You are on page 1of 25

Journal of Network and Computer Applications 181 (2021) 103050

Contents lists available at ScienceDirect

Journal of Network and Computer Applications


journal homepage: www.elsevier.com/locate/jnca

Blockchain based solutions to secure IoT: Background, integration trends


and a way forward
Shivam Saxena a, Bharat Bhushan b, *, Mohd Abdul Ahad c, **
a
Department of Computer Science and Engineering, HMR Institute of Technology and Management, New Delhi, 110036, India
b
Department of Computer Science and Engineering, School of Engineering and Technology, Sharda University, Greater Noida, Uttar Pradesh, 201310, India
c
Department of Computer Science and Engineering, School of Engineering Sciences and Technology, Jamia Hamdard, New Delhi, 110062, India

A R T I C L E I N F O A B S T R A C T

Keywords: The lack of intrinsic security technologies in the current Internet of Things (IoT) systems brings forth numerous
Internet of things security vulnerabilities and privacy risks. To this end, a distributed and decentralized technology named
Blockchain blockchain comes out as a viable solution. This paper investigates the integration trends of blockchain tech­
Security
nology with IoT and discusses the insights of this new paradigm. In particular, this paper presents a compre­
Privacy
Smart contract
hensive survey on security improvements achieved in IoT systems using blockchain and the challenges that
originate during this integration. Further, the paper highlights the most relevant blockchain based IoT appli­
cations and outlines some future research directions.

1. Introduction applications refer to the elementary renovation of business processes


that are linked to marketable functions such as insurance, banking,
Nowadays, the interest in the Internet of Things (IoT) is rising organizational processes and healthcare provision enhancement
considerably with the development of information communication (Makhdoom et al., 2019). Considering the broadening scope of IoT
which sanctions persistent, direct and automated Machine-to-Machine implementation, security and safety of the network becomes a critical
(M2M) interaction or Cyber-Physical Systems (CPSs) (Chowdhury and aspect of the IoT system, especially under constrained resources in terms
Raut, 2018; Tran-Dang and Kim, 2018). The IoT system endeavours to of power, storage and controlled nodes proficiency. Furthermore,
implement a logic which is based on computer programs to an ecosystem limited capability of operating systems, vendor-specific application in­
of things or devices, which then can be controlled or monitored by a stallations, deployment in uncontrolled open environment and limited
centralized engine (typically based on cloud computing) (Fan et al., computational capability of the end nodes are several other factors that
2020). Entities or devices in IoT are provided with a digital description contribute to this vulnerability of IoT systems (Arora et al., 2019; Goel
in the physical world. This digital ‘wrapper’ authorizes communication et al., 2019).
with Information and Communications Technology (ICT) entities which Owing to these challenges, it is necessary to rethink and funda­
are present on a private, public, hybrid cloud, on a Local Area Network mentally restructure the IoT systems (Butun et al., 2020). Currently,
(LAN), or at the ends of Wide Area Network (WAN) (Brous et al., 2020). “blockchain” has emerged as the most suitable candidate technology
IoT applications are categorized into two broad areas. The first class that promises to support a distributed and secure ecosystem for the IoT
includes various types of sensing applications, such as traffic monitoring (Bhushan et al., 2020b). Blockchain technology was first described in
(Yamada et al., 2018), power administration (Radhakrishnan and 1991 as “a cryptographically secured chain of blocks” by Haber et al.
Gopalakrishnan, 2020), Intelligent Transportation Systems (ITSs) (Haber and Stornetta, 1991). However, it received universal recognition
(Madaan et al., 2020), smart cities (Bhushan et al., 2020a), crowd­ after it was implemented as a public ledger by S. Nakamoto in a cryp­
sensing (Luo et al., 2019) and industrial automation (Hassan et al., tocurrency named Bitcoin (2018). Since then, it has received enormous
2020). Whereas, the second class deals with data analytics rather than attention from various industries including finance, agriculture, logistics
the physical aspects and characteristics of the sensors themselves. These and insurance. Owing to its ability to digitise transactions efficiently, it

* Corresponding author. 282, Metro Apartments, Jahangir Puri, New Delhi, 110033, India.
** Corresponding author.
E-mail addresses: shivamsaxena2906@gmail.com (S. Saxena), bharat_bhushan1989@yahoo.com (B. Bhushan), itsmeahad@gmail.com (M.A. Ahad).

https://doi.org/10.1016/j.jnca.2021.103050
Received 25 September 2020; Received in revised form 13 December 2020; Accepted 4 March 2021
Available online 11 March 2021
1084-8045/© 2021 Elsevier Ltd. All rights reserved.
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

contributes towards making several processes faster, leaner and more been summarized in Table 1 by considering the following 14 criterias. 1:
transparent. Blockchain can be described as a chain of cryptographically Characteristics of IoT; 2: Benefits and risks associated with IoT adoption;
linked timestamped blocks that operates as a distributed ledger whose 3: Security requirements and challenges in IoT; 4: Blockchain overview
data is shared among its peers. Therefore, blockchain is capable of and characteristics; 5: Types of blockchain; 6: Layered architecture of
solving the security issues associated with the traditional IoT systems by smart contract; 7: Blockchain transaction process; 8: Consensus mech­
leveraging a distributed and secure environment (Biswal and Bhushan, anism; 9: Need for integrating blockchain and IoT; 10: Blockchain IoT
2019; Ali et al., 2019a). Due to its decentralized, immutable, auditable integration approaches; 11: Security improvements in IoT using block­
and fault tolerant features, several researchers are making efforts to chain; 12: Challenges in IoT and blockchain integration; 13: Blockchain
eliminate the need for a central trusted authority and leverage block­ based IoT applications; 14: Future research directions.
chain to support decentralized IoT communications. The advantages Although blockchain and IoT have been extensively studied in the
associated with a blockchain based IoT systems are manifolds. Firstly, it previous works, there are limited studies that survey the conjunction of
mitigates single point of failure, promotes fault tolerance capabilities these two important areas. To fill this gap, this work surveys the state-of-
and enables end-to-end communications without involvement of a the-art blockchain technology that can be applied to the realm of IoT to
centralized server. Secondly, participants in a blockchain network can improve its security, efficiency and performance. This work presents a
verify data integrity as well as the sender’s identity. Thirdly, the tamper comprehensive survey on the recent advances in the IoT, blockchain
proof data storage capability of blockchain enables to leverage secure technology and how the IoT systems are decentralized using block­
software updates to IoT devices. Further, blockchain stores the data and chains. This survey explores recent research efforts made towards
event logs in an immutable manner thereby guaranteeing traceability solving various security challenges in the IoT, blockchain-IoT integra­
and accountability (Bhushan et al., 2020c; Wu et al., 2019a). tion schemes as well as open research directions for future work. Sum­
In recent research, numerous researchers have tried to exploit the mary of the contributions of this work are enumerated as follows.
benefits of integrating blockchain with the IoT in varied application
scenarios. Several survey articles focussed on reviewing these solutions • This work presents a brief introduction of the IoT accompanied by a
in varied degree of dept and scope. Huckle et al. (2016) highlighted the summary of major security requirements and challenges in IoT.
benefits of integrating blockchain technology and IoT for shared econ­ • This work presents an in-depth survey and explores the state-of-the-
omy applications. Similarly, Christidis et al. (Christidis and Devetsi­ art blockchain technology by highlighting its background, charac­
kiotis, 2016) highlighted the role of smart contracts and blockchain for teristics, classification, architecture and consensus mechanisms.
IoT systems. However, these works did not provide a detailed descrip­ • This work highlights the motivation behind integrating blockchain
tion of the security improvements in IoT using blockchain technology technology and IoT by exploring the achieved security improvements
and the challenges associated with this integration. In another work, in this regard.
Zheng et al. (2018) comprehensively surveyed blockchain technology in • This work comprehensively reviews the recent research efforts on
various application and technological perspectives. The work high­ blockchain based solutions for enhancing IoT security and various
lighted the architecture, consensus schemes, applications and challenges blockchain based IoT applications.
related to blockchain. Similarly, Lu et al. (Lu, 2018) presented an • Finally, in addition to highlighting the research challenges in
extensive survey on the principles of blockchain and its practical ap­ decentralizing IoT systems using blockchain technology, this work
plications in diversified sectors. However, these works failed to explore enumerates several future research directions for open IoT security
the blockchain transaction process and highlight the security improve­ problems.
ments in IoT using blockchain technology. In another work, Dai et al.
(2019) presented a detailed overview of blockchain technology and The remainder of the paper is organised as follows. Section 2
investigated its convergence with IoT. Similarly, Alladi et al. (2019) explored the background, characteristics, security challenges and re­
attempted to review existing blockchain applications in Industrial quirements of IoT. Section 3 presents an overview of the blockchain
Internet of Things (IIoT) settings and highlighted the associated industry technology, throws light on the blockchain transaction process and ex­
specific challenges. However, the work failed to highlight the ap­ plores the most popular consensus algorithms. Section 4 discusses the
proaches, security benefits and challenges associated with the integra­ integration of Blockchain and IoT highlighting its major benefits and the
tion of blockchain and IoT. In another work, Feng et al. (2019) discussed risks involved. This section further discusses in detail the various types
blockchain in detail and highlighted the related privacy issues but did of security improvements achieved in IoT systems using blockchain and
not consider the applicability of blockchain in the realm of IoT. Simi­ highlights the challenges that originate during this integration. Section 5
larly, Alotaibi et al. (Alotaibi, 2019) attempts to survey the recent outlines the IoT applications that exploit the advantage of blockchain
blockchain-based advances to overcome the cyber security challenges in technology. Section 6 presents the future research trends followed by
IoT but does not throw enough light on background, transaction process, conclusion in Section 7.
consensus algorithms and the application areas of blockchain technol­
ogy. In another work, Li et al. (2020a) investigated various types of 2. IoT background
security threats and attacks related to blockchain systems. Similarly,
Mohanta et al. (2020) highlighted the IoT architecture along with its IoT finds huge range of applications in our day-to-day life and the
enabling technology and presented an in-depth description of various internal composition of these applications includes the interaction of
security issues within the IoT system. However, these works did not end-devices and networking technologies. Heterogeneity and decen­
highlight the security benefits associated with the integration of IoT and tralization are two key features of IoT (Ren et al., 2020). Given its large
blockchain technology. In another work, Wang et al. (Sengupta et al., structure and extensively large piles of data to be analysed, decentral­
2020) highlighted the role of blockchain in Industry 4.0 and IoT. Simi­ ization property is crucial. Data is gathered, analysed and recorded in a
larly, Sengupta et al. (Wang et al., 2020a) presented a detailed decentralized approach by the IoT devices. The algorithms implemented
description of security attacks in IIoT along with the proposed coun­ in the IoT system, such as, decentralized computation algorithms and
termeasures and highlighted the importance of blockchain technology clustering algorithms in Wireless Sensor Networks (WSN), which are
towards addressing the related issues. However, the work fails to explore decentralized in nature can significantly improve the scalability and
various aspects of blockchain technology including the transaction capacity of the IoT network (Bhushan and Sahoo, 2020; Varshney et al.,
process, consensus mechanisms and challenges associated with inte­ 2019). The number of devices in the IoT network will continue to in­
grating blockchain technology and IoT. crease with a massive rate. By 2020, this number is expected to increase
A comparative study of the existing work by different authors has up to 50 billion (Georgakopoulos, 2019). Because of this expansion, the

2
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

Table 1
A comparative summary of existing related surveys.
Author (s) Year 1 2 3 4 5 6 7 8 9 10 11 12 13 14

Huckle et al. (Huckle et al., 2016) 2016 ✓ ~ ⨯ ~ ⨯ ⨯ ⨯ ⨯ ✓ ~ ✓ ⨯ ✓ ~


Christidis et al. (Christidis and Devetsikiotis, 2016) 2016 ⨯ ⨯ ⨯ ✓ ~ ~ ✓ ✓ ✓ ~ ~ ~ ⨯ ⨯
Zheng et al. (Zheng et al., 2018) 2018 ⨯ ⨯ ⨯ ✓ ✓ ⨯ ⨯ ✓ ~ ~ ~ ~ ✓ ✓
Lu et al. (Lu, 2018) 2018 ⨯ ~ ~ ✓ ✓ ⨯ ✓ ⨯ ⨯ ⨯ ~ ⨯ ~ ⨯
Dai et al. (Dai et al., 2019) 2019 ✓ ⨯ ✓ ✓ ✓ ~ ⨯ ⨯ ~ ⨯ ⨯ ⨯ ✓ ✓
Alladi et al. (Alladi et al., 2019) 2019 ~ ⨯ ⨯ ~ ⨯ ⨯ ~ ⨯ ~ ⨯ ⨯ ~ ✓ ✓
Feng et al. (Feng et al., 2019) 2019 ⨯ ⨯ ⨯ ~ ✓ ⨯ ✓ ⨯ ~ ⨯ ⨯ ⨯ ~ ~
Alotaibi et al. (Alotaibi, 2019) 2019 ✓ ✓ ✓ ~ ⨯ ⨯ ⨯ ⨯ ✓ ✓ ✓ ~ ⨯ ~
Li et al. (Li et al., 2020a) 2020 ⨯ ⨯ ⨯ ✓ ~ ~ ✓ ~ ⨯ ⨯ ~ ⨯ ⨯ ✓
Mohanta et al. (Mohanta et al., 2020) 2020 ✓ ✓ ✓ ~ ⨯ ⨯ ⨯ ⨯ ✓ ~ ~ ~ ⨯ ⨯
Wang et al. (Sengupta et al., 2020) 2020 ~ ~ ~ ✓ ⨯ ⨯ ~ ~ ~ ⨯ ⨯ ~ ✓ ~
Sengupta et al. (Wang et al., 2020a) 2020 ✓ ✓ ✓ ✓ ✓ ⨯ ⨯ ⨯ ✓ ⨯ ✓ ✓ ~ ⨯

✓ indicates that the topic has been covered in detail.


~ indicates that the topic has been partially covered.
⨯ indicates that the topic has not been covered.

IoT framework faces growing demand for volume. 2.1.2. Openness


The big data feature provided by IoT can enable the data to be made
2.1. Benefits and risks of IoT adoption [BOLD characteristics] available for general open use. Organisational transparency, waste
reduction and improvement of business processes can be done by
The impact of IoT technology can be understood by looking into the making information open to the public (Brous et al., 2019). Businesses
expected benefits and risks associated with it. Studying benefits will and citizens can be empowered by enabling consumer self-service
provide the reasons to adopt IoT whereas studying risks involved will through improved information access. IoT provides industries to
provide with an understanding of the impact of IoT adoption on different examine the real-world situations and thereby provides better
industries. The impact on the organizations refers to the impact of data decision-making ability, increased service efficiency and flexibility in
produced by the IoT network. There are three major characteristics of deriving business values.
IoT namely “Big”, “Open” and “LinkeD” (denoted as BOLD) (Dwivedi IoT relies on allowing other devices to utilize the publicly published
et al., 2016). In comparison to the traditional schemes, IoT generates data on the IoT network. However, this requires a mature set of pro­
high-quality data in substantially large volumes with enhanced accu­ tocols capable of publishing and sharing information while guaranteeing
racy, diversity and timeliness. This data is also referred to as Big Data. data accessibility. Furthermore, the challenges like scalability, real-time
The Open characteristic of IoT data refers to the fact that the data processing and search locality proves to be strong barriers in IoT
manufactured for a particular purpose can be utilized for multiple op­ adoption as the existing search mechanisms relies on remote informa­
erations aiming to achieve different goals. Linked characteristic of IoT tion sharing and fails to efficiently provide local entity search. Several
allows the combination of data from multiple sources or the combina­ regulatory and technical barriers related to data sharing, security and
tion of data from “things” (or devices) with that from traditional sources. ownership also needs to be addressed.
The expected benefits of IoT adoption along with the risks involved are
discussed in the subsections below. 2.1.3. Linked
The Linked feature of IoT can help in empowering the community by
2.1.1. Big providing consumer self-service and reduced labour costs. Fraud
Considering the diversity of IoT technology, various kinds of sensors detection and developing consumer trust can also be provided by linking
can be installed for ensuring compliance to regulations and public data from numerous sources. Besides, organizations can communicate
safety. IoT applications can offer more efficient and secure data collec­ effectively with their clients, additional service revenues can be sup­
tion process. Therefore, big data analytics can prove to be an important ported and new opportunities for interaction can be provided by the
factor in providing smart governance and aiding teamwork among insights gained from linking data from different sources. The insights
collaborating agencies (Hashem et al., 2016). Furthermore, the better collected from the processed big data can be used to improve effec­
timeliness and large volumes of data generated by IoT can improve tiveness, compliance and efficiency (Amanullah et al., 2020).
operational planning and reaction to previously unforeseen events IoT applications can be highly diverse in terms of potentials and
enhancing the performance of industries. Moreover, IoT is progressing protocols etc. Since the data is gathered from different sources, the users
in asset management domain where it is being used to monitor the of this data are also different and the applications involving linked data
quality and health of industrial assets (Kwon et al., 2016). employs various techniques to process this data. This complicates the
On the other hand, data leaks can majorly impact the privacy of design of an IoT architecture. Even though linking of data can ensure
individuals by revealing critical information such as personal financial benefits, inappropriate implementation of guidelines and lack of policies
status, health conditions, etc. Therefore, it is necessary to allow selected can prove to be a challenge in the adoption of IoT. Since skilled staff and
authorized access to manufacture or utilize data and prevent the misuse new organisational processes are needed, a shortage of skilled
of resources by unauthorized access. Although the previously unfore­ personnel, limited educational and training institutes can add to this
seen sights may be uncovered using big data, the duality of IoT can be difficulty (Brous et al., 2017).
sighted in changes to industries that are important for the conversion of The major benefits and risks associated with the aforementioned
big data into practical information while securing individual rights. The characteristics of IoT are summarized in Table 2.
quality of data is not clear and there exists no universally accepted
standard data storage architecture. High cost and risks induced due to 2.2. Security requirements in IoT
reduced return on investment is another important risk in adoption of
IoT (Wahyudi et al., 2018). Before estimating the potential security threats in the IoT system,
firstly, the associating security pre-requisites must be resolved. Re­
searchers have studied and determined the security prerequisites for IoT

3
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

Table 2
Benefits and risks of IoT adoption with respect to BOLD characteristics of IoT.
Big Data (Kwon et al., 2016; Wahyudi et al., Openness (Brous et al., 2019) Linked features (Amanullah et al., 2020; Brous et al.,
2018) 2017)

Benefits • Effective control mechanisms • Organisational transparency • Provision of consumer self-service


