Professional Documents
Culture Documents
https://doi.org/10.1007/s13369-022-07555-1
Received: 14 October 2022 / Accepted: 12 December 2022 / Published online: 24 December 2022
© King Fahd University of Petroleum & Minerals 2022
Abstract
Internet of Things (IoT)-enabled wireless surveillance systems are gaining more attention because of the robust development in
information technology. It is due to the versatile distributed application features and improved performance of the technology,
which required proper investigation. In a multimedia environment, video captured by surveillance cameras is required to be
stored (uploaded) for secure preservation for the sake of futuristics analysis, especially in multimedia forensics investigation
processes. While storing large raw video files over the network and extracting features as per needs, the systems’ provenance
with the ledger integrity, reliability, transparency, availability, immutability, and trustworthiness are the main concerns. These
highlighted challenges pose a serious issue in the domain of network transmissions, where digital forensics investigation is
applied. In addition, the limited use of multimedia resource constraints over the wireless network, such as computational
power, network bandwidth, and storage created another type of challenging aspect throughout the investigation. However, the
current lifecycle is observing the most critical in terms of consecutive duplicated video frame creation. There is a need to handle
a few objects of interest, filter the frames, and investigate them before storing them on the secure digital ledger, which also
relieves the pressure of network transmission at the same time. The real-time monitoring of the blind area (which is covered
with dark shadows) of the video also affects the frame filtering accuracy. This impacts the forensics investigation hierarchy,
investigational data management, and multimedia-enabled chain-of-custody preservation. To address such challenging issues,
this paper bridges these gaps by enabling novel and secure digital forensics investigation processes using IoT-Blockchain-
based collaborative technology. A blockchain hyperledger sawtooth-enabled secure and efficient digital multimedia forensics
investigational distributed architecture is proposed. The process connects participating stakeholders to exchange details of
the investigation, including the video surveillance pre-processed frame filtering-related chain-of-custody details by creating a
private network. And so, customized consensus protocols such as proof-of-work sawtooth policies. To design and deploy such
protocols, the system enables the analysis of the overall activities of scheduled multimedia transmission before preserving them
on the distributed ledger. For automation, smart contracts are implemented to automate ledger redundancy verification and
validation, requesting for contents of video surveillance frame filtering and maintaining immutable preservation. Substantially,
it provides a secure interaction between the investigational processes because of lifecycle tuning. Through experimental results,
the proposed solution provides better performance with robust capability to track and trace real-time video surveillance, frame
auto-filtering redundancy, and object-of-interest investigation with an increased efficiency rate of 30% and reduces resource
consumption down to 11.56%.
Keywords Blockchain · Hyperledger sawtooth · Digital forensics investigation · Internet of Things (IoT) · Wireless network ·
Multimedia technology
123
10174 Arabian Journal for Science and Engineering (2023) 48:10173–10188
123
Arabian Journal for Science and Engineering (2023) 48:10173–10188 10175
is also responsible for mitigating and incident responding dynamic data transparency, provenance, tracking, traceabil-
to such IoT-cloud surveillance-related attacks. The digital ity, immutability, and assurance for performing different
forensics process is admired as it is used to capture wire- operations (dynamic camera surveillance rotation, zoom,
less video surveillance transmitted data (sequence of frames capture-specific objects, frame filter analysis, and object-of-
and extract object-of-interest), examine, analyze, store, and interest preservation). And so, the proposed camera controls
prove facts to convict the stakeholders involved in this crime surveillance maintains trust between the IoT-enabled real-
[19, 20]. This investigation led to the process of acquisi- time automation, including the external multimedia mon-
tion of the collected data for detailed evaluation; the findings itoring devices while sending, receiving, analyzing, inter-
from this analysis of different attributes helped to further preting, and recording the surveillance (sensing) into camera
interpret the crime incident and were then documented as action (wireless network transmission). It also ensures the
the forensics law enforcement report, which the admirable privacy protection for the complete node transactions of IoT-
deposition and testimonials represented in front of the jury surveillance-to-multimedia systems stored in a blockchain
[21]. It is also critical to maintain the transparency and distributed ledger of video surveillance-related frame filter-
secrecy of the digital investigation process [22]. A digi- based and point-of-interest data in a NuCypher Threshold
tal forensics with blockchain can store surveillance-related Re-encryption private network; it helps to examine and ana-
evidence and make a proper chain-of-custody transactions lyze the surveillance-based criminal activity by applying
with an immutable digital distributed ledger preservation, process of a digital forensics investigation. The main objec-
which enables a transparent process of multimedia investi- tives and contributions of this research are as follows:
gation. The wireless multimedia surveillance-enabled events
(incidents) occurrence is preserved in a gazette chain order
connected via various transmission channels in a permis-
sioned private Sawtooth network [23], such as on-chain and • In this paper, we present a detailed design of the
off-chain. The Sawtooth business logic (digital contracts) is IoT-blockchain-enabled wireless video surveillance-based
designed to achieve secure multimedia forensics investiga- investigational processes for multimedia forensics. And
tions, which are hard to tamper with because it is protected so, the paper highlights various related issues, limitations,
with a hash (SHA-256) encrypted. In addition, these pro- and security protection challenges of the current systems
tected ledgers in terms of chain-of-evidence are stored in faced in the analytical hierarchy of examination and com-
distributed file system storage (InterPlanetary file system, putation, which is because of the unstructured lifecycle of
IPFS), which is immutable in nature [24]. The decentralized multimedia forensics.
