 January 2022; pp. 324–329. [Google Scholar]
- Brotsis, S.; Limniotis, K.; Bendiab, G.; Kolokotronis, N.; Shiaeles, S. On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance. Comput. Netw. 2021, 191, 108005. [Google Scholar] [CrossRef]
- Al Sadawi, A.; Hassan, M.S.; Ndiaye, M. A survey on the integration of blockchain with IoT to enhance performance and eliminate challenges. IEEE Access 2021, 9, 54478–54497. [Google Scholar] [CrossRef]
- Hu, S.; Huang, S.; Huang, J.; Su, J. Blockchain and edge computing technology enabling organic agricultural supply chain: A framework solution to trust crisis. Comput. Ind. Eng. 2021, 153, 107079. [Google Scholar] [CrossRef]
- Bhushan, B.; Khamparia, A.; Sagayam, K.M.; Sharma, S.K.; Ahad, M.A.; Debnath, N.C. Blockchain for smart cities: A review of architectures, integration trends and future research directions. Sustain. Cities Soc. 2020, 61, 102360. [Google Scholar] [CrossRef]
- Nakamoto, S.; Bitcoin, A. A peer-to-peer electronic cash system. Bitcoin 2008, 4, 2. [Google Scholar]
- Li, X.; Lu, W.; Xue, F.; Wu, L.; Zhao, R.; Lou, J.; Xu, J. Blockchain-Enabled IoT-BIM Platform for Supply Chain Management in Modular Construction. J. Constr. Eng. Manag. 2022, 148, 04021195. [Google Scholar] [CrossRef]
- Rayes, A.; Salam, S. The Blockchain in IoT. In Internet of Things from Hype to Reality; Springer: Berlin/Heidelberg, Germany, 2022; pp. 277–303. [Google Scholar]
- Alzoubi, Y.I.; Al-Ahmad, A.; Jaradat, A. Fog computing security and privacy issues, open challenges, and blockchain solution: An overview. Int. J. Electr. Comput. Eng. 2021, 11, 5081–5088. [Google Scholar] [CrossRef]
- Khan, N.S.; Chishti, M.A. Security challenges in fog and IoT, blockchain technology and cell tree solutions: A review. Scalable Comput. 2020, 21, 515–542. [Google Scholar] [CrossRef]
- Aloqaily, M.; Bouachir, O.; Boukerche, A.; Al Ridhawi, I. Design guidelines for blockchain-assisted 5g-uav networks. IEEE Netw. 2021, 35, 64–71. [Google Scholar] [CrossRef]
- Alzoubi, Y.I.; Al-Ahmad, A.; Jaradat, A.; Osmanaj, V.H. Fog computing architecture, benefits, security, and privacy, for the internet of thing applications: An overview. J. Theor. Appl. Inf. Technol. 2021, 99, 436–451. [Google Scholar]
- Qatawneh, M.; Almobaideen, W.; AbuAlghanam, O. Challenges of blockchain technology in context internet of things: A survey. Int. J. Comput. Appl. 2020, 175, 14–20. [Google Scholar] [CrossRef]
- Baouya, A.; Chehida, S.; Bensalem, S.; Bozga, M. Fog computing and blockchain for massive IoT deployment. In Proceedings of the 9th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro, 8–11 June 2020; pp. 1–4. [Google Scholar]
- Srivastava, A.; Dashora, K. Application of blockchain technology for agrifood supply chain management: A systematic literature review on benefits and challenges. Benchmarking Int. J. 2022. [Google Scholar] [CrossRef]
- Arslan, S.S.; Jurdak, R.; Jelitto, J.; Krishnamachari, B. Advancements in distributed ledger technology for internet of things. Internet Things 2020, 9, 100114. [Google Scholar] [CrossRef]
- Ali, M.S.; Vecchio, M.; Pincheira, M.; Dolui, K.; Antonelli, F.; Rehmani, M.H. Applications of blockchains in the internet of things: A comprehensive survey. IEEE Commun. Surv. Tutor. 2018, 21, 1676–1717. [Google Scholar] [CrossRef]
- Xie, J.; Tang, H.; Huang, T.; Yu, F.R.; Xie, R.; Liu, J.; Liu, Y. A survey of blockchain technology applied to smart cities: Research issues and challenges. IEEE Commun. Surv. Tutor. 2019, 21, 2794–2830. [Google Scholar] [CrossRef]
- Zafar, S.; Bhatti, K.; Shabbir, M.; Hashmat, F.; Akbar, A. Integration of blockchain and Internet of Things: Challenges and solutions. Ann. Telecommun. 2022, 77, 13–32. [Google Scholar] [CrossRef]
- Tsang, Y.; Wu, C.; Ip, W.; Shiau, W.-L. Exploring the intellectual cores of the blockchain–Internet of Things (BIoT). J. Enterp. Inf. Manag. 2021, 34, 1287–1317. [Google Scholar] [CrossRef]
- Huang, J.; Kong, L.; Chen, G.; Wu, M.-Y.; Liu, X.; Zeng, P. Towards secure industrial IoT: Blockchain system with credit-based consensus mechanism. IEEE Trans. Ind. Inform. 2019, 15, 3680–3689. [Google Scholar] [CrossRef]
- Sharma, P.K.; Park, J.H. Blockchain based hybrid network architecture for the smart city. Future Gener. Comput. Syst. 2018, 86, 650–655. [Google Scholar] [CrossRef]
- Ouaddah, A.; Abou Elkalam, A.; Ouahman, A.A. Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In Europe and MENA Cooperation Advances in Information and Communication Technologies; Springer: Cham, Switzerland, 2017; Volume 520, pp. 523–533. [Google Scholar]
- Alzubi, J.A. Blockchain-based Lamport Merkle Digital Signature: Authentication tool in IoT healthcare. Comput. Commun. 2021, 170, 200–208. [Google Scholar] [CrossRef]
- Rahulamathavan, Y.; Phan, R.C.-W.; Rajarajan, M.; Misra, S.; Kondoz, A. Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Bhubaneswar, India, 17–20 December 2017; pp. 1–6. [Google Scholar]
- Lu, Y. Blockchain and the related issues: A review of current research topics. J. Manag. Anal. 2018, 5, 231–255. [Google Scholar] [CrossRef]
- Jo, B.W.; Khan, R.M.A.; Lee, Y.-S. Hybrid blockchain and internet-of-things network for underground structure health monitoring. Sensors 2018, 18, 4268. [Google Scholar] [CrossRef] [Green Version]
- Yang, R.; Yu, F.R.; Si, P.; Yang, Z.; Zhang, Y. Integrated blockchain and edge computing systems: A survey, some research issues and challenges. IEEE Commun. Surv. Tutor. 2019, 21, 1508–1532. [Google Scholar] [CrossRef]
- Abdellatif, A.A.; Samara, L.; Mohamed, A.; Erbad, A.; Chiasserini, C.F.; Guizani, M.; O’Connor, M.D.; Laughton, J. MEdge-Chain: Leveraging edge computing and blockchain for efficient medical data exchange. IEEE Internet Things J. 2021, 8, 15762–15775. [Google Scholar] [CrossRef]
