Security and Privacy Issues in Cloud and Fog Domain
VerifiedAdded on 2023/04/24
|9
|7796
|425
AI Summary
This research paper focuses on the application of block chain technology in IoT based devices for efficient data handling, co-ordination between devices, and minimizing security threats. The paper discusses the challenges associated with the incorporation of block chain technology in IoT based systems and provides solutions to overcome them. It also highlights the positive and negative impacts of block chain technology in centralized and decentralized IoT networks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Security and Privacy Issues in Cloud and Fog Domain
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ABSTRACT – The main determination of this research project paper is to focus on the application of the block chain
technology in the IoT based devices. The different applications of the block chain technology in the IoT based systems
such as the protection of the integrity and confidentiality of the data is mentioned in this paper. The different types of
IoT based devices which are connected with the help of a centralized or a decentralized server can be tracked or
managed with the help of the block chain technology. The processing of the transactions, co-ordination between the
devices and efficient data handling are the primary objectives of block chain technology in the IoT based devices.
Human intervention is no longer required in most of the IoT based automated technologies which have lots of challenges
associated to it; these are the main reason why block chain technology can be useful. Those challenges and threats can be
minimized with the help of the security solutions provided by the block chain technology. The future applications of the
block chain technologies such as the use of the distributed clouds will be helping to improve the networking system of
the IoT based eco-systems. The paper will be highlighting the positive and the negative impacts of the block chain
technology in the centralized and the decentralized IoT networks. The application of the smart contracts, importance of
the bitcoins of the block chain revolution, challenges and opportunities of the block chain technology in the IoT based
devices will be stated in this paper in a professional manner.
1. INTRODUCTION
There are different types of challenges associated with the
use of the block chain technology in the IoT based devices
(Ejaz & Anpalagan, 2019). The paper will be focusing on two
most important challenge of block chain which is the costs
associated with technology and the need for experienced
dedicated IT professionals (Wilson, 2019). These issues arise
once the system is installed in an environment and should be
highly focused as it may have a direct impact on the growth
and productivity of the organizations where it is incorporated.
Requirements of the project
There are different aspects of block chain technology
discussed in the above unit of the paper such as the following:
o Difficulties in the implementation.
o Use of the technology in the financial sector.
o Use of block chain in access models.
o Huge costs are required to manage the IoT based
systems.
o Use of block chain in SCM.
o Use of block chain in chemical industry.
o Experienced professionals are required to manage the
systems.
o Use of block chain in electric business models.
The paper will be focussing on the costs associated with the
technology and the need of professionals to manage the
systems.
Problem Statement
The incorporation of block chain technology in the
IoT based devices increased the complexity of those devices.
Huge transaction costs and network speed are required in the
IoT based systems is the other problem associated with this
technology.
Techniques to solve the problem
The above-discussed problems are needed to be solved in
an efficient manner so that the desired results are obtained
from the IoT based systems. Dedicated professionals are
needed to be hired for handling and managing the advanced
IoT based systems in the financial sectors. The availability of
dedicated professions is sometimes a concern for business
organizations. The transaction costs can be avoided with the
help of effective IT governance plan as it will minimize the
overhead costs also. The practice of high-speed internet
connections is always preferred for the IoT based systems.
2. Annotated Bibliography
Article 1
Conoscenti, M., Vetro, A., & De Martin, J. C. (2016,
November). Blockchain for the Internet of Things: A
systematic literature review. In Computer Systems and
Applications (AICCSA), 2016 IEEE/ACS 13th International
Conference of (pp. 1-6). IEEE.
This resource helps in understanding the impact of the
block chain technology in the centralized and the
decentralized data intensive applications. The resource is
useful to understanding the effectiveness of block chain
technology in preserving the privacy of the users of the IoT
based devices. The authors of this resource focussed on the
Private by design data management which is an important
aspect for maintaining the integrity of the data.
Article 2
Christidis, K., & Devetsikiotis, M. (2016). Blockchains and
smart contracts for the internet of things. Ieee Access, 4,
2292-2303.
The authors of this resource focused on the importance of
the peer to peer network for the non-trusted members of the
block chain technology. The authors focused on the smart
contracts used for the IoT based devices. The most significant
part of this resource is the states the working principals of the
block chain technology and the IoT base devices.
Article 3
Dorri, A., Kanhere, S. S., & Jurdak, R. (2016). Blockchain
in internet of things: challenges and solutions. arXiv preprint
arXiv:1608.05187.
The challenges associated with the integration of block
chain technology in IoT based devices are stated in this paper.
This knowledge is extreme valuable for the governance plans
of the IoT based systems.
Article 4
technology in the IoT based devices. The different applications of the block chain technology in the IoT based systems
such as the protection of the integrity and confidentiality of the data is mentioned in this paper. The different types of
IoT based devices which are connected with the help of a centralized or a decentralized server can be tracked or
managed with the help of the block chain technology. The processing of the transactions, co-ordination between the
devices and efficient data handling are the primary objectives of block chain technology in the IoT based devices.
Human intervention is no longer required in most of the IoT based automated technologies which have lots of challenges
associated to it; these are the main reason why block chain technology can be useful. Those challenges and threats can be
minimized with the help of the security solutions provided by the block chain technology. The future applications of the
block chain technologies such as the use of the distributed clouds will be helping to improve the networking system of
the IoT based eco-systems. The paper will be highlighting the positive and the negative impacts of the block chain
technology in the centralized and the decentralized IoT networks. The application of the smart contracts, importance of
the bitcoins of the block chain revolution, challenges and opportunities of the block chain technology in the IoT based
devices will be stated in this paper in a professional manner.
1. INTRODUCTION
There are different types of challenges associated with the
use of the block chain technology in the IoT based devices
(Ejaz & Anpalagan, 2019). The paper will be focusing on two
most important challenge of block chain which is the costs
associated with technology and the need for experienced
dedicated IT professionals (Wilson, 2019). These issues arise
once the system is installed in an environment and should be
highly focused as it may have a direct impact on the growth
and productivity of the organizations where it is incorporated.
Requirements of the project
There are different aspects of block chain technology
discussed in the above unit of the paper such as the following:
o Difficulties in the implementation.
o Use of the technology in the financial sector.
o Use of block chain in access models.
o Huge costs are required to manage the IoT based
systems.
o Use of block chain in SCM.
o Use of block chain in chemical industry.
o Experienced professionals are required to manage the
systems.
o Use of block chain in electric business models.
The paper will be focussing on the costs associated with the
technology and the need of professionals to manage the
systems.
Problem Statement
The incorporation of block chain technology in the
IoT based devices increased the complexity of those devices.
Huge transaction costs and network speed are required in the
IoT based systems is the other problem associated with this
technology.
Techniques to solve the problem
The above-discussed problems are needed to be solved in
an efficient manner so that the desired results are obtained
from the IoT based systems. Dedicated professionals are
needed to be hired for handling and managing the advanced
IoT based systems in the financial sectors. The availability of
dedicated professions is sometimes a concern for business
organizations. The transaction costs can be avoided with the
help of effective IT governance plan as it will minimize the
overhead costs also. The practice of high-speed internet
connections is always preferred for the IoT based systems.
2. Annotated Bibliography
Article 1
Conoscenti, M., Vetro, A., & De Martin, J. C. (2016,
November). Blockchain for the Internet of Things: A
systematic literature review. In Computer Systems and
Applications (AICCSA), 2016 IEEE/ACS 13th International
Conference of (pp. 1-6). IEEE.
This resource helps in understanding the impact of the
block chain technology in the centralized and the
decentralized data intensive applications. The resource is
useful to understanding the effectiveness of block chain
technology in preserving the privacy of the users of the IoT
based devices. The authors of this resource focussed on the
Private by design data management which is an important
aspect for maintaining the integrity of the data.
Article 2
Christidis, K., & Devetsikiotis, M. (2016). Blockchains and
smart contracts for the internet of things. Ieee Access, 4,
2292-2303.
The authors of this resource focused on the importance of
the peer to peer network for the non-trusted members of the
block chain technology. The authors focused on the smart
contracts used for the IoT based devices. The most significant
part of this resource is the states the working principals of the
block chain technology and the IoT base devices.
Article 3
Dorri, A., Kanhere, S. S., & Jurdak, R. (2016). Blockchain
in internet of things: challenges and solutions. arXiv preprint
arXiv:1608.05187.
The challenges associated with the integration of block
chain technology in IoT based devices are stated in this paper.