nature of blockchain technology also enables digital foren- • A novel and secure wireless video surveillance monitoring
sics to enhance the investigational node defense ability using architecture are proposed, that aims to collect records in
cryptographic encryption, and the deployment of intrusion real-time and process this information forensically, such
detection provides prevention dynamically for wireless video as chain-of-custody. It is presented that the proposed IoT-
surveillance and related monitoring systems. The installation blockchain uses a hyperledger Sawtooth-enabled video
of anti-disclosure and firewall authentication software tools monitoring in accordance with the frame filtering, col-
creates a new paradigm in the digital investigation environ- laborative validation, and object-of-interest for digital
ment. Along with that, consensus policies and the digital investigation analysis.
signature of the hyperledger network guarantee robust secu- • In this paper, a security procedure follows to protect trans-
rity, protection, and privacy with efficient node deliverance in actions from one end to another; the system uses NuCypher
terms of immutability, integrity, transparency, and distributed Proxy Re-encryption algorithms with digital (smart) con-
node trust within the IoT-real time multimedia-related case tracts. The design and development of such contracts
under investigation [25]. support a multi-proof-of-work consensus protocol that cre-
ates a secure channel between participating stakeholders,
such as registration, video surveillance ledger transmis-
1.1 Motivation, Objectives, Contributions, sion, forensics transaction process validation/verification,
and Section Distribution and transaction updates on the private network.
• Sequence diagrams of this customized private permis-
This research paper deals with a secure and efficient sioned hyperledger Sawtooth network simulate the work-
IoT-enabled real-time video surveillance architecture, a ing operations of the proposed architecture. In addition,
blockchain hyperledger sawtooth-enabled digital forensics the authors choose this module since Hyperledger Saw-
investigation in multimedia technology. The proposed IoT- tooth is an open-source, distributed blockchain platform
blockchain video surveillance, automation transmission over employing intelligent smart contract functionality is also
the wireless network and provide proper multimedia-related highlighted.
123
10176 Arabian Journal for Science and Engineering (2023) 48:10173–10188
• For the proposed IoT-Blockchain, various implementation structure is designed. The main target is to provide the cur-
challenges and limitations rises that become open issues rent IoT-multimedia forensics investigational information
for futuristic developments are separated and discussed. integrity, transparency, confidentiality, provenance, secure
storage, and resist forgery or tampering.
Several blockchain hyperledger-forensics-based methods
The rest of the paper is structured as follows. In Sect. 2,
concentrate on specific solutions that include a combination
we discuss various IoT-blockchain hyperledger Sawtooth-
of IoT-blockchain enabled distributed technology and dig-
enabled real-time video surveillance, monitoring, and secu-
ital forensic investigation processes and strategies [37], as
rity and digital forensics secure architectures for multimedia
discussed and mentioned in Table 1. In our proposed solu-
process investigation and chain-of-custody related literature
tion, we cover the complete process of IoT-digital forensics
and requirements. In Sect. 3, the current IoT-enabled wireless
investigation, video surveillance incident-related evidence
surveillance, forensics investigation analysis, and blockchain
collection with secure preservation and tackle various partic-
private network solution for secure ledger preservation, are
ipating stakeholders at the same time. We also provide and
discussed. Section 4 proposes the IoT-blockchain hyper-
ensure the security of the distributed network and platform
ledger Sawtooth-enabled secure architecture for the wireless
authentication that handles the evidence custody and guar-
surveillance forensics investigation process. In Sect. 5, we
antees preservation in a chronologically ordered, encrypted
discuss the working operation of the proposed architec-
ledger.
ture, and IoT-blockchain implementation limitations are
presented. Finally, conclusions appear in Sect. 6.