- Berdik, D.; Otoum, S.; Schmidt, N.; Porter, D.; Jararweh, Y. A survey on blockchain for information systems management and security. Inf. Process. Manag. 2021, 58, 102397. [Google Scholar] [CrossRef]
- Chang, Z.; Guo, W.; Guo, X.; Chen, T.; Min, G.; Abualnaja, K.M.; Mumtaz, S. Blockchain-Empowered drone networks: Architecture, features, and future. IEEE Netw. 2021, 35, 86–93. [Google Scholar] [CrossRef]
- Yuan, P.; Zheng, K.; Xiong, X.; Zhang, K.; Lei, L. Performance modeling and analysis of a hyperledger-based system using GSPN. Comput. Commun. 2020, 153, 117–124. [Google Scholar] [CrossRef] [Green Version]
- Yang, H.-K.; Cha, H.-J.; Song, Y.-J. Secure identifier management based on blockchain technology in NDN environment. IEEE Access 2018, 7, 6262–6268. [Google Scholar] [CrossRef]
- Rizzardi, A.; Sicari, S.; Miorandi, D.; Coen-Porisini, A. Securing the access control policies to the Internet of Things resources through permissioned blockchain. Concurr. Comput. Pract. Exp. 2022, 34, e6934. [Google Scholar] [CrossRef]
- Kuo, T.-T.; Zavaleta Rojas, H.; Ohno-Machado, L. Comparison of blockchain platforms: A systematic review and healthcare examples. J. Am. Med. Inform. Assoc. 2019, 26, 462–478. [Google Scholar] [CrossRef]
- Paulavičius, R.; Grigaitis, S.; Igumenov, A.; Filatovas, E. A decade of blockchain: Review of the current status, challenges, and future directions. Informatica 2019, 30, 729–748. [Google Scholar] [CrossRef]
- Lone, A.H.; Naaz, R. Applicability of Blockchain smart contracts in securing Internet and IoT: A systematic literature review. Comput. Sci. Rev. 2021, 39, 100360. [Google Scholar] [CrossRef]
- Reyna, A.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 2018, 88, 173–190. [Google Scholar] [CrossRef]
- Wang, S.; Ouyang, L.; Yuan, Y.; Ni, X.; Han, X.; Wang, F.-Y. Blockchain-enabled smart contracts: Architecture, applications, and future trends. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 2266–2277. [Google Scholar] [CrossRef]
- Griggs, K.N.; Ossipova, O.; Kohlios, C.P.; Baccarini, A.N.; Howson, E.A.; Hayajneh, T. Healthcare blockchain system using smart contracts for secure automated remote patient monitoring. J. Med. Syst. 2018, 42, 130. [Google Scholar] [CrossRef] [PubMed]
- Ghandour, A.G.; Elhoseny, M.; Hassanien, A.E. Blockchains for smart cities: A survey. In Security in Smart Cities: Models, Applications, and Challenges; Hassanien, A.E., Elhoseny, M., Ahmed, S., Singh, A., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 193–210. [Google Scholar]
- Wang, X.; Zha, X.; Ni, W.; Liu, R.P.; Guo, Y.J.; Niu, X.; Zheng, K. Survey on blockchain for internet of things. Comput. Commun. 2019, 136, 10–29. [Google Scholar] [CrossRef]
- Fotiou, N.; Siris, V.A.; Polyzos, G.C. Interacting with the Internet of Things Using Smart Contracts and Blockchain Technologies. In Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2018; Wang, G., Chen, J., Yang, L., Eds.; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2018. [Google Scholar] [CrossRef] [Green Version]
- Mercan, S.; Kurt, A.; Akkaya, K.; Erdin, E. Cryptocurrency solutions to enable micropayments in consumer IoT. IEEE Consum. Electron. Mag. 2021, 11, 97–103. [Google Scholar] [CrossRef]
- Pennino, D.; Pizzonia, M.; Vitaletti, A.; Zecchini, M. Blockchain as IoT Economy enabler: A review of architectural aspects. J. Sens. Actuator Netw. 2022, 11, 20. [Google Scholar] [CrossRef]
- Klein, M.; Stummer, C. Feeless micropayments as drivers for new business models: Two exemplary application cases. Front. Blockchain 2021, 4, 641508. [Google Scholar] [CrossRef]
- Pajooh, H.H.; Rashid, M.; Alam, F.; Demidenko, S. Hyperledger fabric blockchain for securing the edge internet of things. Sensors 2021, 21, 359. [Google Scholar] [CrossRef]
- Pincheira, M.; Antonini, M.; Vecchio, M. Integrating the IoT and Blockchain Technology for the Next Generation of Mining Inspection Systems. Sensors 2022, 22, 899. [Google Scholar] [CrossRef]
- Majeed, U.; Khan, L.U.; Yaqoob, I.; Kazmi, S.A.; Salah, K.; Hong, C.S. Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges. J. Netw. Comput. Appl. 2021, 181, 103007. [Google Scholar] [CrossRef]
- Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasubramanian, V. A survey on the adoption of blockchain in IoT: Challenges and solutions. Blockchain Res. Appl. 2021, 2, 100006. [Google Scholar] [CrossRef]
- Lashkari, B.; Musilek, P. A comprehensive review of blockchain consensus mechanisms. IEEE Access 2021, 9, 43620–43652. [Google Scholar] [CrossRef]
- Turk, Ž.; Klinc, R. Potentials of blockchain technology for construction management. Procedia Eng. 2017, 196, 638–645. [Google Scholar] [CrossRef]
- Kumar, N.M.; Mallick, P.K. Blockchain technology for security issues and challenges in IoT. Procedia Comput. Sci. 2018, 132, 1815–1823. [Google Scholar] [CrossRef]
- Pahl, C.; El Ioini, N.; Helmer, S. A decision framework for blockchain platforms for IoT and edge computing. In Proceedings of the IoTBDS 2018, Madeira, Purtogal, 19–21 March 2018. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Derdour, M.; Mukherjee, M.; Derhab, A.; Maglaras, L.; Janicke, H. Blockchain technologies for the internet of things: Research issues and challenges. IEEE Internet Things J. 2018, 6, 2188–2204. [Google Scholar] [CrossRef] [Green Version]
- Alladi, T.; Chamola, V.; Parizi, R.M.; Choo, K.-K.R. Blockchain applications for industry 4.0 and industrial IoT: A review. IEEE Access 2019, 7, 176935–176951. [Google Scholar] [CrossRef]
- Lee, J.; Azamfar, M.; Singh, J. A blockchain enabled cyber-physical system architecture for industry 4.0 manufacturing systems. Manuf. Lett. 2019, 20, 34–39. [Google Scholar] [CrossRef]
- Wei, L.; Wu, J.; Long, C.; Lin, Y.-B. The convergence of ioe and blockchain: Security challenges. IT Prof. 2019, 21, 26–32. [Google Scholar] [CrossRef]