• Smart Governance • Waste reduction • Reduced labour costs
• Aid teamwork among collaborating • Improvement of business processes • Fraud detection
agencies. • Improved information access • Development of consumer trust
• Efficient data collection with high • Better decision making • Efficient organisation and client communication
granularity • Increased service efficiency and flexibility • Improved effectiveness, compliance and efficiency.
• Enhancement of performance of industries
Risks • Data leaks threatening confidentiality • Scalability issues • Different users and different data processing
• Duality of IoT data. • Real• time processing techniques.
• No best or standard architecture. • Failing to efficiently provide local search of entities. • IoT architecture design issues.
• Risks induced due to reduced return on • Security challenges for allowing fine-grained access for • Inappropriate implementation of guidelines and lack
investment. IoT services of policies.
• Shortage of skilled personnel
• Limited educational and training institutes

(Meneghello et al., 2019; Sinha et al., 2019). Some of the major security • Data volume: Numerous IoT applications such as smart cities and
requirements in IoT is listed below. smart grids create huge piles of critical and confidential data, which
is a probable target for the rising security risks.
• Confidentiality: It is intended to hide information from unauthorized • Privacy protection: IoT nodes comprise of sensitive data which must
malicious users and can be described using two concepts. Firstly, it not be identifiable, linkable and traceable and must be protected.
indicates that unauthorized users must not access confidential data. Privacy protection is the major concern in today’s interconnected
Secondly, it guarantees the protection of proprietary data and world as the data is steadily being processed, conveyed, collected
confidentiality. Cryptographic asymmetric and symmetric encryp­ and leveraged by huge enterprises using an array of IoT devices
tion schemes can contribute towards ensuring data confidentiality (Granjal et al., 2015).
(Leithardt et al., 2020). • Resource limitations: Owing to its constrained computation power and
• Integrity: It refers to the concept that data within IoT nodes cannot be memory, these devices do not even readily support operations of
tampered, consumed or altered by unapproved users or entities. regular security protocols such as asymmetric key encryption or
Man-in-the-middle attack (Bhushan et al., 2017) is the most other advanced privacy preserving schemes (Benkhelifa et al., 2018).
commonly launched attack that compromise data integrity by • Scalability: Generally, the IoT system involves a large number of
intercepting data in its way before it is passed on to the intended entities. Thus, confidentiality and security protection procedures
receiver. must efficiently scale throughout the network.
• Authenticity: It addresses the concerns related to origin of the infor­ • Heterogeneity: IoT connects numerous identities having varied
mation and guarantees that the data and transactions are authentic. complexity and capability. Further, these devices also differ in their
Particularly, this principle must authenticate that the individuals or release versions, technical interfaces they use and the function they
groups participating in the operation must be the ones they claim to need to perform. Therefore, the IoT protocols must support different
be. Cryptographic digital signatures had contributed towards pre­ devices under various situations and provide connection between
serving the data authenticity (Gope and Sikdar, 2019). heterogeneous network and things (Ngu et al., 2016).
• Non-repudiation: This guarantees the ability to prove that an event or • Interoperability: The development and utilization of security proced­
task has occurred, with the goal that it is not denied later. In general ures in IoT systems should not completely restrict the operational
terms, it refers to data ownership where the receiver and sender capabilities of IoT nodes. the lack of interoperability might lead to
cannot deny after having received or sent the data. major technological issues such as impossibility to develop cross
• Authorization: It refers to the provision of granting permissions to any domain IoT applications, impossibility to employ non-interoperable
user to have or perform some operation. devices within heterogeneous systems and user dissatisfaction (Aloi
• Availability: It guarantees to provision data and other network ser­ et al., 2017).
vices to authorized users at all times. This implies that the data and • Autonomous control: The conventional data systems require config­
computational power must be available when required by a service. uration from users. However, the settings must be autonomously
This ensures that the computation systems required to analyse data, established in the end-devices of the IoT networks.
the IoT nodes responsible for data capture as well as the communi­ • Attack resistant: Generally, the end-devices in IoT system are small
cation links, all of the components should function appropriately with very little or no physical armour. For example, fixed devices
(Xiong et al., 2019; Amini and Baidas, 2020). could be destroyed by natural disasters or small sensor devices or
mobile phones could be stolen (Hamad et al., 2020).

2.3. Security challenges in IoT


2.4. Security attacks in IoT
Security in IoT domain is considered as a high priority research di­
rection where interactions in the virtual world and the physical world Owing to the huge number of devices connected in IoT systems, there
may be encountered. Therefore, apart from addressing the traditional is a subsequent increase in the vulnerabilities leading to various security
networking attacks, provisions for secure communications (for both attacks in IoT. Furthermore, the lack of network access control and data
machine-to-machine and human-to-human interactions) must be encryption measures enable the adversaries to launch attacks such as
simultaneously provided by the deployed IoT protocols (Gazis, 2017; traffic analysis and eavesdropping (Kouicem et al., 2018; Bhushan and
Sinche et al., 2020). The most prominent security challenges in IoT Sahoo, 2017). The most prevalent security attacks in IoT are listed as
systems are listed as below. below.

4
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

• End Device Attacks: Adversaries seize the devices and control them authority. It is held by a decentralized Peer to Peer (P2P) network of
physically, resulting in perceptibility to the confidential data such as participants making it verifiable and auditable. Blockchain is the un­
certificates and keys. Furthermore, several malicious users may derlying technology behind Bitcoin which gained even more popularity.
pretend to be authentic nodes by utilizing the seized information and The Blockchain is a constantly increasing ledger of information records,
orchestrate other attacks (Xu et al., 2017a). called blocks, which are connected to each other and are secured using
• Communication Channel Attacks: sometimes, adversaries might cryptographic algorithms (Dinh et al., 2018). Consensus algorithm in
attempt to intercept the communication channels and obtain access blockchain ensures an unambiguous block ordering, consistency and
to the confidential data if the channel is not encrypted (Yin et al., integrity among the nodes of the chain (Wang et al., 2019a). A general
2018). The wireless channels can also be interfered or even jammed block is comprised of information related to version, parent block hash,
by these adversaries by transmitting corrupt or noisy signals. timestamp, nonce (which starts from 0 and increases every time after a
• Network Protocol Attacks: The adversaries may exploit the network hash calculation), transaction count and the combined hash of all
protocol vulnerabilities to launch huge range of attacks such as sybil transactions (Merkle root). With the generation of a new block, every
attack, blackhole attacks, wormhole attacks, reply attacks and Denial node in the network will engage in block authentication process (Salman
of Service (DoS) attack. These attacks would degrade the efficiency et al., 2019). When validated and approved, the block will be appended
and precision of protocols and the associated voting mechanisms automatically with a reference that points to its previous or parent
(Khan and Salah, 2018). block. This results in easy detection of unidentified or unauthorized
• Sensory Data Attacks: Communication in the IoT system is carried out transactions since the hash value of the mutated or falsified block will be
through ad hoc protocols, that is, the messages are communicated very much different from that of an unchanged block (Belotti et al.,
hop-by-hop until they reach their destination thus providing at­ 2019). The basic blockchain structure is depicted in Fig. 1.
tackers with the opportunities to modify data or infuse corrupt data.
Data tampering or modification is the process in which adversaries
modify the data and broadcast it to other nodes (Zha et al., 2016). 3.1. Characteristics of blockchain
Corrupt data infusion means that the adversaries transmit data across
the network with authentic identities (Xu et al., 2017b). The blockchain technology promises the highest degree of account­
• DoS Attack: A DoS attack leads to bottleneck condition and depletes ability and varied sectors are testing this innovation so that they can
resources of IoT systems so that the service is not available when utilize it for data transmission, record keeping and other backend pro­
required (Sicari et al., 2018). IoT devices have restrictions on cesses. As an un-alterable record, it progressively empowers them to
communication and network resources thus proving DoS attacks to follow documentation and confirm ownership of assets digitally. The
be disastrous. These attacks completely consume the small energy key characteristics that make blockchain a revolution for the technical
reserves of sensory nodes, degrade network interfaces, mitigate world are listed as below.
network lifespan and paralyze the complete framework (Huang
et al., 2020a). • Transparency: Generally, for public blockchain systems, such as,
• Software Attacks: A group of attacks which utilize loopholes of the Ethereum and Bitcoin, users can approach and communicate with
software to mutate and control the entire system are referred to as blockchain network with equal rights. Furthermore, each transaction
software attacks. Generally, these attacks comprise of malicious is authenticated and recorded in the distributed ledger, simulta­
scripts/virus/worms. Traditional internet security protocols, such as neously being available for all the users. Thus, data on the blockchain
Intrusion Detection Systems (IDSs) are used to overcome the soft­ is transparent to each node so as to validate the committed trans­
ware attacks (Restuccia et al., 2018). action in the blockchain (Al-Jaroodi and Mohamed, 2019a).
• Decentralization: A central agency conducts transaction validation in
3. Overview of blockchain technology traditional transaction management frameworks such as a bank thus
resulting in a performance bottleneck, costly architecture and a
In 2008, Satoshi Nakamoto presented a revolutionary concept named single point of failure. On the other hand, blockchain provides
“Bitcoin” for solving the trust issues encountered within information validation of transactions taking place between two nodes without
systems (Bitcoin, 2018). Bitcoin is a cryptocurrency that nurtures its any intervention, jurisdiction or central entity jurisdiction. There­
value without any support from a financial entity or a centralized fore, reduces the overall service cost, performance bottleneck and the
risk of single-point failure (Aderibole et al., 2020).

Fig. 1. Basic blockchain structure.

5
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

• Immutability: As blockchain structure relies on consecutively linked in public blockchain as compared to private because of less connectivity
blocks where each link is a hash of previous block’s header, any sort in the nodes (Pilkington, 2016). Bitcoin (Bitcoin GitHub implementa,
of data tampering invalidates every consequently created block. Any 2020), Ethereum (Wood and Ethereum, 2014) and Zerocash (Sasson
mutation is easily identified as even slight modification on any et al., 2014) are some of the examples of public blockchains.
transaction results in creation of a new Merkle tree data structure.
• Pseudonymity: Irrespective of the transparency within blockchain 3.2.2. Private blockchains
transactions, the system can maintain a certain level of confidenti­ Private blockchains are also known as permissioned blockchains. In
ality by creating anonymous addresses for the users. However, this category, the number of the miner nodes are limited and their
blockchain systems can only maintain the confidentiality up to a identities are known. Therefore, the participation in the transaction is
particular level as these addresses can be traced. Thus, blockchain only available to a selected number of miner nodes. Furthermore, a user
can only maintain the pseudonymity but not full confidentiality. may only have permission to access the data linked to the user himself.
• Non-Repudiation: In the blockchain transaction mechanism, each The confidentiality of user information is more in private blockchains as
node is provided with a private key. This can later be accessed and compared to public blockchains. Since, the number of nodes committing
validated by other nodes through the corresponding public key of transactions is less, the transaction speed is more thus resulting in
that node. Thus, the transactions that are signed digitally using greater transaction throughput (Andreev et al., 2018). Quorum
cryptography cannot be denied by the source node of the transaction. (JPMorgan, 2020) and Multichain (2020) are some examples of private
• Traceability: Every transaction recorded in the distributed ledger is blockchains.
also attached with a timestamp which is recorded at the time of
transaction. Thus, the origin of transactions as well as the modifi­ 3.2.3. Consortium blockchains
cations can be easily verified and traced by the users after the Consortium blockchains are also known as hybrid blockchains. They
analysis of data of blockchain with associated timestamps (Ven­ are called so as they reside between their public and private counter­
katesh et al., 2020). parts, but closer to the private form of blockchain (She et al., 2019a).
The main aim of a consortium blockchain is to handle the difficulties
3.2. Types of blockchains faced by a particular industry by scaling the effect of cooperation.
Therefore, an advantageous framework is created which includes allies
Participants can interact with blockchain either as writers or as along with business competitors. This blockchain is semi-decentralized
readers. A reader has a passive participation in the transaction process implying that it is under the supervision of specific group members
and concentrates on analysing record contents or validating the block­ (Zhang and Chen, 2019). A multi-party consensus is there in which all of
chain. On the other hand, writers participate actively in the transaction the operations are authenticated by unique predetermined nodes, not by
process and have the facility to extend the chain by using consensus everyone. The blockchain is completely managed by a particular group
protocols (Dasgupta et al., 2019; Soni and Bhushan, 2019). Blockchains but is conserved from monopoly. As soon as each node agrees, this
are classified into three categories on the basis of permissions given to control allows to establish their own instructions, modify or delete
the users for interaction with the ledger. These categories are discussed erroneous transactions, modify account balances, etc. On the other
in the subsections below. hand, the centralized structure of consortium blockchain renders it
powerless against malicious entities. Some of the specific industries
3.2.1. Public blockchains where consortium blockchain fits in place are finance, banking,
Public blockchains are also known as permission less blockchains. healthcare, insurance and logistics. Hyperledger Fabric (Hyperledger
These facilitate participation in the consensus protocols and allows GitHub implem, 2020) and Ethermint (Ethereum GitHub implement,
unrestricted usage of the main chain to any entity as reader or writer. 2020) are some examples of consortium blockchains.
Mining is mostly based on incentives so as to encourage miners to mine Table 3 presents the comparison of the aforementioned types of
blocks. Hence the transaction cost in public ledgers is more as compared blockchain on the basis of various attributes.
to private ledgers. The time taken by the transaction to complete is more

Table 3
Comparison of types of blockchain.
Attributes Public Blockchain (Pilkington, 2016; Bitcoin GitHub Private Blockchain (Andreev et al., Consortium Blockchain (She et al., 2019a; Zhang and Chen,
implementa, 2020; Wood and Ethereum, 2014; 2018; JPMorgan, 2020; Multichain, 2019; Hyperledger GitHub implem, 2020; Ethereum GitHub
Sasson et al., 2014) 2020) implement, 2020)

Framework Fully decentralized Partially decentralized Partially decentralized


Immutability Immutable Alterable Partially immutable
Traceability Fully traceable Fully traceable Partially traceable
Scalability Low High High
Flexibility Low High High
Transaction Slow Fast Fast
Speed
Throughput Less Higher Higher
Efficiency Low High High
Access Open for Read/Write May be restricted May be restricted
Security Consensus mechanism Pre-approved participants Pre-approved participants
Non-repudiation Non-refutable Refutable Partially refutable
Permission Permission less Permissioned Permissioned
Consensus Proof of Stake Ripple PBFT
Mechanism Proof Work, etc. PoA
PoET
Example Bitcoin (Bitcoin GitHub implementa, 2020), Quorum (JPMorgan, 2020) and Hyperledger Fabric (Hyperledger GitHub implem, 2020) and
Ethereum (Wood and Ethereum, 2014) and Zerocash ( Multichain (Multichain, 2020) Ethereum (Ethereum GitHub implement, 2020)
Sasson et al., 2014)

6
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

Fig. 2. Architecture of smart contracts.

3.3. Architecture of smart contract 3.3.3. Operations layer


This layer summarizes all the dynamic processes in the smart con­
On the basis of the operational mechanism of smart contracts, its tracts, including security analysis, mechanical design, updates, formal
entire lifecycle can be represented using 5 stages namely negotiation, verification, and self-destruction. This layer contributes towards safe,
development, deployment, maintenance and learning (Wang et al., efficient and precise working of smart contracts as vulnerable contracts
2019b). According to this life cycle, a structure for exploration of smart can cause massive economic damage to the community. In the
contracts comprises of a 6-layered architecture that includes infra­ perspective of smart contract’s life cycle, starting from negotiation to
structure layer, contract layer, operation layer, intelligence layer, self-destruction, the design procedures make use of incentive and in­
manifestation layer and application layer. These layers are depicted in formation theory that assist contracts to accomplish their functions
Fig. 2 and explored in the subsections below. effectively (Luu et al., 2016). Security analysis and formal verification
mechanisms are used to validate the security. Updates can be technically
3.3.1. Infrastructure layer implemented after the deployment of contracts on the blockchain.
Infrastructure layer envelops the infrastructure that supports the Self-destruction is directed to ensure network stability and high-risk
smart contracts. It comprises of the Trusted Development Environments susceptibility (Huang et al., 2019).
(TDE) which possess the development tools required for smart contract
development such as programming languages, clients, wallets, devel­ 3.3.4. Intelligence layer
opment frameworks and a trusted execution environment. Blockchain This layer provides intellect to the smart contracts by using various
provides a provision for the execution of smart contracts where the ul­ intelligence algorithms related to reasoning, perception, learning, so­
timate execution result is stored in the distributed ledger and trusted cializing and decision-making. However, the newly developed smart
data feeds. Smart contracts are executed generally in secure execution contracts will not only be relying on “if-then” declarations but will also
environments in order to assure the safety of the framework. Hence, have “what-if” type calculation, deduction and decision-making in un­
trusted data feeds are required to import real-world data in the form of identified situations. The advances in Artificial Intelligence (AI) tech­
transactions. The choice of these infrastructure components will impact nology resulted in the smart contracts to have some enhanced level of
the smart contract’s overall attributes and design pattern. intellect (Modha et al., 2011; Gupta et al., 2020a). Therefore, these
contracts are not only independent as they have abilities of task prior­
3.3.2. Contracts layer itization, selection and goal-oriented behaviours but also have civility
This layer comprises of situation-response rules, communication through cooperation, interaction and negotiation. The optimization of
criteria and contract terms. This layer captures the stationary data and contract design and operation can be achieved by providing the learning
therefore can also be considered as a static database that include rules results as a feedback to the contracts layer.
about contract communication, invocation and implementation. At the
design stage, first, all responsible parties negotiate and establish the 3.3.5. Manifestation layer
terms which may include intention agreements, business logics and legal This layer encapsulates various manifestations of smart contracts for
provisions. Then, software engineers use technologies, such as design possible applications consisting of Decentralized Applications (DApps),
pattern and algorithm design to express the contract terms into the code Decentralized Autonomous Corporations (DACs), Decentralized Auton­
of a program. Furthermore, the interaction standards (e.g., communi­ omous Societies (DASs) and Decentralized Autonomous Organizations
cation mode, access authority, etc.) should also be presented in this layer (DAOs) (What is aO? Available:, 2020). Smart Contracts that comprise of
for communication between contracts and contracts or contracts and the critical activities of network nodes are comparable to the application
users (Karamitsos et al., 2018). interfaces of the blockchain which allows blockchain to be deployed in
numerous application scenarios. For example, a variety of DApps can be