123
Arabian Journal for Science and Engineering (2023) 48:10173–10188 10177
123
10178 Arabian Journal for Science and Engineering (2023) 48:10173–10188
Table 1 (continued)
Research method Proposed work Research Gaps References
123
Arabian Journal for Science and Engineering (2023) 48:10173–10188 10179
used blockchain hyperledger Sawtooth, a permissioned pri- variety of actions sequentially. Whereas the participating
vate network modular architecture that provides evidence stakeholders can create a request by posting a transaction on
integrity, transparency, immutability, provenance, and secure this blockchain private network.
distributed ledger storage (IPFS). The IoT-Forensics contracts are more accurate because the
program code is fixed and cannot be changed, which means
3.2 Blockchain Distributed Security and Privacy completely immutable; there is also a blockchain hyperledger
for IoT-Forensics Sawtooth consume low execution risk, reduce cost, fewer
intermediaries, is speedy, and provide real-time updates, and
This section presents the blockchain solution for IoT- support IoT-video surveillance process of investigation and
Forensics investigation that allows the decomposition and forensics infrastructure. Moreover, it provides a securely
maintain the hyperledger Sawtooth blockchain enabling real- protected storage file structure for the process of forensics
time video data applications and recording in a systematic investigation, a platform that allows preserving IoT-Forensics
manner [41]. This solution identifies the common dimensions incident evidence and investigation reports and presenting
and domain requirements based on blockchain security pro- these encrypted records in the court of law.
tection. The Sawtooth private permissioned network provides
a partially decentralized blockchain in which only partici-
pating nodes get permissioned by IoT-Forensics engineers in 4 Real-Time Video Surveillance Forensics
the consensus process, digital contracts, and nodes of busi- Investigation Architecture Enabled by IoT
ness rules. The engineer also manages the stakeholders and with Blockchain
trusted parties and the cryptographic hash encrypted storage
which is commonly shared and exchanged by permissioned The proposed architecture presents the complete IoT-
nodes of IoT-video surveillance transactions and secures the Forensics chain-of-evidence capturing hierarchy, where the
process of investigation [40, 41]. This modular architec- protection of video surveillance data in the distributed envi-
ture demonstrates the multi-chaining concept in IoT-video ronment is the main feature. Secondly, the lifecycle of
surveillance digital forensics investigation; a few crucial key individual node transactions between participating stake-
factors related to IoT-Forensics transactions and the process holders is designed, that handle processes of data records
of digital investigation are discussed as follows: (such as capturing, examining, analyzing, preserving, pre-
senting, and documenting) through a customized Sawtooth
• On-Chain: Available distributed ledgers that are visi- consensus protocol. The proposed IoT-Blockchain aims to
ble to the connected participating stakeholders on this update the incident ledger, such as case reports, evidence col-
permissioned private network. It records all IoT-video lection, judiciary decisions, etc. With the NuCypher Proxy
surveillance transactions on the node and shares them with Re-encryption, it ensures the integrity and transparency of
the entire forensics blockchain. Thus, since these transac- wireless sensors-enabled cameras’ video recording preser-
tions are irreversible and cannot be altered (immutable), vation. Whereas only IoT-Forensics Sawtooth engineers
for completing the transaction, there has to be an agreed authenticate and authorize the request of participating stake-
number of stakeholder confirmations. holders regarding the access of blockchain features, such as
• Off-Chain: These transactions are not published on the reading chain-of-evidence and reporting, accessing, trans-
main blockchain hyperledger Sawtooth permissioned pri- action updates, and submitting registration applications. It
vate network. However, the third parties (a guarantor) is possible through the proposed Distributed application
who are involved in this chain are able to choose to have (DApp), as shown in Fig. 5. In addition, Sawtooth Engineer
an agreement outside of the blockchain, and they are also manages all IoT-surveillance chain-of-evidence access
responsible for the confirmed completion of the transaction requests for approval from different stakeholders (such as
(actual transaction execution) and certifying the agree- victim, accused, investigator, enforcement agency, and court
ment. IoT-Forensics transactions can be carried out using a of law) over the proposed permissioned private network
multi-signature-based solution. This chain can be instantly which two intercommunication channels, such as on-chain
executed as compared to on-chain transactions. and off-chain. For instance, the case investigator/forensics
expert handles logs of video file storage management and
Digital contracts in blockchain hyperledger sawtooth- checks transaction redundancy and tackles the filtering video
enabled IoT-Forensics (such as reg(), addNode(), frame sequence and collaborative validation problems by
updateNodeTrans()) are made up of programable code enabling the IoT-surveillance duplication restriction and
that stores files and keeps track of account balances [42]. forensics analysis tools. Whereas the evidence is preserved
The IoT-Forensics Sawtooth engineer executes these con- in the InterPlanetary File Storage (IPFS), a distributed IoT-
tracts with the use of consensus protocols to agree upon the Forensics video surveillance evidence storage structure. The
123
10180 Arabian Journal for Science and Engineering (2023) 48:10173–10188
primary objective of this storage is to preserve case-related The other features of the proposed work in the video surveil-
transactions, recorded evidence reported and presented doc- lance environment are discussed as follows: securing incident
umentation, case trails, the court of law and settlement investigation (identification of objects of interest), maintain-
information, and judiciary decisions. ing chain-of-evidence confidentiality, integrity, transparency,
However, the proposed blockchain hyperledger Sawtooth- and availability of 24/7 with automation.