- Ahmed, S.; Shah, M.A.; Wakil, K. Blockchain as a trust builder in the smart city domain: A systematic literature review. IEEE Access 2020, 8, 92977–92985. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Shu, L.; Yang, X.; Derhab, A.; Maglaras, L. Security and privacy for green IoT-based agriculture: Review, blockchain solutions, and challenges. IEEE Access 2020, 8, 32031–32053. [Google Scholar] [CrossRef]
- Rao, A.R.; Clarke, D. Perspectives on emerging directions in using IoT devices in blockchain applications. Internet Things 2020, 10, 100079. [Google Scholar] [CrossRef]
- Wang, Q.; Zhu, X.; Ni, Y.; Gu, L.; Zhu, H. Blockchain for the IoT and industrial IoT: A review. Internet Things 2020, 10, 100081. [Google Scholar] [CrossRef]
- Tseng, L.; Yao, X.; Otoum, S.; Aloqaily, M.; Jararweh, Y. Blockchain-based database in an IoT environment: Challenges, opportunities, and analysis. Clust. Comput. 2020, 23, 2151–2165. [Google Scholar] [CrossRef]
- Garay, J.; Kiayias, A.; Leonardos, N. The bitcoin backbone protocol: Analysis and applications. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, 26–30 April 2015; pp. 281–310. [Google Scholar]
- Bhushan, B.; Sahoo, C.; Sinha, P.; Khamparia, A. Unification of blockchain and internet of things (BIoT): Requirements, working model, challenges and future directions. Wirel. Netw. 2021, 27, 55–90. [Google Scholar] [CrossRef]
- Farahani, B.; Firouzi, F.; Luecking, M. The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions. J. Netw. Comput. Appl. 2021, 177, 102936. [Google Scholar] [CrossRef]
- Singh, S.; Hosen, A.S.; Yoon, B. Blockchain security attacks, challenges, and solutions for the future distributed IoT network. IEEE Access 2021, 9, 13938–13959. [Google Scholar] [CrossRef]
- Da Xu, L.; Lu, Y.; Li, L. Embedding blockchain technology into IoT for security: A survey. IEEE Internet Things J. 2021, 8, 10452–10473. [Google Scholar]
- Yaqoob, I.; Salah, K.; Jayaraman, R.; Al-Hammadi, Y. Blockchain for healthcare data management: Opportunities, challenges, and future recommendations. Neural Comput. Appl. 2022, 34, 11475–11490. [Google Scholar] [CrossRef]
- Kumar, R.L.; Khan, F.; Kadry, S.; Rho, S. A Survey on blockchain for industrial Internet of Things. Alex. Eng. J. 2022, 61, 6001–6022. [Google Scholar] [CrossRef]
- Yu, Z.; Song, L.; Jiang, L.; Sharafi, O.K. Systematic literature review on the security challenges of blockchain in IoT-based smart cities. Kybernetes 2021, 51. [Google Scholar] [CrossRef]
- Alkhateeb, A.; Catal, C.; Kar, G.; Mishra, A. Hybrid blockchain platforms for the internet of things (IoT): A systematic literature review. Sensors 2022, 22, 1304. [Google Scholar] [CrossRef]
- Holst, A. Number of IoT Connected Devices Worldwide 2019–2030. Statistica 2022. Available online: https://www.statista.com/statistics/1183463/iot-connected-devices-worldwide-by-technology/ (accessed on 29 June 2022).
- Gill, S.S. Quantum and blockchain based Serverless edge computing: A vision, model, new trends and future directions. Internet Technol. Lett. 2021, e275. [Google Scholar] [CrossRef]
- Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. Blockchain for IoT security and privacy: The case study of a smart home. In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom workshops), Kona, HI, USA, 13 March 2017; pp. 618–623. [Google Scholar]
- Esposito, C.; Ficco, M.; Gupta, B.B. Blockchain-based authentication and authorization for smart city applications. Inf. Process. Manag. 2021, 58, 102468. [Google Scholar] [CrossRef]
- Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar] [CrossRef]
- Zhang, W.; Wu, Z.; Han, G.; Feng, Y.; Shu, L. Ldc: A lightweight dada consensus algorithm based on the blockchain for the industrial internet of things for smart city applications. Future Gener. Comput. Syst. 2020, 108, 574–582. [Google Scholar] [CrossRef]
- Zhong, L.; Wu, Q.; Xie, J.; Guan, Z.; Qin, B. A secure large-scale instant payment system based on blockchain. Comput. Secur. 2019, 84, 349–364. [Google Scholar] [CrossRef]
- Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of blockchain systems. Future Gener. Comput. Syst. 2020, 107, 841–853. [Google Scholar] [CrossRef] [Green Version]
- Abdi, A.I.; Eassa, F.E.; Jambi, K.; Almarhabi, K.; Khemakhem, M.; Basuhail, A.; Yamin, M. Hierarchical Blockchain-Based Multi-Chaincode Access Control for Securing IoT Systems. Electronics 2022, 11, 711. [Google Scholar] [CrossRef]
- Alzahrani, N.; Bulusu, N. Towards true decentralization: A blockchain consensus protocol based on game theory and randomness. In Proceedings of the International Conference on Decision and Game Theory for Security, Cham, Switzerland, 29–31 October 2018; pp. 465–485. [Google Scholar]
- Liao, C.-F.; Bao, S.-W.; Cheng, C.-J.; Chen, K. On design issues and architectural styles for blockchain-driven IoT services. In Proceedings of the 2017 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), Taipei, Taiwan, 12–14 June 2017; pp. 351–352. [Google Scholar]
- Kim, H.; Park, J.; Bennis, M.; Kim, S.-L. Blockchained on-device federated learning. IEEE Commun. Lett. 2019, 24, 1279–1283. [Google Scholar] [CrossRef] [Green Version]
- Vivar, A.L.; Orozco, A.L.S.; Villalba, L.J.G. A security framework for ethereum smart contracts. Comput. Commun. 2021, 172, 119–129. [Google Scholar] [CrossRef]
- Abbasi, Y.; Benlahmer, H. BCSDN-IoT: Towards an IoT security architecture based on SDN and Blockchain. Int. J. Electr. Comput. Eng. Syst. 2022, 13, 155–163. [Google Scholar] [CrossRef]
- Latif, S.A.; Wen, F.B.X.; Iwendi, C.; Li-li, F.W.; Mohsin, S.M.; Han, Z.; Band, S.S. AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems. Comput. Commun. 2022, 181, 274–283. [Google Scholar] [CrossRef]
- Qiu, J.; Liang, X.; Shetty, S.; Bowden, D. Towards secure and smart healthcare in smart cities using blockchain. In Proceedings of the 2018 IEEE International Smart Cities Conference (ISC2), Kansas City, MO, USA, 16–19 September 2018; pp. 1–4. [Google Scholar]
