You are on page 1of 20

Computer Standards & Interfaces 64 (2019) 41–60

Contents lists available at ScienceDirect

Computer Standards & Interfaces


journal homepage: www.elsevier.com/locate/csi

Blockchain authentication of network applications: Taxonomy, T


classification, capabilities, open challenges, motivations, recommendations
and future directions

A.H. Mohsin, A.A. Zaidan , B.B. Zaidan, O.S. Albahri, A.S. Albahri, M.A. Alsalem, K.I. Mohammed
Department of Computing, Faculty of Arts, Computing and Creative Industry, Universiti Pendidikan Sultan Idris, Malaysia

A R T I C LE I N FO A B S T R A C T

Keywords: As the first and last line of defence in many cases, authentication is a crucial part of a system. With authenti-
Blockchain technology cation, any unauthorised access to the system can be prevented. This work maps the research landscape through
Authentication two means. The first is a comprehensive taxonomy of blockchain technology in authentication over networking.
Distributed ledger technology The second is identification of different types of authentication systems under various platforms that use
Security
blockchain technology. This work also provides useful and classified information which can enhance the un-
Decentralised app
derstanding of how various authentication systems can be combined with blockchain technology. In addition,
problems associated with this blockchain technology and proposed solutions are surveyed to fulfil the re-
quirements of the network applications. Moreover, this work highlights the importance, capabilities, motivations
and challenges of blockchain technology with distinct applications in various fields. Finally, recommendations
and future research directions are discussed.

1. Introduction occupying over half of the Internet traffic. Delivery systems are cate-
gorised into two kinds: unprotected and protected. Although various
For several decades, user authentication has been a cornerstone in ways to protect digital content are available, encryption is the basic
information systems. The most widely used form of user authentication technology used. The variation is dependent on how the key for de-
in modern computer systems is the password based. However, this user crypting the content is conveyed. Digital content in the commercial
authentication heavily depends on human cognitive ability to re- domain is protected through digital rights management (DRM) and
member user ID and password. The proliferation of the Internet has conditional access system. However, a disadvantage of these systems is
driven users to create multiple passwords for different systems, leaving pirate attack. Digital content can be accessed illegally by attacks to the
them with the burden of remembering all these passwords. Another content, such as stealing or decrypting. Until today, this challenge re-
issue related to password-based user authentication is its vulnerability mains the most difficult with regard to the distribution of digital con-
to password leakage and cracking attacks. To address these drawbacks, tent [2].
uniform identity authentication is required. By using uniform identity The revolution of digital currencies has been enabled by Bitcoin and
authentication, system users are provided with a convenient way of its underlying blockchain technology. Apart from this revolution, other
identity authentication. Users are required to log in to a reliable au- research areas have been influenced by this technology. Blockchain
thentication server with a user ID and password and afterwards to third represents the source of transaction information which can be shared
parties with a trusted authentication system. The problem is that denial among all users in a distributed network of devices. By using Bitcoin
of service attacks and technical failure can lead to the inefficiency of the blockchain technology, every transaction performed within the network
trusted third party. The design and implementation of an authentication is recorded and stored, thereby eliminating dependency on third parties
scheme which is user-friendly and independent of a trusted party re- such as payment processors. A generalised framework for the im-
mains a challenge [1]. plementation of decentralised computer systems can be derived by
Since the commercialisation of the Internet in 1994, the services of extending the paradigm of blockchain, which was originally designed to
digital content delivery have rapidly increased. The delivery of video be a financial ledger. This blockchain has been used in several domains,
and music may be the most dominant of the Internet payload, including smart grid, healthcare and supply chain. Fig. 1 illustrates the


Corresponding author.
E-mail address: aws.alaa@fskik.upsi.edu.my (A.A. Zaidan).

https://doi.org/10.1016/j.csi.2018.12.002
Received 1 October 2018; Received in revised form 12 December 2018; Accepted 30 December 2018
Available online 31 December 2018
0920-5489/ © 2018 Elsevier B.V. All rights reserved.
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

Fig. 1. Year of proposal of each blockchain communication platform.

year when each blockchain platform was proposed. platforms which are mostly open source with interesting use cases other
The problem of distributed user authentication can be addressed than cryptocurrency. Fig. 2 presents the popular blockchain platforms
with blockchain [3]. In addition to security vulnerability of data along with a brief description.
management system, security issues include Sybil attack, IP spoofing This paper primarily contributes to the authentication-based
and single-point failure. The blockchain uses properties such as data blockchain technology. Different components of system architectures,
integrity, non-repudiation and authentication to solve the aforemen- methods, frameworks, models and algorithms are incorporated in this
tioned problems. Several organisations have designed blockchain authentication-based blockchain technology. In relation to this

Fig. 2. Popular blockchain platforms.

42
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

contribution, majority of the problems associated with this blockchain period of time is stored. On the basis of the time sequence, the data
technology and proposed solutions are surveyed in this work to fulfil structure in blockchain has been arranged in a chain. To implement a
the requirements of the system. Another contribution is the discussion fast, efficient, safe and simple storage data management system, SHA
of the importance, capabilities, motivations and challenges of the 256 algorithm and Merkle tree are used by blockchain. Moreover,
blockchain technology as well as recommendations and future research blockchain technology has been developed in areas of smart contract
directions from an authentication perspective. The focus is on practical and lightning network. For example, scalability is offered in lightning
issues such as data processing, security and privacy as well as net- networks. As a result, certain problems in Bitcoin are solved. In the
working and data storage. This paper has five sections which are or- blockchain, small transactions are used in deriving the way the block-
ganised as follows. Section 1 explains the basic information on block- chain bears.
chain and its most famous technologies and platforms. Section 2 In the case of secret sharing, the encrypted data are divided into
describes the research methodology. Section 3 presents the results of parts called shares. After the data are divided, the divided portions are
the study, and Section 4 discusses the results. Finally, Section 5 pro- distributed separately into various online storages. However, when a
vides the conclusions and recommends future research direction. strong attacker who can widely spy the internet targets a user, the se-
cret sharing approach, as a countermeasure, is insufficient. The data
exchange among users and participants for commercial online storage
1.1. Blockchain communication technology servers, and the target servers are where user's share is stored. By
eavesdropping on this data exchange, the attacker can infiltrate these
A blockchain is a storage mechanism tailored to keep record of target servers. If this eavesdropping occurs, then the shares maybe
transactions that occur between two parties in a permanent and ver- stolen or deleted by the attacker. The encrypted data may be at risk of
ifiable manner [4]. Blockchain is also an open, distributed peer-to-peer being stolen or deleted, if adequate shares for the data reconstruction
mechanism of data storage [4]. However, trust in information systems are robbed or remove. Furthermore, the offline brute-force attack may
can be further complicated by the lack of mechanisms for verification, cause the decryption of plain data [7].
particularly when sensitive information, such as economic transactions Blockchain is a technology that can provide a strong and powerful
involving virtual currencies, is involved. cyber security solution alongside high level of privacy guard. The
Satoshi Nakamoto introduced two radical concepts in 2008, namely, proponents of blockchain technology have argued that its design fa-
Bitcoin and blockchain. The value of Bitcoin is maintained with no cilitates its security. In a blockchain model, the records are stored on
support from a centralised financial entity or authority. A decentralised different interlocked computers. Therefore, the storage of data with
P2P network of actors collectively and securely holds the coin. The third parties is not required.
actors make up a verifiable and auditable network. The newly in- Blockchain technology offers the five following benefits [8]:
troduced technology blockchain can solve the reliability problem of
Bitcoin, the first decentralised cryptocurrency which has changed the 1 Efficiency: Blockchain can be easily managed and can track complex
means of money transfer. By using Bitcoin and many other emerging data logs.
types of cryptocurrency, funds can be transferred globally using digital 2 Security: The security provided by a blockchain is better than that
and non-transferable wallet with no financial entities and foreign ex- by a centralised data management. The latter is at risk of being
change required. Bitcoin is supported by blockchain, which is a pro- damaged due to hacker intrusion. In blockchain, falsifying data is
tocol that ensures that the information remains intact over time. almost impossible because of the simultaneous control of devices
Blockchain has been applied to other areas, such as voting systems, data where data are stored, such as mobile devices. Moreover, the hacker
storage and renting, given the immutability of the information being needs to change all the data stored in the devices to falsify data.
guaranteed in applications besides cryptocurrencies. The authenticity 3 Resilience: All information in blockchain is not stored in one place
of information has been revolutionised with the emergence of block- compared with a centralised data management, where information
chain. It has gained more popularity than cryptocurrencies. However, is equally distributed among the collaborating mobile devices. A
unlike Bitcoin, blockchain allows the verification of transactions by a single point of failure (SPOF) does not exist. Even if several mobile
group of unreliable actors. Through blockchain, an auditable, trans- devices encounter errors or performance degradation, the possibility
parent, immutable, distributed and secure ledger can be obtained. of malicious threats being encountered by an MRM infrastructure
Previous transactions that occurred on the system can be fully and using blockchain is slim. Even if attacked, it can recover easily.
openly accessed, and these transactions can also be verified and col- 4 Transparency: All usage data and resource status are open by default
lated at any point in time. In the blockchain protocol, information is because resource metadata are shared among all the participating
structured in a chain of blocks, with a set of previous Bitcoin transac- mobile devices. In this study, specific mobile devices within the
tions carried out at a particular point in time stored in each block. A MRM infrastructure are prevented from exclusively occupying re-
chain is formed through linking blocks by Reyna et al. [5]. sources.
Various kinds of blockchains exist based on the type of data man- 5 Security: Blockchain is secured by distributing data among many
aged, obtainability of the data and the kind of actions which can be interlocked computers. Over 50% of the systems within the network
performed by the user. Therefore, blockchains can be classified as vulnerable to any hacking become unsuccessful [9]. By using a
permissioned and permissionless and private and public [6]. Table 1 hashing function, a block data chain is created to build the ledger
provides the definitions of the different versions of blockchain. In containing all the transaction histories.
blockchain technology, data block is the basic processing unit wherein
every transaction and related authentication information in a given

Table 1
Definitions of the different versions of blockchain.
Blockchain version Definition

Blockchain 1.0 Corresponds with the original cryptocurrency uses.