enabled a secure and protected IoT-Forensics investigation
architecture for real-time video surveillance. To do a secure 4.1 Transaction Execution and Store Distributed
investigation, the process hierarchy of incidence response to Ledger of IoT-Digital Forensics Investigation
detect suspicious activities is proposed. The lifecycle of the in Chain-of-custody
proposed investigation process is as follows: (i) capturing
data from cameras through wireless sensors, (ii) examin- Through the process of storing IoT-video surveillance-
ing, (iii) analyzing, (iv) preserving, (v) presenting, and (vi) based captured suspicious activities, records are preserved in
documenting. There is a customized Sawtooth off-chain IPFS (a distributed external blockchain hyperledger storage
communication channel designed between the stakeholders file structure) for IoT-Forensics investigation and recorded
for the sake to initiate transaction processors. This can val- chain-of-evidence traceability. These chains of evidence
idate Sawtooth node interconnectivity (Peer-to-Peer (P2P)), are exchanged only among the participating stakeholders
state, consensus, and CLI sawtooth as shown in Fig. 4. within the private permissioned network. In IoT-Forensics,
On the other side, on-chain (implicit) communication con- the IPFS distributed storage leverages high efficiency for
nects to the main sectors of IoT-Forensics real-time video forensics video frame filtering, collaborative validation, and
surveillance process. It works as a respondent, while inci- point-of-object related information record storage. This stor-
dent transactions occur in the investigation hierarchy, such age structure enables chain-of-evidence exchange, transfer,
as frame filtering. It provides integrity and transparency to track, and trace, and preserves large video surveillance and
the Sawtooth case validator throughout implicit transaction digital forensics investigation-related records with domain
deliverance. To automate the transaction of the proposed efficiency, as shown in Fig. 4. Moreover, the IPFS stored
IoT-Blockchain, we designed, developed, and deployed dif- transaction nodes are fully cryptographic hash (SHA-256)
ferent digital contracts—to ensure the registration, validity of encrypted, which is the direct way to preserve the distributed
chain-of-evidence preservation, node peering and their inter- ledger on the blockchain hyperledger Sawtooth with robust
connectivity, sawtooth customized consensus verification security. For instance, this storage does not require any stake-
protocol for deliverance and active processor of transac- holder permit to exchange records with the selected one. With
tions. However, the programming interface of the Sawtooth the implementation of the IoT-Forensics node, transactions
state transfer protocol used to retrieve the IoT-Forensics execution and the processes of digital signature, announce-
chain-of-evidence-related objects, such as video surveillance ment, service delivery, endorsing, and verification protocols
recordings and objects-of-interest in the incident reported are presented in Fig. 5.