7
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

created by writing business logics, legal provisions and intention 3.4.1. Bitcoin transaction
agreements into the smart contracts. Moreover, the system built on the The main purpose of Bitcoin cryptocurrency was to enable decen­
fourth layer will progressively transform into diverse DAOs, DASs and tralized electronic cash payment system and eliminate central in­
DACs. The traditional businesses are expected to improve with the help termediaries between different parties. A bitcoin transaction deals with
of these high-level manifestations laying the foundation for the the transferring of ownership and it is initiated from the client’s bitcoin
emerging programmable society. wallet and later broadcasted throughout the network. Only if the
transaction is valid, other network nodes associate it with the block they
3.3.6. Applications layer are mining and rebroadcast the transaction. The time consumed in
The Application layer comprises of all the applications that are built including a transaction along with all other transactions is 10 min
up to the manifestation layer. For instance, Plantoid is a DAO based approximately (Valdivia et al., 2019; Decker and Wattenhofer, 2013).
application which is developed on Ethereum to accomplish a fully Unspent Transaction Output (UTXO) is the capability of the user to
aesthetic society that connects designers, artists, audiences and net­ spend the received the output amount of a transaction therefore it forms
works into an interdependent relationship, thereby liberating art from the major element of the bitcoin structure (Delgado-Segura et al., 2019).
hierarchically organized capitalist markets (Lotti, 2016). The received amount stays put as a separate entity in a bitcoin wallet and
there is no chance of mixing of coins or cash as evident in a physical
3.4. Blockchain transaction process wallet. This can be better explained using an example. Consider a sce­
nario in which bob receives two distinct amounts of $4 and $3 succes­
Transactions are small tasks stored in public records (known as sively. If this is stored in any online or physical wallet, the result returns
blocks) that are stored, implemented and executed for validation by all the sum of the two amounts that is $7. But, in a bitcoin wallet, it is stored
participants (Tschorsch and Scheuermann, 2016). In this, it is possible to as individual entities and the result shows the exact amounts of $4 and
review any previously committed transactions but their modification of $3.
any kind is not possible (Zheng et al., 2017). Blockchain transforms The overall bitcoin transaction process is depicted in Fig. 3. Suc­
Bitcoin into a censorship-resistant, borderless digital currency as it fa­ cessful miners are provided with incentives (transaction fees and block
cilitates decentralized execution of transactions within a peer-to-peer creation rewards) for validating transactions, managing transactions
global network. The major concern for traditional centralized systems and creating new blocks to be added to the existing chain (Schrijvers
such as banks is “trust”. Blockchain serves to fill this requirement quite et al., 2017). Users assign a transaction fee for the successful miners
efficiently as it is a trustless system and provides trust via functions while sending a transaction. Even though there is no header information
propagating various activities within the network (Glaser, 2017). The with respect to the transaction fee, it is achieved by sending a slightly
mining and consensus mechanism of blockchain relies heavily on lower value than the total UTXO to the recipients. Therefore, the
cryptographic hash functions thereby enhancing its capability to address transaction fee is represented by this unassigned transaction amount as
the security issues (Odwyer and Malone, 2014; Manimuthu et al., 2019). depicted in equation (1).
The hash output always remains the same for a given input and even a
InputUTXO − Output = Transaction Fees (1)
small change in input results in a significant amount of change in the
output hash. It is a one-way function as calculating the input value from Apart from the transaction data being verified and validated, miners
the known output value is not feasible thereby making this secure. also include a unique type of bitcoin transaction named “coinbase
Blockchain uses Elliptic Curve Digital Signature Algorithm (ECDSA) transaction” which can only be created by the miner and is created with
which helps to ensure that only the true possessors can spend funds every newly mined block on the network. The miners are also required
(Yuan and Wang, 2018). An attempt to make a fraudulent transaction is to send the transaction fees collected by them in this transaction. Now, it
infeasible as the signature of every transaction is of 256 bits therefore is the responsibility of other network peers to verify whether the
the adversary needs to guess 2256 cases thereby leading to their resource transaction is levelled out. The sum of transaction fees and the block
exhaustion. Apart from the sender identity verification, the transaction reward is sent to the miners who need to assign its reward while block
validity (whether the sender has enough funds to transfer) also needs to creation. Every other network node validates whether the block adheres
be checked. This can be well achieved by analysing the ledger holding to the requirements depicted in equation (2).
information about the past committed transactions. ∑ ∑
BlockOutputs ≤ BlockInputs + Block Reward (2)

Fig. 3. Bitcoin transaction process.

8
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

3.4.2. Ethereum transaction to achieve a reliable and trustful consensus in the decentralized
Similar to bitcoin that define its state in terms of UTXO, Ethereum distributed framework. The consensus mechanisms which are typically
brings forth the concept of account. The transactions in Ethereum are implemented can be categorized into two: Probabilistic and Determin­
capable of updating the account balance directly without any need to istic (Dai et al., 2019). The objective of probabilistic consensus mecha­
maintain the states as in case of bitcoin UTXO thereby allowing easy nism is to save the authenticated block and then seek the consensus. On
exchange of data, messages and values between the account resulting the other hand, the deterministic consensus mechanisms first reach the
state transactions. Ethereum basically works with two types of accounts: consensus and then save the authenticated block. Moreover, the former
Contract Account (CA) and Externally Owned Account (EOA). CA rep­ solves the discrepancy of multiple chain bifurcations by considering the
resents a Smart Contract (SC), is controlled by code and owned by pri­ longest chain whereas the later solves this challenge by performing
vate keys. Whereas, EOA interacts with the blockchain via transactions numerous communication rounds in the network overlay. Numerous
and is essentially required for participation in the Ethereum network consensus techniques have been proposed on the basis of utilization of
(Alharby and Moorsel, 2017; Hartel et al., 2019). “Ether” is the trans­ resources, attack tolerance capability, scalability and performance
ferable amount in Ethereum and its denominator is known as “Wei” (Wang et al., 2019c; Bamakan et al., 2020; Gramoli, 2020). These
(Atzei et al., 2017). Ethereum and bitcoin use several common attributes mechanisms are generalized into two main categories: voting-based and
such as transaction details, nonce and block hash. Apart from these, proof-based. In voting-based consensus techniques, voting is done
Ethereum additionally uses several fields such as smart contract’s state, among participants for the validation of each block and a minimum
fees limit and so on. number of votes are required for the block authentication based on the
Furthermore, there is a requirement of gas or crypto-fuel for any kind employed consensus mechanism. Whereas, in proof-based consensus
of action as an incentive-based model is employed by Ethereum for block techniques, few manager (called miners) are chosen who validate and
creation. In order to reduce the complexity and computation overhead, append the freshly generated blocks to the main chain. These techniques
gas is used instead of “ether” as the gas cryptocurrency is independent of mainly differ on how the miners are selected. The most popular
valuation for the computation as well as the transaction fees. The major consensus schemes are explored in the subsections below.
difference between ether and gas cryptocurrency is that the gas points
remains static with market swings. It is the responsibility of the mining 3.5.1. Proof of work (PoW)
process to compute the gas points required to execute a transaction and PoW employs rigorous computation tasks (or consensus puzzle) that
the transaction gets rejected if the specified fee (in gas points) is not the miners need to solve for the generation of a new block. The miners
sufficient. If the gas points required for the execution is available in the who solve the puzzle receives the incentive for that block. Once the PoW
account balance, the transaction is executed successfully and the is completed, the freshly generated block is appended to the chain after
remaining amount after executing is returned to the originating account. verification from the rest of the network. This verification is not a
Miners compete for block creation and the one solving the puzzle first is rigorous task and requires less effort as compared to solving the
labelled as “winner” and added to the main channel. Those solving them computational puzzle. Sometimes the blockchain may fork into different
afterwards are labelled as “ommers” and appended as side blocks of the branches due to concurrent generation of blocks which is solved by
main channel (Ritz and Zugenmaier, 2018). The overall Ethereum contemplating that the longest chain of blocks will be the one which is
transaction process is depicted in Fig. 4. valid. This provides a trust less distributed-consensus technique. It is
extremely costly for the adversary to add a corrupt block or modify the
blockchain since the remaining miners would outpace such adversaries
3.5. Consensus techniques in the process of block creation, thereby invalidating the maliciously
created block. Technically, in order to add a manipulated block to the
A major benefit of the blockchain system is the technology to vali­ chain, it is mandatory to solve the puzzle before other miner nodes. But
date the reliability and trustfulness of the block without the need of a this is too exorbitant as it requires the adversary to possess 51% of the
trusted central authority. The consensus algorithms are applied in order

Fig. 4. Ethereum transaction process.

9
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

total resources, which is practically impossible (Kiayias and Zindros, the assigned time period and the first one to finish the designated
2020). waiting time obtains leadership for validation (Intel, 2017). The PoET
consensus technique needs to ensure two important factors. Firstly, the
3.5.2. Proof of stake (PoS) participating nodes must select genuine random waiting time. Secondly,
PoS was proposed to overcome the issues of high resource wastage in it is necessary to ensure that the winner has indeed completed the
PoW. In PoS implemented systems, the blocks are said to be ‘forged’ not waiting time (Chen et al., 2017).
mined. The blockchain systems or the cryptocurrencies which are using
the PoS technique often starts by launching with PoW and later switches 3.5.6. Practical Byzantine Fault Tolerance (PBFT)
to PoS. The “forger” is selected on the basis of its stake value in each PBFT consensus mechanism is based on the method of Byzantine
block generation process. The more the wealth, the more will be the Fault Tolerance. Initially, a temporary leader is selected which is also
chance to win. In order to prevent the favouring of the wealthiest, replaced frequently. There are 3 phases in every block validation round:
several unique methods have been proposed such as Coin Age Selection pre-prepared, prepared and commit. In pre-prepared phase, a block is
(CAS) and Randomized Block Selection (RBS). The participants in CAS proposed by the leader to the rest of the nodes. In the prepared phase,
are selected on the basis of duration for which their coins have been voting is carried out and the votes of the participants are broadcasted to
stacked. The number of coins is multiplied with the number of days the the leaders. Lastly, if two-thirds of the total votes are in favour then the
coins were stacked for to calculate Coin Age. Incentives are provided by new block is appended to the blockchain. PBFT is suited for permis­
proposing an acceptable block after validation by other participants. On sioned access blockchain as it can tolerate less than 33 suspicious nodes
the other hand, RBS methods choose forgers on the basis of combination and also there is an initial filtering to select the participants for the
of the highest stake and the lowest hash value. Although PoS reduces consensus mechanism. PBFT is not scalable when the network grows
resource wastage, there is a possibility that rich goes on to get richer. (Wang et al., 2018a; Su and Vaidya, 2017).
This conflicts with the main idea of a decentralized network (Deir­
mentzoglou et al., 2019; Saleh, 2018). 3.5.7. Raft
Raft (Huang et al., 2020b) is a quick consensus technique used by R3
3.5.3. Delegated Proof of Stake (DPoS) Corda (2020) and Quorum platforms (JPMorgan, 2020). The working of
DPoS is more democratic and efficient variant of PoS in which only a Raft depends on three states namely follower, leader and candidate.
restricted number of participants (also called “witnesses”) participate in Follower is the starting state. After a predefined time, if the leader does
the block generation process (“Delegated Proof of Stake, 2020). Any not respond to the follower or the follower does not receive a signal from
participant who owns cryptocurrency is a stakeholder. These stake­ the leader it changes to the candidate state. Voting is done for the next
holders select the witnesses by voting and these witnesses are respon­ leader and the maximum voted candidate becomes the leader and all
sible for obtaining consensus in the block generation and validation other candidate returns to the follower state.
process. The voting power for the stakeholders depend on the amount of
stake of each stakeholder. Generally, each witness presents an individual 3.5.8. Proof of activity (PoA)
proposal when asking for votes. Also, the incentives collected by the PoA is a hybrid consensus mechanism which is a combination of both
witnesses are equally distributed with their respective electors. PoS and PoW (Bentov et al., 2014). Initially, the miners attempt to figure
Furthermore, if an elected witness does not work efficiently, it is out a hash function in a race to mine the new block which is similar to
expelled and replaced by another witness. The mechanism is more the PoW consensus. Nonetheless, the newly generated block would
efficient and faster as the number of validators is less (Yang et al., 2019). enclose the miner’s address and a header only. At first, there are no
However, DPoS systems are vulnerable to centralization due to the transactions in the new block. The consensus is reached by selecting a
involvement of only limited number of witnesses. group of validators according to the new block’s header to sign the new
block. Proof of stake is used to achieve this step. Although it is more
3.5.4. Proof of Importance (PoI) secure against different attacks, this approach can face higher delay
PoI is a consensus scheme proposed by NEM blockchain platform which may not be sustainable for time-restricted IoT applications (Liu
that reward those users who actively participate in the network (Proof of et al., 2019).
Importance (PoI), 2015). On the basis of its importance, each participant
is allotted a rating (also known as importance score) using mathematics 3.5.9. Leased Proof of Stake (LPoS)
from page ranking and network clustering. At higher level, the score LPoS is a consensus mechanism that operates like PoS but can be
calculation is based on 3 primary inputs: net transfers, currency vested and regarded as an improved version of PoS as it attempts to annihilate the
cluster nodes. The higher the importance score the more will be the centrality challenge associated with PoS consensus. This mechanism
chance to append a new block. POI solves two major issues prevalent in empowers the participants with nominal balance to engage in the
PoS. Firstly, it solves the hoarding risk as the importance score is consensus by providing an option of leasing. Leasing here means that the
designed in such a way that hoarding the coins will decrease the score wealthy participants can lease funds to the nodes with lower balance for
and spending the will increase the score. Secondly, it solves the chain a particular time interval. The amount to be leased will be kept by the
fork problem where participants can create blocks on either side of the wealthy nodes at the time of lease contract. However, the contract will
chain. Therefore, carrying two chains would require two transaction boost the chances of mining blocks for participants having low balance.
designs which is not easy as it is impossible to immediately create blocks As soon as the block is solved by these low balance nodes, the reward
on both the chains. will be shared with the leasing node proportionally. The LPoS consensus
makes the network more decentralized and thereby increasing the
3.5.5. Proof of elapsed time (PoET) overall network security (”Leased Proof of Stake”, 2020). Regrettably,
PoET relies on a fair lottery system to mitigate the resource wastage LPoS is not beneficial with respect to IoT, as the concept behind IoT does
and high-power consumption. It is a consensus mechanism in which not support monetary benefits which is the base for this consensus.
every possible validator node requests a safe random waiting time from
a dependable execution system installed into the computing platform. 3.5.10. Stellar
Each participant in the overall network creates a random wait time and Stellar consensus mechanism was presented by Mazieres utilizing a
goes to inactive or sleep state for that particular time. The one to wake modification of PBFT named Federated Byzantine Fault Tolerance
up first commits a new block to the blockchain, broadcasting the (FBFT) (Innerbichler and Damjanovic-Behrendt, 2018). This consensus
necessary information to the entire network. All the participants wait for mechanism implements micro-finance services on the blockchain

10
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

platform. In FBFT, participants within the intersecting groups that are the digitalization of facilities in every major sector. The implementation
capable of performing local consensus among themselves are called of IoT integrated with Cloud Computing (Munoz et al., 2018) has proved
federates (Sankar et al., 2017). This method permits anyone to partici­ to be instrumental. Similarly, blockchain has the potential to revolu­
pate in the consensus since the process is open to public and decen­ tionize the current IoT structure and the integration of both can prove to
tralized. The inherent characteristics of stellar such as low latency, low be invaluable. Blockchain can provide a reliable information
computational requirements and high throughput makes its suited for sharing-service where data is trusted and is perceptible. The security
IoT systems. level escalates automatically since the data remains immutable and
source of the data can be tracked at any time (Sethi et al., 2020).
3.5.11. Ripple
Ripple consensus mechanism is identical to Stellar as it also utilizes
4.1. Need for integration
FBFT consensus mechanism. This algorithm was suggested to decrease
the latency of blockchains (Schwartz and YoungsArthur, 2014). Every
Issues related to IoT systems (such as resource constrained end-
miner in this method uses a dependable subgroup of nodes among the
devices, heterogeneity, privacy protection and confidentiality vulnera­
larger network to establish a consensus. The nodes in the network are
bilities) can be complemented using the blockchain technology (Malik
classified into two types based on their operations. The nodes in the first
et al., 2019a; Gupta et al., 2020b). Blockchain can enhance innumerable
set are called server nodes responsible for performing the consensus. The
aspects of IoT and the integration of both these technologies yields
nodes in the second set are called client nodes which are only responsible
several potential benefits that are enumerated below.
for transferring funds. Every server node has a Unique Node List (UNL).
The participants enlisted in UNL are referred in order to reach consensus
• Enhanced security: The data generated from IoT devices can be pro­
among new transactions. If 4/5th of the total nodes in UNL are in favour
tected by blockchains as the data will be stored in the form of
of the new transaction then the consensus is established. This algorithm
encrypted and cryptographically signed transactions (Pan et al.,
can permit up to 20% malicious nodes in UNL (Zheng et al., 2017).
2017). Furthermore, the automatic software updates in IoT devices
Ripple is generally utilized for financial requirements to empower
provided by the integration of blockchain proves to be a remedy for
transactions where there are no chargebacks (Chalaemwongwan and
the vulnerable security breaches and thus improves the immunity of
Kurutach, 2018).
the entire system (Zhang et al., 2019).
• Improved interoperability: Essentially, blockchain can provide
3.5.12. Tendermint
enhanced interoperability of IoT systems by storing and modifying
Tendermint is a permissioned consensus algorithm and belongs to
IoT generated data into blockchains. Different types of IoT datasets
the group of BFT consensus mechanisms that are able to host random
are transformed, processed, mined, resized and ultimately recorded
application states (Tendermint, 2020). In the PBFT, every participant
in the decentralized distributed ledger.
has equivalent voting capability whereas in tendermint, the participants
• Autonomous interactions: Automatic interaction of IoT devices is an
have distinctive voting capabilities which directly depend on their
excellent feature which can be provided by the blockchain technol­
respective stakes. Thus, it can also be considered as a hybrid combina­
ogy. Decentralized Autonomous Corporations (DACs) (Wu et al.,
tion of PoS and PBFT. Tendermint can permit mischievous activity from
2019b) are proposed for the automation of transactions involving big
at most 33% of the overall byzantine voting power. This consensus al­
payment where there is no role for the traditional agencies. DACs are
gorithm has some serious benefits such as high scalability, high
implemented by smart contracts and work autonomously without
throughput and a very little latency. It can be moulded for IoT use cases
any human interference consequently reducing the cost. This func­
if the monetary concepts behind this process can be replaced by other
tionality could also benefit IoT applications to implement decoupled
mechanisms.
and device-agnostic applications.
Table 4 presents the comparison of different types of consensus
• Reliability: Since the information in blockchain based systems remain
protocols in terms of various parameters.
distributed over the entire network and immutable over time, the
members of the system are capable of authenticating the data and
4. Blockchain integration with IoT
have the confidence that the data is not meddled with. Blockchain
can also provide sensor data accountability and traceability.
IoT is optimizing and transforming physical procedures to convert
• Secure Code Deployment: Code can be securely and safely deployed by
them into the elements of the digital era. In this process, piles of infor­
taking benefit of immutable storage secured by blockchain. This
mation are being created that are providing knowledge and insights at
functionality can be used by IoT systems to safely update the device’s
unthinkable levels. This data helps to improve the quality of life through
software (Lin et al., 2018).