Blockchain 2.0 Introduced in January 2014 with the launch of the Ethereum platform as an open-source platform which enhances smart contracts and focuses on financial
transactions such as loans, stocks and financial contracts.
Blockchain 3.0 Introduced to cover a range of non-financial transactions such as usage in health, art, science and government.

43
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

1.2. Research objectives ScienceDirect, Web of Science, conference proceedings and journal
publications, the primary search for this review was conducted.
This study performs a systematic review and analysis of (state-of- Regardless of the nature (whether it offers technical or scientific lit-
the-art) research which attempted to achieve authentication in different erature), reliable and relevant databases were searched.
fields using blockchain technology. The specific objectives of this study
are as follows: 2.4.2. Study inclusion/exclusion criteria
To ensure use of relevant studies, the search only included materials
- To identify the taxonomy and classify all the studies according to that were published within January 2013 to 1 December 2018.
different categories. Moreover, only papers written in English were included. Besides the
- To identify the benefits of using blockchain and its challenges for mentioned criteria for inclusion, we specifically focused on studies that
providing recommendations that can enhance its effectiveness. employed blockchain technology in authentication system in central or
- To investigate the problems related to blockchain and propose so- distributed servers in different domains such as smart home, govern-
lutions within the scope of this paper. ment operations and smart city. This focus is further elaborated in
Section 2.3.
We also provide researchers with a list of the names of journals
interested in blockchain technology. In addition, future studies sug-
2.4.3. Selection
gested by other authors are also presented.
All the filters used on the gathered articles for obtaining the last set
of articles are given in this paragraph. Fig. 4 shows the order of pro-
2. Research methodology
cessing stages of these filters.
2.1. Research questions
1 Journal and conference articles
Q1. What is the taxonomy of the research which studied authenti-
In the first stage, all unpublished journals and conference articles
cation system using blockchain technology?
were manually eliminated.
Q2. What are the distribution of articles published in this topic in
terms of publication years, significance of using blockchain, publisher,
1 Full text availability
problems, proposed solutions and blockchain implementation re-
garding authentication?
In the second stage, all articles that were not available in full text
Q3. What are the motivations and capabilities of using blockchain
were excluded. These articles were only two.
technology in authentication?
Q4. What are the challenges faced in this research?
1 Non-English language articles
Q5. What are the recommendations which can be followed to ensure
that blockchain is effectively used during the process of authentication?
The third stage involved the exclusion of articles written in any
What are the future studies suggested by authors in the literature used
other language other than English. No such articles were found and
for this systematic review?
excluded.
2.2. Research scope
1 Duplication
This study focused on the most usable form of authentication in
The fourth stage involved intersecting between all databases papers
daily life based on blockchain technology. The reviewed literature was
to identify and exclude duplicated articles. The total number of
selected from different fields, as shown in Fig. 5. These fields include
duplicated articles found was 32.
Internet of Things (IoT), smart domains, telemedicine, cloud computing
and artificial intelligence. For example, artificial intelligence is in-
1 Focusing on use of blockchain technology in terms of authentication
tegrated with blockchain technology to achieve authentication. In the
filtering stage of the paper selection process, unrelated papers were
The fifth stage involved the exclusion of articles, abstracts and titles
excluded, as discussed in Section 2.4.
with no evidence of investigating the use of blockchain technology.
2.3. Review protocol
1 Full text reading
In this review, the research protocol contained search strategy,
In the sixth stage, all the relevant papers were selected subsequent
database selection, criteria for quality assessment and criteria for in-
to a complete full text reading. The total numbers of articles that
clusion and exclusion. The steps of paper selection are depicted in
were selected and used after the entire filtering process were 45.
Fig. 3.

2.4. Research strategy 3. Results

To create a detailed search strategy, keywords as well as alternative This section provides findings regarding this systematic review on
ways of expressing were first identified to develop a search query. the basis of authentication systems integrated with blockchain tech-
Fellow academics were also consulted in relation to the task involved. nology.
The search was conducting early June 2018 in consideration of newly
published articles. To match the search string with the formatting re- 3.1. Taxonomy
quirements for each database, we altered the search string. The general
strategy used is ((Blockchain OR "Blockchain") AND (Authentication)). This section contains the definitions of categories and subcategories
of all the types of articles. The definitions are given on the basis of the
2.4.1. Literature database taxonomy of the articles and the type of proposed solution to develop
By using online research databases such as IEE Xplore, the blockchain technology, as presented in Fig. 5.

44
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

Fig. 3. Steps of the paper selection.

3.1.1. Development and design category is classified into the following subcategories.
In recent times, the use of authentication systems based on block-
chain technology has been employed in different spheres of life. The use 3.1.1.1. IoT. All studies regarding the authentication of users or
of these systems is employed in areas where decentralised authentica- devices in IoT are discussed as follows.
tion of devices or individuals is required. Majority of the articles (34/
45) in the first major category basically have focused on the develop- - Smart phone
ment and design of frameworks, algorithms, methods and techniques,
as presented in Fig. 5. Majority of these articles have aimed at enhan- Cha et al. [10] proposed the blockchain connected gateway as a
cing the authentication of devices or individuals using blockchain. Such mediator between IoT devices and users. In this study, instead of
studies also aimed at enhancing data protection during communication directly accessing a device, users can use the blockchain connected
between nodes and data storage. On the basis of the taxonomy, this (BC) gateway to obtain information of the device as well as privacy

45
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

Fig. 4. Order of stages of the selection.

policies of IoT device linked to a BC gateway. Yang et al. [11] - Smart electricity meters
proposed a 5 G architecture of blockchain on the basis of trust au-
thentication (BTA) and a blockchain-based anonymous access (BAA) Lee and Kim [12] proposed a smart meter using blockchain tech-
scheme. BAA is implemented in cloud radio over fibre network. nology due to different problems such as data alteration, forgery and
miscalculation of charges. The authentication of IoT device and data

46
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

Fig. 5. Type of articles.

tampering can be prevented in IoT because IoT data are stored in the vehicles to determine if messages that have been received are false
blockchain. Third parties are prevented from viewing the user's or true. The reputation value is calculated using the ratings of pre-
original data using block retrieve with zero-knowledge proof tech- vious messages broadcasted by a certain vehicle. A temporary centre
nology. node provides the ratings, and the ratings are validated by majority
of the vehicles. Finally, the ratings are stored in the blockchain. In
- Vehicular networks other words, the agreement of majority of vehicles on the reputation
of a specific vehicle is reflected in the ratings stored in the block-
Yang et al. [13] proposed a blockchain system in vehicular net- chain.
works. Using the reputation values of the sender, this system helps

47
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

- Smart city identities in a decision-making case study, where remote cancer care
which required authentication of individuals. For such system, Wu and
By applying group key and key management based on multi-solution Tsai [24] proposed the requirements of network security and two
chain, confidentiality was provided by Ra and Lee [14]. Moreover, a algorithms that satisfy these requirements. It proposed that in designing
smart home environment that reduces storage space was proposed a healthcare system, the security of information first, then storage of
by this author. The smart home environment can perform this information and access and finally security of network should be
function via extended Merkle tree and a KSI-based authentication planned accordingly. Medical data in health systems are guaranteed
and communication that is efficient and secure. to be in a high level of security and still confidential. Ji et al. [25]
Sharma and Park [15] maximised the growing software-defined proposed a blockchain-based multi-level location sharing scheme
networking as well as blockchain technologies to present a hybrid (BMPLS). Furthermore, blockchain-based location sharing for telecare
network architecture which can be implemented in the smart city. medical information systems was investigated. The authors initially
The strengths of distributed and centralised network architectures defined the most important requirements of blockchain-based location
are inherited by this proposed architecture. Furthermore, to achieve sharing. These requirements include decentralisation, confidentiality,
a high level of security and privacy of the model, a proof-of-work variability, irretrievability, multi-level privacy protection and
scheme was proposed by the author. Zhu et al. [16] presented a unforgeability. In this study, order-preserving encryption and Merkle
blockchain on the basis of identity framework for IoT (BIFIT). The tree were used.
author(s) illustrated how to implement BIFIT in IoT smart homes to
enhance the autonomous extraction of the signatures of appliances, 3.1.1.4. Satellite networks. A subject which has received great attention
thereby enabling the creation of blockchain-based identities for in the field of satellite communication is LEO constellation. To
their owners. strengthen further the efficiency and authentication reliability of the
LEO constellation, Wei et al. [26] proposed blockchain-based access
- General Authentication (others) verification protocol (BAVP) by integrating identity- based encryption
and blockchain technology. BAVP is a protocol that rapidly and
Lin et al. [17] constructed a new ID-based linear homomorphic efficiently verifies access.
signature scheme, which addresses the limitations of using public
key certificates. The security of the scheme was proven against ex- 3.1.1.5. Cloud computing. Kim and Jeong [8] proposed the Secure
isting forgery on adaptively selected message and ID attack under Authentication–Management human-centric scheme (SAMS), which
the random oracle model. Polyzos and Fotiou [18] designed a uses blockchain to authenticate mobile devices. This authentication
blockchain which supports the data distribution system to enhance aims to trust the mobile devices’ information within the MRM resource.
the analysed operation in IoT. The benefits of this blockchain The hash value of the major node is used from the SAMS and that of the
technology can be used in building key security mechanisms. A new resource information in the subordinate client node within the MRM for
DMM schema which can address hierarchical security issues was the creation of blocks. Blockchain is formed by SAMS by creating and
proposed by Sharma et al. [19] on the basis of blockchain. The is- linking hash values and blocks with the addition of client nodes. On the
sues are addressed without the network being affected. Moreover, basis of the JSON Web Tokens (JWT) and blockchain, Faisca and
the schema fully satisfies the requirements for distributed security Rogado [27] proposed an authentication scheme as an essential tool for
and consumes less energy in IoT fog networks. Hammi et al. [20] personal cloud interoperability. Zhang et al. [28] introduced the BCPay,
proposed bubbles of trust system as genuine and decentralised. In- which is a good payment framework using blockchain technology. This
tegrity and accessibility of data are protected by this system. In framework was introduced to enable fair and secure payment of
addition, the system supplies a strong identification and device outsourcing services in cloud computing without depending on a
authentication. The authors maximised the security provided by third party (whether a trusted one or not). Architecture, properties
blockchains to achieve this goal. Basically, this system creates se- and intruder model of BCPay were presented alongside a detailed
cure virtual regions (bubbles) where trust and identity among things description of the design.
exist.
3.1.1.6. Commercial online. On the basis of an open P2P network, a new
3.1.1.2. Electricity microgrids. On the basis of the allocated attributes of scheme with no central server for a secure online storage was proposed
electrical transaction, Khan and Khan [21] reported that the signatures by Fukumitsu et al. [7]. The proposed scheme does not allow the
of numerous producers can be used in validating the electrical detection of target user data in the online storage by the attacker
transactions hidden in blockchain. These signatures are verified and because secret sharing divides the data into different parts and
endorsed by the consumers achieve those attributes with no distributes them to P2P nodes through the anonymous communication.
information being revealed. The producers are responsible for
generating the private and public keys for these consumers. The use 3.1.1.7. Internet of energy. Huang et al. [4] proposed a model of
of these keys during endorsement confirms that the consumers have the decentralised security for the management of EV charging in the
authority to perform the endorsement. Internet of Energy (IoE). The model, which is referred to as LNSC,
maximises smart contracts and lighting network within a blockchain
3.1.1.3. Telemedicine. Brogan et al. [22] designed FHIRChain prototype ecosystem.
using blockchain technology and FHIR standards to provide patients
with a collaborative clinical decision support. Five major requirements 3.1.1.8. Broadcast. Kishigami et al. [2] proposed a digital content
given by the ONC interoperability way (the ability to determine user distribution system based on a decentralised blockchain. In this study,
identity and authentication and to protect information exchange, data a prototype which can enhance the understanding of the concept of the
access authority, consistent data formats and modularity of the system) system was also provided. At the moment, no incentive mechanism for
were jointly addressed by this FHIRChain design and public key the mining calculation exists in the proposed system, implying that no
cryptography. Zhanga et al. [23] presented FHIRChain, which is a cost can be covered if the hash value is calculated by each minor. In the
blockchain architecture specially tailored to fulfil the requirements of case of a Bitcoin system, the minor will be paid BTC as an incentive.
ONC by encapsulating HL7 Fast Healthcare Interoperability Resources
(FHIR) standard for shared clinical data. In this study, an FHIRChain- 3.1.1.9. Artificial intelligence. Lasla et al. [29] employed blockchain for
based decentralised application was demonstrated using digital health tracking the certificate of each vehicle (revoked or valid) within