- Lakhan, A.; Mohammed, M.A.; Kadry, S.; AlQahtani, S.A.; Maashi, M.S.; Abdulkareem, K.H. Federated Learning-Aware Multi-Objective Modeling and blockchain-enable system for IIoT applications. Comput. Electr. Eng. 2022, 100, 107839. [Google Scholar] [CrossRef]
- Hannah, S.; Deepa, A.; Chooralil, V.S.; BrillySangeetha, S.; Yuvaraj, N.; Arshath Raja, R.; Suresh, C.; Vignesh, R.; Srihari, K.; Alene, A. Blockchain-based deep learning to process IoT data acquisition in cognitive data. BioMed Res. Int. 2022, 2022, 5038851. [Google Scholar] [CrossRef] [PubMed]
- Khan, L.U.; Saad, W.; Han, Z.; Hossain, E.; Hong, C.S. Federated learning for internet of things: Recent advances, taxonomy, and open challenges. IEEE Commun. Surv. Tutor. 2021, 23, 1759–1799. [Google Scholar] [CrossRef]
- Ghazal, T.M.; Hasan, M.K.; Alshurideh, M.T.; Alzoubi, H.M.; Ahmad, M.; Akbar, S.S.; Al Kurdi, B.; Akour, I.A. IoT for smart cities: Machine learning approaches in smart healthcare—A review. Future Internet 2021, 13, 218. [Google Scholar] [CrossRef]
- Bouras, M.; Lu, Q.; Dhelim, S.; Ning, H. A Lightweight Blockchain-Based IoT Identity Management Approach. Future Internet 2021, 13, 24. [Google Scholar] [CrossRef]
- Du, Y.; Wang, Z.; Leung, V. Blockchain-Enabled edge intelligence for IoT: Background, emerging trends and open issues. Future Internet 2021, 13, 48. [Google Scholar] [CrossRef]
- Ang, K.L.M.; Seng, J.K.P.; Ngharamike, E. Towards crowdsourcing internet of things (crowd-iot): Architectures, security and applications. Future Internet 2022, 14, 49. [Google Scholar] [CrossRef]
- Tomer, V.; Sharma, S. Detecting IoT Attacks Using an Ensemble Machine Learning Model. Future Internet 2022, 14, 102. [Google Scholar] [CrossRef]
- Yazdinejad, A.; Parizi, R.M.; Dehghantanha, A.; Zhang, Q.; Choo, K.-K.R. An energy-efficient SDN controller architecture for IoT networks with blockchain-based security. IEEE Trans. Serv. Comput. 2020, 13, 625–638. [Google Scholar] [CrossRef]
- Li, C.; Zhang, L.-J. A blockchain based new secure multi-layer network model for internet of things. In Proceedings of the 2017 IEEE International Congress on Internet of Things (ICIOT), Honolulu, HI, USA, 25–30 June 2017; pp. 33–41. [Google Scholar]
- Hasankhani, A.; Hakimi, S.M.; Shafie-khah, M.; Asadolahi, H. Blockchain technology in the future smart grids: A comprehensive review and frameworks. Int. J. Electr. Power Energy Syst. 2021, 129, 106811. [Google Scholar] [CrossRef]
- Christidis, K.; Devetsikiotis, M. Blockchains and smart contracts for the internet of things. IEEE Access 2016, 4, 2292–2303. [Google Scholar] [CrossRef]
- Chen, J.; Duan, K.; Zhang, R.; Zeng, L.; Wang, W. An AI based super nodes selection algorithm in blockchain networks. arXiv 2018, arXiv:1808.00216. [Google Scholar]
- Chen, F.; Xiao, Z.; Cui, L.; Lin, Q.; Li, J.; Yu, S. Blockchain for internet of things applications: A review and open issues. J. Netw. Comput. Appl. 2020, 172, 102839. [Google Scholar] [CrossRef]
- Wang, J.; Liu, Y.; Niu, S.; Song, H. Lightweight blockchain assisted secure routing of swarm UAS networking. Comput. Commun. 2021, 165, 131–140. [Google Scholar] [CrossRef]
- Hakak, S.; Khan, W.Z.; Gilkar, G.A.; Imran, M.; Guizani, N. Securing smart cities through blockchain technology: Architecture, requirements, and challenges. IEEE Netw. 2020, 34, 8–14. [Google Scholar] [CrossRef]
- Suhail, S.; Hussain, R.; Jurdak, R.; Hong, C.S. Trustworthy digital twins in the industrial internet of things with blockchain. IEEE Internet Comput. 2021, 26, 58–67. [Google Scholar] [CrossRef]
- Sengupta, J.; Ruj, S.; Bit, S.D. A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J. Netw. Comput. Appl. 2020, 149, 102481. [Google Scholar] [CrossRef]
- Shen, M.; Tang, X.; Zhu, L.; Du, X.; Guizani, M. Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things J. 2019, 6, 7702–7712. [Google Scholar] [CrossRef]
- Singh, S.; Sharma, P.K.; Yoon, B.; Shojafar, M.; Cho, G.H.; Ra, I.-H. Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city. Sustain. Cities Soc. 2020, 63, 102364. [Google Scholar] [CrossRef]
- Tan, L.; Shi, N.; Yang, C.; Yu, K. A blockchain-based access control framework for cyber-physical-social system big data. IEEE Access 2020, 8, 77215–77226. [Google Scholar] [CrossRef]
- Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasubramanian, V. Blockchain leveraged decentralized iot ehealth framework. Internet Things 2020, 9, 100159. [Google Scholar] [CrossRef]
- Vivekanandan, M.; Sastry, V. BIDAPSCA5G: Blockchain based internet of things (IoT) device to device authentication protocol for smart city applications using 5G technology. Peer-to-Peer Netw. Appl. 2021, 14, 403–419. [Google Scholar] [CrossRef]
- Anitha, A.; Haritha, T. The Integration of Blockchain With IoT in Smart Appliances: A Systematic Review. In Blockchain Technologies for Sustainable Development in Smart Cities; IGI Global: Hershey, PA, USA, 2022; pp. 223–246. [Google Scholar]
- Arul, R.; Al-Otaibi, Y.D.; Alnumay, W.S.; Tariq, U.; Shoaib, U.; Piran, M.J. Multi-modal secure healthcare data dissemination framework using blockchain in IoMT. Pers. Ubiquitous Comput. 2021. [Google Scholar] [CrossRef]
- Awan, S.H.; Ahmed, S.; Nawaz, A.; Sulaiman, S.; Zaman, K.; Ali, M.; Najam, Z.; Imran, S. BlockChain with IoT, an emergent routing scheme for smart agriculture. Int. J. Adv. Comput. Sci. Appl. 2020, 11, 420–429. [Google Scholar] [CrossRef]
- Banerjee, S.; Bera, B.; Das, A.K.; Chattopadhyay, S.; Khan, M.K.; Rodrigues, J.J. Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT. Comput. Commun. 2021, 169, 99–113. [Google Scholar] [CrossRef]
- Bera, B.; Chattaraj, D.; Das, A.K. Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment. Comput. Commun. 2020, 153, 229–249. [Google Scholar] [CrossRef]