Table 4
Comparison of consensus protocols.
Consensus protocols Blockchain Scalability Latency Fault Decentralization Throughput IoT
Type Tolerance Suitability

PoW (Kiayias and Zindros, 2020) Permission less High High <25% High Low Low
PoS (Deirmentzoglou et al., 2019; Saleh, 2018) Both High Medium <50% High High Medium
DPoS (“Delegated Proof of Stake, 2020; Yang et al., 2019) Both High Medium <50% Medium High Medium
PoI (Proof of Importance (PoI), 2015) Permission less High Medium <50% High High Medium
PoET (Intel, 2017; Chen et al., 2017) Both High Low N/A Medium Medium High
PBFT (Wang et al., 2018a; Su and Vaidya, 2017) Permissioned Low Low <33% Medium High High
Raft (Huang et al., 2020b; Corda, 2020) Permissioned Low Low <50% Medium High Medium
PoA (Bentov et al., 2014; Liu et al., 2019) Permission less High Medium <50% High Low Low
LPoS (”Leased Proof of Stake”, 2020) Permission less High Medium <50% High Low Low
Stellar (Innerbichler and Damjanovic-Behrendt, 2018; Sankar Permission less High Medium Variable High High Medium
et al., 2017)
Ripple (Schwartz and YoungsArthur, 2014; Chalaemwongwan Permission less High Medium <20% High High Medium
and Kurutach, 2018)
Tendermint (Tendermint, 2020) Permissioned High Low <33% Medium High Medium

11
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

• Service Market: By making the transactions between peers possible • Site-Level: The users at a given site individually creates data that is
without central authorities, blockchain can speed up the develop­ not immediately secured. However, as soon as the data reaches the
ment of IoT system of information and service markets, where micro- local assembly point it is assimilated to a blockchain.
services can be effortlessly installed and micro-payments can be done • Device-Level: Each device has the potential as well as the forced
securely in a full-proof environment. requirement to create blockchains of data so that the data can be
• Dependability and traceability: The data residing in the blockchain can immediately secured.
be identified and validated wherever and whenever the user wants.
All of the transactions recorded on the blockchain are traceable. When integrating blockchain and IoT, it is critical to decide where
Wang et al. (2019d) developed a product traceability network based the communication in the IoT infrastructure will take place. This
on the blockchain system which ensures the availability of product communication is classified into three different categories as shown in
tracing services to suppliers and retailers. The immutability feature Fig. 5 and listed below.
of blockchain also provides the dependability of IoT data as it is
nearly impossible to modify or alter the data recorded on the system. • IoT-IoT: In this approach, the IoT communication takes place with no
use of blockchain. This scheme operates by storing only a small
4.2. Levels and approaches of integration amount of IoT data in the blockchain. Discovery and routing mech­
anisms are required for devices to be able to communicate
The core characteristics of blockchain such as P2P network partici­ throughout the network. This could be the quickest approach in
pation, endorsing peer functionality and PoW, committing enhances the terms of security and latency.
overall complexity of the network. Therefore, it is not always efficient to • IoT-Blockchain: IoT-Blockchain approach confirms that the important
implement a mature blockchain-secured network in an IoT ecosystem. transactions are traceable as their particulars are stored in the
However, certain applications like smart grids, smart contracts, e-health blockchain. It enhances the independence of IoT devices. There is an
systems and transportations systems might have enough facilities to immutable record of interactions as all the interactions are recorded
assist the required P2P functionality. The employment of above- in the blockchain. This can result in increased data and high band­
mentioned functionalities in generic IoT devices is a challenge due to width requirement which itself is a challenge.
the restraints in storage and computing ability of devices. Thus, the • Hybrid Approach: Here a part of the data and interactions is stored in
blockchain mechanisms may have to be installed in particular elements the blockchain and the remainder data is directly shared between the
of the IoT network (Minoli and Occhiogrosso, 2018). Another scheme devices. Fog computing and cloud computing could play a major role
would be to use a basic decentralized ledger in which blocks are signed in complementing the drawbacks of IoT and blockchain. A major
digitally along the way. Different levels of blockchain IoT integration are challenge here would be to choose which data should be stored in the
listed as follows. blockchain.

• End-to-End Blockchains: The source miner creates the first block that Despite the rapid development of blockchain technology, it is
holds the transaction data. Other elements or miners in the network meaningless to implement it in situations where current data structures
then append the newly mined blocks in the blockchain as the data are sufficient. Depending upon the requirements of the application it can
flows through the framework to its final stage. be decided when it is worth to use blockchain. For example, it may not
• Analytics or Storage-Level: It is also similar to an end-to-end block­ be efficient to use blockchain only when high performance is required,
chain. However, the transaction is ‘exhausted’ at the analytics stage, but a hybrid approach can be implemented for the same to achieve the
where the information is extracted and utilized for further desired functionality. Still, loads of investigation and research is
processing. required for a global, real-time implementation of IoT objects as
• Gateway-Level: The data created by individual users is not immedi­ blockchain elements.
ately protected. As soon as the data reaches a gateway, it is combined
up and stored in a blockchain along with the data from other devices.

Fig. 5. Blockchain-IoT integration approaches.

12
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

4.3. Security improvements in IoT using blockchain 4.3.2. Data integrity management through blockchain
It is nearly impossible to create invalid blocks, alter records or hide
With more and more physical devices joining the Internet, the system transactions previously stored in the blockchain architecture because of
vulnerabilities expand exponentially producing numerous complex se­ the decentralized distributed consensus mechanism. Thus, it is required
curity insinuations. In IoT systems, end-devices are at a high risk of at­ to decentralize IoT using blockchain since the features of blockchain
tacks such as Distributed Denial-of-Service (DDoS), eavesdropping, mitigate the data integrity threats. Dorri et al. (2017) proposed a
message fabrication, blackhole and MITM attacks (Bhattacharjya et al., multi-level blockchain based framework to store piles of IoT data and
2018; Rathi et al., 2020; Miloslavskaya and Tolstoy, 2018). As observed maintain an unalterable record of datasets in the cloud. Liu et al. (2017)
in botnet attacks (Kolias et al., 2017), a group of malicious devices or highlighted a blockchain based data integrity policy where integrity
nodes can attack collectively to demolish the entire IoT service frame­ verification can be performed without the need of third-party authen­
work. Moreover, a central point of failure within a centralized archi­ tication on the basis of queries. The proposed scheme relies on query
tecture not only risks accessibility but also risks authorization and issuing and data verification in order to find any data integrity loss. Yang
privacy (Sicari et al., 2017). Currently, security measures implemented et al. (2017) projected a credibility assessment technique based on
in the IoT network are centralized, comprising of third-party agencies. A blockchain for Internet of Vehicles (IoV). A reputation system based on
blockchain-based IoT framework is less vulnerable to falsified validation blockchain is proposed which resolves the credibility of the information
since the transaction issuing devices have their own blockchain ad­ obtained depending upon the reputation of the source transmitter. Also,
dresses. The consensus mechanisms implemented in public blockchain the application of blockchain for secure firmware update of IoT end
systems provide prevention of DDoS attacks by imposing a fee for every devices is gaining research attention. In another work, Boudguiga et al.
transaction (Halpin and Piekarska, 2017). Therefore, the IoT security (2017) stated the use of consortium blockchains to record firmware
measures can be improved by implementing blockchain in the system. updates inside the transactions, making IoT devices obtain updates in a
Utilizing blockchains for security policy prosecution and maintaining an safe, peer-to-peer environment. In another work, Hammi et al. (2018)
openly inspectable ledger of IoT interactions, exclusive of the proposed “bubbles of trust” to ensure a robust authentication and
third-party security dependence, can be extremely advantageous to the identification of devices. The proposed approach facilitates the creation
IoT network. Various types of blockchain based security improvements of secure virtual zones named bubbles for the devices to trust and
achieved in an IoT system is explored in the subsections below. identify each other. Chen et al. (2018a) employed blockchain based
stochastic scheme that distributes the load over IoT edge nodes by
4.3.1. Access control provision of blockchain limiting the number of cooperative nodes. Altulyan et al. (2019)
Many researchers have shown that enforcement of access control addressed the issue of data integrity from an end-to-end perspective and
policies using Blockchain in the IoT network has the potential to proposed a holistic framework relying on three concepts, namely,
improve the overall network security. Zhang et al. (Zhang and Wen, blockchain, fog computing and secret sharing. In another work, Wei
2016) proposed a token-based approach in developing a blockchain et al. (2020) proposed a distributed virtual machine model to ensure
supported e-business model where participants can buy access permis­ data trust verification by enabling cooperation among multi-tenants.
sions for a temporary period using custom cryptocurrencies. Axon et al. Jamil et al. (2020) proposed a hyperledger fabric based novel patient
(Axon and Goldsmith, 2017) proposed a multi-layer blockchain frame­ monitoring platform that provide patients with global access to immu­
work where data storage and access control are handled by different table and extensive medical information. The proposed scheme out­
layers. The first layer is a decentralized data record based on blockchain performed the traditional scheme in terms of resource utilization,
for storing IoT data along with their respective blockchain addresses. transaction latency and transactions per second.
The second layer handles a stream of messages to provide a discussion of
access decisions among different parties. The final layer has access 4.3.3. Privacy guarantee through blockchains
control operations for different individuals with different roles. In The inherent addressing feature of the blockchain comprising of
another work, Ouaddah et al. (2016) analysed another approach for public and private keys provide built-in validation and privacy features
access control based on tokens where different roles are assigned to users to the blockchain applications. Aitzhan et al. (Aitzhan and Svetinovic,
and access control protocols. In another work, Ali et al. (2017) suggested 2018) studied a privacy solution for smart grids focussed on hiding the
an idea where access policies were coded into the blockchain to main­ identity of the energy producers. This proposed scheme does not intend
tain access permissions. This helps in keeping an eye on malicious ac­ to completely decentralize the environment as Distribution System
tivities and prevents the wastage of overall transaction fees. Shafagh Operators (DSOs) are used to maintain the security of producers as
et al. (2017) presented a blockchain based access control solution for autonomous mediators. In another work, Cha et al. (2018) employed
data recorded in a Decentralized Hash Table (DHT). The DHT nodes Ethereum blockchain to manage privacy among different IoT gateways
identify the blockchain data to make decisions for access control. Dagher that maintain Bluetooth Low Energy (BLE) devices such as smart factory
et al. (2018) proposed a blockchain based framework that facilitates an tools and wearables. The interaction among these gateways are carried
efficient, interoperable and secure access to medical records by patients, out via smart contracts and remain confidential under signatures based
providers and third party. Ding et al. (2019) proposed to simplify the on blockchain. Similarly, Ali et al. (Chakraborty et al., 2018a) proposed
access management using an attribute-based access control technique. a technique where access control negotiations are maintained in the
Blockchain is employed to record the distribution of attributes and header of the blockchain where off-chain data is stored using Inter
thereby prevent data tampering and single point of failure. Lyu et al. Planetary File System (IPFS). A key is provided to access the file every
(2020) proposed a blockchain based access control scheme to enable the time a request is granted which guarantees data privacy. Hassan et al.
provider to share, audit and revocate his content securely. Bera et al. (2019) discussed the privacy issues associated with blockchain-IoT
(2020) proposed a similar framework to enable secure communication integration focussing on the daily use applications. The work discusses
among drones. Liu et al. (2020) proposed Fabric-IoT, a Hyperledger five different strategies namely differential privacy, private contract,
Fabric based access control mechanism. It implements three types of mining services, encryption and anonymization. In another work,
smart contracts namely device, policy and access. The device contract Mohanty et al. (2020) proposed a lightweight model for smart homes
implements a method to store the URL of resource data produced by that relies on three set of optimizations: distributed throughput man­
devices. Policy contract contains functions to maintain access control agement, certificateless cryptography and lightweight consensus algo­
policies for admin users. Access contract is the main code that imple­ rithm. The proposed scheme achieved enhanced performance in terms of
ments access control techniques for normal users. energy consumption and processing time. Gai et al. (2020) proposed a
novel Internet of Edge model that integrates IoT framework with

13
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

blockchain and edge computing. The proposed model is devised for a using higher-layer devices which have higher computational and storage
mountable and well-regulated IoT system that exploits the benefits of capacity. As the higher-level devices are in a blockchain framework, the
edge computing and blockchain to enable privacy-preserving. Lu et al. liveness of the proposal is guaranteed. Iftekhar et al. (2020) integrated
(2020) utilized blockchain to empower a secure data sharing platform the existing conventional food tracking infrastructure with the enter­
for distributed parties. The data sharing problem is formulated into a prise ready blockchain platform named Hyperledger Fabric. The trans­
machine learning problem with the help of privacy preserved federated action records remain secured and accessible to the stakeholders based
learning model. The achieved results show that the proposed scheme on the agreed set of policies. Ozyilmaz et al. (Ozyilmaz and Yurdakul,
enhanced security, accuracy and efficiency. 2019) proposed a standardized IoT infrastructure that is resistant and
fault tolerant to DDoS attacks. The proposed system uses Ethereum
4.3.4. IoT availability improvement through blockchain blockchain, a distributed data storage platform named ‘Swarm’ and an
The inherent properties of blockchain such as decentralization im­ emerging network technology named ‘LoRa’. The proposed system
proves the service availability in the IoT system. The on-chain data minimized security risks and ensured high availability.
storage solution has built-in availability features whereas in the off- The afore discussed blockchain based security improvements ach­
chain storage solution the availability depends on the mechanism used ieved in an IoT systems are summarized in Table 5.
to store data. Bahga et al. (Bahga and Madisetti, 2016) created a smart
factory and manufacturing units based on blockchain where
manufacturing commands can be issued directly to the machines. In 4.4. Challenges in IoT and blockchain integration
another work, Charaborty et al. (Chakraborty et al., 2018b) demon­
strated a multilevel blockchain platform to counter the security issues in Apart from numerous improvements, there also exists several chal­
resource-restricted IoT nodes. The end-nodes interact with each other lenges that are encountered when integrating IoT domain and block­
chain technology. Some of the major challenges faced in this integration

Table 5
Security improvements in IoT using blockchain.
Security improvements Reference Year Contribution

Access control provision of Zhang et al. (Zhang and Wen, 2016 Token-based access permissions for off-chain records
blockchain 2016)
Axon et al. (Axon and Goldsmith, 2017 PKI system based on multi-layer blockchain framework
2017)
Ouaddah et al. (Ouaddah et al., 2017 Token-based access control strategy for assigning varied roles to the users.
2016)
Ali et al. (Ali et al., 2017) 2017 Policies for access control coded in smart contracts for IPFS files
Shafagh et al. (Shafagh et al., 2017 Access permission coded in smart contracts for data stored in DHT
2017)
Dagher et al. (Dagher et al., 2018) 2018 Blockchain based framework to enable efficient, interoperable and secured access to medical
records
Ding et al. (Ding et al., 2019) 2019 Simplify the access management using an attribute-based access control technique
Lyu et al. (Lyu et al., 2020) 2020 Access control scheme to enable the provider to securely share, audit and revocate
Bera et al. (Bera et al., 2020) 2020 Enable secure communication among drones
Liu et al. (Liu et al., 2020) 2020 Hyperledger Fabric based access control mechanism
Data integrity management Dorri et al. (Dorri et al., 2017) 2017 Cloud-based data records maintained by multilevel blockchains
through blockchain Liu et al. (Liu et al., 2017) 2017 Blockchain based data integrity policy that relies on query issuing and data verification
Yang et al. (Yang et al., 2017) 2017 Incoming command credibility reputation system based on blockchain
Boudguiga et al. (Boudguiga 2017 Consortium blockchains to record firmware updates inside the transactions
et al., 2017)
Hammi et al. (Hammi et al., 2018 “Bubbles of trust” to ensure a robust authentication and identification of devices
2018)
Chen et al. (Chen et al., 2018a) 2018 Blockchain based stochastic scheme that distributes the load over IoT edge nodes
Altulyan et al. (Altulyan et al., 2019 A holistic framework relying on three concepts, namely, blockchain, fog computing and secret
2019) sharing
Wei et al. (Wei et al., 2020) 2020 Distributed virtual machine model to ensure data trust verification by enabling cooperation
among multi-tenants
Jamil et al. (Jamil et al., 2020) 2020 Hyperledger fabric based novel patient monitoring platform that provide patients with global
access to immutable and extensive medical information
Privacy guarantee through Aitzhan et al. (Aitzhan and 2018 Privacy solution for smart grids focussed on hiding the identity of the energy producers
blockchains Svetinovic, 2018)
Cha et al. (Cha et al., 2018) 2018 Ethereum blockchain to manage privacy among different IoT gateways
Ali et al. (Chakraborty et al., 2018 Access control negotiations are maintained in the header of the blockchain
2018a)
Hassan et al. (Hassan et al., 2019) 2019 Privacy issues associated with blockchain-IoT integration focussing on the daily use applications
Mohanty et al. (Mohanty et al., 2020 Lightweight model for smart homes
2020)
Gai et al. (Gai et al., 2020) 2020 Internet of Edge model that integrates IoT framework with blockchain and edge computing
Lu et al. (Lu et al., 2020) 2020 Blockchain to empower a secure data sharing platform for distributed parties
Availability improvement through Bahga et al. (Bahga and Madisetti, 2016 Blockchain based smart factory and manufacturing units
blockchain 2016)
Charaborty et al. (Chakraborty 2018 Multilevel blockchain platform to counter the security issues in resource-restricted IoT nodes
et al., 2018b)
Iftekhar et al. (Iftekhar et al., 2020 Food tracking infrastructure with the enterprise ready blockchain platform named Hyperledger
2020) Fabric
Ozyilmaz et al. (Ozyilmaz and 2020 Standardized IoT infrastructure that is resistant and fault tolerant to DDoS attacks
Yurdakul, 2019)