48
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

immutable and distributed records. This study basically focused on category have used blockchain for authentication to use blockchain in
using lightweight blockchain-based authentication approach as an different environments. Lin et al. [35] designed a cryptographic
alternative for certificate verification. Moreover, the authors proposed membership authentication scheme (i.e. authenticating graph data)
a fully distributed vehicle admission/revocation scheme. They which can support blockchain-based identity management systems. In
illustrated how their proposed scheme can be used in alleviating this system, a digital identity object is bound to its real-world entity. In
computation overhead, thereby improving response time and security this work, the authors specifically introduced a novel scheme known as
of the entire system. transitively closed undirected graph authentication (TCUGA). The
scheme only requires node signatures, such as certificates for
3.1.1.10. Telecommunication. Using blockchain technology, Lee [30] identifying nodes. Niu et al. [36] designed and implemented an
introduced a new ID as a service (IDaaS) for digital management. A access authentication scheme which can efficiently provide
practical example was used in explaining how the developed accountability and anonymity in a simultaneous manner without
blockchain-based ID as a service works in the identification and depending on any trustworthy third party. The current advancement
authentication of the mobile users in telecommunication company in Bitcoin techniques, such as CoinsShuffle protocol and Coloured
and achieves the ability of managing the infrastructure. Via Coins, inspired the development of this scheme. The solution which
blockchain, a new method of authenticating Wi-Fi access points using can be used to address the challenge confronting the quantum era
Bitcoin 2.0 was proposed by Sanda and Inaba [31]. This method allows blockchain was proposed by Kiktenko et al. [37]. A quantum-safe
the users authorisation through the exchange of Auth-Coins rather than blockchain platform was realised after an experiment. The quantum-
user information. safe blockchain can be used for quantum key distribution upon the fibre
network to obtain secure information authentication. Critical questions
3.1.1.11. Industry 4.0. Lin et al. [32] proposed a system on the basis of regarding scalability and realisability of quantum-safe blockchains in
blockchain for secure mutual authentication of a hierarchical governmental and commercial use were answered using the results
framework. The framework consists of four tangible layers which are obtained in this study.
tailored to combine vertically inter-organisational value networks,
manufacturing factories and engineering value chain. This conceptual 3.1.2. Review and survey
framework allows the efficient implementation of a flexible and re- On the basis of the taxonomy of articles, the second major category
configurable smart factory. is review and survey. The articles found under this category were only
eight out of the 45 articles. These articles are basically literature review
3.1.1.12. Financial sector. Morrison [33] presented an architecture that and previous surveys which handled issues related to the present study.
makes sensor data cloudy by hashing. Only the hashes are retained at Two sub-categories are derived from this major category. The sub-
the enterprise level. The risk assessments, which credit card companies categories are as follows.
use, inspired the idea of Context Integrity Measurement Architecture
(CIMA). Excursions ranging from normal to typical behaviour are 3.1.2.1. Review articles. Fernández-caramés and Member [6] proposed
flagged by these assessments. If an excursion goes beyond a given a universal approach to blockchain for IoT scenarios. It presented the
threshold level, then extra proof of identity is required by the card fundamentals of blockchain regarding IOT applications, and a
companies before a transaction can be further performed. The idea comprehensive analysis of the most important aspects of their
behind the CIMA is the measurement of excursions from physical and/ development, implementation and. The study also aimed at predicting
or logical situation related to mobile protection. the potential impact of blockchain in changing the IoT industry whilst
addressing the challenges faced today. Hawlitschek et al. [38]
3.1.1.13. Cellular networks. Raju et al. [34] employed blockchain addressed the question of how the notion and formation of trust in
technology to propose an identity management system which the sharing economy is influenced by blockchain-based trust-free
enhances the privacy of users by considering attribution and systems. The findings of the study are as follows. 1) The meaning of
anonymity as important attributes of the system. The system also trust is basically relative between the contexts of sharing economy and
facilitates end-to-end management from user authentication to usage blockchain. 2) To a certain extent, blockchain technology is appropriate
invoices. The setup employs pseudonymous identities to enable for replacing trust in platform providers. 3) Transferring trust-free
network access, thereby preventing the reconstruction of a systems to sharing economy interactions is difficult depending on the
participant's identity. development of reliable interfaces using blockchain ecosystems.
Purdon and Erturk [39] considered the future consequences of
3.1.1.14. Social networks. To preserve private information on social blockchain because the imagination of innovators and computer sci-
networks, Yu et al. [1] proposed an algorithm that efficiently preserves entists is stimulated by the concept of disintermediated trustless led-
the privacy of users. This algorithm preserves users’ private information gers. The authors also highlighted the role of Cloud in the im-
when communities are expanded on the basis of mining seed. Users are plementation of this new paradigm as a novel decentralised P2P–Cloud
prevented from tampering other users, whilst verifying their identities model. Finally, the manner in which blockchain can be incorporated
after a request is sent. In this algorithm, the public key of users is stored into the university curriculum of computer science and information
using the recognition and non-tampering of the blockchain. The public technology was discussed in the paper. Rivera et al. [40] used all re-
key is bound to the block address used for authentication. levant extant research on blockchain-based digital identity im-
plemented in a smart environment to conduct a systematic mapping
3.1.1.15. Websites. A framework for a fully distributed user review. The paper provided an understanding of the current research
authentication was proposed by Zhang et al. [3] using blockchain topics, challenges and future directions of these areas from a technical
technology. In the proposed scheme, the identity of user is stored in the point of view. Interest in theory and practice can be stimulated for
blockchain. The user's encrypted personal information is then located in further discussions and research in these areas.
off-blockchain storage. Finally, a smart contract which permits the The attributes of e-residency regarding applying blockchain in
access to each website/application is attached. To verify the user's identity authentication and their consequences were explored from a
identity, a challenge-response protocol is employed by a service cross-discipline perspective by Sullivan and Burger [41]. In the study
provider after the users haves logged in. Afterwards, when user's carried out by Wolfond [42] the ecosystem approach to digital identity
personal information needs to be retrieved, this operation is was examined. Moreover, the study described the significance of
performed from the off-blockchain storage. Other studies in this blockchain technology in addressing current and the Canadian context