- Bhawiyuga, A.; Wardhana, A.; Amron, K.; Kirana, A.P. Platform for integrating internet of things based smart healthcare system and blockchain network. In Proceedings of the 6th NAFOSTED Conference on Information and Computer Science (NICS), Hanoi, Vietnam, 12–13 December 2019; pp. 55–60. [Google Scholar]
- Brandão, A.; São Mamede, H.; Gonçalves, R. Systematic review of the literature, research on blockchain technology as support to the trust model proposed applied to smart places. In Proceedings of the World Conference on Information Systems and Technologies, Budva, Montenegro, 27–29 March 2018; pp. 1163–1174. [Google Scholar]
- Dagher, G.G.; Mohler, J.; Milojkovic, M.; Marella, P.B. Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain. Cities Soc. 2018, 39, 283–297. [Google Scholar] [CrossRef]
- Devi, M.S.; Suguna, R.; Joshi, A.S.; Bagate, R.A. Design of IoT blockchain based smart agriculture for enlightening safety and security. In Proceedings of the International Conference on Emerging Technologies in Computer Engineering, Jaipur, India, 1–2 February 2019; pp. 7–19. [Google Scholar]
- Dwivedi, A.D.; Srivastava, G.; Dhar, S.; Singh, R. A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 2019, 19, 326. [Google Scholar] [CrossRef] [Green Version]
- El Kafhali, S.; Chahir, C.; Hanini, M.; Salah, K. Architecture to manage internet of things data using blockchain and fog computing. In Proceedings of the 4th International Conference on Big Data and Internet of Things, Rabat, Morocco, 23–24 October 2019; pp. 1–8. [Google Scholar]
- Farouk, A.; Alahmadi, A.; Ghose, S.; Mashatan, A. Blockchain platform for industrial healthcare: Vision and future opportunities. Comput. Commun. 2020, 154, 223–235. [Google Scholar] [CrossRef]
- Hewa, T.; Ylianttila, M.; Liyanage, M. Survey on blockchain based smart contracts: Applications, opportunities and challenges. J. Netw. Comput. Appl. 2020, 177, 102857. [Google Scholar] [CrossRef]
- Huang, J.-C.; Shu, M.-H.; Hsu, B.-M.; Hu, C.-M. Service architecture of IoT terminal connection based on blockchain identity authentication system. Comput. Commun. 2020, 160, 411–422. [Google Scholar] [CrossRef]
- Huh, S.; Cho, S.; Kim, S. Managing IoT devices using blockchain platform. In Proceedings of the 19th International Conference on Advanced Communication Technology (ICACT), PyeongChang, Korea, 19–22 February 2017; pp. 464–467. [Google Scholar]
- Khan, F.A.; Asif, M.; Ahmad, A.; Alharbi, M.; Aljuaid, H. Blockchain technology, improvement suggestions, security challenges on smart grid and its application in healthcare for sustainable development. Sustain. Cities Soc. 2020, 55, 102018. [Google Scholar] [CrossRef]
- Kumari, A.; Gupta, R.; Tanwar, S.; Kumar, N. A taxonomy of blockchain-enabled softwarization for secure UAV network. Comput. Commun. 2020, 161, 304–323. [Google Scholar] [CrossRef]
- McGhin, T.; Choo, K.-K.R.; Liu, C.Z.; He, D. Blockchain in healthcare applications: Research challenges and opportunities. J. Netw. Comput. Appl. 2019, 135, 62–75. [Google Scholar] [CrossRef]
- Mehta, P.; Gupta, R.; Tanwar, S. Blockchain envisioned UAV networks: Challenges, solutions, and comparisons. Comput. Commun. 2020, 151, 518–538. [Google Scholar] [CrossRef]
- Memon, R.A.; Li, J.P.; Nazeer, M.I.; Khan, A.N.; Ahmed, J. DualFog-IoT: Additional fog layer for solving blockchain integration problem in internet of things. IEEE Access 2019, 7, 169073–169093. [Google Scholar] [CrossRef]
- Miglani, A.; Kumar, N.; Chamola, V.; Zeadally, S. Blockchain for internet of energy management: Review, solutions, and challenges. Comput. Commun. 2020, 151, 395–418. [Google Scholar] [CrossRef]
- Minoli, D.; Occhiogrosso, B. Blockchain mechanisms for IoT security. Internet Things 2018, 1, 1–13. [Google Scholar] [CrossRef]
- Misra, S.; Deb, P.K.; Pathak, N.; Mukherjee, A. Blockchain-enabled SDN for securing fog-based resource-constrained IoT. In Proceedings of the INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 490–495. [Google Scholar]
- Moin, S.; Karim, A.; Safdar, Z.; Safdar, K.; Ahmed, E.; Imran, M. Securing IoTs in distributed blockchain: Analysis, requirements and open issues. Future Gener. Comput. Syst. 2019, 100, 325–343. [Google Scholar] [CrossRef]
- Naseer, O.; Ullah, S.; Anjum, L. Blockchain-based decentralized lightweight control access scheme for smart grids. Arab. J. Sci. Eng. 2021, 46, 8233–8243. [Google Scholar] [CrossRef]
- Panarello, A.; Tapas, N.; Merlino, G.; Longo, F.; Puliafito, A. Blockchain and iot integration: A systematic survey. Sensors 2018, 18, 2575. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Pavithran, D.; Al-Karaki, J.N.; Shaalan, K. Edge-based blockchain architecture for event-driven IoT using hierarchical identity based encryption. Inf. Process. Manag. 2021, 58, 102528. [Google Scholar] [CrossRef]
- Qu, C.; Tao, M.; Yuan, R. A hypergraph-based blockchain model and application in internet of things-enabled smart homes. Sensors 2018, 18, 2784. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Rahman, M.A.; Rashid, M.M.; Hossain, M.S.; Hassanain, E.; Alhamid, M.F.; Guizani, M. Blockchain and IoT-based cognitive edge framework for sharing economy services in a smart city. IEEE Access 2019, 7, 18611–18621. [Google Scholar] [CrossRef]
- Rasool, S.; Iqbal, M.; Dagiuklas, T.; Ul-Qayyum, Z.; Li, S. Reliable data analysis through blockchain based crowdsourcing in mobile ad-hoc cloud. Mob. Netw. Appl. 2020, 25, 153–163. [Google Scholar] [CrossRef] [Green Version]
- Rathore, S.; Kwon, B.W.; Park, J.H. BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network. J. Netw. Comput. Appl. 2019, 143, 167–177. [Google Scholar] [CrossRef]
- Rifi, N.; Rachkidi, E.; Agoulmine, N.; Taher, N.C. Towards using blockchain technology for IoT data access protection. In Proceedings of the 17th International Conference on Ubiquitous Wireless Broadband (ICUWB), Salamanca, Spain, 12–15 September 2017; pp. 1–5. [Google Scholar]