through the wireless network. Whereas the transaction pro- The large amounts of video surveillance-based recorded
cessor helps in investigation and maintain video file records files are used to trigger through individual Sawtooth business
in the distributed ledger. While a set of commands such rule (digital contracts). The transaction execution proposal is
as IoT-Forensics process, investigation, capture, examine, sent to the P2P connected nodes in the chain to endorse digital
analysis, preserve, and report tunes through the Sawtooth contracts, they execute the endorsement, and the distributed
Command Line Interface (CLI) that interacts with blockchain ledger is successfully endorsed, as shown in Fig. 5. How-
hyperledger security protection and storage services. ever, a digital signature provides an acceptance mechanism to
The acyclic transaction nodes’ interconnectivity shares the participating stakeholders, where they can able to accept
complex validation and verification. Whereas the customized changes involved in the process of the chain of custody. And
consensus policies manage participating stakeholder trans- so, it returns to the endorser to endorse the document and
actions, where it can initiate the request of accessing as exchange it among the stakeholders after the completion of
well as execute a transaction to the approval of update the endorsement process. The peering of nodes validates the
transactions—implemented in a separate process. A trusted integrity of IoT-Forensics case transactions and aggregates
transactional execution environment is designed that enables them onto the distributed ledger. For instance, the REST API
an efficient multithreading validation processes with the executes the complete running transactions delivered through
help of proof-of-work blockchain consensus. Substantially, the hyperledger Sawtooth directly; through this REST API,
the proposed distributed ledger architecture provides high the IoT-Forensics chain-of-evidence investigation system can
security for the digital forensic investigation process in an GET (meaning current state) and POST (meaning digital con-
IoT-wireless video surveillance environment. With the strong tract) node services in the peering private network. It also
performance of blockchain increase the adaptation in future. extracted the video surveillance investigation case records
123
Arabian Journal for Science and Engineering (2023) 48:10173–10188 10181
Fig. 4 Blockchain hyperledger sawtooth enables novel and secure IoT-forensics investigation architecture for real-time video surveillance and
process of incident response
123
10182 Arabian Journal for Science and Engineering (2023) 48:10173–10188
Smart (Digital) Contract #1: Stakeholders Participation (reg()) Smart (Digital) Contract #2: Blockchain-Forensics Node
Transactions (AddNode())
Input: IoT-Real Time Video Surveillance Forensics Engineer
Initialized System Address Input: IoT-Real Time Video Surveillance Forensics Engineer
Variable: int.main(): Initialized System Address
type.file[z]; Variable: int.main():
Video-based incident evidence case registration number, type.file[z];
(caseNum); track ID,
case details, (trackID);
(caseDetails); previous court of law decision,
case chain-of-custody, access (PCoLD);
(caseCOC); current decision
case decision, (current Decision)
(caseDecision); timestamp (execute);
go timestamp(execute), update records contract (UpdateNodeTrans());
IoT-Forensics Add Node Transaction Contract Address IoT-Forensics Engineer, counter (TranCounter)
(AddNode()), IoT-Forensics Engineer authorized to set add node
transactions registration; transactions addresses
(TranReg), if int.main(): type.file[z] is IoT-Forensics Engineer
counter (TranCounter); then,
IoT-Forensics Engineer is authorized and responsible and if UpdateNodeTrans() is not Added in the digital contact
maintain a set of case transaction registration contracts; (AddNode())
if Tx.main() is true then,
then, digital contract state will change and add new case node and
if caseNum is not the digital contact their details
then, update trackID, PCoLD, currentDecision, timestamp,
digital contract state will change and add new case node and execute,
their details and
update caseNum, caseDetails, caseCOC, caseDecision, UpdateNodeTrans();
timestamp, execute, else
and Error generate then backtrack;
AddNode(); terminate;
else else
Error generate then backtrack; Error generate then backtrack;
terminate; terminate;
else
Error generate then backtrack;
terminate; (AddNode()), respectively, shown in digital contract 3 (Table
4).
created to add and execute IoT-Forensics chain-of-evidence- 5 Operations of the Proposed IoT-Real Time
related information and is used by IoT-Forensics engineers Video Surveillance Investigation
to record the details of stakeholders and permission them
according to the consensus protocol. Whereas the AddNode() 5.1 Simulations and Results
function is designed to add new transactions that occur dur-
ing the investigation process (including chain-of-evidence In this paper, we used the VIRAT-2020 temporal real-time
examine, analysis, preserve, report, generation, presentation, video surveillance public repository dataset/database. It is
court trial, and settlement) and execute updated information designed to be realistic multimedia streaming, diverse scenes,
in the UpdateNodeTrans() contract, which updates all trans- completely natural human events, and categories-based, rec-
action history with the new AddNode() related information ognized actions, and clutter background related videos. It is
and shares it among the chain stakeholders. a well-known benchmark dataset for artificial intelligence,
These contracts also record additional IoT-Forensics IoT, and multimedia-based communities. This dataset pro-
related information such as update caseNum, caseDetails, vides a wide range of temporal resolution, which is designed
caseCOC, caseDecision, update trackID, PCoLD, current- to capture these ranges with 20–200 pixels and a frame rate
Decision, update assAddress, CurrentTrans, previousTrans, of 2–30 Hz. And so, it provides both the original video with
calTrans, timestamp, and other activity execute steps. Fur- downsampled and high-definition quality [43].