49
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

future challenges regarding verification and authentication. blockchain technology has gained increasing interest form researchers
in the last years. Additional studies are expected to be conducted in this
3.1.2.2. Survey articles. The major security issues of IoT were surveyed area.
and reviewed in reference [43]. These issues were categorised on the
basis of three IoT layers, namely, high-level, intermediate-level, and 3.2.2. Distribution by significance of using blockchain technology
low-level IoT layers. In addition, the mechanisms recommended in the We introduced a group of the general significance of using block-
literature for leveraging IoT security at different levels were also chain technology in most information systems. The significances are in
discussed. In reference [44] a discussion on blockchain technology terms of data structure, security, traceability, authentication and im-
and the key technologies related to blockchain technology were given. plementation, as presented in Fig. 7.
The study also recommended areas for further studies on the basis of
the survey of the trends among relevant studies. The many current 3.2.2.1. Significance related to security. The blockchain technology can
issues associated with the use of blockchain within the environment of be a solution for security and privacy problems of IoT. Security
cloud computing should be considered. challenges such as those related to access management and IP
spoofing and IP address counterfeit can be addressed in systems
3.1.3. Evaluation studies where blockchain is employed. With the provision of a strong defence
Kshetri [9] highlighted how will the solutions which depend on against attacks, blockchain technology can solve the problems related
blockchain perform in given conditions compared with the recent IoT to IP spoofing and IP address forgery [6,45]. An important benefit of
ecosystem, which basically depends on cloud servers that are cen- using blockchain technology is security. With blockchain, falsifying
tralised through service providers. The paper employed real-world ex- data is almost impossible because the simultaneous control of all mobile
amples to argue that the decentralised attribute of blockchain can make devices containing the distributed data is required. This control also
a system less vulnerable to modify and counterfeit by tampering users. requires changing all the data stored in the mobile devices [8]. For
In addition, the paper explored the possibility to make the blockchain example, in bank transactions, a hacker cannot possibly successfully
contain an IoT security gap in the goal after discovery. attacked the network and rob the money from an account because idle
undistinguishable copies of the same ledger are stored globally in
3.1.4. Analytical studies blockchain. The devices cannot communicate with one another by
Out of the 45 articles, only two analytical studies were found. Reyna disguising themselves or by injecting forge signatures into records
et al. [5] analysed the major challenges which must be addressed by IoT because blockchain cannot be altered [9]. Using blockchain, substantial
and blockchain to work together successfully. The authors also high- level of security is attained, censorship is prevented, the system is not
lighted major areas where IoT applications can be improved by block- allowed to encounter single point failure and blockchain substantially
chain on IoT devices, and an evaluation was carried out as well. The contribute to the scalability of the overlay architecture [18]. If the
study examined current platforms and applications to provide a holistic distributed architecture technology of a blockchain is used, then the
overview of the interaction between IoT paradigm and blockchain malicious attack on a few nodes does not affect the operation of other
technology. Kumar and Mallick [45] provided an elaborate discussion nodes [25]. In a situation where the attack attempt is practically
on the possible security problems from component interaction per- difficult, hash function is employed to confirm that the details of
spective in IoT. The author(s) also studied how it is impacted by the transaction are not altered. The hash function is also used to find a
distributed ledger-based blockchain technology. The application of nonce value which can be used in getting a new block, thereby
blockchain technology in specific sectors was also studied. To highlight guaranteeing the integrity of transaction data during a Bitcoin
the contribution of blockchain technology, different challenges peculiar transaction [44].
to IoT and IoT combined with blockchain were discussed by the author
(s). 3.2.2.2. Significance related to data structure. The decentralised
management of identity and the distributed storage of credential are
3.2. Classification of research papers enhanced by the irreversible, distributed, immutable and undeletable
nature of blockchain [27]. The blockchain is a structured list in which
3.2.1. Distribution depending on year of publication data are stored similar to a distributed database. Furthermore, the
Fig. 6 shows the publication direction for the three databases (IEEE design of the blockchain makes its indiscriminate manipulation difficult
Xplore, ScienceDirect and Web of Science) for each year in 2013–2018. because the blockchain is saved and verified by the network
Generally, the rate of publication increases every year. A substantial participants. The structure of each block is contented from a header
increase occurred in blockchain research in 2018. Therefore, the and a body. The hash values of current and previous nonce and block

Fig. 6. Publication trends for the three databases.

50
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

Fig. 7. Significances of using blockchain technology.

are the constituents of the header. The index method is used in blockchain also ensures that every party is responsible for the role it
searching the block data within a database. Although the hash values plays in the entire transaction, thereby preventing dispute [9].
of the next block are not contained in the present block, they are added Blockchain also enhances a verified and transparent recording
as a practice [44]. without requiring a central authority or institution. Blockchain can
provide an infrastructure that organises a decentralised market [38]. To
3.2.2.3. Significance related to traceability. The use of blockchain in IoT reduce the cost of transactions and make them as public transactions,
enables a trusted sharing service where the reliability and traceability transaction records are constructed as open access. Furthermore, the
of information is guaranteed [5]. The tracking ability of blockchain in total elimination of key management and distribution is possible with
IoT has been observed in agricultural and BIoT applications. To verify blockchain [43]. Blockchain can be employed in different areas, such as
the integrity of data and the temperature record accessibility in a the financial sector and within the environment of IoT. The use of
pharmaceutical feeding chain, IoT sensors and blockchain technology blockchain is expected to expand further to different areas [44].
were employed [6,43,2]. Blockchain can track sources of insecurity in Examples of implementing blockchain in different fields are as fol-
supply chain handle crisis such as product recalls during security lows:
vulnerability [9]. Blockchain can also be used as an efficient
mechanism for accountability, where users who perform malicious - Social networks: Using reliability scoring, the system is improved by
activities such as the distribution of DRM-protected content or blockchain, which performs an analysis of attacks instead of pro-
transmission of malicious information can be traced [18]. Moreover, tecting them using proof-of-work [1].
when blockchain is used in vehicle-to-vehicle communication (V2V), - Energy sector: Blockchain applications are useful in energy sector or
the complete history of all the transactions performed can be traced in the IoE. A system which permits IoT/IoE devices to pay among
[29]. The movements of food can be traced using blockchain in the food these devices without human intrusion can be constructed on the
sector, thereby tackling food contamination rapidly [30]. Blockchain basis of blockchain technology [6]. In addition, information on
has no single point of potential failure and provides a historical electricity usage searches and payment can be stored using block-
transaction record which is transparent, complete and intrinsically chain [12]. When blockchain is used in electricity microgrids, the
valid. In addition, conflicts are publicly resolved with the provision of transactions are made efficiently manageable by decentralised au-
an unforgeable record of past transactions [38]. thorities. However, the participation of several stakeholders in au-
thentication and information processing makes the approach ex-
pensive. Blockchain also allows each stakeholder to access
3.2.2.4. Significance related to implementation. Many benefits of particular transaction data rather than to all transactions of con-
blockchain can be reaped during implementation in different sumers. The authenticity of each stakeholder must be verified before
environments. One such benefit is the usability of the system. As a any changes to the consumer transactions are made [21].
result, the system is easy to implement, connect and expand by using an - Smart environment: To address the existing single-point failure, a
open source. The level of blockchain efficiency is high because it can be block-chain-based IoT smart home environment is used in satisfying
easily managed and can track complex data logs. Despite the efficient computation and providing security. It provides security in
participation of several mobile devices, the complex processes of terms of non-repudiation and digital signature [14].
system integration can be bypassed [8]. Moreover, the decentralised

51
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

- Financial field: Blockchain can be used to address dual spending in transparency because of its openness. In conclusion, it is suitable for use
cryptocurrency [20]. The underpinning technology of Bitcoin is in different areas, such as financial sector and the IoT environment, and
blockchain. Bitcoin is a virtual peer-to-peer currency transaction its applications are expected to expand [44]. Moreover, blockchain can
and payment system, where users can use a conventional inter- record past actions during the processing time, and such past actions
mediary such as a bank or government agency [41]. can be retrieved in the future [45].
- Property sector: Blockchain is used in the property sector for digital
yet unforgeable property records. It enhances transparency and 4.1.2. Data communication capability
verifiability as well as reduces the number of disputes and transfer In blockchain, the transaction can perform among two or more
fees [30]. nodes, thereby permitting a digital asset (the coin). The form of the
asses in the real world depends on the application used (for example, a
3.2.2.5. Significance related to cost of authentication. The use of coin can be translated into real money, domain name or energy ex-
blockchain in verifying the attributes of a device incurs no cost. In change from one device to another). Moreover, the use of blockchain in
other words, verification is done at no cost [9]. Currently, the smart contracts allows the establishment of a trust relationship among
blockchain technology has been used in smart contracts to enable the two or more entities without depending on a trusted third party, and
establishment of legal effects for transactions, thereby remarkably the blockchain can reliably and single-handedly enforce this relation-
reducing the cost of contract signing, contract execution and payment ship (i.e. smart contract) when required [18]. Double-spending between
matters [25].The blockchain can eliminate unnecessary charges customers can be prevented in bank transaction using blockchain
through P2P transactions with no third party authorisation because technology [27,45]. The purpose of developing blockchain is to provide
the blockchain technology has broker-free (P2P-based) characteristics. security, authentication, immunity against different attacks, privacy,
The cost of security is saved because hacking is difficult with the self-maintenance and simple deployment [6]. The participants have all
ownership of transaction information by many people [44]. Therefore, the transaction history. Blockchain, which can enhance network de-
blockchain can reduce cost and fraud whilst simplifying the experience pendability, can be the ideal and ultimate system [2].
of customers and preventing bad actors from tampering with the system
[42]. 4.1.3. Security capability
Blockchain can also trace sources of insecurity in supply chain and
3.2.3. Distribution according to publisher house or journal handle issues of security vulnerability during product recall in a crisis.
Fig. 8 reveals that the articles are classified according to journals, Furthermore, security challenges such as IP spoofing and confronting
publishers and scientific conferences. This classification is a new IoT can be addressed by blockchain-based identity and access man-
method in systematic review. This kind of classification helps the re- agement systems [9]. Blockchain helps in the management of data by
searcher to target the journal which is related to the topic of study. recording information on data in the block, thereby simplifying data
sorting. In addition, the problem of security vulnerability of data
3.2.4. Distribution by the type of the problems and the proposed solution for management system in extant IoT platforms, such as Sybil attack, IP
each study spoofing and SPOF management, can be solved with the security
Many researchers have identified problems related to the current properties of blockchain. Such properties include data integrity, non-
research topic and proposed solutions for the identified problems. repudiation and authentication [24].
Table 2 contains a list and brief discussion of all these problems and
their proposed solutions. This discussion provides an insight into these 4.1.4. Capability to reduce complexity
problems. Blockchain technology can offer a new method of automating
business operation to avoid the cost and complexity in the centralised
3.2.5. Distribution according to field of blockchain implementation in terms IT infrastructure. It creates reliability among nodes and users as well as
of authentication minimises the risk of forgery and cost by eliminating third parties and
According to this systematic review, the use of blockchain tech- reducing the time process consumed [15]. Using blockchain tech-
nology has been employed in different fields and environments to nology, a distributed software architecture which allows conflicting
achieve authentication, as presented in Fig. 9. agents to engage in transactions that are cryptographically secure is
provided. The agents are allowed to interact without the need for a
4. Discussion centralised platform or governing authority. These characteristics re-
duce the complexities that come with writing contracts, thereby making
4.1. Capabilities of blockchain micro transactions less expensive; the sharing of information in lemon
markets is also enabled by blockchain. When blockchain is used in
Blockchain allows creating digital code which contains contracts micro transactions, decentralised authorities make the transactions ef-
and storing in distributed databases with high level of transparency. ficiently manageable [21]. Accountability and transparency are two
Such contracts are protected from tampering, deletion or alterations major attributes of blockchain; both are necessary for applications re-
because the blockchain technology has many capabilities in terms of garding smart contracts and investment to manufacturing and health-
privacy and security as well as data storage. Certain capabilities are care [37]. Within this scope, blockchains solve the conflicts using trust
illustrated in Fig. 10 and explained in the subsequent paragraph. and secured records of history transactions [38].