This knowledge is extreme valuable for the governance plans
of the IoT based systems.
Article 4
Huckle, S., Bhattacharya, R., White, M., & Beloff, N.
(2016). Internet of things, blockchain and shared economy
applications. Procedia computer science, 98, 461-466.
The authors of this resource highlighted the shared
economy applications of the IoT based systems and the block
chain technology. Their work is valuable as it helps the
readers to understand how block chain technology is exploited
in an IoT based system.
Article 5
Tapscott, D., & Tapscott, A. (2016). Blockchain revolution:
how the technology behind bitcoin is changing money,
business, and the world. Penguin.
The authors of this resource focused on the increasing use
of the bit coins as an alternative to money. The impact of this
block chain revolution can be obtained from this resource. The
resource also helps in understanding the compatibility issues
of the bit coins with the IoT based devices.
Article 6
Zhang, Y., & Wen, J. (2017). The IoT electric business
model: Using blockchain technology for the internet of things.
Peer-to-Peer Networking and Applications, 10(4), 983-994.
The authors of this resource focused on the different
aspects of the block chain for the IoT based devices such as
the networking applications. The most valuable unit of this
resource is that it proposes different types of electric business
models which can be used by the systems which work on
block chain technology.
Article 7
Biswas, K., & Muthukkumarasamy, V. (2016, December).
Securing smart cities using blockchain technology. In High
Performance Computing and Communications; IEEE 14th
International Conference on Smart City; IEEE 2nd
International Conference on Data Science and Systems
(HPCC/SmartCity/DSS), 2016 IEEE 18th International
Conference on (pp. 1392-1393). IEEE.
The authors of this resource highlighted the use of different
aspects of block chain technologies across the IoT smart
cities. The main value of this paper is that it states the
usefulness of the block chain technology more than focusing
on the features of this technology.
Article 8
Ouaddah, A., Abou Elkalam, A., & Ait Ouahman, A.
(2016). FairAccess: a new Blockchain‐based access control
framework for the Internet of Things. Security and
Communication Networks, 9(18), 5943-5964.
The communication and the security features provided by
the block chain technology in an IoT based systems are
highlighted in this resource. The most exciting part of this
resource is that it proposes a new access control framework
which can be incorporated into an IoT based system.
Article 9
Sun, J., Yan, J., & Zhang, K. Z. (2016). Blockchain-based
sharing services: What blockchain technology can contribute
to smart cities. Financial Innovation, 2(1), 26.
The contributions of the block chain technology in the IoT
smart cities are the main focus on this resource. The author
wanted to state the detailed applications of the black chain
technology in the smart cities. The resource proposes a
conceptual framework on the basis of the system used in the
corporation, associated technologies used and the users who
are accessing the system.
Article 10
Zheng, Z., Xie, S., Dai, H. N., & Wang, H. (2016).
Blockchain challenges and opportunities: A survey.
International Journal of Web and Grid Services, 1, 1-25.
The authors of this resource focused on the challenges
associated with the block chain technologies in the IoT based
devices. The valuable unit of the resource states about the
future trends of the block chain technology with the help of a
block chain consensus algorithm.
3. LITERATURE REVIEW
As discussed by Conoscenti, Vetro and De Martin
(2016), the use of the block chain technology is increasing
every day. The researcher focused on the use of the block
chain in the cryptocurrency. The main advantage of the paper
is that it focuses on the implementation of block chain
technology in IoT based systems. According to the researcher,
the implementation of block chain technology is very much
useful considering our transactions in our daily life.
According to Huckle et al. (2016), decentralization
and shared economy uses are the main uses of the internet of
things and block chain technology. The researcher focused on
the use of block chain technology in uses like Uber. The
opportunities of the block chain technology are stated in a
professional way in this paper.
As discussed by Li et al. (2018), block chain
technology is very much useful in the industries. The
researcher focused on the use of the technology in industrial
equipment's such as the microgrids in the energy industries.
The main advantage of the paper is that it focuses on the
security provided by this technology in the financial
transactions.
According to Ouaddah, Elkalam and Ouahman
(2017), there are different types of issues associated with the
incorporation of the block chain technology in IoT based
systems. The researcher focused on the access control models
where block chain technology is incorporated. The issues
associated with those systems and models are discussed in the
paper. The main advantage of the paper is that it provides
detailed information about the issues associated with the block
chain technology.
As discussed by Saberi et al. (2015), block chain
technology is very much used in the supply chain market. The
researcher focused on the traceability, transparency, and
security provided by the block chain technology in the IoT
based systems. The main advantage of the paper is that it
provides detailed knowledge about the use of block chain
technology in the smart contracts which are often used in the
supply chain market.
According to Sikorski, Haughton and Kraft (2017),
the use of IoT based systems are gaining popularity across
various industries. The researcher focused on the use of block
chain technology in the chemical industry. The foremost
(2016). Internet of things, blockchain and shared economy
applications. Procedia computer science, 98, 461-466.
The authors of this resource highlighted the shared
economy applications of the IoT based systems and the block
chain technology. Their work is valuable as it helps the
readers to understand how block chain technology is exploited
in an IoT based system.
Article 5
Tapscott, D., & Tapscott, A. (2016). Blockchain revolution:
how the technology behind bitcoin is changing money,
business, and the world. Penguin.
The authors of this resource focused on the increasing use
of the bit coins as an alternative to money. The impact of this
block chain revolution can be obtained from this resource. The
resource also helps in understanding the compatibility issues
of the bit coins with the IoT based devices.
Article 6
Zhang, Y., & Wen, J. (2017). The IoT electric business
model: Using blockchain technology for the internet of things.
Peer-to-Peer Networking and Applications, 10(4), 983-994.
The authors of this resource focused on the different
aspects of the block chain for the IoT based devices such as
the networking applications. The most valuable unit of this
resource is that it proposes different types of electric business
models which can be used by the systems which work on
block chain technology.
Article 7
Biswas, K., & Muthukkumarasamy, V. (2016, December).
Securing smart cities using blockchain technology. In High
Performance Computing and Communications; IEEE 14th
International Conference on Smart City; IEEE 2nd
International Conference on Data Science and Systems
(HPCC/SmartCity/DSS), 2016 IEEE 18th International
Conference on (pp. 1392-1393). IEEE.
The authors of this resource highlighted the use of different
aspects of block chain technologies across the IoT smart
cities. The main value of this paper is that it states the
usefulness of the block chain technology more than focusing
on the features of this technology.
Article 8
Ouaddah, A., Abou Elkalam, A., & Ait Ouahman, A.
(2016). FairAccess: a new Blockchain‐based access control
framework for the Internet of Things. Security and
Communication Networks, 9(18), 5943-5964.
The communication and the security features provided by
the block chain technology in an IoT based systems are
highlighted in this resource. The most exciting part of this
resource is that it proposes a new access control framework
which can be incorporated into an IoT based system.
Article 9
Sun, J., Yan, J., & Zhang, K. Z. (2016). Blockchain-based
sharing services: What blockchain technology can contribute
to smart cities. Financial Innovation, 2(1), 26.
The contributions of the block chain technology in the IoT
smart cities are the main focus on this resource. The author
wanted to state the detailed applications of the black chain
technology in the smart cities. The resource proposes a
conceptual framework on the basis of the system used in the
corporation, associated technologies used and the users who
are accessing the system.
Article 10
Zheng, Z., Xie, S., Dai, H. N., & Wang, H. (2016).
Blockchain challenges and opportunities: A survey.
International Journal of Web and Grid Services, 1, 1-25.
The authors of this resource focused on the challenges
associated with the block chain technologies in the IoT based
devices. The valuable unit of the resource states about the
future trends of the block chain technology with the help of a
block chain consensus algorithm.
3. LITERATURE REVIEW
As discussed by Conoscenti, Vetro and De Martin
(2016), the use of the block chain technology is increasing
every day. The researcher focused on the use of the block
chain in the cryptocurrency. The main advantage of the paper
is that it focuses on the implementation of block chain
technology in IoT based systems. According to the researcher,
the implementation of block chain technology is very much
useful considering our transactions in our daily life.
According to Huckle et al. (2016), decentralization
and shared economy uses are the main uses of the internet of
things and block chain technology. The researcher focused on
the use of block chain technology in uses like Uber. The
opportunities of the block chain technology are stated in a
professional way in this paper.
As discussed by Li et al. (2018), block chain
technology is very much useful in the industries. The
researcher focused on the use of the technology in industrial
equipment's such as the microgrids in the energy industries.