14
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

are explored in the subsections below. 4.4.5. Data privacy and anonymity
Numerous IoT applications work with private data therefore, it is
4.4.1. Security necessary to consider data anonymity and confidentiality. The problems
Several research works have labelled blockchain as a major of data privacy introduce greater complexity in the blockchain itself as it
requirement for the much-needed security enhancement in IoT. Never­ starts from the data assortment stage and extends to the communication
theless, a major challenge in the blockchain-IoT integration is the and application stage (Choo et al., 2020). It is a major challenge to
trustworthiness of the information generated by the IoT devices. Even secure the devices, since it entails the implementation of cryptographic
though, blockchain provides data immutability and transaction valida­ software into the devices. The limitation of computation resources and
tion but once the corrupted data enters, it will reside within the block­ restriction to economic viability should also be taken into account. IoT
chain. Also, there are various risks such as rejection of services, MITM device constraints often make it essential to secure communication using
and eavesdropping (Neshenko et al., 2019). The devices are prone to be encryption standards such as Transport Layer Security (TLS), Secure
attacked or hacked preventing them from working over the security Sockets Layer (SSL) and Internet Protocol Security (IPSec). Trust is also a
breaches or possible bugs. The Blockchain-IoT combination can have major aspect of IoT where blockchain implementation can play a vital
serious consequences on the communication of IoT devices. At present, role.
the IoT application protocols like MQTT (Messaging Queuing Telemetry
Transport) and CoAP (Constrained Application Protocol) use the safety 4.4.6. Legislative issues
protocols such as DTLS (Datagram Transport Layer Security) or TLS Blockchains, especially with respect to cryptocurrencies, has brought
(Transport Layer Security) to provide communication (Quincozes et al., with it a lot of controversy regarding authenticity. A country’s laws and
2019). However, these schemes are heavy, complex and require su­ regulations about data privacy also affect the IoT domain, for example,
premacy of key organisation. the data protection directive. With the emergence of new technologies,
majority of these laws are now becoming obsolete and are needed to be
4.4.2. Consensus revised. The development of new standards and rules can degrade the
The resource constrained nature of IoT devices make them incom­ security features of devices. In this way it can help towards building the
patible for solving consensus algorithms, such as PoW, directly. As most trusted and secure IoT network. Therefore, the laws of different
mentioned, there are a lot of suggestions for consensus mechanisms, countries regarding information handling and information security
though they are, generally unformed and are not tested much. Even proves to be a big challenge in tackling IoT. The issue even deteriorates
though there are certain proposals to incorporate full blockchain nodes when combined with blockchain (Novak, 2019; Gürkaynak et al., 2018).
into the IoT objects, mining is yet a major challenge in IoT. In Babelchain The aforementioned challenges associated with IoT and blockchain
(Alaslani et al., 2019), a consensus algorithm known as Proof of Un­ integration are summarized in Table 6.
derstanding is suggested to target the implementation of PoW. The
protocol, rather than making miners to compute hash algorithms, ad­ 5. Blockchain based IoT applications
vises conversion from various other protocols with less energy
consumption. Developers and researchers around the world are innovating inge­
nious ways to integrate blockchain in IoT systems (Alfandi et al., 2020;
4.4.3. Storage capability and scalability Wang et al., 2019e). These use cases focus on taking benefits from the
Scalability and storage capability of blockchains are still under inherent features of blockchain such as immutability, fault tolerance,
debate, but with respect to IoT, these inadequacies make the imple­ capability to run smart contracts, cryptographic security, decentralized
mentation of blockchain in IoT a much greater challenge. In the IoT
system, this drawback can prove to be an enormous obstacle to its Table 6
combination with blockchain. Moreover, blockchain was not created to Challenges associated with IoT and blockchain integration.
record huge data sets such as those generated from the devices in the IoT
Areas Challenges
framework. These challenges should be addressed before integrating
Security (Neshenko et al., 2019; • If corrupted data enters the chain, it will
blockchain with IoT. At present, a lot of data gathered from the devices
Quincozes et al., 2019) always reside
is stored and a small part is used for generalizing actions and extracting • Risks rejection of services, MITM and
knowledge. Theoretically, various techniques to compress, normalize eavesdropping
and filter data have been proposed. Data compression can improve • Resource constrained devices are prone to
computing tasks, transmission and storing large volumes of IoT gener­ be attacked or hacked
Consensus (Alaslani et al., 2019) • Devices are incompatible for solving
ated data (Qi et al., 2020; Mangia et al., 2019).
complex puzzle or consensus algorithms
• Mining is a major challenge in IoT
4.4.4. Smart contracts Storage capability and scalability (Qi • Large amount of generated data
Smart contracts can prove to be beneficial for IoT but there are et al., 2020; Mangia et al., 2019) • Need for techniques to compress,
numerous ways in which the smart contracts can be implemented in the normalize and filter data
Smart contracts (Rouhani and Deters, • Validation and verification of smart
IoT framework. Smart contracts can ensure a dependable and safe pro­ 2019) contracts.
cessing engine. These contracts or codes can safely replicate the concept • Retrieving data from different sources can
behind IoT applications, although certain challenges are there which overburden the contracts.
should be referred to beforehand. Since the IoT structure may get un­ • Resources to perform a large amount of
processing are not shared
stable at times, validating and verifying these contracts could be
Data privacy and anonymity (Choo • Problems of data privacy introduce
compromised. Retrieving data from different sources could further et al., 2020) greater complexity in the blockchain itself
overburden the contracts. Even though the smart contracts are decen­ • Major challenge to secure the devices.
tralized and distributive, the resources to perform a large amount of • The limitation of computation resources
processing are not shared as the execution of the contract code takes and restriction to economic viability.
• Laws will need to be updated to wrap new
place in every node simultaneously. Smart contracts must support group models
mechanisms and filtering to address the requirements of IoT (Rouhani Legislative Issues (Novak, 2019; • Country’s laws and regulations about data
and Deters, 2019). Gürkaynak et al., 2018) privacy
• Majority of these laws are obsolete and
needs to be revised.

15
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

control, data integrity and authentication. It is evident that some of the trust (Wamba and Queiroz, 2020; Duan et al., 2020).
applications use patented blockchains developed for their particular
needs rather than using open source blockchains like Ethereum and 5.3. Impact on business models
Hyperledger. Various types of blockchain based IoT applications are
explored in the subsections below. Blockchain promotes the growth of entirely new businesses and can
contribute towards shutdown of traditional incumbents. Zhang et al.
5.1. Blockchain-based smart home (Zhang and Wen, 2016) offered a blockchain based decentralized elec­
tronic business model aimed to distribute smart properties and paid data
Dorri et al. (2017) proposed a lightweight, secure and private such as a parking space, automobiles, commodities, fuel and online
infrastructure of a blockchain-based smart home application which is shopping. The proposed model relies on the idea of the Decentralized
centrally managed by its owner and the miners provide a distributed key Autonomous Corporations (DACs) which is automated by smart con­
to the interacting devices as per the scheme provided by the user. This tracts without any human involvement. The DAC model can be imple­
policy ensures controlled IoT data access as well as guarantees avail­ mented for every sensor or device to exchange its paid information for
ability, confidentiality and integrity. However, the Cluster Heads (CHs), some services like software upgradation, power and additional modules.
the cloud storage and the Home-Minister in this scheme provide a single Burer et al. (Bürer et al., 2019) considered the drivers for use cases of
point of failure at the corresponding layer. Furthermore, in the proposed blockchain in energy industry and explored the role of blockchain for
scheme, it is the responsibility of the CH to decide whether to reject a sustainability. Lizcano et al. (2019) evaluated the benefits of blockchain
block or retain it. In another work, Qashlan et al. (2019) proposed technology to manage transactions of competencies, teaching and con­
Ethereum based private blockchain implementation for smart homes tent to eliminate the existing gap between the working world and aca­
where the owner can monitor and access the home appliances. Shi et al. demic world. In another work, Schneider et al. (2020) developed a
(She et al., 2019b) proposed a homomorphic encryption-based data theoretical framework to analyse blockchain implications on value
structure to record the transactions of a smart home and at the same time creation. The framework shows that the blockchain technology serves as
protect customer privacy. Lin et al. (2020a) constructed a novel safe an agent, a capability, and a resource to its users. Therefore, it con­
mutual verification system, which can be implemented in smart homes. tributes to the emergence, enablement and efficiency gains in various
The researchers described the security and privacy constraints, business models and business ecosystems. Prybila et al. (2020) proposed
including anonymity, traceability, and confidentiality that the proposed a bitcoin-based business process management system for seamless
system fulfils. Afzal et al. (2020) presented a decentralized demand side verification and execution monitoring of choreographies and at the same
management system for numerous smart homes in community micro­ time preserving independence and anonymity of the participants.
grid. The proposed system is integrated with the IoT smart meter and
energy consumption game is planned for decreasing the electricity cost. 5.4. Security for smart cities

5.2. Supply chain management Conventionally, problems related to complications in distributing


data retrieved from heterogeneous devices and implementing to deliver
To ensure a product’s transparency and authenticity in its overall cross-functionality are faced due to unavailability of a general standard
supply chain cycle, blockchain is an ideal platform. It helps to maintain a for devices. Biswas et al. (Biswas and Muthukkumarasamy, 2016) pre­
formal registry that tracks the origin and the modifications in the sented a secure communication framework among smart cities, based on
products in the supply chain. In a supply chain, the sensor framework, blockchain. Authors claimed that the implementation of blockchain to
linking storage coolers and cargo trucks can be connected to the digital the nodes in the smart city will ensure a distributed platform where all of
ledger in order to keep the track of the location of the product. A Global the devices would be able to interact safely. Also, data integrity and data
Digital Ledger based on IBM Bluemix (Bluemix is nowloud:, 2017) is availability attacks will also be prevented using blockchain. It also
launched by Everledger to certify the diamonds digitally and to provides an immutable ledger of transactions, that can be later used for
contribute in the avoiding of frauds. Complete information is stored by auditing. In another work, Rahman et al. (2019) utilized spatio-temporal
the ledger including transaction history and ownership. The organisa­ smart contracts to design a secure infrastructure for economy sharing in
tion claims that it uses a hybrid blockchain replica in order to exploit the mega smart cities. Yetis et al. (Yetis and Sahingoz, 2019) utilized the
benefit of permission-controlled access. Malik et al. (2019b) proposed distributed blockchain node structure with blocks to design a device
TrustChain, a three-layered consortium blockchain based trust man­ authorization system. In another work, Sabrina et al. (Sabrina, 2019)
agement framework to trace communications among supply chain par­ proposed an access control model for assigning resources in a large scale
ticipants. In another work, Botcha et al. (2019) utilized the concept of IoT system such as smart cities. Access control for external users are
blockchain and IoT edge devices to enhance traceability in pharma achieved by using public blockchain and smart contracts whereas access
supply chains. Vaio et al. (Vaio and Varriale, 2020) investigated the control for internal users are achieved using local off-chain storage. In
implications of blockchain considering the decision-making process in a another work, Hakak et al. (Makhdoom et al., 2020) presented a
supply chain. Italian airport used a blockchain based collaborative blockchain based conceptual framework for securing smart cities.
decision-making platform that promotes cooperation between the air Makhdoom et al. (Hakak et al., 2020) proposed a blockchain based se­
traffic controllers and the aviation industry. Liu et al. (Liu and Li, 2020) curity framework named “PrivySharing” to enable secure IoT data
proposed a blockchain based product information traceability frame­ sharing within a smart city. In order to achieve data privacy, blockchain
work to achieve effective tag verification in cross border e-commerce is divided into channels having specific type of data from finite number
supply chain. In another work, Yadav et al. (Yadav and Singh, 2020) of authorized organizations. In addition to this, the data within these
proposed to integrate blockchain technology and supply chains to ach­ channels are further secured and isolated by using encryption and pri­
ieve sustainability. Despite having practical implementation of block­ vate data collection respectively.
chain in supply chain management, there are still issues of implementing
blockchain. Also, there are doubts regarding the condition and situation 5.5. Vehicular ad-hoc networks (VANETS)
of a product in shipment to the customer which is presently done by a
sensing device or a human manually. Since no other node knows the Conventionally, VANETS are managed by a centralized working
current state of the product, despite the one broadcasting it, there must authority. There are many limitations to this arrangement such as ex­
be a component of reliability, such that its input is accepted in the istence of a single point of failure and restrcited user privacy due to
ledger. The complete supply chain can be compromised if there is no centralized management. Leiding et al. (2016) proposed an Ethereum

16
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

Table 7
Blockchain based IoT applications.
Application Reference Year Contribution

Blockchain-based Dorri et al. (Dorri et al., 2017) 2017 Blockchain-based lightweight, secure and private infrastructure
smart home Qashlan et al. (Qashlan et al., 2019) 2019 Ethereum based private blockchain implementation
Shi et al. (She et al., 2019b) 2019 Homomorphic encryption-based data structure to record the transactions
Lin et al. (Lin et al., 2020a) 2020 Safe mutual verification system
Afzal et al. (Afzal et al., 2020) 2020 Decentralized demand side management system for smart homes in community microgrid.
Supply Chain Malik et al. (Malik et al., 2019b) 2019 Consortium blockchain based TrustChain to trace communications among supply chain participants
Management Botcha et al. (Botcha et al., 2019) 2019 Enhance traceability in Pharma supply chain
Vaio et al. (Vaio and Varriale, 2020) 2020 Collaborative decision-making platform that promotes cooperation participants
Liu et al. (Liu and Li, 2020) 2020 Blockchain based product information traceability
Yadav et al. (Yadav and Singh, 2020) 2020 Integrate blockchain technology and supply chains to achieve sustainability
Wamba et al. (Wamba and Queiroz, 2020 Bibliometric analysis on blockchain and its interplay with supply chain management
2020)
Duan et al. (Duan et al., 2020) 2020 Blockchains within food supply chain to inprove food traceability, efficiency and information
transparency
Impact on business Zhang et al. (Zhang and Wen, 2016) 2016 Blockchain based decentralized electronic business model aimed to distribute smart properties and
models paid data
Burer et al. (Bürer et al., 2019) 2019 Use cases of blockchain in energy industry for sustainability
Lizcano et al. (Lizcano et al., 2019) 2019 Blockchain technology to manage transactions of competencies, teaching and content
Schneider et al. (Schneider et al., 2020) 2020 Framework to analyse blockchain implications on value creation.
Prybila et al. (Prybila et al., 2020) 2020 Process management system for seamless verification and execution monitoring of choreographies
Security for smart Biswas et al. (Biswas and 2016 Blockchain based secure communication framework among smart cities
cities Muthukkumarasamy, 2016)
Rahman et al. (Rahman et al., 2019) 2019 Spatio-temporal services for economy sharing in mega smart cities.
Yetis et al. (Yetis and Sahingoz, 2019) 2019 Authorization system for IoT devices using the distributed blockchain node structure
Sabrina et al. (Sabrina, 2019) 2019 SRBAC model aimed to assign resource access rights
Hakak et al. (Makhdoom et al., 2020) 2020 Blockchain based conceptual framework for securing smart cities
Makhdoom et al. (Hakak et al., 2020) 2020 “PrivySharing” to enable secure IoT data sharing within a smart city.
VANETs Leiding et al. (Leiding et al., 2016) 2016 Ethereum based self-managing VANET for problem-reaction based verification
Javaid et al. (Javaid et al., 2019) 2019 Blockchain based trust less system for registering IVs.
Ali et al. (Ali et al., 2019b) 2019 Bilinear pairing based certificateless public key signature
Deng et al. (Deng and Gao, 2020) 2020 Blockchain enabled electronic payment scheme in VANETs
Luo et al. (Luo et al., 2020) 2020 Blockchain based data structure to record the trustworthiness of vehicles and provide trust-based
location privacy preserving in VANETs.
Blockchain for Xia et al. (Xia et al., 2017) 2017 MeDShare for efficient data sharing among medical custodians
Healthcare Gordon et al. (Gordon and Catalini, 2018 Simplify the patient-centric interoperability in healthcare using blockchain technology
2018)
Wang et al. (Wang et al., 2018b) 2018 Consortium blockchain for connecting patients, health bureaus and hospitals in order to enable data
sharing, care auditability and review of medical records
Griggs et al. (Griggs et al., 2018) 2018 Maintaining PHI by utilizing smart contracts and a private blockchain
Chen et al. (Chen et al., 2018b) 2018 Maintain personal medical records based on cloud storage implementing blockchain
Omar et al. (Omar et al., 2019) 2019 Patient pivotal healthcare system for data management
Shahnaz et al. (Shahnaz et al., 2019) 2019 Framework for implementing blockchain in EHRs
Celesti et al. (Celesti et al., 2020) 2020 Direct clinical examination of patients with the help of IoT enabled medical devices
Wang et al. (Wang et al., 2020b) 2020 Consortium blockchain based framework named “GuardHealth” for secure data sharing

based self-managing VANET for problem-reaction based verification. issues associated with healthcare systems owing to its replication
Each user is identified by the hash of its public key or Ethereum address mechanism and security features. Xia et al. (2017) proposed a
and are required to pay (in Ethers) to exploit application facilities. This blockchain-based system named “MeDShare” aimed to solve the data
payment serves as incentives for vendors providing services on sharing issues among medical custodians. The proposed framework
Ethereum-based applications. However, the work does not explain what implements an access control mechanism and smart contracts to effi­
data about each device will be recorded on the blockchain. Javaid et al. ciently trace the behaviour of the data and revoke access to offending
(2019) a trustless system model for VANETs that employs a certificate individuals in case of permission violations. In another work, Gordon
authority and blockchain for registering Intelligent Vehicles (IVs). Ali et al. (Gordon and Catalini, 2018) aimed to simplify the patient-centric
et al. (2019b) proposed a bilinear pairing based certificateless public key interoperability in healthcare using blockchain technology. Wang et al.
signature aimed to enable conditional privacy preserving authentication (2018b) presented a Parallel Healthcare Systems (PHSs) framework
in VANETs. The proposed scheme included blockchain for efficiently using Artificial systems, Computational experiments and Parallel
implementing transparency of pseudo-entities before signature verifi­ execution (ACP) as its platform in order to achieve accurate and effec­
cation. In another work, Deng et al. (Deng and Gao, 2020) proposed a tive diagnosis. The presented PHS framework relies on consortium
blockchain enabled electronic payment scheme in VANETs. Luo et al. blockchain for connecting patients, health bureaus and hospitals in
(2020) proposed a blockchain based data structure aimed to record the order to enable data sharing, care auditability and review of medical
trustworthiness of vehicles and provide trust-based location privacy records. Similarly, Griggs et al. (2018) proposed a system for main­
preserving in VANETs. taining Protected Health Information (PHI) by utilizing smart contracts
and a private blockchain. Chen et al. (2018b) designed a storage blue­
print to maintain personal medical records based on cloud storage
5.6. Blockchain for healthcare
implementing blockchain. Similarly, Omar et al. (2019) presented a
patient pivotal healthcare system for data management that implements
The traditional client-server data management systems are vulner­
blockchain as the storage unit to obtain confidentiality. Shahnaz et al.
able to centralized data stewardship, data privacy and single point of
(2019) proposed a framework for implementing blockchain in
failure. Blockchain technology promises to solve some of these inherent