4.1.1. Data storage capability 4.2. Motivations


In terms of integrity, the design of blockchain foundation does not
allow the alteration of any information stored in it; the cost of making Motivations for using blockchain technology vary. We grouped
alterations, if possible, is high [6]. The undeletable, immutable, dis- these motivations into categories extracted from the literature review,
tributed and irreversible nature of blockchain is appropriate for the as shown in Fig. 11.
storage of distributed credential and the management of decentralised
identity [27]. Compared with the storage of all data in a central data- 4.2.1. Motivations related to implementation and efficiency
base, blockchain provides higher security for data. Regarding data The aim of using blockchain here is to provide novel ways of au-
storage and management, the danger of attacks on databases is reduced. tomating business processes without the need for expensive centralised
When used in an area that requires data disclosure, blockchain provides IT infrastructure. The use of blockchain can enhance the building of

52
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

Fig. 8. Classification of articles according to journals, publishers and scientific conferences.

trust between users and devices, reduce the settlement time for trans- centralised security system [27]. Blockchain is used in digital identity
action, reduce the risk of falsification, reduce cost and eliminate in- because of its major attributes such as data integrity, security and
termediaries [15]. It also eliminates any third party as a trusted au- anonymity without requiring a third party as an intermediary in charge
thority; authorities such as banks are not required for the tracking of of the transactions [40]. In the context of identity, blockchain can prove
money transfers because all members have their own tamper-proof the existence and/or non-existence of a person at a particular place and
copy of the blockchain ledger. All copies of the blockchain maintained time on the basis of verification by a group of individuals. Actually,
by members are simultaneously updated through a peer-to-peer net- their consensus constitutes fact [41].
work; thus, all members can validate the copies instantly [16]. In an IoT
environment, we should develop reliable and effective model for node
(devices) interaction and minimise as much as possible or eliminate 4.2.3. Motivations related to data storage
human intervention [18]. Blockchain is also used in improving the ef- The motivation of using blockchain in distributed system is related
ficiency of competing authentication schemes for undirected graph in to data storage and how these data are distributed within the network.
terms of the capability to add or delete nodes and edges dynamically. Blockchain facilitates produce a new secure online storage scheme on
Moreover, blockchain efficiently solves the authentication of non-ex- the basis of an open P2P network without a central server. Blockchain
istent edges, which is a known challenge in transitive signature schemes does not allow the detection of the target user data by attackers because
[35]. Furthermore, blockchain are widely used to provide trust and the data are divided into several parts by secret sharing. Afterwards, the
authorise identity registration, ownership trackback and monitoring of data are distributed into P2P nodes by anonymous communication [7].
products, goods and assets [43].

4.2.2. Motivations related to safety and security 4.3. Challenges


In a centralised system, the issues on user privacy and security arise.
These issues are against the personal cloud principle, which maintains In this section, we discuss challenges faced by blockchain tech-
that groups and individuals should be in total control of their digital nology and find corresponding solutions. Fig. 12 illustrates the cate-
personal identities and data. Thus, the need for blockchain prevents a gories of these challenges.

53
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

Table 2
Problems and proposed solutions for each study.
Reference Problem Solution

[1] A malicious user can obtain information about the relationships of users, assume Blockchain algorithm was designed to propose an authentication protocol which
their interests and pretend to be them for cheating other people. can protect the privacy information of a user in the social community detection.
Considering user with high closeness, the authentication procedure used
encrypting and hashing function to enhance the security level.
[2] How to secure video and audio in the network is not known. A decentralised system based on blockchain was proposed to distribute the digital
content.
[3] The current authentication schemes in computer systems require human A fully distributed user authentication framework with the blockchain
cognitive ability to remember numerous complex ID and password or rely on a technology was designed. In this scheme, the identity of a user is stored in the
trusted third party, possibly failing due to technical failure or denial-of-service blockchain. The user's encrypted personal information is stored in an off-
attacks. blockchain storage and attaches a smart contract which grants different
permissions to each website/application.
[4] The security of electronic vehicles is not enhanced during internet charging, LNCS was proposed to address the security issue using lightning network and
smart contract in the blockchain ecosystem.
[7] User data and metadata are not secured in the network nodes (online data store). A decentralised online storage scheme is proposed on the basis of open P2P
network.
[8] Way of authentication using external cloud services and mobile resource SAMS was proposed to achieve the mobile device authentication using
management without a cloud server (MRM) to merge computing and storage blockchain technology for reliable resource information in these devices.
resources of the integrated mobile devices is not identified.
[10] User privacy is not protected. To authenticate and manage the privacy of users securely, a digital signature
mechanism was proposed. BC gateway was proposed as well. The BC gateway
serves as an intermediary between users and IoT devices.
[11] A huge number of terminal devices are interconnected via Cloud radio access 5 G architecture of BTA and BAA scheme in cloud radio over fibre network were
network. Hence to enhance the services in 5 G area of IoT, centralised access proposed. SDN testbed was used to evaluate the efficiency of this architecture.
authentication is used. However, cost of network is added. Therefore, an
authentic mechanism cannot be provided to achieve high level of security of
services.
[12] IoT devices are used to manipulate authentication and information in electricity A smart meter using a block chain was proposed.
meters as well as counterfeit and modification of data and faults in computation
of charges.
[13] In IoT, extra attention is given to the security of vehicular networks and focused Reputation vehicular networks system that uses blockchain technology was
on data authentication and integrity, which are not enough to estimate the proposed to give the vehicles the ability of estimating received messages on the
credibility of coming messages. basis of historical messages broadcasted from specific vehicle.
[14] For managing the inside of the house, privacy and security in smart homes A secure smart home authentication and group key and key management were
involve communication between IoT devices and the external cloud server with proposed on the basis of multi-solution chain to provide confidentiality.
the Internet or gateway. Smart homes also involve communication with other
devices (such as the user's smartphone). Therefore, the secure transmission of
smart home messages is essential to prevent any attack.
[15] The limitations of today's smart city network such as high latency, bandwidth Hybrid network architecture is proposed for the smart city to achieve efficiency
bottlenecks, security and privacy, and scalability arise in the current smart city and address the current limitations. The strength of distributed and centralised
network architecture. network architectures is inherited by this architecture.
[16] The problem lies in how to ensure privacy and security as well as SPOF in BIFIT was proposed. It can be implemented in smart home environment for
centralised systems. Moreover, untraditional properties of IoT such as identity self-management by end users. The signatures of the individuals are
heterogeneity, scalability and mobility need new identity management systems to autonomously extracted using this framework with blockchain. Moreover,
be implemented in distributed and trustless environments. appliances’ signatures (low level identities) and owners’ identities are connected
to use them in the authentication of credentials and to ensure that the behaviours
of all IoT entities are normal.
[17] The shortcomings of the use of public key certificates, such as existential forgery A new ID-based linear homomorphic signature scheme was constructed.
on adaptively chosen message and ID attack under the random oracle mode,
should be addressed.
[18] The further use and development of IOT is impeded by privacy and security An authentication system was designed, and enabling technologies were
concerns in IOT. determined.
[19] The existing DMM solutions can provide smooth handovers in modern fog A new blockchain-based DMM which can resolve hierarchical security issues was
network architectures due to IoT applications and 5 G communications proposed. It can perform this function without the network layer being affected.
technologies. However, they need robustness from a security perspective. DMM It also fully satisfies distributed security requirements with less consumption of
depends on external mechanisms and uses a centralised device which affects the energy.
level of security, where hierarchical dependencies can introduce problems.
[20] All devices in IOT need to authenticate from one other. They also need to achieve Bubbles of trust system was proposed. It enables the devices to be efficiently
data integrity during communication and provide resistance against malicious identified and authenticated. Moreover, it saves the data integrity and
users and tamper use. availability.
[21] Energy distribution model between producer and consumer data is prone to In the solution, electrical transactions embedded in blockchain are validated
modification and misuse. If a consumer moves from one producer to another, using the signatures of multiple producers. The public and private keys for these
then the issues related to energy transactions and losses need to be addressed consumers are generated by the producers and endorsement procedure using
alongside security aspects such as information tampering. these keys, thereby ensuring that these consumers are authorised.
[22] Security and privacy issues exist in digital healthcare ecosystem. Ledger technologies were used as a key player in advancing electronic health,
thereby ensuring authenticity and integrity of data generated by wearable and
embedded devices. The solution enable patients to define granular access controls
that can be updated over time using the MAM module of the IOTA protocol.
[23] Data during communication and collaborative decision making should be To provide a collaborative clinical decision support for patients, FHIRChain
ensured. Hence, barriers to efficient information exchange are created and prototype was designed using blockchain technology and the FHIR data
impede effective treatment decision for patients. standards. The FHIRChain was used together with public key cryptography. It
addresses five key requirements provided by the ONC interoperability roadmap,
that I, user identifiability and authentication, secure data exchange, permissioned
data access, consistent data formats and system modularity.
(continued on next page)