The main advantage of the paper is that it focuses on the
security provided by this technology in the financial
transactions.
According to Ouaddah, Elkalam and Ouahman
(2017), there are different types of issues associated with the
incorporation of the block chain technology in IoT based
systems. The researcher focused on the access control models
where block chain technology is incorporated. The issues
associated with those systems and models are discussed in the
paper. The main advantage of the paper is that it provides
detailed information about the issues associated with the block
chain technology.
As discussed by Saberi et al. (2015), block chain
technology is very much used in the supply chain market. The
researcher focused on the traceability, transparency, and
security provided by the block chain technology in the IoT
based systems. The main advantage of the paper is that it
provides detailed knowledge about the use of block chain
technology in the smart contracts which are often used in the
supply chain market.
According to Sikorski, Haughton and Kraft (2017),
the use of IoT based systems are gaining popularity across
various industries. The researcher focused on the use of block
chain technology in the chemical industry. The foremost
benefit of the paper is that it states about the different
advantages and disadvantages associated with the
incorporation of block chain technology.
As discussed by Wu et al. (2018), the use of block
chain technology has improved the quality of service provided
by the IoT based systems. The flexibility and security
provided by the block chain technology is the main focus of
the paper. The researcher focussed on the use of the block
chain technology in the security mechanisms of the IoT based
systems. The main advantage of the paper is that it provides
detailed information about the maintenance costs associated
with the IoT based systems which are working on block chain
technology.
According to Wüst and Gervais (2018), block chain
has helped the society in a massive way with the help of its
specifications but this technology has few issues also which
are discussed in the paper. The issues focussed in this paper is
the processing time of the system which have incorporated the
system. The scalability issues were also discussed in the paper
with primary importance.
As discussed by Zhang and Wen (2017), block chain
technology is increasingly being used in the IoT based
systems. The researcher of the paper focuses on the use of
block chain technology in the IoT electric business models.
The foremost benefit of the paper is that it provides minute
details of the elements used in the business models. The
security of the block chain technology is also provided in a
detailed manner in this paper.
According to Zheng et al. (2017), the service
provided by the IoT based systems are very dependent on the
block chain technology. The researcher focussed on the use of
the block chain technology in variety of uses based on the
financial transactions. The drawback of the paper is that it is
written entirely in generalized form rather than focussing on
any particular usage of block chain technology on the
financial uses. The main advantage of this paper is that it
focuses on the challenges associated with the incorporation of
block chain technology in the IoT based systems. The paper
provides a comprehensive overview of the block chain
technology and its other associated aspects.
4. SOLUTIONS/FINDINGS/
RECOMMENDATIONS
There exist different salient features of the Blockchain
which makes it an attractive technology that helps in
addressing the aforementioned security as well as the privacy
challenges that are faced by the IoT technology. some of the
salient features include the following:
Decentralized structure: The Blockchain lacks a central
control and for this reason it is associated with ensuring
the scalability along with the robustness by making use of
the resources from all the nodes that are actively taking
part and is also associated with the elimination of the
many-to-one traffic flow which in turn is associated with
decreasing the delays as well as help in overcoming the
various problems related to single-point failures (Dorri,
Kanhere & Jurdak, 2017).
Anonymity: The anonymity which has been afforded as
well as inherited by the blockchain makes it well-suited
for most of the IoT use cases where there is an essential
need of keeping the identity of the user private.
Security: Blockchain technology is associated with
realizing the need of a secure network over the untrusted
parties which are generally desirable in IoT with the
numerous and the heterogenous devices.
Despite of all this the adaptation of the Blockchain in the
IoT is not straightforward and generally requires the
addressing of certain challenge (Dorri et al., 2017). Some of
the major challenges have been listed which needs to be
addressed:
Mining is generally considered to be computationally
intensive whereas it is seen that most of the IoT devices
are generally restricted by the resources.
The mining of the different blocks is generally considered
to be a time consuming task whereas in most of the IoT
applications low latency is desirable.
Scaling of the blockchain becomes poor with increased
number of nodes and besides this it is expected that the
IoT networks would be consisting of large number of
nodes.
The Blockchain protocol which underlies it is associated
with the creation of a significant amount of overhead
traffic which might seem to be undesirable for certain IoT
devices consisting of limited bandwidth.
In this paper we would eb discussing about a blockchain
based architecture that is to be used by the IoT and would be
associated with delivering a lightweight and decentralized
security as well as privacy. Besides this the architecture is also
associated with the retention of the benefits that the
Blockchain would be having while overcoming the challenges
that has been discussed above and are faced while integrating
the blockchain technology with the IoT.
4.1 . Block-chain Based IoT Architecture
The block-chain based IoT infrastructure that can be used
in order to overcome the challenges has been discussed in this
section by taking an example of smart home which has been
equipped with numerous IoT devices that includes the smart
thermostat, smart lights, IP camera and numerous other
sensors (Qiu et al., 2018). The architecture that is being
proposed have been illustrated in the figure provided below
and consists of three different tiers the smart home, the
overlay network and the cloud storage.
The data storage and the access use case that has been
considered is that the user would be capable of accessing the
data from their smart homes for example the temperature of
the bedroom remotely (Roulin et al., 2018). Additionally, the
smart devices should also be capable of storing the data on the
storages which are to be used by the third parties so as to avail
some of the services.
advantages and disadvantages associated with the
incorporation of block chain technology.
As discussed by Wu et al. (2018), the use of block
chain technology has improved the quality of service provided
by the IoT based systems. The flexibility and security
provided by the block chain technology is the main focus of
the paper. The researcher focussed on the use of the block
chain technology in the security mechanisms of the IoT based
systems. The main advantage of the paper is that it provides
detailed information about the maintenance costs associated
with the IoT based systems which are working on block chain
technology.
According to Wüst and Gervais (2018), block chain
has helped the society in a massive way with the help of its
specifications but this technology has few issues also which
are discussed in the paper. The issues focussed in this paper is
the processing time of the system which have incorporated the
system. The scalability issues were also discussed in the paper
with primary importance.
As discussed by Zhang and Wen (2017), block chain
technology is increasingly being used in the IoT based
systems. The researcher of the paper focuses on the use of
block chain technology in the IoT electric business models.
The foremost benefit of the paper is that it provides minute
details of the elements used in the business models. The
security of the block chain technology is also provided in a
detailed manner in this paper.
According to Zheng et al. (2017), the service
provided by the IoT based systems are very dependent on the
block chain technology. The researcher focussed on the use of
the block chain technology in variety of uses based on the
financial transactions. The drawback of the paper is that it is
written entirely in generalized form rather than focussing on
any particular usage of block chain technology on the
financial uses. The main advantage of this paper is that it
focuses on the challenges associated with the incorporation of
block chain technology in the IoT based systems. The paper
provides a comprehensive overview of the block chain
technology and its other associated aspects.
4. SOLUTIONS/FINDINGS/
RECOMMENDATIONS
There exist different salient features of the Blockchain
which makes it an attractive technology that helps in
addressing the aforementioned security as well as the privacy
challenges that are faced by the IoT technology. some of the
salient features include the following:
Decentralized structure: The Blockchain lacks a central
control and for this reason it is associated with ensuring
the scalability along with the robustness by making use of
the resources from all the nodes that are actively taking
part and is also associated with the elimination of the
many-to-one traffic flow which in turn is associated with
decreasing the delays as well as help in overcoming the
various problems related to single-point failures (Dorri,
Kanhere & Jurdak, 2017).
Anonymity: The anonymity which has been afforded as
well as inherited by the blockchain makes it well-suited
for most of the IoT use cases where there is an essential
need of keeping the identity of the user private.
Security: Blockchain technology is associated with
realizing the need of a secure network over the untrusted
parties which are generally desirable in IoT with the
numerous and the heterogenous devices.
Despite of all this the adaptation of the Blockchain in the
IoT is not straightforward and generally requires the
addressing of certain challenge (Dorri et al., 2017). Some of
the major challenges have been listed which needs to be
addressed:
Mining is generally considered to be computationally
intensive whereas it is seen that most of the IoT devices
are generally restricted by the resources.
The mining of the different blocks is generally considered
to be a time consuming task whereas in most of the IoT
applications low latency is desirable.
Scaling of the blockchain becomes poor with increased
number of nodes and besides this it is expected that the
IoT networks would be consisting of large number of
nodes.