17
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

Electronics Health Record (EHR) and defined granular access user rules consensus mechanisms, thus a trade-off between decentralization and
so as to achieve secured storage of electronic medical records. In another high speed is created by the consensus mechanisms. Therefore, this
work, Celesti et al. (2020) proposed a tele-medical laboratory service trade-off needs to further investigation.
that enables direct clinical examination of patients with the help of IoT
enabled medical devices. Wang et al. (2020b) proposed a secure, pro­ 6.3. Complex technical barriers
ductive, dynamic and decentralized consortium blockchain based
framework named “GuardHealth” for secure data sharing. Apart from Numerous works have been proposed that focussed on securing IoT
handling sensitive information, the proposed scheme also maintains systems using blockchain technology. Shen et al. (2019) proposed a
authentication, confidentiality and efficient data preserving. privacy preserving SVM scheme named “secureSVM” tha ensures
The afore discussed blockchain based IoT applications are summa­ confidentiality for the blockchain-based encrypted IoT data. Biswas
rized in Table 7. et al. (2019) utilized the concept of local peer network to restrict the
number of transactions entering the global blockchain without
6. Future challenges and research directions compromising the peer validation of transactions at global and local
level. In another work, Alghamdi et al. (2020) proposed a consortium
Even though blockchain is a powerful technology, it is still under blockchain based secure service provisioning scheme and
development and several obstacles are faced in the adoption of block­ reputation-based incentive mechanism to enable fair payment among
chain for IoT systems irrespective of its innumerable advantages. Ma­ lightweight clients. However, the issues regarding security, scalability,
jority of these challenges arise due to the utilization of blockchain stability constraints and graphical development of Blockchain IoT ap­
technology in systems that have limited capabilities in terms of re­ plications are still needed to be addressed. Furthermore, challenges
sources, scalability and privacy preservation. This section provides a regarding the design of validation protocols, transaction capacity or
brief overview of the challenges that restricts its practicality for smart contracts implementation also needs to be addressed from varied
numerous security applications discussed in aforementioned sections. angles.
Some of these challenges are explored in the subsections below.
6.4. IoT blockchain and cellular networks
6.1. Edge device constraints and reputation in IoT
In the rapid development of the LTE cellular network, research is in
As IoT uses traditional Internet for connecting smart devices and progress for finding a balanced decentralized and centralized network.
providing automated tasks, while integration with blockchain technol­ The essential security features of the application layer of blockchain can
ogy, many devices pose issues, due to limited computation and be implemented in IoT edge devices by decentralizing cellular networks
networking capabilities. Furthermore, these devices cannot process PoW from the perspective of control (Haddad et al., 2020). It can also help in
consensus because of constraints on computational power and battery. influencing the features provided by lower layers of cellular networks
Apart from this, the edge devices suffer from lack of authorization and like data authentication and protection. Although most of the edge de­
authentication standards and limited interoperability. The interopera­ vices depend on cellular networking, the research is still at very early
bility can be enabled for different edge devices by implementing stages in decentralizing cellular networks.
blockchain that is focused on storing structured and unstructured data
transmission over data communication networks. Fortino et al. (2020a) 6.5. Smart contracts scripting standards for security
analysed the role of reputation and trust in integration of IoT with
fog/edge computing. The work considered intelligent agents technology Regardless of the massive security features provide by blockchain
for incorporating social behaviour in the smart object’s community. In technology, there are major exploitable voids in the smart contracts that
another work, Fortino et al. (2020b) proposed a blockchain based make the system vulnerable (Singh et al., 2020). Due to the open source
reputation model that relies on reputation capital of each agent. The nature of the smart contract code, it is possible for the involved parties to
proposed model yields better group composition and achieves protec­ determine how the code is initiated and what it does. Adversaries
tion against the misleading agents. Extension of blockchain to the IoT frequently exploits the attacks related to mining pools, transaction
edge is an important research direction and several recent works have authentication, cryptocurrency wallets and smart contracts. Parity
been proposed in this regard. Lin et al. (2019) developed a consortium Wallet hack and the DAO attack are the result of ingenuous bugs within
blockchain for efficient and secure knowledge trading in edge the smart contract code. was an example of attackers exploiting these
AI-enabled IoT using smart contracts and proof of trading consensus voids (Sayeed et al., 2020). Furthermore, assigning execution of smart
mechanism. Xu et al. (2020a) proposed a lightweight blockchain contracts to machines brings some problems with it, since it makes them
framework using dynamic trust right algorithm to improve the susceptible to technical concerns like bugs, communication failures,
throughput and transaction load in IIoT edge applications. However, the viruses or hacking. The immutable and irreversible nature of the
major challenge in this research direction would be to provide IoT blockchain framework make “bugs in coding” a critical problem. Formal
gateways and devices with mechanisms to publish transactions on the validation of the contract logic and exploring precision of the contracts
blockchain using constrained devices, without validating blocks in a are some of the important areas that can serve as future research di­
centralized pool. rection. Also, developing a secure smart contract scripting standard for
blockchain IoT integration needs further investigation and is a strong
6.2. Public-private blockchain trade-off future research direction.

Blockchains are technologically immature to compete with the pro­ 6.6. Rapid field testing
cessing speed of traditional centralized systems in financial applications
(Yao et al., 2019; Al-Jaroodi and Mohamed, 2019b). Even if, the Heterogenous blockchains for different applications are needed to be
transaction throughput of private blockchains are much higher, a total identified in the near future. Furthermore, the first step in combining
decentralization is not provided as the organisation itself controls the blockchain with IoT environment is to decide the type of blockchain
blockchain. Private blockchain consensus mechanisms, such as PBFT (Su which satisfies the purpose (Alaba et al., 2017). Therefore, a system is
and Vaidya, 2017), require rounds of voting to obtain Byzantine Fault mandatory for checking various type of blockchains. This can be per­
Tolerance which is not appropriate for implementing in public block­ formed in two stages namely standardization and testing. In the stan­
chains. In public blockchains, latency depends on the lottery-based dardization stage, all the needed requirements are to be analysed and

18
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

negotiated after deeply understanding the market, services, products 6.9. Scalability of BCoT
and supply chains. Once the blockchain type is decided, testing and
validation needs to be performed against the requirement. In the testing The state-of-the-art IoT framework still faces numerous scalability
stage, numerous criteria need to be evaluated such as security, problem with respect to both devices and underlying communication.
throughput, energy efficiency, blockchain capacity, latency and privacy. Scalability is also a major hurdle in the development of blockchain
Designing an efficient standardization and testing frameworks can be technology. Rivera et al. (2019) proposed a blockchain-framework to
another interesting future research direction. address the scalability and security issues in the IoT network. It is
blockchain-based IoT framework in which a set of edge nodes are inte­
grated to offer security and processing functionalities. In another work,
6.7. Blockchain towards green IoT
Dang et al. (Le-Dang and Le-Ngoc, 2019) suggested an architecture for
scalable reconfiguration of immense IoT devices based on blockchain
The exponential rise in the global industry activity has contributed
technology. The IoT devices are decoupled from blockchain operations
towards global warming due to increased fossil fuel energy consumption
in order to minimize resource utilization using a REST API. In another
and technological processes resulting in high carbon footprints. Green
work, Lao et al. (2020) demonstrated a (GPBFT) Geographic Practical
IoT has gained considerable attention as increased energy consumption
Byzantine Fault Tolerance consensus protocol which is a location-based
by IoT devices have diverted our focus towards realizing an eco-friendly
scalable consensus mechanism. The main concept behind this consensus
IoT system. Green IoT aims to provide an energy efficient service by
is that a majority of Blockchain IoT applications depend upon a fixed IoT
enabling the production and use of renewable energy (Janhunen et al.,
edge device for data collection and processing. The GPBFT utilizes the
2018; Poongodi et al., 2020). However, malicious IoT devices can
geographical information to reach consensus, thereby avoiding Sybil
launch energy attacks and thereby cause significant energy loss. Owing
attacks. Biswas et al. (2019) proposed a local peer network-based so­
to its decentralized and secure nature, blockchain technology can
lution to address the challenges of scalability and resource constraints in
contribute towards creating a secure, low-power and eco-friendly IoT
a blockchain-based IoT network. The local peer network limits the
system (Sharma et al., 2020). Several works have been proposed in this
number of transactions entering the global Blockchain by implementing
regard. Jiang et al. (2019) proposed a blockchain-based secure and
a scalable local ledger, without negotiating on the peer validation of
distributed wireless power transfer architecture that offers mitigated
transactions at the local and global level. In another work, Arellanes
energy loss for low-power IoT devices. Similarly, Yazdinejad et al.
et al. (Arellanes and Lau, 2019) presented a DX-MAN semantics
(2020) proposed a secure and low latency PoW protocol to improve the
leveraging technique for apprehending distributed data flows in IoT
overall computation processing speed of blockchain based green IoT
systems. The technique is validated with the help of smart contracts and
networks. However, research exploring the role of blockchain technol­
experimentally analysed to examine scalability. Similarly, Baouya et al.
ogy in green IoT ecosystems is still in its nascent stage and needs further
(2020) proposed a blockchain system for scalable management of IoT
investigation.
devices. The proposed system deployed smart contracts to provide the
functionality of ledger update. Even though, significant amount of work
6.8. Incentive mechanism in BCIoT has been done in this regard, new theories and technologies needs to be
developed to enhance the scalability of BCoT.
The mining mechanism in blockchain technology involves high
computational resources. IoT devices, therefore, purchase computa­ 6.10. Mobile edge computing (MEC) for blockchains
tional power from edge servers and divest the gigantic tasks. Ding et al.
(2020) suggested a two-stage Stackelberg game incentive mechanism MEC is a standard architecture for distributed cloud computing that
where the blockchain platform act as a leader and IoT nodes act as moves the computational overload from a centralized cloud, closer to
followers. This motivates IoT devices to purchase more computational the customer, to the edge of the network. Instead of transmitting whole
resources for participating in the mining process. The increased sale of data to the cloud for analysis, the edge of the network processes, stores
computational resources would result in a more secure IoT environment and analyses the data for further utilization. IoT and MEC together play
and at the same time assures the profits of blockchain platform. Simi­ a significant role in modernizing the interaction of humans and the
larly, Lin et al. (2020b) devised a similar incentive mechanism for physical world. Sekaran et al. (2020) analysed the implementation of
trading energy knowledge along with optimum economic incentives and blockchain technology with 6G enabled IoT framework which utilizes
power distribution techniques using Stackelberg game mechanism. In the power of MEC in order to reduce the computation overload and
another work, Alghamdi et al. (2020) proposed an incentive mechanism increase overall performance and efficiency. In another work, Asher­
based on the reputation of Service Providers. The proposed mechanism alieva et al. (Asheralieva and Niyato, 2020) studied the pricing and
encourages the Service Providers to leverage precise and protected resource management in the IoT system which use services based on
services at an affordable cost to the lightweight clients. Yin et al. (2020) blockchain and MEC. The model use servers based on clouds to gather
proposed an incentive mechanism for Mobile Crowdsensing IoT. This information from IoT nodes using a set of peers. The MEC model push
mechanism is crucial for active participation of multiple vehicles and the task of peers to blockchain server using Unmanned Arial Vehicles
task collaboration in the Internet of Vehicles network. An innovative (UAVs). Similarly, Kumar et al. (2020) proposed a framework known as
time-window based procedure is devised to orchestrate the tasks among BlockEdge to address the problems faced by current IoT networks. The
vehicles and also provide incentives to the vehicles to participate. In BlockEdge framework is a combination of blockchain and edge
another work, Wu et al. (2018) introduced a novel incentive architec­ computing which aids the IoT network in terms of latency, network
ture, referred to as SmartRetro, for incentivizing and attracting distrib­ usage and power consumption. Similarly, Xu et al. (2020b) presented
uted IoT devices to contribute in retrospective vulnerability detection Edgence for managing huge distributed decentralized applications
and showcase results powered by blockchain. The authors performed a (dApps) in IoT scenarios. It utilize edge clouds to access IoT nodes and
theoretical analysis of security and performance to demonstrate the further use in-built blockchains to accomplish self-administration and
achievements of SmartRetro. Lin et al. (2019) proposed a P2P knowl­ self-management on edge clouds. In another work, Wu et al. (2020)
edge market to make knowledge tradable in IoT enabled with edge-AI. considered an IoT-Edge-Cloud Computing scenario based on blockchain
The researchers developed a knowledge consortium blockchain for technology which utilize the advantages of both MEC and MCC. The
safe and well-organized management of knowledge including knowl­ authors in this work also developed an EEDTO (Energy-Efficient Dy­
edge coins. Even though numerous incentive mechanisms have been namic Task Offloading) algorithm by selecting the optimum computing
proposed, it is still an emerging research area. place, either on the MEC server, MCC server or on the IoT device itself

19
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

taking into consideration the joint minimization of task response time during this integration. The discovery suggests that blockchain tech­
and resource consumption. Similarly, Xu et al. (2020c) explained nology is an ideal and most suitable candidate for empowering IoT and
BeCome, a Blockchain-based Computation Offloading Method. The re­ realizing a safe, convenient, supervisable and transparent system that
searchers employed Blockchain to ensure data integrity in the IoT paves the way for newly emerging business models. It can be concluded
network along with MEC in order to aid offloading in cloud computing. that the development and deployment of blockchain based IoT systems
Blockchain based 6G-enabled mobile edge computation for IoT auto­ are still in nascent stage and additional technological advances are
mation needs further investigation and is a strong future research required to address the specific demands for its broader use. Therefore,
direction. this survey points out interesting open research directions to improve
security, capacity and scalability of blockchains for future effective
6.11. Directed acyclic graph (DAG) based blockchains integration of IoT and blockchain technology.

With massive advancements related to optimized authentication


Declaration of competing interest
mechanism, efficiency, high scalability and support for multiparty
environment and IoT, DAG architecture is quickly replacing conven­
The authors declare that they have no known competing financial
tional blockchain architectures (Pervez et al., 2018). Zhao et al. (Zhao
interests or personal relationships that could have appeared to influence
and Yu, 2019) presented a critical analysis on two different DAG based
the work reported in this paper.
models for blockchain namely IOTA and Hashgraph. The authors also
provided an in-depth analysis on the different blockchain architectures
References
and the challenges faced by them while combining with IoT framework.
In another work, Li et al. (2020b) investigated the impact of network Aderibole, A., Aljarwan, A., Rehman, M.H., Zeineldin, H.H., Mezher, T., Salah, K.,
load on security and performance of DAG based ledger using tangle Svetinovic, D., 2020. Blockchain technology for smart grids: decentralized NIST
consensus mechanism. The trade-off between confirmation delay and conceptual model. IEEE Access 8, 43177–43190. https://doi.org/10.1109/
access.2020.2977149.
security level acts as guidance for practical deployment of DAG block­ Afzal, M., Huang, Q., Amin, W., Umer, K., Raza, A., Naeem, M., 2020. Blockchain
chains. Similarly, Cullen et al. (2020) analysed parasite chain attack enabled distributed demand side management in community energy system with
scenario which focuses on destroying the immutability and irrevers­ smart homes. IEEE Access 8, 37428–37439. https://doi.org/10.1109/
access.2020.2975233.
ibility of the blockchain with respect to DAG-based blockchain of IOTA
Aitzhan, N.Z., Svetinovic, D., 2018. Security and privacy in decentralized energy trading
foundation. Authors compared the traditional blockchain platforms with through multi-signatures, blockchain and anonymous messaging streams. IEEE
DAG-based blockchain systems in these attack scenarios. In another Trans. Dependable Secure Comput. 15 (5), 840–852. https://doi.org/10.1109/
tdsc.2016.2616861.
work, Bhandary et al. (2020) highlighted the use of blockchain tech­
Al-Jaroodi, J., Mohamed, N., 2019a. Blockchain in industries: a survey. IEEE Access 7,
nology focussing on a newer version of DAG based architecture called 36500–36515. https://doi.org/10.1109/access.2019.2903554.
IOTA. The practical limitation of classical blockchain framework and the Al-Jaroodi, J., Mohamed, N., 2019b. Blockchain in industries: a survey. IEEE Access 7,
installation of IOTA for authenticated transmission of sensor data is also 36500–36515. https://doi.org/10.1109/access.2019.2903554.
Alaba, F.A., Othman, M., Hashem, I.A., Alotaibi, F., 2017. Internet of Things security: a
highlighted. Similarly, Cao et al. (2019) investigated the results of survey. J. Netw. Comput. Appl. 88, 10–28. https://doi.org/10.1016/j.
network load on DAG consensus mechanism for blockchain based IoT jnca.2017.04.002.
systems. The consensus mechanism dynamics for DAG based IoT systems Alaslani, M., Nawab, F., Shihada, B., 2019. Blockchain in IoT systems: end-to-end delay
evaluation. IEEE Internet of Things Journal 6 (5), 8332–8344. https://doi.org/
are demonstrated specifically by applying Markov chain model. How­ 10.1109/jiot.2019.2917226.
ever, research exploring the DAG based blockchains is still in its nascent Alfandi, O., Khanji, S., Ahmad, L., Khattak, A., 2020. A survey on boosting IoT security
stage and needs further investigation. and privacy through blockchain. Cluster Comput. https://doi.org/10.1007/s10586-
020-03137-8.
Alghamdi, T.A., Ali, I., Javaid, N., Shafiq, M., 2020. Secure service provisioning scheme
7. Conclusion for lightweight IoT devices with a fair payment system and an incentive mechanism
based on blockchain. IEEE Access 8, 1048–1061. https://doi.org/10.1109/
access.2019.2961612.
The exponential rise in adoption of IoT led to the emergence of Alharby, M., Moorsel, A.V., 2017. Blockchain Based Smart Contracts: A Systematic
numerous security vulnerabilities ranging from attacks on data to at­ Mapping Study. Computer Science & Information Technology (CS & IT). https://doi.
tacks on devices. The current IoT devices are insecure and impotent of org/10.5121/csit.2017.71011.
Ali, M.S., Dolui, K., Antonelli, F., 2017. IoT data privacy via blockchains and IPFS. In:
defending themselves majorly due to its resource constrained nature,
Proceedings of the Seventh International Conference on the Internet of Things - IoT,
immature standards, poor interoperability, absence of secure software vol. 17. https://doi.org/10.1145/3131542.3131563.
and hardware design, deployment and development. This has drawn Ali, M.S., Vecchio, M., Pincheira, M., Dolui, K., Antonelli, F., Rehmani, M.H., 2019a.
huge attention from the research community and numerous efforts have Applications of blockchains in the internet of things: a comprehensive survey. IEEE
Communications Surveys & Tutorials 21 (2), 1676–1717. https://doi.org/10.1109/
been carried out in order to define a robust global mechanism for IoT comst.2018.2886932.
systems. In such an ecosystem, a decentralized, distributed technology Ali, I., Gervais, M., Ahene, E., Li, F., 2019b. A blockchain-based certificateless public key
named “blockchain” can offer solutions to the issues related to security, signature scheme for vehicle-to-infrastructure communication in VANETs. J. Syst.
Architect. 99, 101636. https://doi.org/10.1016/j.sysarc.2019.101636.
privacy, traceability, reliability and interoperability. Blockchain tech­ Alladi, T., Chamola, V., Parizi, R.M., Choo, K.R., 2019. Blockchain applications for
nology grants integrity, authentication, and non-repudiation by default, industry 4.0 and industrial IoT: a review. IEEE Access 7, 176935–176951. https://
and utilizing smart contracts, manages automation and authorization of doi.org/10.1109/access.2019.2956748.
Aloi, G., Caliciuri, G., Fortino, G., Gravina, R., Pace, P., Russo, W., Savaglio, C., 2017.
transactions as well. Enabling IoT interoperability through opportunistic smartphone-based mobile
In this paper, we presented a comprehensive survey of blockchain gateways. J. Netw. Comput. Appl. 81, 74–84. https://doi.org/10.1016/j.
technology applied to resolve the myriad of data security and privacy jnca.2016.10.013.
Alotaibi, B., 2019. Utilizing blockchain to overcome cyber security concerns in the
issues in IoT. The paper throws light on the background of IoT and internet of things: a review. IEEE Sensor. J. 19 (23), 10953–10971. https://doi.org/
presents the state-of-the-art survey of blockchain technology in detail 10.1109/jsen.2019.2935035.
highlighting its characteristics, classification, architecture, transaction Altulyan, M., Yao, L., Kanhere, S.S., Wang, X., Huang, C., 2019. A unified framework for
data integrity protection in people-centric smart cities. Multimed. Tool. Appl. 79
process and consensus protocols. Further, the paper discuss how
(7–8), 4989–5002. https://doi.org/10.1007/s11042-019-7182-7.
blockchain technology can be leveraged to solve the most pertaining IoT Amanullah, M.A., Habeeb, R.A., Nasaruddin, F.H., Gani, A., Ahmed, E., Nainar, A.S.,
security problems and highlights the major benefits and risks involved in Imran, M., 2020. Deep learning and big data technologies for IoT security. Comput.
integration of Blockchain and IoT. Moreover, the paper presents a ho­ Commun. 151, 495–517. https://doi.org/10.1016/j.comcom.2020.01.016.
Amini, M.R., Baidas, M.W., 2020. Availability-reliability-stability trade-offs in ultra-
listic survey on major security improvements achieved in IoT systems reliable energy-harvesting cognitive radio IoT networks. IEEE Access 8,
using blockchain technology and outlines the challenges that originate 82890–82916. https://doi.org/10.1109/access.2020.2991861.