54
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

Table 2 (continued)

Reference Problem Solution

[24] Data should be collected from wearable sensors in healthcare environments in New healthcare system architecture was proposed for data exchange. It enables
high level of security and integrity. this system to collect patient data from multiple nodes or wearable sensors using
blockchain technology.
[25] Regarding security issues, the authentication from patient locations is important Using order-preserving encryption and Merkle tree, BMPLS was proposed to
in healthcare environments. achieve the privacy-preserving location sharing on the basis of blockchain for
telecare medical information systems.
[26] Centralised authentication protocols used for MEO/GEO satellite networks cannot BAVP was proposed by combining identity-based encryption (IBE) and
accommodate LEO satellites with frequent user connection switching. decentralised blockchain technology. Two different key management schemes
with IBE and blockchain were investigated, thereby enhancing the authentication
reliability and efficiency in LEO constellation.
[27] Cloud interoperability is required. Using JWT and blockchain, an end-to-end authentication mechanism was
proposed.
[28] Secure and fair payment of outsourcing services is absent in general without BCPay was introduced. It is a blockchain-based fair payment framework for
relying on any third-party (trusted or not). outsourcing services in cloud computing
[29] Vehicles authentication is required in roads. Blockchain was used to keep track of each vehicle's certificate (valid or revoked).
[30] Mobile user authentication is needed. Blockchain technology was used to introduce a new IDaaS for digital identity
management.
[31] Wi-Fi hotspots which are installed at several places are prone to malicious use by A new authentication method of Wi-Fi access points was proposed using Bitcoin
illegal users because most communications are not encrypted. 2.0. This method uses blockchain and saved logs of user access. Bitcoin address
can be used as encryption keys for communications.
[32] In Industry 4.0 applications, the security of information considers critical Hierarchical framework using blockchain was proposed. This framework consists
problem. Much vulnerability appears in manufacturing (e.g. hardware Trojans of four layers which permit efficient implementation of a flexible and
and backdoors). Therefore, address these risks is difficult. reconfigurable smart factory and achieve a secure and mutual authentication
[33] All the card companies need extra evidence of identity before permitting a A CIMA architecture which uses context as a shared secret between the mobile
transaction. device and the enterprise was proposed, thereby enabling efficient setup of one-
time session encryption keys and mutual authentication
[34] In cellular networks, when the carrier personally provides identifiable A blockchain technology was used to propose a user identity management
information for individual setup, the risk of profiling increases. Therefore, system. The system ensures privacy and gives priority to attribution and
authorisation, authentication and accountability of network access implemented anonymity whilst supporting end-to-end management from user assertion to
in conventional cellular networks are inadequate in the cognitive space because usage billing.
they are neither spontaneous nor scalable.
[35] An authentication for undirected graphs (authentication of non-existent graph TCUGA scheme was introduced.
edges) is a problem.
[36] Service providers experience unconditional anonymity due to similarity among An authentication scheme based on Wi-Fi hotspot access was proposed to provide
the anonymous users, Hence, no way is available for deciding which user is accountability without any dependence on any trusted third party. This solution
responsible for the specific action during the system working. is derived from the concept of Bitcoin techniques.

4.3.1. Challenges related to privacy few nodes are prone from attacks. However, availability can be com-
Most security systems which have privacy challenges often use promised during different kinds of attacks. Majority attack means that
blockchain to achieve a high level of privacy. In blockchain, authenti- 51% attack have been done from the total number of nodes. This attack
cation of users involves the identification of the users using hash values is the most dangerous type. In this kind of attack, the entire chain can
and the public key. Anonymity is not guaranteed because all transac- be controlled by a single miner, and this miner can perform any kind of
tions are shared. Sharing of transactions makes the analysis of such transaction. In this situation, data are available. However, performing
transactions easy for third parties to derive the true identities of the transactions might be impossible because the attacker can block the
individuals. transactions. Obviously, the integrity of the data can be affected by this
The privacy issue in an IoT environment is complex because the kind of attack [1,6,9,39]. The 51% attack is the most common kind [5].
data of a private individual can be revealed. Blockchain can be used to Additionally, security which is associated with the personal key used in
store the data when the privacy conditions vary from country to an- encryption is the most crucial aspect of blockchain. Several kinds of
other. Blockchain transactions are confronted with privacy challenge. attacks, such as the reuse attack, are attempted by an attacker to gain
Specifically, stored information is supposedly anonymous but practi- access to the personal key, which is stored in a peer's device, and to
cally accessible by third parties. The addition of a blockchain compli- hack Bitcoin. Blockchain accounts can be compromised by exploiting
cates the system due to the sharing of transactions among peers in the private keys with limited randomness to ensure the privacy of
specific fields, such as financial systems or industry which monitors transactions and prevent race attacks which may cause double spending
activities [6]. For instance, when using blockchain in IoT field and during transactions. Apart from these problems, several other problems
chain to store the information on device or data authentication, the can be caused by blockchain such as those related to the security of
operation of proof-of-work or address search might leak user data [12]. transactions, software and wallet. Many studies have been conducted in
The decentralised consensus is generated on the basis of the public an attempt to solve these problems [43,44].
availability of previous transaction data and the pseudonymous dis-
closure of the related transacting parties. Thus, the issue of privacy 4.3.3. Challenges related to implementation and evaluation
protection becomes a specific challenge [38]. Challenges related to implementation and evaluation of using
blockchain technology may arise when the blockchain network system
4.3.2. Challenges related to security needs to perform large numbers of transactions per any time unit. This
The assertion that blockchains can permanently store data without challenge represents the limitation in certain types of networks. The
alterations is practically not true in terms of the preservation of in- largest number the Bitcoin's blockchain can perform is 7 transactions
tegrity in rare cases. Therefore, data stored in blockchain should be per second, and this blockchain takes a long time for processing these
reliable, secure and accurate [6,38]. Availability is an attribute of se- transactions. In case of Bitcoin, block creation times follow a Poisson
curity that is easily achieved by using blockchains because this archi- distribution with a 10-min mean [6,39]. Moreover, a striking closeness
tecture allows the nodes to work using distributed systems, even when a exists between human populations and the number of cellular

55
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

Fig. 9. Implementation of blockchain technology in different fields.

Fig. 10. Capabilities of blockchain technology.

56
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

chain in Bitcoin is constantly growing at a rate of 1 MB per block every


10 min. Additional resources are required by nodes as the size in-
creases, thereby causing a reduction in the capacity scale of the system.
Furthermore, the performance of a system can be negatively influenced
by an oversized chain. For example, this increases the synchronisation
time of new users [5].
The growth of block is periodic because it occurs as users store their
transactions. This growth causes a long initial download time, and the
need to utilise miners that are powerful with large and stable memories.
The computational resources are wasted because large amounts of data
that are not relevant to nodes are being stored in them [6]. Another
issue in this context is scalability. The blockchain is immutable, so a
growing list of the blocks must be maintained. In 16 December 2016,
the size of Bitcoin blockchain was 100 GB and is still growing. In terms
of block size, e.g. asking about the number of transactions which has
been contented in one block. Most blockchain implementations have
attempted to improve the transactions per second [30].

Fig. 11. Categories of motivations to use blockchain technology. 4.3.5. Challenges related to the infrastructure
For the blockchain to function properly, certain elements should be
connections. Each is estimated at around 7.5 billion. Although the made available. These elements include communication protocols, de-
number of machines at the moment is estimated to be only 300 million, centralised storage, mining hardware and network administration or
the number will triple by 20, possibly becoming over one billion. Also address management. The industry is progressively fulfilling a few of
around the same time, an aggregate of 8.9 billion cellular connections these requirements and creating specific equipment for blockchain
around the globe is expected, thereby achieving a penetration rate of applications [6].
1.14 per capita. This increase might cause a carrier to be furnished with
personally identifiable information for user setup, thereby increasing 4.3.6. Challenges related to legal rules
the risk of profiling in cognitive cellular networks [34]. In the case of In the case of currencies, legal implication can have a direct and
using blockchain in smart contracts, the smart contracts cannot trigger negative effect on blockchain applications in virtual currencies. Hence,
themselves. Instead, they need serious intervention. Therefore, self- it is an important aspect that cannot be underestimated. Many countries
execution must be triggered by another contract, an artificial or human have begun to develop laws guiding the usage of virtual currencies due
user. Integrating real world human interactions with a closed block- to the unavailability of laws governing virtual currency transactions.
chain-based ecosystem is challenging without a trusted interface [38]. This situations have produced many uncertainties and may be the re-
cent cause for the recent decline in virtual currencies [5]. Although the
4.3.4. Challenges related to memory capacity full legal implications of blockchain are unknown, new legal issues are
The challenges related to memory capacity when the use of block- raised as a result of using distributed ledger. The legal issues that arise
chain is employed during implementation are discussed in this section. are in terms of accountability for the documents, such as data storage
The storage capacity and the scalability of blockchain have been deeply and information extraction from the blockchain record (ledger) as well
questioned. In this technology, storage ability is required because the as implications of compromised data integrity, security and accuracy.

Fig. 12. Categories of challenges in using blockchain technology.