thermore, the well-deployed UpdateNodeTrans() contract The simulation is executed for the temporal real-time
exchanges its updated addresses with the other contracts video surveillance stream to detect suspicious activities and
123
Arabian Journal for Science and Engineering (2023) 48:10173–10188 10183
123
10184 Arabian Journal for Science and Engineering (2023) 48:10173–10188
123
Arabian Journal for Science and Engineering (2023) 48:10173–10188 10185
123
10186 Arabian Journal for Science and Engineering (2023) 48:10173–10188
Fig. 10 Operation of validation and verification of the proposed blockchain hyperledger sawtooth-enabled IoT-forensics architecture through
sequence diagram
123
Arabian Journal for Science and Engineering (2023) 48:10173–10188 10187
Author Contributions AAK has written original draft, organization, of things (IoT) domain. In: The Internet of Things for Smart Urban
preparation, and performed part of the literature survey, edited, design Ecosystems, pp. 305–331. Springer, Cham (2019)
modular architecture, explored the software tools, with rewrote the 15. Zikria, Y.B.; Afzal, M.K.; Kim, S.W.; Marin, A.; Guizani, M.: Deep
draft after reviewed. AAS (Supervisor) and AAL (Co-Supervisor) have Learning for Intelligent IoT: Opportunities, Challenges and Solu-
reviewed, suggested, and recommended a sort of improvements in this tions (2020)
paper. All the authors of this paper read and agreed to the online version 16. Gaddipati, M.S.S.; Krishnaja, S.; Gopan, A.; Thayyil, A.G.; Devan,
of the published article. A.S.; Nair, A.: Real-time human intrusion detection for home
surveillance based on IOT. In: International Conference on Infor-
mation and Communication Technology for Intelligent Systems,
Declarations pp. 493–505. Springer, Singapore (2020)
17. Rodda, A.; Mallika, S.S.; Jaiganesh, M.; Mrunalini, M.: Suspect
Conflict of interest The authors declare no conflict of interest. detection system–an architecture based on surveillance visual ana-
lytics using IoT. Mater. Today: Proc. (2020)
18. Khan, A.A.; Laghari, A.A.; Gadekallu, T.R.; Shaikh, Z.A.; Javed,
A.R.; Rashid, M.; Estrela, V.V.; Mikhaylov, A.: A drone-based data
References management and optimization using metaheuristic algorithms and
blockchain smart contracts in a secure fog environment. Comput.
1. Panda, S.K.; Sahu, S.K.: Design of IoT-based real-time video Electr. Eng. 102, 108234 (2022)
surveillance system using raspberry Pi and sensor network. In: 19. Xu, R.; Nikouei, S.Y.; Nagothu, D.; Fitwi, A.; Chen, Y.: Blend-
Intelligent Systems, pp. 115–124. Springer, Singapore (2021) sps: a blockchain-enabled decentralized smart public safety system.
2. Liu, Y.; Kong, L.; Chen, G.; Xu, F.; Wang, Z.: Light-weight AI and Smart Cities 3(3), 928–951 (2020)
IoT collaboration for surveillance video pre-processing. J. Syst. 20. Minoli, D.; Occhiogrosso, B.: Blockchain mechanisms for IoT
Architect. 114, 101934 (2021) security. Internet of Things 1, 1–13 (2018)
3. Singh, S.; Sharma, P.K.; Yoon, B.; Shojafar, M.; Cho, G.H.; Ra, 21. Khan, P.W.; Byun, Y.C.; Park, N.: A data verification system for
I.H.: Convergence of blockchain and artificial intelligence in IoT CCTV surveillance cameras using blockchain technology in smart
network for the sustainable smart city. Sustain. Cities Soc. 63, cities. Electronics 9(3), 484 (2020)
102364 (2020) 22. Shaikh, Z.A.; Khan, A.A.; Teng, L.; Wagan, A.A.; Laghari, A.A.:
4. Raju, P.S.; Mahalingam, M.; Rajendran, R.A.: Review of intellec- BIoMT modular infrastructure: the recent challenges, issues, and
tual video surveillance through internet of things. In: The Cognitive limitations in blockchain hyperledger-enabled E-healthcare appli-
Approach in Cloud Computing and Internet of Things Technolo- cation. Wirel. Commun. Mob. Comput. 1, 1 (2022)
gies for Surveillance Tracking Systems, pp. 141–155. Academic 23. Almusaylim, Z.A.; Zaman, N.; Jung, L.T.: Proposing a data pri-
Press (2020) vacy aware protocol for roadside accident video reporting service
5. Khan, A.A.; Laghari, A.A.; Shaikh, Z.A.; Dacko-Pikiewicz, Z.; using 5G in vehicular cloud networks environment. In: 2018 4th
Kot, S.: Internet of Things (IoT) security with blockchain technol- International conference on computer and information sciences
ogy: a state-of-the-art review. IEEE Access (2022). https://doi.org/ (ICCOINS), pp. 1–5, (2018). https://doi.org/10.1109/ICCOINS.