The Blockchain protocol which underlies it is associated
with the creation of a significant amount of overhead
traffic which might seem to be undesirable for certain IoT
devices consisting of limited bandwidth.
In this paper we would eb discussing about a blockchain
based architecture that is to be used by the IoT and would be
associated with delivering a lightweight and decentralized
security as well as privacy. Besides this the architecture is also
associated with the retention of the benefits that the
Blockchain would be having while overcoming the challenges
that has been discussed above and are faced while integrating
the blockchain technology with the IoT.
4.1 . Block-chain Based IoT Architecture
The block-chain based IoT infrastructure that can be used
in order to overcome the challenges has been discussed in this
section by taking an example of smart home which has been
equipped with numerous IoT devices that includes the smart
thermostat, smart lights, IP camera and numerous other
sensors (Qiu et al., 2018). The architecture that is being
proposed have been illustrated in the figure provided below
and consists of three different tiers the smart home, the
overlay network and the cloud storage.
The data storage and the access use case that has been
considered is that the user would be capable of accessing the
data from their smart homes for example the temperature of
the bedroom remotely (Roulin et al., 2018). Additionally, the
smart devices should also be capable of storing the data on the
storages which are to be used by the third parties so as to avail
some of the services.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Fig 1: Blockchain Based IoT Infrastructure
Source: (Dorri et al., 2017)
The three tiers of the architecture depicted above
have been discussed below in brief:
Smart Home: Some of the major constituents of the
Smart home have been listed below:
Devices: The devices would mainly be consisting of
the various smart devices that are to be placed all
across the house.
Local Blockchain: Mining of a blockchain which is
private and secure is to be done and sorted by one or
more than one resources-capable devices which
would always remain online, for example a smart
bulb or the home computer (Roulin et al., 2018). The
Blockchain that is to be used in the smart home
would be centrally managed by the owner of the
house and this is entirely different from the
blockchain that is used in managing the bitcoins
which is totally decentralized in nature. Each and
every transaction which pertains to specific devices
would be chained together and the owner of the
house would be solely responsible for adding or
removing of any device. The addition of the new
device is associated with creation of a starting
transaction and this process is almost similar to the
process of creation of new coin in the Bitcoin.
Besides this the deletion is possible just by removal
of the ledger (Dorri et al., 2017). The local
blockchain would also be having a policy header that
would be acting as an access control list allowing the
owners in controlling each and every transaction
happening inside the house. The devices would only
become capable of communicating with one another
if they are permitted by the owners by providing
them with a shared key which would be based upon
the algorithm of Diffie-Hellman (Lin, Shen & Miao,
2017). Checking as well as changing of the policies
is done by using the most updated blocks which are
aced in the header of the last block despite of the
existence of all the blocks in the policy header of the
blockchain. Whereas in case of the bitcoins each of
the transactions are grouped together along with
being mined in units of the blocks (Miller, 2018).
However, in case of the smart home each of the
blocks are mined and appended to the blockchain
without the POW or any other type of puzzle so as
reduce the other overhead associated with this.
Besides this the miners are also associated with the
addition of pointers to the previous blocks along with
being associated with coping the policy present in the
previous block header to the new block. Besides this
they are also responsible for the chaining of the
blocks to the block chain (Panarello et al., 2018).
This new architecture would be different from the
blockchain used by Bitcoins in another way that is
whenever a transaction is added to a block then it
would be treated as a new transaction without
considering the fact that if the block has been mined
or not.
Local Storage: The house might be consisting of an
optional local storage so as to store the data locally as
per the figure which has been provided above. This
storage would be used for the purpose of backing up
of the files (Kuzmin, 2017).
Along with all these parts each home’s miner would be
having a list of PKs that would be used for the purpose of
providing others with the permission of accessing the smart
home data.
4.2 Overlay Network:
The overlay network is considered to be akin to the peer-to-
peer networks that are used by the bitcoins. Besides this the
constituent nodes might be the smart home miners or the other
high resource devices that can be used in homes or the
smartphones or personal computers of the owners. Each of the
node is associated with the usage of the Tor for the purpose of
getting connected to the overlay network so as to have
additional anonymity at the IP-layer (Wang et al., 2018).
Besides these particular users might be having more than one
node in the overlay network as well. For the purpose of
decreasing the network overhead and the delays the nodes
present in the overlay network are to be grouped into clusters
Source: (Dorri et al., 2017)
The three tiers of the architecture depicted above
have been discussed below in brief:
Smart Home: Some of the major constituents of the
Smart home have been listed below:
Devices: The devices would mainly be consisting of
the various smart devices that are to be placed all
across the house.
Local Blockchain: Mining of a blockchain which is
private and secure is to be done and sorted by one or
more than one resources-capable devices which
would always remain online, for example a smart
bulb or the home computer (Roulin et al., 2018). The
Blockchain that is to be used in the smart home
would be centrally managed by the owner of the
house and this is entirely different from the
blockchain that is used in managing the bitcoins
which is totally decentralized in nature. Each and
every transaction which pertains to specific devices
would be chained together and the owner of the
house would be solely responsible for adding or
removing of any device. The addition of the new
device is associated with creation of a starting
transaction and this process is almost similar to the
process of creation of new coin in the Bitcoin.
Besides this the deletion is possible just by removal
of the ledger (Dorri et al., 2017). The local
blockchain would also be having a policy header that
would be acting as an access control list allowing the
owners in controlling each and every transaction
happening inside the house. The devices would only
become capable of communicating with one another
if they are permitted by the owners by providing
them with a shared key which would be based upon
the algorithm of Diffie-Hellman (Lin, Shen & Miao,
2017). Checking as well as changing of the policies
is done by using the most updated blocks which are
aced in the header of the last block despite of the
existence of all the blocks in the policy header of the
blockchain. Whereas in case of the bitcoins each of
the transactions are grouped together along with
being mined in units of the blocks (Miller, 2018).
However, in case of the smart home each of the
blocks are mined and appended to the blockchain
without the POW or any other type of puzzle so as
reduce the other overhead associated with this.
Besides this the miners are also associated with the
addition of pointers to the previous blocks along with
being associated with coping the policy present in the
previous block header to the new block. Besides this
they are also responsible for the chaining of the
blocks to the block chain (Panarello et al., 2018).
This new architecture would be different from the
blockchain used by Bitcoins in another way that is
whenever a transaction is added to a block then it
would be treated as a new transaction without
considering the fact that if the block has been mined
or not.
Local Storage: The house might be consisting of an
optional local storage so as to store the data locally as
per the figure which has been provided above. This
storage would be used for the purpose of backing up
of the files (Kuzmin, 2017).
Along with all these parts each home’s miner would be
having a list of PKs that would be used for the purpose of
providing others with the permission of accessing the smart
home data.
4.2 Overlay Network:
The overlay network is considered to be akin to the peer-to-
peer networks that are used by the bitcoins. Besides this the
constituent nodes might be the smart home miners or the other
high resource devices that can be used in homes or the
smartphones or personal computers of the owners. Each of the
node is associated with the usage of the Tor for the purpose of
getting connected to the overlay network so as to have
additional anonymity at the IP-layer (Wang et al., 2018).
Besides these particular users might be having more than one
node in the overlay network as well. For the purpose of
decreasing the network overhead and the delays the nodes
present in the overlay network are to be grouped into clusters
where each of the cluster would be associated with electing
the Cluster Head or the CH. Additionally each of the node is
entirely free in changing the cluster in cases if it is associated
with experiencing delays that are expensive (Rahulamathavan
et al., 2017). Besides this the nodes present in the cluster are
always capable of electing a new CH at any moment of time
and the each of the CH is associated with the maintenance of
the following three criteria:
Private key of the requester: Includes eh private key
which are allowed to get access of the data for the smart
homes that are connected to this cluster (Fan, Park & Gil-
Garcia, 2018).
Private key of the Requestees: This includes the list
of the private keys of the smart homes that are
connected to the cluster which are also allowed to
access (Huang et al., 2017)
Forward list: This includes the list of transaction that are
sent for the other CHs existing in the network.
4.3 Cloud storage:
There might exist some cases where the devices in the
smart homes wishes to store their data in the cloud storages so
as to make sure that the third-party service providers become
capable of accessing the data that are being stored and for
providing certain smart services. The cloud storage would be
associated with eth grouping of the user’s data into identical
blocks which would be consisting of unique block numbers.
The block numbers and the hash of the stored data are to be
used by the users for eth purpose of receiving authentication.