- AlAhmad, A.S.; Kahtan, H.; Alzoubi, Y.I.; Ali, O.; Jaradat, A. Mobile cloud computing models security issues: A systematic review. J. Netw. Comput. Appl. 2021, 190, 103152. [Google Scholar] [CrossRef]
- Ferreira, C.M.S.; Garrocho, C.T.B.; Oliveira, R.A.R.; Silva, J.S.; Cavalcanti, C.F.M. IoT registration and authentication in smart city applications with blockchain. Sensors 2021, 21, 1323. [Google Scholar] [CrossRef]
- Azaria, A.; Ekblaw, A.; Vieira, T.; Lippman, A. Medrec: Using blockchain for medical data access and permission management. In Proceedings of the 2nd International Conference on Open and Big Data (OBD), Vienna, Austria, 22–24 August 2016; pp. 25–30. [Google Scholar]
- Mettler, M. Blockchain technology in healthcare: The revolution starts here. In Proceedings of the 18th International Conference on E-health Networking, Applications and Services (Healthcom), Munich, Germany, 14–16 September 2016; pp. 1–3. [Google Scholar]
- Srivastava, G.; Parizi, R.M.; Dehghantanha, A. The Future of Blockchain Technology in Healthcare Internet of Things Security. In Blockchain Cybersecurity, Trust and Privacy; Choo, K.K., Dehghantanha, A., Parizi, R., Eds.; Advances in Information Security; Springer: Cham, Switzerland, 2020; Volume 79. [Google Scholar] [CrossRef]
- Gao, W.; Hatcher, W.G.; Yu, W. A survey of blockchain: Techniques, applications, and challenges. In Proceedings of the 27th International Conference On Computer Communication and Networks (ICCCN), Hangzhou, China, 30 July–2 August 2018; pp. 1–11. [Google Scholar]
- Machado, C.; Fröhlich, A.A.M. IoT data integrity verification for cyber-physical systems using blockchain. In Proceedings of the 21st International Symposium on Real-Time Distributed Computing (ISORC), Singapore, 29–31 May 2018; pp. 83–90. [Google Scholar]
- Mora, O.B.; Rivera, R.; Larios, V.M.; Beltrán-Ramírez, J.R.; Maciel, R.; Ochoa, A. A use case in cybersecurity based in blockchain to deal with the security and privacy of citizens and smart cities cyberinfrastructures. In Proceedings of the 2018 IEEE International Smart Cities Conference (ISC2), Kansas City, MO, USA, 16–19 September 2018; pp. 1–4. [Google Scholar]
- Kiayias, A.; Panagiotakos, G. On trees, chains and fast transactions in the blockchain. In Progress in Cryptology—LATINCRYPT 2017; LATINCRYPT 2017. Lecture Notes in Computer Science; Lange, T., Dunkelman, O., Eds.; Springer: Cham, Switzerland, 2017; Volume 11368, pp. 327–351. [Google Scholar]
- Natoli, C.; Gramoli, V. The balance attack against proof-of-work blockchains: The R3 testbed as an example. arXiv 2016, arXiv:1612.09426. [Google Scholar]
- Alzoubi, Y.I.; Al-Ahmad, A.; Kahtan, H. Blockchain technology as a Fog computing security and privacy solution: An overview. Comput. Commun. 2022, 182, 129–152. [Google Scholar] [CrossRef]
- Ma, M.; Shi, G.; Li, F. Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario. IEEE Access 2019, 7, 34045–34059. [Google Scholar] [CrossRef]
- Dang, T.L.N.; Nguyen, M.S. An approach to data privacy in smart home using blockchain technology. In Proceedings of the 2018 International Conference on Advanced Computing and Applications (ACOMP), Ho Chi Minh City, Vietnam, 27–29 November 2018; pp. 58–64. [Google Scholar]
- Lin, J.; Shen, Z.; Zhang, A.; Chai, Y. Blockchain and IoT based food traceability for smart agriculture. In Proceedings of the 3rd International Conference on Crowd Science and Engineering, Singapore, 28–31 July 2018; pp. 1–6. [Google Scholar]
- Dorri, A.; Kanhere, S.S.; Jurdak, R. Towards an optimized blockchain for IoT. In Proceedings of the 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI), Pittsburgh, PA, USA, 18–21 April 2017; pp. 173–178. [Google Scholar]
- Chaudhry, N.; Yousaf, M.M. Consensus algorithms in blockchain: Comparative analysis, challenges and opportunities. In Proceedings of the 12th International Conference on Open Source Systems and Technologies (ICOSST), Lahore, Pakistan, 19–21 December 2018; pp. 54–63. [Google Scholar]
- Bi, W.; Yang, H.; Zheng, M. An accelerated method for message propagation in blockchain networks. arXiv 2018, arXiv:1809.00455. [Google Scholar]
- Ghosh, B.; Bouri, E. Is Bitcoin’s carbon footprint persistent? Multifractal evidence and policy implications. Entropy 2022, 24, 647. [Google Scholar] [CrossRef]
- Singh, S.; Ra, I.-H.; Meng, W.; Kaur, M.; Cho, G.H. SH-BlockCC: A secure and efficient internet of things smart home architecture based on cloud computing and blockchain technology. Int. J. Distrib. Sens. Netw. 2019, 15, 1550147719844159. [Google Scholar] [CrossRef]
- Hazari, S.S.; Mahmoud, Q.H. A parallel proof of work to improve transaction speed and scalability in blockchain systems. In Proceedings of the 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 7–9 January 2019; pp. 0916–0921. [Google Scholar]
- Simić, M.; Sladić, G.; Milosavljević, B. A case study IoT and blockchain powered healthcare. In Proceedings of the 8th PSU-UNS International Conference on Engineering and Technology (ICET), Novi Sad, Serbia, 13 March 2017. [Google Scholar]
- Saghiri, A.M.; Vahdati, M.; Gholizadeh, K.; Meybodi, M.R.; Dehghan, M.; Rashidi, H. A framework for cognitive internet of things based on blockchain. In Proceedings of the 4th International Conference on Web Research (ICWR), Tehran, Iran, 11–12 May 2018; pp. 138–143. [Google Scholar]
- Samaniego, M.; Jamsrandorj, U.; Deters, R. Blockchain as a service for IoT. In Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Chengdu, China, 15–18 December 2016; pp. 433–436. [Google Scholar]
- Stanciu, A. Blockchain based distributed control system for edge computing. In Proceedings of the 21st International Conference on Control Systems and Computer Science (CSCS), Bucharest, Romania, 29–31 May 2017; pp. 667–671. [Google Scholar]