10.1109/ACCESS.2022.3223370 2018.8510588
6. Vijeikis, R.; Raudonis, V.; Dervinis, G.: Towards automated 24. Kumar, M.S.; Vimal, S.; Jhanjhi, N.Z.; Dhanabalan, S.S.;
surveillance: a review of intelligent video surveillance. Intell. Com- Alhumyani, H.A.: Blockchain based peer to peer communication
put. 784–803 (2021) in autonomous drone operation. Energy Rep. 7, 7925–7939 (2021)
7. Zhou, Z.; Yu, H.; Shi, H.: Optimization of wireless video surveil- 25. Alamri, M.; Jhanjhi, N.Z.; Humayun, M.: Blockchain for Internet
lance system for smart campus based on internet of things. IEEE of Things (IoT) research issues challenges & future directions: a
Access 8, 136434–136448 (2020) review. Int. J. Comput. Sci. Netw. Secur 19(1), 244–258 (2019)
8. Ghosh, G.; Sood, M.; Verma, S.: Internet of Things based video 26. Guruprakash, J.; Koppu, S.: EC-ElGamal and Genetic algorithm-
surveillance systems for security applications. J. Comput. Theor. based enhancement for lightweight scalable blockchain in IoT
Nanosci. 17(6), 2582–2588 (2020) domain. IEEE Access 8, 141269–141281 (2020)
9. Khan, A.A.; Shaikh, A.A.; Cheikhrouhou, O.; Laghari, A.A.; 27. Zawali, B.; Ikuesan, R.A.; Kebande, V.R.; Furnell, S.: Realising
Rashid, M.; Shafiq, M.; Hamam, H.: IMG-forensics: multimedia- a push button modality for video-based forensics. Infrastructures
enabled information hiding investigation using convolutional neu- 6(4), 54 (2021)
ral network. IET Image Process. (2021) 28. Bourouis, S.; Alroobaea, R.; Alharbi, A.M.; Andejany, M.;
10. Zhang, J.; Xu, C.; Gao, Z.; Rodrigues, J.J.; de Albuquerque, Rubaiee, S.: Recent advances in digital multimedia tampering
V.H.C.: Industrial pervasive edge computing-based intelligence iot detection for forensics analysis. Symmetry 12(11), 1811 (2020)
for surveillance saliency detection. IEEE Trans. Industr. Inf. 17(7), 29. Li, S.; Qin, T.; Min, G.: Blockchain-based digital forensics inves-
5012–5020 (2020) tigation framework in the Internet of Things and social systems.
11. Sultana, T.; Wahid, K.A.: IoT-guard: event-driven fog-based video IEEE Trans. Comput. Soc. Syst. 6(6), 1433–1441 (2019)
surveillance system for real-time security management. IEEE 30. Ryu, J.H.; Sharma, P.K.; Jo, J.H.; Park, J.H.: A blockchain-based
Access 7, 134881–134894 (2019) decentralized efficient investigation framework for IoT digital
12. Wang, R.; Tsai, W.T.; He, J.; Liu, C.; Li, Q.; Deng, E.: A video forensics. J. Supercomput. 75(8), 4372–4387 (2019)
surveillance system based on permissioned blockchains and edge 31. Li, M.; Lal, C.; Conti, M.; Hu, D.: LEChain: a blockchain-based
computing. In: 2019 IEEE International Conference on Big Data lawful evidence management scheme for digital forensics. Fut.