In case if the storage is capable of successfully locating the
data present by making use of the block-number and the hast
then the user gets authenticated (Cebe, Kaplan & Akkaya,
2018). The data packets that are received from the user are
generally stored in the order of First-In-First Out in the blocks
along with the hash of the stored data as depicted in the figure
on the bottom right side. Once the data gets stored, encryption
of the new block number is done by making use of the shared
key that is derived from the generalized Diffie-Hellman
algorithm. This in turn would be associated with making sure
of the fact that whoever possess the key is acting as the only
one who would be knowing the number of the block (Lin et
al., 2018). Due to the reason that the hashes are resistant to
collision and only the true users know the number of the
block, it can be guaranteed that no one other than the true user
is accessing the data and is also responsible for ensuring the
fact that chaining of fresh data is being done on the existing
ledger. The capability of each user to create a different ledger
of data in the storage for each of the devices or for the single
common ledger for all of its devices worth nothing
(Shandilya, Gupta & Khatri, 2018). Additionally, it can be
stated that the former is particularly much more useful in case
if the user is having the wish of providing access to all the
data present in a particular device to a SP.
4.4 Transaction Handling
4.4.1 Storing:
The discussed general topology of the Blockchain based
IoT security and privacy architecture is one of the best ways
of securing the data and below is the discussed methodology
of handling the various transactions.
Depending upon the policy which has been defined the
devices might be associated with the storing of the data
locally, by sharing or by using the cloud storage. For example,
the smart thermostat which is responsible for storing of the
data in the cloud storage and would be used by the service
providers for eth purpose of implementing certain smart
services (Zhu et al., 2018). When the user creates an account
in the cloud storage facility and is responsible for setting up
the permission for the thermostat so as to upload the data to
the facility. At the time of bootstrapping the cloud storage
would be associated with returning the pointer to the first
block of the data. Whenever there is a need of storing a data
by the thermostat it would be associated with sending the data
to the mine (Banafa, 2017). Once the checking of the
permission along with the extracting of the previous block-
number and the hash gets completed, the miner would be
associated with the creation of a random ID and would be
responsible for sending of the data back to the storage with
this ID. This has been shown in the figure provided below. It
is also considered that at any point of time two of the nodes
cannot have the same ID (Huh, Cho & Kim, 2017). Checking
of the storage is responsible for validating the transactions
along with confirming the availability of storage space in the
clouds. In case if this happens then it would be associated with
calculating the hash that the received data packets are having
which would be followed by the comparing of this with the
hash received. In case if there is any kind of match between
the two hashes then the data packets would be encrypted by
usage of a new block number which is sent to the miner.
Followed by this is the signing of the sighed hash by the
storage and after this it is sent to the overlay network so as to
be mined in the overlying blockchain (Danzi et al., 2018).
This in turn would be making sure that the changes are visible.
There is no need of storage so as to send the hash of the data
to the overlay network and this is also similar in case of the
local storage however there is only a simple difference that is
there is no need of suing the IDs as all communications would
be performed locally.
the Cluster Head or the CH. Additionally each of the node is
entirely free in changing the cluster in cases if it is associated
with experiencing delays that are expensive (Rahulamathavan
et al., 2017). Besides this the nodes present in the cluster are
always capable of electing a new CH at any moment of time
and the each of the CH is associated with the maintenance of
the following three criteria:
Private key of the requester: Includes eh private key
which are allowed to get access of the data for the smart
homes that are connected to this cluster (Fan, Park & Gil-
Garcia, 2018).
Private key of the Requestees: This includes the list
of the private keys of the smart homes that are
connected to the cluster which are also allowed to
access (Huang et al., 2017)
Forward list: This includes the list of transaction that are
sent for the other CHs existing in the network.
4.3 Cloud storage:
There might exist some cases where the devices in the
smart homes wishes to store their data in the cloud storages so
as to make sure that the third-party service providers become
capable of accessing the data that are being stored and for
providing certain smart services. The cloud storage would be
associated with eth grouping of the user’s data into identical
blocks which would be consisting of unique block numbers.
The block numbers and the hash of the stored data are to be
used by the users for eth purpose of receiving authentication.
In case if the storage is capable of successfully locating the
data present by making use of the block-number and the hast
then the user gets authenticated (Cebe, Kaplan & Akkaya,
2018). The data packets that are received from the user are
generally stored in the order of First-In-First Out in the blocks
along with the hash of the stored data as depicted in the figure
on the bottom right side. Once the data gets stored, encryption
of the new block number is done by making use of the shared
key that is derived from the generalized Diffie-Hellman
algorithm. This in turn would be associated with making sure
of the fact that whoever possess the key is acting as the only
one who would be knowing the number of the block (Lin et
al., 2018). Due to the reason that the hashes are resistant to
collision and only the true users know the number of the
block, it can be guaranteed that no one other than the true user
is accessing the data and is also responsible for ensuring the
fact that chaining of fresh data is being done on the existing
ledger. The capability of each user to create a different ledger
of data in the storage for each of the devices or for the single
common ledger for all of its devices worth nothing
(Shandilya, Gupta & Khatri, 2018). Additionally, it can be
stated that the former is particularly much more useful in case
if the user is having the wish of providing access to all the
data present in a particular device to a SP.
4.4 Transaction Handling
4.4.1 Storing:
The discussed general topology of the Blockchain based
IoT security and privacy architecture is one of the best ways
of securing the data and below is the discussed methodology
of handling the various transactions.
Depending upon the policy which has been defined the
devices might be associated with the storing of the data
locally, by sharing or by using the cloud storage. For example,
the smart thermostat which is responsible for storing of the
data in the cloud storage and would be used by the service
providers for eth purpose of implementing certain smart
services (Zhu et al., 2018). When the user creates an account
in the cloud storage facility and is responsible for setting up
the permission for the thermostat so as to upload the data to
the facility. At the time of bootstrapping the cloud storage
would be associated with returning the pointer to the first
block of the data. Whenever there is a need of storing a data
by the thermostat it would be associated with sending the data
to the mine (Banafa, 2017). Once the checking of the
permission along with the extracting of the previous block-
number and the hash gets completed, the miner would be
associated with the creation of a random ID and would be
responsible for sending of the data back to the storage with
this ID. This has been shown in the figure provided below. It
is also considered that at any point of time two of the nodes
cannot have the same ID (Huh, Cho & Kim, 2017). Checking
of the storage is responsible for validating the transactions
along with confirming the availability of storage space in the
clouds. In case if this happens then it would be associated with
calculating the hash that the received data packets are having
which would be followed by the comparing of this with the
hash received. In case if there is any kind of match between
the two hashes then the data packets would be encrypted by
usage of a new block number which is sent to the miner.
Followed by this is the signing of the sighed hash by the
storage and after this it is sent to the overlay network so as to
be mined in the overlying blockchain (Danzi et al., 2018).
This in turn would be making sure that the changes are visible.
There is no need of storage so as to send the hash of the data
to the overlay network and this is also similar in case of the
local storage however there is only a simple difference that is
there is no need of suing the IDs as all communications would
be performed locally.
Fig 2: Process of Store Transaction
Source: (Pustišek & Kos, 2018)
4.4.2 Accessing:
There is a need of accessing the data that are stored by the
service providers for a certain period of time or for the entire
chain of the data for a specific device for the purpose of
implementing particular services (Walker et al., 2017). In
order to access get access to the information the service
provider is associated with the creation and signing of the
mulitisig transaction that requires the sign of the requester as
the requestee. Followed by this is the sending of this to their
own (Wei et al., 2019) CH. After this the CH is responsible
for checking of the both lists consisting of the private keys. In
case if the multisig transaction’s requester is present in the CH
requesters private key list or in the list of the requestee’s
private key list then the transaction of the broadcast would be
done upon is own cluster. In case if does not happen, the
transaction would be broadcasted to the other CHs and the
private key requester would be put in the forward list
(Angeletti, Chatzigiannakis & Vitaletti, 2017). In case when
the miner of the smart home receives multisig transaction then
it needs to check the policy present in the local Blockchain of
the owner so as to verify if the service provider is having the
permission of accessing the data. In case if the miner is
associated with requesting packets from the storage then they
would be encrypting them with private key of the requester
which is followed by sending it to the requester as depicted in
the figure provided below.
The miners might be associated with the usage of methods
like the safe answer or introduction of noise so as to provide
additional privacy before sending the data. The output of the
multisig transaction can either be set to “1” or “0” and is to be
done by the minor (Nguyen et al., 2018). This would be
indicating the fact if the requester is having access to the data.