- Savazzi, S.; Nicoli, M.; Rampa, V. Federated learning with cooperating devices: A consensus approach for massive IoT networks. IEEE Internet Things J. 2020, 7, 4641–4654. [Google Scholar] [CrossRef] [Green Version]
- Qu, Y.; Gao, L.; Luan, T.H.; Xiang, Y.; Yu, S.; Li, B.; Zheng, G. Decentralized privacy using blockchain-enabled federated learning in fog computing. IEEE Internet Things J. 2020, 7, 5171–5183. [Google Scholar] [CrossRef]
- Outchakoucht, A.; Hamza, E.; Leroy, J.P. Dynamic access control policy based on blockchain and machine learning for the internet of things. Int. J. Adv. Comput. Sci. Appl. 2017, 8, 417–424. [Google Scholar] [CrossRef]
- Roldán, J.; Boubeta-Puig, J.; Martínez, J.L.; Ortiz, G. Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks. Expert Syst. Appl. 2020, 149, 113251. [Google Scholar] [CrossRef]
- Ren, Z.; Wu, H.; Ning, Q.; Hussain, I.; Chen, B. End-to-end malware detection for android IoT devices using deep learning. Ad Hoc Netw. 2020, 101, 102098. [Google Scholar] [CrossRef]
- Manogaran, G.; Rawal, B.S.; Saravanan, V.; Kumar, P.M.; Martínez, O.S.; Crespo, R.G.; Montenegro-Marin, C.E.; Krishnamoorthy, S. Blockchain based integrated security measure for reliable service delegation in 6G communication environment. Comput. Commun. 2020, 161, 248–256. [Google Scholar] [CrossRef]
Abbreviation | Definition | Abbreviation | Definition |
---|---|---|---|
ADEPT | Autonomous Distributed P2P Telemetry | FNN | Feed-forward neural network |
AES | Advanced Encryption Standard | HLF | Hyperledger Fabric |
BBP | Bitcoin Backbone Protocol | IATBA | International Association for Trusted Blockchain Applications |
BC | Blockchain | IoT | Internet of things |
BECI | Bitcoin Energy Usage Index | IOTA | Internet of things application |
BIoT | Blockchain and Internet of things integration | IPFS | InterPlanetary File System |
CBECI | Cambridge Bitcoin Power Consumption Index | ISO | International Organization for Standardization |
CNN | Convolutional neural network | LSTM | Long-short term memory |
DAG | Directed acyclic graph | MiTM | Man-in-the-middle |
DDoS | Distributed denial of service | NIS | Network and information security |
DID | Decentralized identity | PBFT | Practical Byzantine fault tolerance |
DHT | Distributed hash-table | PKI | Public key infrastructure |
DLT | Distributed ledger technology | PoA | Proof-of-activity |
DPoS | Delegate proof-of-stake | PoC | Proof-of-capacity |
EEA | Enterprise Ethereum Alliance | PoW | Proof-of-work |
ECC | Elliptic Curve Cryptography | QoS | Quality of service |
ETH | Ether | SDN | Software-defined networking |
EVM | Ethereum Virtual Machine | SSI | Self-sovereign identity |
FBA | Federated Byzantine agreement | SVM | Support vector machines |
FC | Fog computing | zkSNARK | Zero-knowledge succinct non-interactive argument of knowledge |
Features | Bitcoin | Ethereum | HLF | Multichain |
---|---|---|---|---|
Access | Public | Public | Consortium | Private |
Open source | Yes | Yes | Yes | Yes |
Consensus | PoW | PoS/PoW | PBTF/SIEVE | PBTF/Ripple |
Crypto currency | Bitcoin | ETH | None | Multicurrency |
Smart contracts | Bitcoin script | Smart contract | Chain code | Smart filters |
Special hardware requirement | No | No | No | No |
Average transaction per second | 7 | 15–20 | 3500 | 200–1000 |
Hashing algorithm | SHA-256 | Ethash, KECCAK-256 | SHAKE256, SHA3 | SHA-256 |
ID management | No | No | Yes | Yes |
Key management | No | No | Yes | Yes |
Trustless operation | Yes | Yes | Trusted validators | Trusted validators |
Data confidentiality | No | No | Yes | Yes |
Authentication | No | Medium | High | High |
Platform | Advantages | Disadvantages |
---|---|---|
Bitcoin |
|
|
Ethereum |
|
|
HLF |
|
|
Multichain |
|
|
Recent Survey Article | Year | Domain | BIoT Challenges |
---|---|---|---|
Fernández-Caramés and Fraga-Lamas [4] | 2018 | BIoT applications | Technical, standardization, BC infrastructure, regulations, and different BC varieties. |
Ferrag et al. [63] | 2018 | BIoT integration | Security attacks, adequate security framework, power consumption, trust management, BC infrastructure, skyline query processing, and vehicular cloud advertisement dissemination. |
Reyna et al. [46] | 2018 | BIoT integration | Scalability, security, privacy, smart contracts, legislations, and consensus. |
Ali et al. [25] | 2018 | BIoT applications | Scalability, security, privacy, resources, public/private implementation, big data and machine learning (ML), SDN network, and cellular network. |
Alladi et al. [64] | 2019 | BC applications in IIoT | Scalability, security, privacy, energy and cost, resources, and regulations. |
Wei et al. [66] | 2019 | BIoT integration security challenges | Security, data privacy, authentication and identity management, trust establishment, decentralized cooperation, and consensus protocol. |
Xie et al. [26] | 2019 | BIoT for smart cities | Security, privacy, energy, incentive and punishment mechanisms, cost, and regulations. |
Yang et al. [36] | 2019 | BC in edge computing | Scalability, security, privacy, artificial intelligence (AI), self-organization, function integration, resource management, and big data. |
Ahmed et al. [67] | 2020 | BIoT in smart cities | Security, privacy, data, structure, bandwidth, and latency. |
Ferrag et al. [68] | 2020 | BIoT for green agriculture | Scalability, ML and database of intrusion detection, choosing consensus algorithm, cryptographic protocol, security attacks, and slicing threat of 5G. |
Rao and Clarke [69] | 2020 | BIoT integration | Security, privacy, computation and storage, the granularity of transactions, trust, and successful pilots of BIoT, and awareness. |
Tseng et al. [71] | 2020 | BIoT-based database | Bitcoin Backbone Protocol (BBP) database. |
Wang et al. [70] | 2020 | BC for industrial IoT | Performance, privacy, standardization, and complexity. |