57
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

Therefore, this is useful in terms of identity because although effec- 4.4.3. Regarding testing and evaluation
tively applying national data protection legislation in the blockchain In study [23], a plan to improve the simulations of the FHIRChain
context is impossible, a citizen has the right to identity according to was proposed by the authors to enable a thorough evaluation of the
international law. Therefore, the law can be used to secure this identity FHIRChain prototype performance. In this study, comparison and de-
in case of loss of an effective national data protection law for e-residents ployment different configurations of blockchain were proposed within
[41]. the work environment, such as the blockchain template provided by
Amazon Web Services. To identify management of patients, the authors
explored the techniques. Future research is also recommended to un-
4.4. General future studies suggested by authors
derstand the perception which consumers have of blockchain-based
platforms in terms of trust-building. Conceptualisation and develop-
Whilst reviewing the literature, suggestions for future studies made
ment of sufficient instruments of measuring trust in blockchain-based
by authors were found, and they are presented in this section.
algorithms should be addressed in future studies. High level of accuracy
in the discussion and precision of the concept of trust can then be
4.4.1. Regarding applications achieved [38].
The first step required in combining blockchain with IoT is identi-
fying which blockchains fits the requirement. In this manner, the en- 4.4.4. Regarding security
cryption algorithm is improved, thereby enhancing the security of so- Effective mechanisms which can be used in ensuring the privacy of
cial networks [1]. The author in study [6] stated that a mechanism that transactions and avoiding race attacks that may cause double spending
can be used in testing various blockchains for application in different during transactions are yet to be defined [43]. For example, gateways
areas should be established and optimised. Moreover, this author also that are used in IoT systems which rely on blockchains should be se-
recommended the need for the improvement of security in protocol cured. They do not need to be protected them from malicious or un-
framework. These authors proposed to make adjustments to the trusted gateways. Many privacy threats are related to public distributed
blockchain structure. In addition, planning is required to have a general ledgers in a system that uses blockchain. On this basis, blockchains
methodology for the authentication of IoT applications and services and which enable the preservation of privacy, such as Z-Cash, should be
to evaluate performance, overhead and scalability of authentication studied. Future studies should focus on addressing the issues of scal-
using blockchain technology. Future studies should focus on the re- ability and efficiency which are great problems at the moment [18].
formation of blockchain technology on the basis of specific satellite Future studies should also study blockchain application in emergency
network routing algorithm. Innovation and reformation of many cen- situations in telemedicine wherein a patient is rushed to an emergency
tralised applications, such as social applications and third-party pay- room in distress or unconscious. Healthcare professionals should be
ment, can be done on the basis of the distributed public key infra- able to obtain the patient's health data. The patient does not have to
structure (DPKI) [26]. remember or provide an authorisation key. A group of researchers have
proposed to address this issue by exploring secure biometric solutions,
such as iris, palm vein and voice scanners [22].
4.4.2. Regarding implementation
Efforts of future research should be geared towards addressing the
design of trusted interfaces with the aim of facilitating the successful 4.4.5. Regarding transaction cost
implementation of online and offline platforms that are based on The cost of blockchain implementation in any system is crucial.
blockchains. An issue that is a great challenge for future work is Therefore, to solve the problems caused by Bitcoin property, such as
overcoming the problem of trust and using methods that do not rely on confirmation time and transaction fee, a new blockchain derived from
trusted third parties. This challenge may offer a business opportunity to Bitcoin adapted to the present method is proposed [31].
platform operators. Finally, in the presence of memory constraints,
resolving multi-blockchain dependencies is mandatory. This resolve can 4.5. Recommendations
be performed by moving towards network architectures with no
managing authority. However, these architectures also are also limited On the basis of the systematic review, we briefly provide the readers
by challenges, such as record management and tracking and service with recommendations. The recommendations are meant to alleviate
charging policies, which need to be further explored [19]. the challenges which designers and developers encounter. We also

Fig. 13. Categories of recommendations for using blockchain technology.

58
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

provide them with a robust and accurate system. This system is de- make the decision on issuing and revoking of certificate. This commu-
signed using blockchain technology. It satisfies the needs of organisa- nication in turn introduces a SPOF and jeopardises the safety of mo-
tions, companies and governments in terms of an information system torists. Therefore, public policies on privacy protection should be pro-
with high level of security. These recommendations are categorised into vided to address this issue by training key stakeholders whilst
groups according to their audience. The readers can then understand increasing the investment in technology in this area [29].
each type of audience, as illustrated in Fig. 13.
4.5.3. Recommendations to developers
4.5.1. Recommendations to researchers Structural scalability is another challenge confronting the smart city
In this section, recommendations for researchers are given. In study network. In this system, growth of the system is allowed as needed; the
[6], the authors recommended that techniques of blockchain com- system does not require making changes to the network architecture
pression should be further explored. Future studies need to address the [15]. Digital identity services of companies and governments should be
security issues present in the current devices and networks as well as developed by building a platform that allows this extension. Companies
the other issues that may arise during integrations. Such studies are and governments can use the platform. Developers should also increase
needed because the current solutions are inadequate to address these the internet infrastructure to enhance its ability for handling large scale
crucial security issues [32]. However, Bitcoin protocol by nature of its data in IoT systems [40]. This increase can be achieved through dis-
design does not enforce privacy. On this basis, efforts have been made tributed or decentralised networks such as peer-to-peer networking,
to provide strong and efficient anonymity features in Bitcoin. However, distributed file sharing and autonomous device coordination. These
not only virtual currencies need high level of privacy in the chain but functions can be performed with blockchain, thereby allowing a large
also many other applications that are based on public blockchain number of connected and networked devices to be tracked by IoT sys-
technology, especially those handling sensitive data. Thus, further re- tems [45]. Furthermore, excessive memory may be used by multiple
search should be conducted to ensure security and privacy of critical ledgers as a solution to redundant memory requirements. The perfor-
technologies such as IoT and blockchain [5]. Furthermore, apart from mance of the system may be affected by using excessive memory. Thus,
smart environments, other applications may use blockchain as a digital controlled operations must be performed for memory consumption
identity solution. The possibility of using smart contracts, licensing and [19].
IoT in a blockchain environment needs to be researched [40]. Finally,
location privacy is represented as fundamental security requirement for 4.5.4. Recommendations to merchants
providing the services to the specific location. Any leakage in location Recommendations for merchants using this technology concerns
information should be prevented. For instance, two studies are related latency. The processing time for blockchain transactions is long. For
to epidemic spread on the basis of specific data. The first research instance, in Bitcoin, block construction times follow a Poisson dis-
analyses the distribution of infectious diseases in a country. The second tribution with a 10 min mean. The time helps in preventing double
research considers the distribution of these diseases in the world. The spending. However, merchants are required to stay for almost one hour
aforementioned studies have different requirements on location because 5 to 6 blocks are added to the chain before proving the
privacy. Therefore, a required property for location sharing is multi- transaction. Nonetheless, only few seconds are required for VISA [6].
level privacy protection. [25].
4.6. Study limitations
4.5.2. Recommendations to governments and companies
Recommendations are given to companies and governments be- The first limitation of this systematic review is the number of the
cause they require high level of security for their information systems. source databases. The selected databases are the most reliable sample of
In terms of blockchain infrastructure, they should construct a detailed sources related to the research topic of this study. In addition, the use of
reliable framework or infrastructure which can satisfy all requirements blockchain technology to achieve authentication of individuals and
for using blockchain in IoT environment. Although many recent ap- device do not necessarily reflect the reality of its application or its ef-
proaches solve such trust issues, many of these approaches rely on inter- fectiveness. Nevertheless, this research reflects the response of the re-
domain policies and monitoring. For instance, governments can assist search community to the trend especially in the current year (2018), as
use cases of general interest by setting up a blockchain infrastructure discussed in Section 3.2.1. Finally, the rapid progress in this field hardly
[6]. Moreover, the focus should be on the general procedure which allows for any timelines in literature review. Articles from 1 September
achieves the privacy on the basis of blockchain. Stakeholders (users) 2018 onwards were excluded.
should undergo training courses to increase their investment. Com-
mercial certifiers, such as accountants, city inspectors, lawyers and 4.7. Future research directions
notaries, should be ensured to feel comfortable when using this tech-
nology. If the governments and the private companies aim to develop In the near future, we plan to address various emergency situations,
new and transformative technologies such as blockchain, then they including normal cases as well as when the patient reaches the emer-
should provide money and infrastructure develop the blockchain-based gency section unconscious or in distress and when the patient is in his/
solutions; as a result, cyber security can be strengthened, and privacy is her location but need telemedicine services. Healthcare providers
secure [9]. With regard to companies, one of the most important con- should be able to access patients’ activity data without the patient re-
cerns in an Industry 4.0 implementation is security because detecting membering or providing an authorisation key. Moreover, patients
the vulnerabilities introduced during manufacturing (e.g. hardware should be able to access health services from their location through
Trojans and backdoors) can be difficult. Furthermore in comparison to telemedicine system and services. They should be able to access the
the traditional internet and electronic commerce applications, a smart systems using finger vein verification, which is integrated with block-
factory can be vulnerable as a result of broad and diverse attack vectors. chain. Physicians, patients and other employees can be authenticated in
Future research should be conducted this area to explore how the the telemedicine system.
performance of blockchain in Industry 4.0 using hardware im-
plementation can be optimised. Such a research should also focus on 5. Conclusion
how blockchain can be used together with smart factory operator for
implementation and evaluation of the proposed prototype (most prob- This review examined blockchain technology as a state-of-the-art
ably a hybrid hardware and software based prototype) in a real-world technology and provided a systematic review of blockchain regarding
setting [32]. V2V communication on road depends on a central node to decentralised authentication. The blockchain technology was