Once the data is sent for the requester the miner should be
associated with storing the multisig transaction in the local
Blockchain. Additionally, the miner would be sending the
multisig transaction to a random set of CHs so as to be get
stored in the overlay network. The multisig that is stored
would be treated as a proof for the data which was sent by the
user or can be used so as to make the other nodes aware of the
misbehaviour (Liao et al., 2017). The miner might be
associated with deciding the fact if to send the multisig
network to the overlay blockchain when there is no intension
of revelling the access. This increases user’s privacy by
preventing an attacker to link different transactions to a real-
world identity. In a smart home, there are several instances
when the owner of the home or SP needs access to the entire
data of a device.
Fig 3: Process of Access Transaction
Source: (Qian et al., 2018)
4.4.3 Monitoring
There might exist situation when the owners might be
associated with wishing for an access to specific information
from the different smart devices on a real-time basis for
example in this case is the checking of the current
configuration that the smart thermostat is having (Novo,
2018). A monitor transaction if to be provided for solving this,
where the miner would be associated with requesting a real-
time data from the requested data and would be sending it to
the requester. The data might also be sent in a conterminous
way as well (Andersen et al., 2017).
Fig 4: Process of Monitor Transaction
Source: (Zhang & Wen, 2017)
5. Conclusion
The security and the privacy of the IoT acts as one of the
critical factors for meeting success. Meeting the high
expectations of the society and economy regarding this this
specific transformation technology is one of the crucial
factors. The Blockchain IoT architecture that has been
proposed in this paper is associated with handling the various
security and privacy related threats and this is mainly done by
considering the various resource related constraints of the
numerous IoT devices. The qualitative overhead analysis of
the architecture has also been shown in this paper which is
associated with depicting the fact that it is having a constant
performance overhead which is at its best stage and the worst
Source: (Pustišek & Kos, 2018)
4.4.2 Accessing:
There is a need of accessing the data that are stored by the
service providers for a certain period of time or for the entire
chain of the data for a specific device for the purpose of
implementing particular services (Walker et al., 2017). In
order to access get access to the information the service
provider is associated with the creation and signing of the
mulitisig transaction that requires the sign of the requester as
the requestee. Followed by this is the sending of this to their
own (Wei et al., 2019) CH. After this the CH is responsible
for checking of the both lists consisting of the private keys. In
case if the multisig transaction’s requester is present in the CH
requesters private key list or in the list of the requestee’s
private key list then the transaction of the broadcast would be
done upon is own cluster. In case if does not happen, the
transaction would be broadcasted to the other CHs and the
private key requester would be put in the forward list
(Angeletti, Chatzigiannakis & Vitaletti, 2017). In case when
the miner of the smart home receives multisig transaction then
it needs to check the policy present in the local Blockchain of
the owner so as to verify if the service provider is having the
permission of accessing the data. In case if the miner is
associated with requesting packets from the storage then they
would be encrypting them with private key of the requester
which is followed by sending it to the requester as depicted in
the figure provided below.
The miners might be associated with the usage of methods
like the safe answer or introduction of noise so as to provide
additional privacy before sending the data. The output of the
multisig transaction can either be set to “1” or “0” and is to be
done by the minor (Nguyen et al., 2018). This would be
indicating the fact if the requester is having access to the data.
Once the data is sent for the requester the miner should be
associated with storing the multisig transaction in the local
Blockchain. Additionally, the miner would be sending the
multisig transaction to a random set of CHs so as to be get
stored in the overlay network. The multisig that is stored
would be treated as a proof for the data which was sent by the
user or can be used so as to make the other nodes aware of the
misbehaviour (Liao et al., 2017). The miner might be
associated with deciding the fact if to send the multisig
network to the overlay blockchain when there is no intension
of revelling the access. This increases user’s privacy by
preventing an attacker to link different transactions to a real-
world identity. In a smart home, there are several instances
when the owner of the home or SP needs access to the entire
data of a device.
Fig 3: Process of Access Transaction
Source: (Qian et al., 2018)
4.4.3 Monitoring
There might exist situation when the owners might be
associated with wishing for an access to specific information
from the different smart devices on a real-time basis for
example in this case is the checking of the current
configuration that the smart thermostat is having (Novo,
2018). A monitor transaction if to be provided for solving this,
where the miner would be associated with requesting a real-
time data from the requested data and would be sending it to
the requester. The data might also be sent in a conterminous
way as well (Andersen et al., 2017).
Fig 4: Process of Monitor Transaction
Source: (Zhang & Wen, 2017)
5. Conclusion
The security and the privacy of the IoT acts as one of the
critical factors for meeting success. Meeting the high
expectations of the society and economy regarding this this
specific transformation technology is one of the crucial
factors. The Blockchain IoT architecture that has been
proposed in this paper is associated with handling the various
security and privacy related threats and this is mainly done by
considering the various resource related constraints of the
numerous IoT devices. The qualitative overhead analysis of
the architecture has also been shown in this paper which is
associated with depicting the fact that it is having a constant
performance overhead which is at its best stage and the worst
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
most part of cluster in the network instead of the number of
nodes. The architecture that has been presented above is in
context of a smart-home but this can also be broadly applied
upon most of the multi-tiered IoT network topologies as well.
However there still exist some Open questions related to
further reduction of the vulnerabilities like the denial of
service attacks, modification attacks, and besides this it has
been seen that almost 51% attack are aimed at establishing
distributed trust. Additionally, the intrinsic broadcast medium,
decentralization, and resource-constraints of IoT acts as some
of the key challenges in providing answers to these questions.
The architecture which has been proposed in this paper has
been associated with lying a groundwork for conducting
further research in this area, and is also associated with
providing a lightweight, secure and private framework which
is associated with the retention of most of the benefits of
blockchain technology
6. References and Presentation
Andersen, M. P., Kolb, J., Chen, K., Fierro, G., Culler, D. E.,
& Popa, R. A. (2017). WAVE: A Decentralized Authorization
System for IoT via Blockchain Smart Contracts.
Angeletti, F., Chatzigiannakis, I., & Vitaletti, A. (2017,
September). The role of blockchain and IoT in recruiting
participants for digital clinical trials. In Software,
Telecommunications and Computer Networks (SoftCOM),
2017 25th International Conference on (pp. 1-5). IEEE.
Banafa, A. (2017). IoT and Blockchain Convergence: Benefits
and Challenges. IEEE Internet of Things.
Cebe, M., Kaplan, B., & Akkaya, K. (2018, November). A
Network Coding Based Information Spreading Approach for
Permissioned Blockchain in IoT Settings. In Proceedings of
the 15th EAI International Conference on Mobile and
Ubiquitous Systems: Computing, Networking and Services(pp.
470-475). ACM.
Conoscenti, M., Vetro, A., & De Martin, J. C. (2016,
November). Blockchain for the Internet of Things: A
systematic literature review. In Computer Systems and Uses
(AICCSA), 2016 IEEE/ACS 13th International Conference of
(pp. 1-6). IEEE.
Danzi, P., Kalor, A. E., Stefanovic, C., & Popovski, P. (2018,
May). Analysis of the communication traffic for blockchain
synchronization of iot devices. In 2018 IEEE International
Conference on Communications (ICC) (pp. 1-7). IEEE.
Dorri, A., Kanhere, S. S., & Jurdak, R. (2017, April). Towards
an optimized blockchain for IoT. In Proceedings of the
Second International Conference on Internet-of-Things
Design and Implementation (pp. 173-178). ACM.
Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P.
(2017). LSB: A Lightweight Scalable BlockChain for IoT
Security and Privacy. arXiv preprint arXiv:1712.02969.
Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017,
March). Blockchain for IoT security and privacy: The case
study of a smart home. In Pervasive Computing and
Communications Workshops (PerCom Workshops), 2017
IEEE International Conference on (pp. 618-623). IEEE.
Ejaz, W., & Anpalagan, A. (2019). Blockchain Technology
for Security and Privacy in Internet of Things. In Internet of
Things for Smart Cities (pp. 47-55). Springer, Cham.
Fan, L., Park, S., & Gil-Garcia, J. R. (2018). Understanding
the Potential of Blockchain for IoT Data in the Public Sector:
Challenges and Benefits in a Simulated Environment. EGOV-
CeDEM-ePart 2018, 21.