20
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

Andreev, R.A., Andreeva, P.A., Krotov, L.N., Krotova, E.L., 2018. Review of blockchain Bluemix is now IBM Cloud: Build confidently with 170 services. (2017). Retrieved from
technology: types of blockchain and their application. Intellekt. Sist. Proizv. 16 (1), https://www.ibm.com/blogs/bluemix/2017/10/bluemix-is-now-ibm-cloud/.
11. https://doi.org/10.22213/2410-9304-2018-1-11-14. Botcha, K.M., Chakravarthy, V.V., Anurag, 2019. Enhancing traceability in
Arellanes, D., Lau, K., 2019. Decentralized data flows in algebraic service compositions pharmaceutical supply chain using internet of things (IoT) and blockchain. In: 2019
for the scalability of IoT systems. In: 2019 IEEE 5th World Forum on Internet of IEEE International Conference on Intelligent Systems and Green Technology
Things (WF-IoT). https://doi.org/10.1109/wf-iot.2019.8767238. (ICISGT). https://doi.org/10.1109/icisgt44072.2019.00025.
Arora, A., Kaur, A., Bhushan, B., Saini, H., 2019. Security concerns and future trends of Boudguiga, A., Bouzerna, N., Granboulan, L., Olivereau, A., Quesnel, F., Roger, A.,
internet of things. In: 2019 2nd International Conference on Intelligent Computing. Sirdey, R., 2017. Towards better availability and accountability for IoT updates by
Instrumentation and Control Technologies (ICICICT). https://doi.org/10.1109/ means of a blockchain. In: 2017 IEEE European Symposium on Security and Privacy
icicict46008.2019.8993222. Workshops (EuroS&PW). https://doi.org/10.1109/eurospw.2017.50.
Asheralieva, A., Niyato, D., 2020. Distributed dynamic resource management and pricing Brous, P., Janssen, M., Schraven, D., Spiegeler, J., Duzgun, B.C., 2017. Factors
in the IoT systems with blockchain-as-a-service and UAV-enabled mobile edge influencing adoption of IoT for data-driven decision making in asset management
computing. IEEE Internet of Things Journal 7 (3), 1974–1993. https://doi.org/ organizations. In: Proceedings of the 2nd International Conference on Internet of
10.1109/jiot.2019.2961958. Things. Big Data and Security. https://doi.org/10.5220/0006296300700079.
Atzei, N., Bartoletti, M., Cimoli, T., 2017. A survey of attacks on Ethereum smart Brous, P., Janssen, M., Herder, P., 2019. Internet of Things adoption for reconfiguring
contracts (SoK). Lecture Notes in Computer Science Principles of Security and Trust decision-making processes in asset management. Bus. Process Manag. J. 25 (3),
164–186. https://doi.org/10.1007/978-3-662-54455-6_8. 495–511. https://doi.org/10.1108/bpmj-11-2017-0328.
Axon, L., Goldsmith, M., 2017. PB-PKI: a privacy-aware blockchain-based PKI. In: Brous, P., Janssen, M., Herder, P., 2020. The dual effects of the Internet of Things (IoT): a
Proceedings of the 14th International Joint Conference on E-Business and systematic review of the benefits and risks of IoT adoption by organizations. Int. J.
Telecommunications. https://doi.org/10.5220/0006419203110318. Inf. Manag. 51, 101952. https://doi.org/10.1016/j.ijinfomgt.2019.05.008.
Bahga, A., Madisetti, V.K., 2016. Blockchain platform for industrial internet of things. J. Bürer, M.J., Lapparent, M.D., Pallotta, V., Capezzali, M., Carpita, M., 2019. Use cases for
Software Eng. Appl. 9 (10), 533–546. https://doi.org/10.4236/jsea.2016.910036. Blockchain in the Energy Industry Opportunities of emerging business models and
Bamakan, S.M., Motavali, A., Bondarti, A.B., 2020. A survey of blockchain consensus related risks. Comput. Ind. Eng. 137, 106002. https://doi.org/10.1016/j.
algorithms performance evaluation criteria. Expert Syst. Appl. 154, 113385. https:// cie.2019.106002.
doi.org/10.1016/j.eswa.2020.113385. Butun, I., Osterberg, P., Song, H., 2020. Security of the internet of things: vulnerabilities,
Baouya, A., Chehida, S., Bensalem, S., Bozga, M., 2020. Fog computing and blockchain attacks, and countermeasures. IEEE Communications Surveys & Tutorials 22 (1),
for massive IoT deployment. In: 2020 9th Mediterranean Conference on Embedded 616–644. https://doi.org/10.1109/comst.2019.2953364.
Computing (MECO). https://doi.org/10.1109/meco49872.2020.9134098. Cao, B., Huang, S., Feng, D., Zhang, L., Zhang, S., Peng, M., 2019. Impact of network load
Belotti, M., Bozic, N., Pujolle, G., Secci, S., 2019. A vademecum on blockchain on direct acyclic graph based blockchain for internet of things. In: 2019 International
technologies: when, which, and how. IEEE Communications Surveys & Tutorials 21 Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
(4), 3796–3838. https://doi.org/10.1109/comst.2019.2928178. (CyberC). https://doi.org/10.1109/cyberc.2019.00044.
Benkhelifa, E., Welsh, T., Hamouda, W., 2018. A critical review of practices and Celesti, A., Ruggeri, A., Fazio, M., Galletta, A., Villari, M., Romano, A., 2020. Blockchain-
challenges in intrusion detection systems for IoT: toward universal and resilient based healthcare workflow for tele-medical laboratory in federated hospital IoT
systems. IEEE Communications Surveys & Tutorials 20 (4), 3496–3509. https://doi. clouds. Sensors 20 (9), 2590. https://doi.org/10.3390/s20092590.
org/10.1109/comst.2018.2844742. Cha, S.-C., Chen, J.-F., Su, C., Yeh, K.-H., 2018. A blockchain connected gateway for BLE-
Bentov, I., Lee, C., Mizrahi, A., Rosenfeld, M., 2014. Proof of activity. Perform. Eval. Rev. based devices in the internet of things. IEEE Access 6, 24639–24649. https://doi.
42 (3), 34–37. https://doi.org/10.1145/2695533.2695545. org/10.1109/access.2018.2799942.
Bera, B., Chattaraj, D., Das, A.K., 2020. Designing secure blockchain-based access control Chakraborty, R.B., Pandey, M., Rautaray, S.S., 2018a. Managing computation load on a
scheme in IoT-enabled Internet of Drones deployment. Comput. Commun. 153, blockchain – based multi – layered internet – of – things network. Procedia
229–249. https://doi.org/10.1016/j.comcom.2020.02.011. Computer Science 132, 469–476. https://doi.org/10.1016/j.procs.2018.05.146.
Bhandary, M., Parmar, M., Ambawade, D., 2020. A blockchain solution based on directed Chakraborty, R.B., Pandey, M., Rautaray, S.S., 2018b. Managing computation load on a
acyclic graph for IoT data security using IoTA tangle. In: 2020 5th International blockchain – based multi – layered internet – of – things network. Procedia
Conference on Communication and Electronics Systems (ICCES). https://doi.org/ Computer Science 132, 469–476. https://doi.org/10.1016/j.procs.2018.05.146.
10.1109/icces48766.2020.9137858. Chalaemwongwan, N., Kurutach, W., 2018. Notice of Violation of IEEE Publication
Bhattacharjya, A., Zhong, X., Wang, J., Li, X., 2018. Security challenges and concerns of Principles: state of the art and challenges facing consensus protocols on blockchain.
internet of things (IoT). Cyber-physical systems: architecture, security and In: 2018 International Conference on Information Networking (ICOIN). https://doi.
application EAI/springer innovations in communication and computing, org/10.1109/icoin.2018.8343266.
pp. 153–185. https://doi.org/10.1007/978-3-319-92564-6_7. Chen, L., Xu, L., Shah, N., Gao, Z., Lu, Y., Shi, W., 2017. On security analysis of proof-of-
Bhushan, B., Sahoo, G., 2017. Recent advances in attacks, technical challenges, elapsed-time (PoET). Lecture Notes in Computer Science Stabilization, Safety, and
vulnerabilities and their countermeasures in wireless sensor networks. Wireless Pers. Security of Distributed Systems 282–297. https://doi.org/10.1007/978-3-319-
Commun. 98 (2), 2037–2077. https://doi.org/10.1007/s11277-017-4962-0. 69084-1_19.
Bhushan, B., Sahoo, G., 2020. Requirements, protocols, and security challenges in Chen, Y., Wang, L., Wang, S., 2018a. Stochastic blockchain for IoT data integrity. IEEE
wireless sensor networks: an industrial perspective. Handbook of Computer Transactions on Network Science and Engineering 7 (1), 373–384. https://doi.org/
Networks and Cyber Security 683–713. https://doi.org/10.1007/978-3-030-22277- 10.1109/tnse.2018.2887236.
2_27. Chen, Y., Ding, S., Xu, Z., Zheng, H., Yang, S., 2018b. Blockchain-based medical records
Bhushan, B., Sahoo, G., Rai, A.K., 2017. Man-in-the-middle attack in wireless and secure storage and medical service framework. J. Med. Syst. 43 (1) https://doi.org/
computer networking — a review. In: 2017 3rd International Conference on 10.1007/s10916-018-1121-4.
Advances in Computing. Communication & Automation (ICACCA) (Fall). https:// Choo, K.-K.R., Yan, Z., Meng, W., 2020. Editorial: blockchain in industrial IoT
doi.org/10.1109/icaccaf.2017.8344724. applications: security and privacy advances, challenges, and opportunities. IEEE
Bhushan, B., Khamparia, A., Sagayam, K.M., Sharma, S.K., Ahad, M.A., Debnath, N.C., Transactions on Industrial Informatics 16 (6), 4119–4121. https://doi.org/10.1109/
2020a. Blockchain for smart cities: a review of architectures, integration trends and tii.2020.2966068.
future research directions. Sustainable Cities and Society 61, 102360. https://doi. Chowdhury, A., Raut, S.A., 2018. A survey study on Internet of Things resource
org/10.1016/j.scs.2020.102360. management. J. Netw. Comput. Appl. 120, 42–60. https://doi.org/10.1016/j.
Bhushan, B., Sahoo, C., Sinha, P., Khamparia, A., 2020b. Unification of Blockchain and jnca.2018.07.007.
Internet of Things (BIoT): requirements, working model, challenges and future Christidis, K., Devetsikiotis, M., 2016. Blockchains and smart contracts for the internet of
directions. Wireless Network. https://doi.org/10.1007/s11276-020-02445-6. things. IEEE Access 4, 2292–2303. https://doi.org/10.1109/access.2016.2566339.
Bhushan, B., Sinha, P., Sagayam, K.M., J, A., 2020c. Untangling blockchain technology: a Corda. Available online. https://docs.corda.net/. (Accessed 15 June 2020).
survey on state of the art, security threats, privacy services, applications and future Cullen, A., Ferraro, P., King, C., Shorten, R., 2020. On the resilience of DAG-based
research directions. Comput. Electr. Eng. https://doi.org/10.1016/j. distributed ledgers in IoT applications. IEEE Internet of Things Journal 7 (8),
compeleceng.2020.106897, 106897. 7112–7122. https://doi.org/10.1109/jiot.2020.2983401.
Biswal, A., Bhushan, B., 2019. Blockchain for internet of things: architecture, consensus Dagher, G.G., Mohler, J., Milojkovic, M., Marella, P.B., 2018. Ancile: privacy-preserving
advancements, challenges and application areas. In: 2019 5th International framework for access control and interoperability of electronic health records using
Conference on Computing, Communication, Control and Automation (ICCUBEA). blockchain technology. Sustainable Cities and Society 39, 283–297. https://doi.org/
https://doi.org/10.1109/iccubea47591.2019.9129181. 10.1016/j.scs.2018.02.014.
Biswas, K., Muthukkumarasamy, V., 2016. Securing smart cities using blockchain Dai, H., Zheng, Z., Zhang, Y., 2019. Blockchain for internet of things: a survey. IEEE
technology. In: 2016 IEEE 18th International Conference on High Performance Internet of Things Journal 6 (5), 8076–8094. https://doi.org/10.1109/
Computing and Communications; IEEE 14th International Conference on Smart City; jiot.2019.2920987.
IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/ Dasgupta, D., Shrein, J.M., Gupta, K.D., 2019. A survey of blockchain from security
DSS). https://doi.org/10.1109/hpcc-smartcity-dss.2016.0198. perspective. Journal of Banking and Financial Technology 3 (1), 1–17. https://doi.
Biswas, S., Sharif, K., Li, F., Nour, B., Wang, Y., 2019. A scalable blockchain framework org/10.1007/s42786-018-00002-6.
for secure transactions in IoT. IEEE Internet of Things Journal 6 (3), 4650–4659. Decker, C., Wattenhofer, R., 2013. Information propagation in the Bitcoin network. IEEE
https://doi.org/10.1109/jiot.2018.2874095. P2P 2013 Proceedings. https://doi.org/10.1109/p2p.2013.6688704.
Bitcoin, S. Nakamoto. A peer-to-peer electronic cash system. Last accessed: December 12, Deirmentzoglou, E., Papakyriakopoulos, G., Patsakis, C., 2019. A survey on long-range
2018. [Online]. Available. http://bitcoin.org/bitcoin.pdf. attacks for proof of stake protocols. IEEE Access 7, 28712–28725. https://doi.org/
Bitcoin GitHub implementation, https://github.com/bitcoin/bitcoin, (accessed July 15, 10.1109/access.2019.2901858.
2020).