59
A.H. Mohsin et al. Computer Standards & Interfaces 64 (2019) 41–60

investigated. The problems of data storage, communication, key ex- homomorphic signature scheme and its application in blockchain, IEEE Access X (X)
change and other problems related to authentication were discussed. (2018) 1–8.
[18] G.C. Polyzos, N. Fotiou, Blockchain-assisted information distribution for the in-
The research methodology and search query used in the selection of the ternet of things, Proc. - 2017 IEEE Int. Conf. Inf. Reuse Integr. IRI 2017, 2017-
final set of articles were described. On the basis of the systematic re- January 2017, pp. 75–78.
view, 2013 has the least publications on blockchain technology, [19] V. Sharma, I. You, F. Palmieri, D.N.K. Jayakody, J. Li, Secure and energy-efficient
handover in fog networks using blockchain-based DMM, IEEE Commun. Mag. 56
whereas 2018 has the highest number of publications. Of the published (5) (2018) 22–31.
articles, 53% were from IEEE, whereas Web of Science has the smallest [20] M.T. Hammi, B. Hammi, P. Bellot, A. Serhrouchni, Bubbles of Trust: a decentralized
published articles among selected databases with 22.2%. This study blockchain-based authentication system for IoT, Comput. Secur. 78 (2018)
126–142.
aimed to provide a comprehensive analysis of the existing studies for [21] S. Khan, R. Khan, Multiple authorities attribute-based verification mechanism for
providing insight into the taxonomy, significance of use, and challenges blockchain mircogrid transactions, Energies 11 (5) (2018) 1–13.
of blockchain technology in authentication and recommendations to [22] J. Brogan, I. Baskaran, N. Ramachandran, Authenticating health activity data using
distributed ledger technologies, Comput. Struct. Biotechnol. J. 16 (2018) 257–266.
facilitate its effective use. This paper is expected to be a starting point
[23] P. Zhanga, J. Whitea, D.C. Schmidta, G. Lenzb, S.T. Rosenbloomc, {FHIRChain}:
for further studies and discussions on the adoption and implementation applying blockchain to securely and scalably share clinical data, Comput. Struct.
of blockchain for digital identity in system authentication. Biotechnol. J. 16 (2018) 1–30.
[24] H.-T. Wu, C.-W. Tsai, Toward blockchains for health-care systems: applying the
bilinear pairing technology to ensure privacy protection and accuracy in data
Acknowledgment sharing, IEEE Consum. Electron. Mag. 7 (4) (2018) 65–71.
[25] Y. Ji, J. Zhang, J. Ma, C. Yang, X. Yao, BMPLS: blockchain-based multi-level
We are grateful to the editors and reviewers for their invaluable privacy-preserving location sharing scheme for telecare medical information sys-
tems, J. Med. Syst. 42 (8) (2018).
suggestions, specially the reviewers for their efforts, comments and [26] S. Wei, S. Li, P. Liu, M. Liu, BAVP: blockchain-based access verification protocol in
suggestions on this study. LEO constellation using IBE keys, Secur. Commun. Netw. 2018 (2018).
[27] J.G. Faisca, J.Q. Rogado, Personal cloud interoperability fully decentralized identity
management, WoWMoM 2016 - 17th Int. Symp. a World Wireless, Mob. Multimed.
Supplementary materials Networks, 2016.
[28] Y. Zhang, R.H. Deng, X. Liu, D. Zheng, Blockchain based efficient and robust fair
Supplementary material associated with this article can be found, in payment for outsourcing services in cloud computing, Inf. Sci. (Ny). 462 (2018)
262–277.
the online version, at doi:10.1016/j.csi.2018.12.002. [29] N. Lasla, M. Younis, W. Znaidi, D. Ben Arbia, Efficient distributed admission and
revocation using blockchain for cooperative ITS, 2018 9th IFIP Int. Conf. New
References Technol. Mobil. Secur. 2018, pp. 1–5.
[30] J.H. Lee, BIDaaS: blockchain based ID as a service, IEEE Access 6 (2017)
2274–2278.
[1] R. Yu, et al., Authentication with block-chain algorithm and text encryption pro- [31] T. Sanda, H. Inaba, Proposal of new authentication method in Wi-Fi access using
tocol in calculation of social network, IEEE Access 5 (2017) 24944–24951. Bitcoin 2.0, 2016 IEEE 5th Glob. Conf. Consum. Electron. GCCE 2016, 2016,
[2] J. Kishigami, S. Fujimura, H. Watanabe, A. Nakadaira, A. Akutsu, The blockchain- pp. 0–4.
based digital content distribution system, Proc. - 2015 IEEE 5th Int. Conf. Big Data [32] C. Lin, D. He, X. Huang, K.K.R. Choo, A.V. Vasilakos, BSeIn: A blockchain-based
Cloud Comput. BDCloud 2015, 2015, pp. 187–190 February 2018. secure mutual authentication with fine-grained access control system for industry
[3] L. Zhang, H. Li, L. Sun, Z. Shi, Y. He, Poster: towards fully distributed user au- 4.0, J. Netw. Comput. Appl. 116 (February) (2018) 42–52.
thentication with blockchain, 2017 IEEE Symp. Privacy-Aware Comput. 2017, pp. [33] J. Morrison, Context integrity measurement architecture: A privacy-preserving
202–203. strategy for the era of ubiquitous computing, 2016 IEEE 7th Annu. Ubiquitous
[4] X. Huang, C. Xu, P. Wang, H. Liu, LNSC: a security model for electric vehicle and Comput. Electron. Mob. Commun. Conf. UEMCON 2016, 2016.
charging pile management based on blockchain ecosystem, IEEE Access 6 (c) (2018) [34] S. Raju, S. Boddepalli, S. Gampa, Q. Yan, J.S. Deogun, Identity management using
13565–13574. blockchain for cognitive cellular networks, IEEE Int. Conf. Commun. 2017.
[5] A. Reyna et al., “On blockchain and its integration with IoT . Challenges and op- [35] C. Lin, D. He, X. Huang, M.K. Khan, K.R. Choo, A New Transitively Closed
portunities,” vol. 88, pp. 173–190, 2018. Undirected Graph Authentication Scheme for Blockchain-based Identity
[6] T.M. Fernández-caramés and S. Member, “A Review on the Use of Blockchain for Management Systems, IEEE Access 4 (c) (2018).
the Internet of Things,” vol. 3536, no. c, pp. 1–23, 2018. [36] Y. Niu, L. Wei, C. Zhang, J. Liu, Y. Fang, An anonymous and accountable authen-
[7] M. Fukumitsu, S. Hasegawa, J. Iwazaki, M. Sakai, D. Takahashi, A proposal of a tication scheme for Wi-Fi hotspot access with the Bitcoin blockchain, 2017 IEEE/
secure P2P-type storage scheme by using the secret sharing and the blockchain, CIC Int. Conf. Commun. China, no. Iccc, 2017, pp. 1–6.
Proc. - Int. Conf. Adv. Inf. Netw. Appl. AINA, 2017, pp. 803–810. [37] E.O. Kiktenko, et al., Quantum-secured blockchain, Quantum Sci. Technol. 3 (3)
[8] H.-W. Kim, Y.-S. Jeong, Secure authentication-management human-centric scheme (2018) 035004.
for trusting personal resource information on mobile cloud computing with [38] F. Hawlitschek, B. Notheisen, T. Teubner, The limits of trust-free systems: a lit-
blockchain, Human-centric Comput. Inf. Sci. 8 (1) (2018). erature review on blockchain technology and trust in the sharing economy,
[9] N. Kshetri, Blockchain's roles in strengthening cybersecurity and protecting privacy, Electron. Commer. Res. Appl. 29 (2018) 50–63.
Telecomm. Policy June (2017) 1–12. [39] I. Purdon, E. Erturk, Perspectives of blockchain technology, its relation to the cloud
[10] S.C. Cha, J.F. Chen, C. Su, K.H. Yeh, A blockchain connected gateway for BLE-based and its potential role in computer science education, Eng. Technol. Appl. Sci. Res. 8
devices in the Internet of things, IEEE Access 6 (2018) 24639–24649. (1) (2018) 2412–2416.
[11] H. Yang et al., “Blockchain-based trusted authentication in cloud radio over fiber [40] R. Rivera, J.G. Robledo, V.M. Larios, J.M. Avalos, How digital identity on block-
network for 5 G,” pp. 16–18, 2017. chain can contribute in a smart city environment, 2017 Int. Smart Cities Conf. ISC2
[12] C.H. Lee and K. Kim, “Implementation of IoT System using blockchain with au- 2017, 00 2017.
thentication and data protection,” pp. 936–940, 2018. [41] C. Sullivan, E. Burger, E-residency and blockchain, Comput. Law Secur. Rev. 33 (4)
[13] Z. Yang, K. Zheng, K. Yang, V.C.M. Leung, A blockchain-based reputation system for (2017) 470–481.
data credibility assessment in vehicular networks, IEEE Int. Symp. Pers. Indoor [42] G. Wolfond, A blockchain ecosystem for digital identity: improving service delivery
Mob. Radio Commun, PIMRC, 2017-October 2018, pp. 1–5. in Canada's public and private sectors, Technol. Innov. Manag. Rev. 7 (10) (2017)
[14] G.J. Ra, I.Y. Lee, A study on KSI-based authentication management and commu- 35–40.
nication for secure smart home environments, KSII Trans. Internet Inf. Syst. 12 (2) [43] M.A. Khan, K. Salah, IoT security: review, blockchain solutions, and open chal-
(2018) 892–905. lenges, Futur. Gener. Comput. Syst. 82 (2018) 395–411.
[15] P.K. Sharma, J.H. Park, Blockchain based hybrid network architecture for the smart [44] J. Park, J. Park, Blockchain security in cloud computing: use cases, challenges, and
city, Futur. Gener. Comput. Syst. 86 (September, 2018) 650–655. solutions, Symmetry (Basel) vol. 9, (8) (2017) 164.
[16] X. Zhu, Y. Badr, J. Pacheco, S. Hariri, Autonomic Identity Framework for the [45] N.M. Kumar, P.K. Mallick, Blockchain technology for security issues and challenges
Internet of Things, Proc. - 2017 IEEE Int. Conf. Cloud Auton. Comput. ICCAC 2017, in IoT, Procedia Comput. Sci. 132 (2018) 1815–1823.
2017, pp. 69–79.
[17] Q. Lin, H. Yan, Z. Huang, W. Chen, J. Shen, Y. Tang, An ID-based linearly

60

You might also like