Huang, Z., Su, X., Zhang, Y., Shi, C., Zhang, H., & Xie, L.
(2017, December). A decentralized solution for IoT data
trusted exchange based-on blockchain. In Computer and
Communications (ICCC), 2017 3rd IEEE International
Conference on (pp. 1180-1184). IEEE.
Huckle, S., Bhattacharya, R., White, M., & Beloff, N. (2016).
Internet of things, blockchain and shared economy uses.
Procedia computer science, 98, 461-466.
Huh, S., Cho, S., & Kim, S. (2017, February). Managing IoT
devices using blockchain platform. In Advanced
Communication Technology (ICACT), 2017 19th International
Conference on (pp. 464-467). IEEE.
Kuzmin, A. (2017, November). Blockchain-based structures
for a secure and operate IoT. In Internet of Things Business
Models, Users, and Networks, 2017 (pp. 1-7). IEEE.
Li, Z., Kang, J., Yu, R., Ye, D., Deng, Q., & Zhang, Y.
(2018). Consortium blockchain for secure energy trading in
industrial internet of things. IEEE transactions on industrial
informatics, 14(8), 3690-3700.
Liao, C. F., Bao, S. W., Cheng, C. J., & Chen, K. (2017,
June). On design issues and architectural styles for
blockchain-driven IoT services. In Consumer Electronics-
Taiwan (ICCE-TW), 2017 IEEE International Conference
on (pp. 351-352). IEEE.
Lin, J., Shen, Z., & Miao, C. (2017, July). Using blockchain
technology to build trust in sharing LoRaWAN IoT.
In Proceedings of the 2nd International Conference on Crowd
Science and Engineering (pp. 38-43). ACM.
Lin, J., Shen, Z., Zhang, A., & Chai, Y. (2018, July).
Blockchain and IoT based Food Traceability for Smart
Agriculture. In Proceedings of the 3rd International
Conference on Crowd Science and Engineering (p. 3). ACM.
Miller, D. (2018). Blockchain and the Internet of Things in the
Industrial Sector. IT Professional, 20(3), 15-18.
Nguyen, T. D., Pham, H. A., & Thai, M. T. (2018, December).
Leveraging Blockchain to Enhance Data Privacy in IoT-Based
Applications. In International Conference on Computational
Social Networks (pp. 211-221). Springer, Cham.
Novo, O. (2018). Blockchain Meets IoT: an Architecture for
Scalable Access Management in IoT. IEEE Internet of Things
Journal.
Ouaddah, A., Elkalam, A. A., & Ouahman, A. A. (2017).
Towards a novel privacy-preserving access control model
based on blockchain technology in IoT. In Europe and MENA
Cooperation Advances in Information and Communication
Technologies (pp. 523-533). Springer, Cham.
Panarello, A., Tapas, N., Merlino, G., Longo, F., & Puliafito,
A. (2018). Blockchain and iot integration: A systematic
survey. Sensors, 18(8), 2575.
nodes. The architecture that has been presented above is in
context of a smart-home but this can also be broadly applied
upon most of the multi-tiered IoT network topologies as well.
However there still exist some Open questions related to
further reduction of the vulnerabilities like the denial of
service attacks, modification attacks, and besides this it has
been seen that almost 51% attack are aimed at establishing
distributed trust. Additionally, the intrinsic broadcast medium,
decentralization, and resource-constraints of IoT acts as some
of the key challenges in providing answers to these questions.
The architecture which has been proposed in this paper has
been associated with lying a groundwork for conducting
further research in this area, and is also associated with
providing a lightweight, secure and private framework which
is associated with the retention of most of the benefits of
blockchain technology
6. References and Presentation
Andersen, M. P., Kolb, J., Chen, K., Fierro, G., Culler, D. E.,
& Popa, R. A. (2017). WAVE: A Decentralized Authorization
System for IoT via Blockchain Smart Contracts.
Angeletti, F., Chatzigiannakis, I., & Vitaletti, A. (2017,
September). The role of blockchain and IoT in recruiting
participants for digital clinical trials. In Software,
Telecommunications and Computer Networks (SoftCOM),
2017 25th International Conference on (pp. 1-5). IEEE.
Banafa, A. (2017). IoT and Blockchain Convergence: Benefits
and Challenges. IEEE Internet of Things.
Cebe, M., Kaplan, B., & Akkaya, K. (2018, November). A
Network Coding Based Information Spreading Approach for
Permissioned Blockchain in IoT Settings. In Proceedings of
the 15th EAI International Conference on Mobile and
Ubiquitous Systems: Computing, Networking and Services(pp.
470-475). ACM.
Conoscenti, M., Vetro, A., & De Martin, J. C. (2016,
November). Blockchain for the Internet of Things: A
systematic literature review. In Computer Systems and Uses
(AICCSA), 2016 IEEE/ACS 13th International Conference of
(pp. 1-6). IEEE.
Danzi, P., Kalor, A. E., Stefanovic, C., & Popovski, P. (2018,
May). Analysis of the communication traffic for blockchain
synchronization of iot devices. In 2018 IEEE International
Conference on Communications (ICC) (pp. 1-7). IEEE.
Dorri, A., Kanhere, S. S., & Jurdak, R. (2017, April). Towards
an optimized blockchain for IoT. In Proceedings of the
Second International Conference on Internet-of-Things
Design and Implementation (pp. 173-178). ACM.
Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P.
(2017). LSB: A Lightweight Scalable BlockChain for IoT
Security and Privacy. arXiv preprint arXiv:1712.02969.
Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017,
March). Blockchain for IoT security and privacy: The case
study of a smart home. In Pervasive Computing and
Communications Workshops (PerCom Workshops), 2017
IEEE International Conference on (pp. 618-623). IEEE.
Ejaz, W., & Anpalagan, A. (2019). Blockchain Technology
for Security and Privacy in Internet of Things. In Internet of
Things for Smart Cities (pp. 47-55). Springer, Cham.
Fan, L., Park, S., & Gil-Garcia, J. R. (2018). Understanding
the Potential of Blockchain for IoT Data in the Public Sector:
Challenges and Benefits in a Simulated Environment. EGOV-
CeDEM-ePart 2018, 21.
Huang, Z., Su, X., Zhang, Y., Shi, C., Zhang, H., & Xie, L.
(2017, December). A decentralized solution for IoT data
trusted exchange based-on blockchain. In Computer and
Communications (ICCC), 2017 3rd IEEE International
Conference on (pp. 1180-1184). IEEE.
Huckle, S., Bhattacharya, R., White, M., & Beloff, N. (2016).
Internet of things, blockchain and shared economy uses.
Procedia computer science, 98, 461-466.
Huh, S., Cho, S., & Kim, S. (2017, February). Managing IoT
devices using blockchain platform. In Advanced
Communication Technology (ICACT), 2017 19th International
Conference on (pp. 464-467). IEEE.
Kuzmin, A. (2017, November). Blockchain-based structures
for a secure and operate IoT. In Internet of Things Business
Models, Users, and Networks, 2017 (pp. 1-7). IEEE.
Li, Z., Kang, J., Yu, R., Ye, D., Deng, Q., & Zhang, Y.
(2018). Consortium blockchain for secure energy trading in
industrial internet of things. IEEE transactions on industrial
informatics, 14(8), 3690-3700.
Liao, C. F., Bao, S. W., Cheng, C. J., & Chen, K. (2017,
June). On design issues and architectural styles for
blockchain-driven IoT services. In Consumer Electronics-
Taiwan (ICCE-TW), 2017 IEEE International Conference
on (pp. 351-352). IEEE.
Lin, J., Shen, Z., & Miao, C. (2017, July). Using blockchain
technology to build trust in sharing LoRaWAN IoT.
In Proceedings of the 2nd International Conference on Crowd
Science and Engineering (pp. 38-43). ACM.
Lin, J., Shen, Z., Zhang, A., & Chai, Y. (2018, July).
Blockchain and IoT based Food Traceability for Smart
Agriculture. In Proceedings of the 3rd International
Conference on Crowd Science and Engineering (p. 3). ACM.
Miller, D. (2018). Blockchain and the Internet of Things in the
Industrial Sector. IT Professional, 20(3), 15-18.
Nguyen, T. D., Pham, H. A., & Thai, M. T. (2018, December).
Leveraging Blockchain to Enhance Data Privacy in IoT-Based
Applications. In International Conference on Computational
Social Networks (pp. 211-221). Springer, Cham.