and Smart Computing (BigComp), pp. 1–6. IEEE (2019) Gener. Comput. Syst. 115, 406–420 (2021)
13. Naeem, M.; Ejaz, W.; Iqbal, M.; Iqbal, F.; Anpalagan, A.; 32. Kumar, G.; Saha, R.; Lal, C.; Conti, M.: Internet-of-Forensic (IoF):
Rodrigues, J.J.: Efficient scheduling of video camera sensor net- A blockchain based digital forensics framework for IoT applica-
works for IoT systems in smart cities. Trans. Emerg. Telecommun. tions. Fut. Gener. Comput. Syst. 120, 13–25 (2021)
Technol. 31(5), e3798 (2020) 33. Stoyanova, M.; Nikoloudakis, Y.; Panagiotakis, S.; Pallis, E.;
14. Santamaria, A.F.; Raimondo, P.; Palmieri, N.; Tropea, M.; De Markakis, E.K.: A survey on the internet of things (IoT) forensics:
Rango, F.: Cooperative video-surveillance framework in internet
123
10188 Arabian Journal for Science and Engineering (2023) 48:10173–10188
challenges, approaches, and open issues. IEEE Commun. Surv. 43. Khan, A.A.; Shaikh, A.A.; Shaikh, Z.A.; Laghari, A.A.; Karim, S.:
Tutor. 22(2), 1191–1221 (2020) IPM-Model: AI and metaheuristic-enabled face recognition using
34. Akter, O.; Akther, A.; Uddin, M.A.; Islam, M.M.: Cloud foren- image partial matching for multimedia forensics investigation with
sics: challenges and blockchain based solutions. Int. J. Mod. Educ. genetic algorithm. Multimed. Tools Appl. 1, 1–17 (2022)
Comput. Sci. 10(8), 1–12 (2020) 44. Ranjith, J.; Mahantesh, K.: Blockchain-based knapsack system for
35. Velmurugadass, P.; Dhanasekaran, S.; Anand, S.S.; Vasudevan, V.: security and privacy preserving to medical data. SN Comput. Sci.
Enhancing Blockchain security in cloud computing with IoT envi- 2(4), 1–7 (2021)
ronment using ECIES and cryptography hash algorithm. Mater. 45. Khan, A.A.; Wagan, A.A.; Laghari, A.A.; Gilal, A.R.; Aziz, I.A.;
Today: Proc. 37, 2653–2659 (2021) Talpur, B.A.: BIoMT: a state-of-the-art consortium serverless net-
36. Hsu, C.L.; Chen, W.X.; Le, T.V.: An autonomous log storage man- work architecture for healthcare system using blockchain smart
agement protocol with blockchain mechanism and access control contracts. IEEE Access 10, 78887–78898 (2022)
for the Internet of Things. Sensors 20(22), 6471 (2020) 46. Liang, W.; Ji, N.: Privacy challenges of IoT-based blockchain: a
37. Lao, L.; Li, Z.; Hou, S.; Xiao, B.; Guo, S.; Yang, Y.: A survey of IoT systematic review. Clust. Comput. 1, 11–19 (2021)
applications in blockchain systems: Architecture, consensus, and 47. Shaikh, Z.A.; Khan, A.A.; Baitenova, L.; Zambinova, G.; Yegina,
traffic modeling. ACM Comput. Surv. (CSUR) 53(1), 1–32 (2020) N.; Ivolgina, N.; Laghari, A.A.; Barykin, S.E.: Blockchain hyper-
38. Kaur, R.; Ali, A.: A novel blockchain model for securing IoT based ledger with non-linear machine learning: a novel and secure
data transmission. Int. J. Grid Distrib. Comput. 14(1), 1045–1055 educational accreditation registration and distributed ledger preser-
(2021) vation architecture. Appl. Sci. 12(5), 2534 (2022)
39. Lone, A.H.; Naaz, R.: Applicability of blockchain smart contracts
in securing Internet and IoT: a systematic literature review. Comput. Springer Nature or its licensor (e.g. a society or other partner) holds
Sci. Rev. 39, 100360 (2021) exclusive rights to this article under a publishing agreement with the
40. Qatawneh, M.; Almobaideen, W.; AbuAlghanam, O.: Challenges author(s) or other rightsholder(s); author self-archiving of the accepted
of Blockchain Technology in Context Internet of Things: A Survey. manuscript version of this article is solely governed by the terms of such
Int. J. Comput. Appl. 975, 8887 (2020) publishing agreement and applicable law.
41. Oktian, Y.E.; Lee, S.G.; Lee, B.G.: Blockchain-based continued
integrity service for IoT big data management: a comprehensive
design. Electronics 9(9), 1434 (2020)
42. Atlam, H.F.; Azad, M.A.; Alzahrani, A.G.; Wills, G.: A review of
blockchain in Internet of Things and AI. Big Data Cognit. Comput.
4(4), 28 (2020)
123