Al Sadawi et al. [11] | 2021 | BIoT integration | Scalability, security, privacy, resources, consensus choice, big data, device mobility, smart contracts, and standardization. |
Bhushan et al. [73] | 2021 | BIoT unification | Scalability, IoT resources, BC infrastructure, BIoT and cellular network, privacy, and ML, and big data. |
Farahani et al. [74] | 2021 | BIoT integration | Security, privacy, throughput, latency, resources, usability, and centralization. |
Majeed et al. [57] | 2021 | BIoT for smart cities | Scalability, security, privacy, sustainability, consensus algorithm, latency, processing and storage, and smart contract immutability. |
Singh et al. [75] | 2021 | BIoT integration security challenges | Combined and zero attacks, infrastructure, and security requirements (key exchange, resources, performance, and threat management). |
Uddin et al. [58] | 2021 | BIoT challenges and solutions | Scalability, security, privacy, connectivity, big data, and throughput. |
Da Xu et al. [76] | 2021 | BIoT security challenges and recommendations | Performance, consensus, bandwidth, communication, block recording, integration with edge computing, and interoperability with 6G. |
Yaqoob et al. [77] | 2021 | BC for healthcare data management | Scalability, regulations, interoperability, irreversibility, tokenization, integration with eHealth, data accuracy, and adoption culture. |
Abdelmaboud et al. [8] | 2022 | BIoT integration | Scalability, security, identity management, interoperability, consensus related challenges. |
Kumar et al. [78] | 2022 | BC and IIoT integration | Complexity, security, privacy, interoperability, heterogeneity, resources. |
Yu et al. [79] | 2022 | BIoT security challenges in smart cities | Resources and power consumption, confidentiality, standardization, and the need for more studies. |
Pennino et al. [53] | 2022 | BC as enabler of IoT economy | Scalability, transaction cost, unneeded functionalities, and computational power. |
Alkhateeb et al. [80] | Hypride BC for IoT | Portability, resources, interoperability, computational power, and scalability. | |
This survey | BIoT integration challenges | An in-depth comprehensive discussion of BIoT’s current challenges. Seven challenge categories including 28 challenges were identified. Discussion of best practices currently recommended. Discussion of BIoT’s future challenges. Six main themes of future challenges were identified. |
Search Terms | Database | Inclusion Criteria | Selected Articles |
---|---|---|---|
(Internet of things OR IoT) AND (Blockchain OR Bitcoin OR Ethereum OR Multichain OR distributed ledger OR Cryptocoin OR Hyperledger Fabric) | IEEE Xplore, Elsevier ScienceDirect, MDPI Online, Google Scholar, Wiley Online Library, SpringerLink, SAGE Publication, ACM Digital Library, and Emerald Insight | Only papers written in English. Result: 517 papers. | [4,5,6,8,9,10,11,12,13,19,21,24,25,26,27,29,30,33,35,36,39,42,44,45,46,47,48,49,51,53,55,56,57,58,61,62,63,64,66,67,68,69,70,71,73,74,75,76,77,78,79,80,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103,104,105,106,107,108,109,110,111,112,113,114,115,116,117,118,119,120,121,122,123,124,125,126,127,128,129,130,131,132,133,134,135,136,137,138,139,140,141,142,143,144,145,146,147,148,149,150,151] |
Papers excluded on the basis of the abstract (if not focused on IoT and BC). Result: 273 papers. | |||
Papers excluded on the basis of the full-text evaluation (if challenges of IoT and BC integration not reported). Result: 122 papers |
Category | Challenge | Best Practice |
---|---|---|
Security | Confidentiality [26,44,86] |
|
Integrity [76,87] |
| |
Availability [76] |
| |
Authentication [57,75,76] |
| |
Vulnerabilities [10,88,89] |
| |
Trust [27,66] |
|
Category | Challenge | Best Practice |
---|---|---|
Privacy | Identity [10,26,46] |
|
Data [10,25,46] |
| |
Location [10,57] |
| |
Usage [10,26] |
|
Category | Challenge | Best Practice |
---|---|---|
Technical considerations | Consensus algorithms [57,74,76,90] |
|
Smart contracts [10,11,46,57] |
| |
Communication [13,44,76] |
| |
Heterogeneous devices [11,76,77] |
| |
Bandwidth [76] |
| |
Cryptography mechanisms [44,88] |
| |
Cryptography keys [4,68,88] |
|
Category | Challenge | Best Practice |
---|---|---|
Scalability | Storage [8,57,74] |
|
Block size [62,64,91] |
| |
Cost [26,28,62] |
|
Category | Challenge | Best Practice |
---|---|---|
Computational | Time [57,74,92] |
|
Power [26,57] |
| |
Throughput [26,93] |
|
Category | Challenge | Best Practice |
---|---|---|
Regulations | Standards [75,77] |
|
Incentive and punishment [26] |
| |
Awareness [69,74] |
|
Category | Challenge | Best Practice |
---|---|---|
Design | BIoT architectures [4,91,94,95] |
|
BC platforms [46,57] |
|
Challenge | Research Directions |
---|---|
Big data [11,25,26,68,70,73] |
|
New business mode [76,82,96] |
|
AI [8,26,36,97,98,99] |
|
Quantum computing [77,82] |
|
Double-chained IoT [76] |
|
Interoperability [8,78] |
|
IoT, BC, and edge integration [12,105,142,150] |
|
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alzoubi, Y.I.; Al-Ahmad, A.; Kahtan, H.; Jaradat, A. Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges. Future Internet 2022, 14, 216. https://doi.org/10.3390/fi14070216
Alzoubi YI, Al-Ahmad A, Kahtan H, Jaradat A. Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges. Future Internet. 2022; 14(7):216. https://doi.org/10.3390/fi14070216
Chicago/Turabian StyleAlzoubi, Yehia Ibrahim, Ahmad Al-Ahmad, Hasan Kahtan, and Ashraf Jaradat. 2022. "Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges" Future Internet 14, no. 7: 216. https://doi.org/10.3390/fi14070216
APA StyleAlzoubi, Y. I., Al-Ahmad, A., Kahtan, H., & Jaradat, A. (2022). Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges. Future Internet, 14(7), 216. https://doi.org/10.3390/fi14070216