Novo, O. (2018). Blockchain Meets IoT: an Architecture for
Scalable Access Management in IoT. IEEE Internet of Things
Journal.
Ouaddah, A., Elkalam, A. A., & Ouahman, A. A. (2017).
Towards a novel privacy-preserving access control model
based on blockchain technology in IoT. In Europe and MENA
Cooperation Advances in Information and Communication
Technologies (pp. 523-533). Springer, Cham.
Panarello, A., Tapas, N., Merlino, G., Longo, F., & Puliafito,
A. (2018). Blockchain and iot integration: A systematic
survey. Sensors, 18(8), 2575.
Pustišek, M., & Kos, A. (2018). Approaches to Front-End IoT
Application Development for the Ethereum
Blockchain. Procedia Computer Science, 129, 410-419.
Qian, Y., Jiang, Y., Chen, J., Zhang, Y., Song, J., Zhou, M., &
Pustišek, M. (2018). Towards decentralized IoT security
enhancement: A blockchain approach. Computers &
Electrical Engineering, 72, 266-273.
Qiu, H., Qiu, M., Memmi, G., Ming, Z., & Liu, M. (2018,
December). A Dynamic Scalable Blockchain Based
Communication Architecture for IoT. In International
Conference on Smart Blockchain (pp. 159-166). Springer,
Cham.
Rahulamathavan, Y., Phan, R. C. W., Rajarajan, M., Misra, S.,
& Kondoz, A. (2017, December). Privacy-preserving
blockchain based IoT ecosystem using attribute-based
encryption. In 2017 IEEE International Conference on
Advanced Networks and Telecommunications Systems
(ANTS) (pp. 1-6). IEEE.
Roulin, C., Dorri, A., Jurdak, R., & Kanhere, S. (2018). On
the Activity Privacy of Blockchain for IoT. arXiv preprint
arXiv:1812.08970.
Saberi, S., Kouhizadeh, M., Sarkis, J., & Shen, L. (2018).
Blockchain technology and its relationships to sustainable
supply chain management. International Journal of Production
Research, 1-19.
Shandilya, A., Gupta, H., & Khatri, S. K. (2018, June). Role
and Aplications of Iot in Online Transactions using
Blockchain Technology. In 2018 International Conference on
Advances in Computing and Communication Engineering
(ICACCE) (pp. 465-470). IEEE.
Sikorski, J. J., Haughton, J., & Kraft, M. (2017). Blockchain
technology in the chemical industry: Machine-to-machine
electricity market. Applied Energy, 195, 234-246.
Walker, M. A., Dubey, A., Laszka, A., & Schmidt, D. C.
(2017, December). PlaTIBART: a platform for transactive IoT
blockchain applications with repeatable testing.
In Proceedings of the 4th Workshop on Middleware and
Applications for the Internet of Things (pp. 17-22). ACM.
Wang, Z., Dong, X., Li, Y., Fang, L., & Chen, P. (2018,
August). IoT Security Model and Performance Evaluation: A
Blockchain Approach. In 2018 International Conference on
Network Infrastructure and Digital Content (IC-NIDC) (pp.
260-264). IEEE.
Wei, L., Liu, S., Wu, J., Long, C., Ma, S., & Li, B. (2019).
Enabling Distributed and Trusted IoT Systems with
Blockchain Technology. Newsletter.
Wilson, J. H. (2019). Andragogy and the Learning-Tech
Culture Revolution: The Internet of Things (IoT), Blockchain,
AI, and the Disruption of Learning. In Multicultural
Andragogy for Transformative Learning (pp. 252-269). IGI
Global.
Wu, L., Du, X., Wang, W., & Lin, B. (2018, March). An out-
of-band authentication scheme for internet of things using
blockchain technology. In 2018 International Conference on
Computing, Networking and Communications (ICNC) (pp.
769-773). IEEE.
Wüst, K., & Gervais, A. (2018, June). Do you need a
Blockchain?. In 2018 Crypto Valley Conference on
Blockchain Technology (CVCBT) (pp. 45-54). IEEE.
Zhang, Y., & Wen, J. (2017). The IoT electric business model:
Using blockchain technology for the internet of things. Peer-
to-Peer Networking and Applications, 10(4), 983-994.
Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017,
June). An overview of blockchain technology: Architecture,
consensus, and future trends. In Big Data (BigData Congress),
2017 IEEE International Congress on (pp. 557-564). IEEE.
Zhu, S., Li, W., Li, H., Tian, L., Luo, G., & Cai, Z. (2018).
Coin Hopping Attack in Blockchain-based IoT. IEEE Internet
of Things Journal.
Application Development for the Ethereum
Blockchain. Procedia Computer Science, 129, 410-419.
Qian, Y., Jiang, Y., Chen, J., Zhang, Y., Song, J., Zhou, M., &
Pustišek, M. (2018). Towards decentralized IoT security
enhancement: A blockchain approach. Computers &
Electrical Engineering, 72, 266-273.
Qiu, H., Qiu, M., Memmi, G., Ming, Z., & Liu, M. (2018,
December). A Dynamic Scalable Blockchain Based
Communication Architecture for IoT. In International
Conference on Smart Blockchain (pp. 159-166). Springer,
Cham.
Rahulamathavan, Y., Phan, R. C. W., Rajarajan, M., Misra, S.,
& Kondoz, A. (2017, December). Privacy-preserving
blockchain based IoT ecosystem using attribute-based
encryption. In 2017 IEEE International Conference on
Advanced Networks and Telecommunications Systems
(ANTS) (pp. 1-6). IEEE.
Roulin, C., Dorri, A., Jurdak, R., & Kanhere, S. (2018). On
the Activity Privacy of Blockchain for IoT. arXiv preprint
arXiv:1812.08970.
Saberi, S., Kouhizadeh, M., Sarkis, J., & Shen, L. (2018).
Blockchain technology and its relationships to sustainable
supply chain management. International Journal of Production
Research, 1-19.
Shandilya, A., Gupta, H., & Khatri, S. K. (2018, June). Role
and Aplications of Iot in Online Transactions using
Blockchain Technology. In 2018 International Conference on
Advances in Computing and Communication Engineering
(ICACCE) (pp. 465-470). IEEE.
Sikorski, J. J., Haughton, J., & Kraft, M. (2017). Blockchain
technology in the chemical industry: Machine-to-machine
electricity market. Applied Energy, 195, 234-246.
Walker, M. A., Dubey, A., Laszka, A., & Schmidt, D. C.
(2017, December). PlaTIBART: a platform for transactive IoT
blockchain applications with repeatable testing.
In Proceedings of the 4th Workshop on Middleware and
Applications for the Internet of Things (pp. 17-22). ACM.
Wang, Z., Dong, X., Li, Y., Fang, L., & Chen, P. (2018,
August). IoT Security Model and Performance Evaluation: A
Blockchain Approach. In 2018 International Conference on
Network Infrastructure and Digital Content (IC-NIDC) (pp.
260-264). IEEE.
Wei, L., Liu, S., Wu, J., Long, C., Ma, S., & Li, B. (2019).
Enabling Distributed and Trusted IoT Systems with
Blockchain Technology. Newsletter.
Wilson, J. H. (2019). Andragogy and the Learning-Tech
Culture Revolution: The Internet of Things (IoT), Blockchain,
AI, and the Disruption of Learning. In Multicultural
Andragogy for Transformative Learning (pp. 252-269). IGI
Global.
Wu, L., Du, X., Wang, W., & Lin, B. (2018, March). An out-
of-band authentication scheme for internet of things using
blockchain technology. In 2018 International Conference on
Computing, Networking and Communications (ICNC) (pp.
769-773). IEEE.
Wüst, K., & Gervais, A. (2018, June). Do you need a
Blockchain?. In 2018 Crypto Valley Conference on
Blockchain Technology (CVCBT) (pp. 45-54). IEEE.
Zhang, Y., & Wen, J. (2017). The IoT electric business model:
Using blockchain technology for the internet of things. Peer-
to-Peer Networking and Applications, 10(4), 983-994.
Zheng, Z., Xie, S., Dai, H., Chen, X., & Wang, H. (2017,
June). An overview of blockchain technology: Architecture,
consensus, and future trends. In Big Data (BigData Congress),
2017 IEEE International Congress on (pp. 557-564). IEEE.
Zhu, S., Li, W., Li, H., Tian, L., Luo, G., & Cai, Z. (2018).
Coin Hopping Attack in Blockchain-based IoT. IEEE Internet
of Things Journal.
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.