21
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

Delgado-Segura, S., Pérez-Solà, C., Navarro-Arribas, G., Herrera-Joancomartí, J., 2019. Haddad, Z., Fouda, M.M., Mahmoud, M., Abdallah, M., 2020. Blockchain-based
Analysis of the bitcoin UTXO set. Financial Cryptography and Data Security Lecture authentication for 5G networks. 2020. IEEE International Conference on Informatics,
Notes in Computer Science 78–91. https://doi.org/10.1007/978-3-662-58820-8_6. IoT, and Enabling Technologies (ICIoT). https://doi.org/10.1109/
Deng, X., Gao, T., 2020. Electronic payment schemes based on blockchain in VANETs. iciot48696.2020.9089507.
IEEE Access 8, 38296–38303. https://doi.org/10.1109/access.2020.2974964. Hakak, S., Khan, W.Z., Gilkar, G.A., Imran, M., Guizani, N., 2020. Securing smart cities
Delegated proof of stake (DPoS). Accessed: July 2020, available. https://en.bitcoinwiki. through blockchain technology: architecture, requirements, and challenges. IEEE
org/wiki/DPoS. Network 34 (1), 8–14. https://doi.org/10.1109/mnet.001.1900178.
Ding, S., Cao, J., Li, C., Fan, K., Li, H., 2019. A novel attribute-based access control Halpin, H., Piekarska, M., 2017. Introduction to security and privacy on the blockchain.
scheme using blockchain for IoT. IEEE Access 7, 38431–38441. https://doi.org/ In: 2017 IEEE European Symposium on Security and Privacy Workshops
10.1109/access.2019.2905846. (EuroS&PW). https://doi.org/10.1109/eurospw.2017.43.
Ding, X., Guo, J., Li, D., Wu, W., 2020. An incentive mechanism for building a secure Hamad, S.A., Sheng, Q.Z., Zhang, W.E., Nepal, S., 2020. Realizing an internet of secure
blockchain-based internet of things. IEEE Transactions on Network Science and things: a survey on issues and enabling technologies. IEEE Communications Surveys
Engineering. https://doi.org/10.1109/tnse.2020.3040446, 1-1. & Tutorials 22 (2), 1372–1391. https://doi.org/10.1109/comst.2020.2976075.
Dinh, T.T.A., Liu, R., Zhang, M., Chen, G., Ooi, B.C., Wang, J., 2018. Untangling Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A., 2018. Bubbles of Trust: a
blockchain: a data processing view of blockchain systems. IEEE Trans. Knowl. Data decentralized blockchain-based authentication system for IoT. Comput. Secur. 78,
Eng. 30 (7), 1366–1385. https://doi.org/10.1109/tkde.2017.2781227. 126–142. https://doi.org/10.1016/j.cose.2018.06.004.
Dorri, A., Kanhere, S.S., Jurdak, R., Gauravaram, P., 2017. Blockchain for IoT security Hartel, P., Homoliak, I., Reijsbergen, D., 2019. An empirical study into the success of
and privacy: the case study of a smart home. In: 2017 IEEE International Conference listed smart contracts in Ethereum. IEEE Access 7, 177539–177555. https://doi.org/
on Pervasive Computing and Communications Workshops (PerCom Workshops). 10.1109/access.2019.2957284.
https://doi.org/10.1109/percomw.2017.7917634. Hashem, I.A., Chang, V., Anuar, N.B., Adewole, K., Yaqoob, I., Gani, A., Chiroma, H.,
Duan, J., Zhang, C., Gong, Y., Brown, S., Li, Z., 2020. A content-analysis based literature 2016. The role of big data in smart city. Int. J. Inf. Manag. 36 (5), 748–758. https://
review in blockchain adoption within food supply chain. Int. J. Environ. Res. Publ. doi.org/10.1016/j.ijinfomgt.2016.05.002.
Health 17 (5), 1784. https://doi.org/10.3390/ijerph17051784. Hassan, M.U., Rehmani, M.H., Chen, J., 2019. Privacy preservation in blockchain based
Dwivedi, Y.K., Janssen, M., Slade, E.L., Rana, N.P., Weerakkody, V., Millard, J., IoT systems: integration issues, prospects, challenges, and future research directions.
Snijders, D., 2016. Driving innovation through big open linked data (BOLD): Future Generat. Comput. Syst. 97, 512–529. https://doi.org/10.1016/j.
exploring antecedents using interpretive structural modelling. Inf. Syst. Front 19 (2), future.2019.02.060.
197–212. https://doi.org/10.1007/s10796-016-9675-5. Hassan, M.M., Gumaei, A., Huda, S., Almogren, A., 2020. Increasing the trustworthiness
Ethereum GitHub implementation, https://github.com/ethereum/goethereum (accessed in the industrial IoT networks through a reliable cyberattack detection model. IEEE
July 15, 2020). Transactions on Industrial Informatics 16 (9), 6154–6162. https://doi.org/10.1109/
Fan, K., Luo, Q., Zhang, K., Yang, Y., 2020. Cloud-based lightweight secure RFID mutual tii.2020.2970074.
authentication protocol in IoT. Inf. Sci. 527, 329–340. https://doi.org/10.1016/j. Huang, Y., Bian, Y., Li, R., Zhao, J.L., Shi, P., 2019. Smart contract security: a software
ins.2019.08.006. lifecycle perspective. IEEE Access 7, 150184–150202. https://doi.org/10.1109/
Feng, Q., He, D., Zeadally, S., Khan, M.K., Kumar, N., 2019. A survey on privacy access.2019.2946988.
protection in blockchain system. J. Netw. Comput. Appl. 126, 45–58. https://doi. Huang, K., Yang, L.-X., Yang, X., Xiang, Y., Tang, Y.Y., 2020a. A low-cost distributed
org/10.1016/j.jnca.2018.10.020. denial-of-service attack architecture. IEEE Access 8, 42111–42119. https://doi.org/
Fortino, G., Fotia, L., Messina, F., Rosaci, D., Sarne, G.M., 2020a. Trust and reputation in 10.1109/access.2020.2977112.
the internet of things: state-of-the-art and research challenges. IEEE Access 8, Huang, D., Ma, X., Zhang, S., 2020b. Performance analysis of the Raft consensus
60117–60125. https://doi.org/10.1109/access.2020.2982318. algorithm for private blockchains. IEEE Transactions on Systems, Man, and
Fortino, G., Messina, F., Rosaci, D., Sarne, G.M., 2020b. Using blockchain in a reputation- Cybernetics: Systems 50 (1), 172–181. https://doi.org/10.1109/
based model for grouping agents in the internet of things. IEEE Trans. Eng. Manag. tsmc.2019.2895471.
67 (4), 1231–1243. https://doi.org/10.1109/tem.2019.2918162. Huckle, S., Bhattacharya, R., White, M., Beloff, N., 2016. Internet of things, blockchain
Gai, K., Wu, Y., Zhu, L., Zhang, Z., Qiu, M., 2020. Differential privacy-based blockchain and shared economy applications. Procedia Computer Science 98, 461–466. https://
for industrial internet-of-things. IEEE Transactions on Industrial Informatics 16 (6), doi.org/10.1016/j.procs.2016.09.074.
4156–4165. https://doi.org/10.1109/tii.2019.2948094. Hyperledger GitHub implementation, https://github.com/hyperledger/fabric-sdk-py
Gazis, V., 2017. A survey of standards for machine-to-machine and the internet of things. (accessed July 15, 2020).
IEEE Communications Surveys & Tutorials 19 (1), 482–511. https://doi.org/ Iftekhar, A., Cui, X., Hassan, M., Afzal, W., 2020. Application of blockchain and internet
10.1109/comst.2016.2592948. of things to ensure tamper-proof data availability for food safety. J. Food Qual. 2020,
Georgakopoulos, D., 2019. A global IoT device discovery and integration vision. In: 2019 1–14. https://doi.org/10.1155/2020/5385207.
IEEE 5th International Conference on Collaboration and Internet Computing (CIC). Innerbichler, J., Damjanovic-Behrendt, V., 2018. Federated byzantine agreement to
https://doi.org/10.1109/cic48465.2019.00035. ensure trustworthiness of digital manufacturing platforms. Proceedings of the 1st
Glaser, F., 2017. Pervasive decentralisation of digital infrastructures: a framework for Workshop on Cryptocurrencies and Blockchains for Distributed Systems - CryBlock
blockchain enabled system and use case analysis. In: Proceedings of the 50th Hawaii 18. https://doi.org/10.1145/3211933.3211953.
International Conference on System Sciences (2017). https://doi.org/10.24251/ Intel: Sawtooth Lake (2017). https://intelledger.github.io/(accessed July 15, 2020).
hicss.2017.186. Jamil, F., Ahmad, S., Iqbal, N., Kim, D., 2020. Towards a remote monitoring of patient
Goel, A.K., Rose, A., Gaur, J., Bhushan, B., 2019. Attacks, countermeasures and security vital signs based on IoT-based blockchain integrity management platforms in smart
paradigms in IoT. In: 2019 2nd International Conference on Intelligent Computing. hospitals. Sensors 20 (8), 2195. https://doi.org/10.3390/s20082195.
Instrumentation and Control Technologies (ICICICT). https://doi.org/10.1109/ Janhunen, J., Mikhaylov, K., Petäjäjärvi, J., Sonkki, M., 2018. Wireless energy transfer
icicict46008.2019.8993338. powered wireless sensor node for green IoT: design, implementation and evaluation.
Gope, P., Sikdar, B., 2019. Lightweight and privacy-preserving two-factor Authentication Sensors 19 (1), 90. https://doi.org/10.3390/s19010090.
scheme for IoT devices. IEEE Internet of Things Journal 6 (1), 580–589. https://doi. Javaid, U., Aman, M.N., Sikdar, B., 2019. DrivMan: driving trust management and data
org/10.1109/jiot.2018.2846299. sharing in VANETs with blockchain and smart contracts. In: 2019 IEEE 89th
Gordon, W.J., Catalini, C., 2018. Blockchain technology for healthcare: facilitating the Vehicular Technology Conference (VTC2019-Spring). https://doi.org/10.1109/
transition to patient-driven interoperability. Comput. Struct. Biotechnol. J. 16, vtcspring.2019.8746499.
224–230. https://doi.org/10.1016/j.csbj.2018.06.003. Jiang, L., Xie, S., Maharjan, S., Zhang, Y., 2019. Blockchain empowered wireless power
Gramoli, V., 2020. From blockchain consensus back to Byzantine consensus. Future transfer for green and secure internet of things. IEEE Network 33 (6), 164–171.
Generat. Comput. Syst. 107, 760–769. https://doi.org/10.1016/j. https://doi.org/10.1109/mnet.001.1900008.
future.2017.09.023. JPMorgan. Enterprise-ready distributed ledger and smart contract platforms. https://gith
Granjal, J., Monteiro, E., Silva, J.S., 2015. Security for the internet of things: a survey of ub.com/jpmorganchase/quorum. (Accessed 15 July 2020).
existing protocols and open research issues. IEEE Communications Surveys & Karamitsos, I., Papadaki, M., Barghuthi, N.B., 2018. Design of the blockchain smart
Tutorials 17 (3), 1294–1312. https://doi.org/10.1109/comst.2015.2388550. contract: a use case for real estate. J. Inf. Secur. 9 (3), 177–190. https://doi.org/
Griggs, K.N., Ossipova, O., Kohlios, C.P., Baccarini, A.N., Howson, E.A., Hayajneh, T., 10.4236/jis.2018.93013.
2018. Healthcare blockchain system using smart contracts for secure automated Khan, M.A., Salah, K., 2018. IoT security: review, blockchain solutions, and open
remote patient monitoring. J. Med. Syst. 42 (7) https://doi.org/10.1007/s10916- challenges. Future Generat. Comput. Syst. 82, 395–411. https://doi.org/10.1016/j.
018-0982-x. future.2017.11.022.
Gupta, R., Tanwar, S., Al-Turjman, F., Italiya, P., Nauman, A., Kim, S.W., 2020a. Smart Kiayias, A., Zindros, D., 2020. Proof-of-Work sidechains. Financial Cryptography and
contract privacy protection using AI in cyber-physical systems: tools, techniques and Data Security Lecture Notes in Computer Science 21–34. https://doi.org/10.1007/
challenges. IEEE Access 8, 24746–24772. https://doi.org/10.1109/ 978-3-030-43725-1_3.
access.2020.2970576. Kolias, C., Kambourakis, G., Stavrou, A., Voas, J., 2017. DDoS in the IoT: mirai and other
Gupta, S., Sinha, S., Bhushan, B., 2020b. Emergence of blockchain technology: botnets. Computer 50 (7), 80–84. https://doi.org/10.1109/mc.2017.201.
fundamentals, working and its various implementations. SSRN Electronic Journal. Kouicem, D.E., Bouabdallah, A., Lakhlef, H., 2018. Internet of things security: a top-
https://doi.org/10.2139/ssrn.3569577. down survey. Comput. Network. 141, 199–221. https://doi.org/10.1016/j.
Gürkaynak, G., Yılmaz, I., Yeşilaltay, B., Bengi, B., 2018. Intellectual property law and comnet.2018.03.012.
practice in the blockchain realm. Comput. Law Secur. Rep. 34 (4), 847–862. https:// Kumar, T., Harjula, E., Ejaz, M., Manzoor, A., Porambage, P., Ahmad, I., Ylianttila, M.,
doi.org/10.1016/j.clsr.2018.05.027. 2020. BlockEdge: blockchain-edge framework for industrial IoT networks. IEEE
Haber, S., Stornetta, W.S., 1991. How to time-stamp a digital document. J. Cryptol. 3 (2), Access 8, 154166–154185. https://doi.org/10.1109/access.2020.3017891.
99–111. https://doi.org/10.1007/bf00196791.

22
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

Kwon, D., Hodkiewicz, M.R., Fan, J., Shibutani, T., Pecht, M.G., 2016. IoT-based Malik, A., Gautam, S., Abidin, S., Bhushan, B., 2019a. Blockchain technology-future of
prognostics and systems health management for industrial applications. IEEE Access IoT: including structure, limitations and various possible attacks. In: 2019 2nd
4, 3659–3670. https://doi.org/10.1109/access.2016.2587754. International Conference on Intelligent Computing. Instrumentation and Control
Lao, L., Dai, X., Xiao, B., Guo, S., 2020. G-PBFT: a location-based and scalable consensus Technologies (ICICICT). https://doi.org/10.1109/icicict46008.2019.8993144.
protocol for IoT-blockchain applications. In: 2020 IEEE International Parallel and Malik, S., Dedeoglu, V., Kanhere, S.S., Jurdak, R., 2019b. TrustChain: trust management
Distributed Processing Symposium (IPDPS). https://doi.org/10.1109/ in blockchain and IoT supported supply chains. In: 2019 IEEE International
ipdps47924.2020.00074. Conference on Blockchain (Blockchain). https://doi.org/10.1109/
Le-Dang, Q., Le-Ngoc, T., 2019. Scalable blockchain-based architecture for massive IoT blockchain.2019.00032.
reconfiguration. In: 2019 IEEE Canadian Conference of Electrical and Computer Mangia, M., Marchioni, A., Pareschi, F., Rovatti, R., Setti, G., 2019. Chained compressed
Engineering (CCECE). https://doi.org/10.1109/ccece.2019.8861858. sensing: a blockchain-inspired approach for low-cost security in IoT sensing. IEEE
Leiding, B., Memarmoshrefi, P., Hogrefe, D., 2016. Self-managed and blockchain-based Internet of Things Journal 6 (4), 6465–6475. https://doi.org/10.1109/
vehicular ad-hoc networks. In: Proceedings of the 2016 ACM International Joint jiot.2019.2910402.
Conference on Pervasive and Ubiquitous Computing: Adjunct. https://doi.org/ Manimuthu, A., Rs, V., R, G., Marwaha, D., 2019. A literature review on bitcoin:
10.1145/2968219.2971409. transformation of crypto currency into a global phenomenon. IEEE Eng. Manag. Rev.
Leithardt, V., Santos, D., Silva, L., Viel, F., Zeferino, C., Silva, J., 2020. A solution for 47 (1), 28–35. https://doi.org/10.1109/emr.2019.2901431.
dynamic management of user profiles in IoT environments. IEEE Latin America Meneghello, F., Calore, M., Zucchetto, D., Polese, M., Zanella, A., 2019. IoT: internet of
Transactions 18 (7), 1193–1199. https://doi.org/10.1109/tla.2020.9099759. threats? A survey of practical security vulnerabilities in real IoT devices. IEEE
Leased Proof of Stake”, Available Online: https://docs.wavesprotocol.org/en/blockchain Internet of Things Journal 6 (5), 8182–8201. https://doi.org/10.1109/
/leasing (Accessed on 19 July 2020). jiot.2019.2935189.
Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q., 2020a. A survey on the security of blockchain Miloslavskaya, N., Tolstoy, A., 2018. Internet of Things: information security challenges
systems. Future Generat. Comput. Syst. 107, 841–853. https://doi.org/10.1016/j. and solutions. Cluster Comput. 22 (1), 103–119. https://doi.org/10.1007/s10586-
future.2017.08.020. 018-2823-6.
Li, Y., Cao, B., Peng, M., Zhang, L., Zhang, L., Feng, D., Yu, J., 2020b. Direct acyclic Minoli, D., Occhiogrosso, B., 2018. Blockchain mechanisms for IoT security. Internet of
graph-based ledger for internet of things: performance and security analysis. IEEE/ Things 1–2, 1–13. https://doi.org/10.1016/j.iot.2018.05.002.
ACM Trans. Netw. 28 (4), 1643–1656. https://doi.org/10.1109/tnet.2020.2991994. Modha, D.S., Ananthanarayanan, R., Esser, S.K., Ndirango, A., Sherbondy, A.J., Singh, R.,
Lin, C., He, D., Huang, X., Choo, K.R., Vasilakos, A.V., 2018. BSeIn: a blockchain-based 2011. Cognitive computing. Commun. ACM 54 (8), 62–71. https://doi.org/10.1145/
secure mutual authentication with fine-grained access control system for industry 1978542.1978559.
4.0. J. Netw. Comput. Appl. 116, 42–52. https://doi.org/10.1016/j. Mohanta, B.K., Jena, D., Satapathy, U., Patnaik, S., 2020. Survey on IoT security:
jnca.2018.05.005. challenges and solution using machine learning, artificial intelligence and
Lin, X., Li, J., Wu, J., Liang, H., Yang, W., 2019. Making knowledge tradable in edge-AI blockchain technology. Internet of Things 11, 100227. https://doi.org/10.1016/j.
enabled IoT: a consortium blockchain-based efficient and incentive approach. IEEE iot.2020.100227.
Transactions on Industrial Informatics 15 (12), 6367–6378. https://doi.org/ Mohanty, S.N., Ramya, K., Rani, S.S., Gupta, D., Shankar, K., Lakshmanaprabu, S.,
10.1109/tii.2019.2917307. Khanna, A., 2020. An efficient Lightweight integrated Blockchain (ELIB) model for
Lin, C., He, D., Kumar, N., Huang, X., Vijayakumar, P., Choo, K.-K.R., 2020a. IoT security and privacy. Future Generat. Comput. Syst. 102, 1027–1037. https://
HomeChain: a blockchain-based secure mutual authentication system for smart doi.org/10.1016/j.future.2019.09.050.
homes. IEEE Internet of Things Journal 7 (2), 818–829. https://doi.org/10.1109/ Multichain: Open platform for blockchain applications,” https://www.multichain.com/
jiot.2019.2944400. (accessed July 15, 2020).
Lin, X., Wu, J., Bashir, A.K., Li, J., Yang, W., Piran, J., 2020b. Blockchain-based incentive Munoz, R., Vilalta, R., Yoshikane, N., Casellas, R., Martinez, R., Tsuritani, T., Morita, I.,
energy-knowledge trading in IoT: joint power transfer and AI design. IEEE Internet 2018. Integration of IoT, Transport SDN, and edge/cloud computing for dynamic
of Things Journal. https://doi.org/10.1109/jiot.2020.3024246, 1-1. distribution of IoT analytics and efficient use of network resources. J. Lightwave
Liu, Z., Li, Z., 2020. A blockchain-based framework of cross-border e-commerce supply Technol. 36 (7), 1420–1428. https://doi.org/10.1109/jlt.2018.2800660.
chain. Int. J. Inf. Manag. 52, 102059. https://doi.org/10.1016/j. Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., Ghani, N., 2019. Demystifying
ijinfomgt.2019.102059. IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on
Liu, B., Yu, X.L., Chen, S., Xu, X., Zhu, L., 2017. Blockchain based data integrity service internet-scale IoT exploitations. IEEE Communications Surveys & Tutorials 21 (3),
framework for IoT data. In: 2017 IEEE International Conference on Web Services 2702–2733. https://doi.org/10.1109/comst.2019.2910750.
(ICWS). https://doi.org/10.1109/icws.2017.54. Ngu, A.H., Gutierrez, M., Metsis, V., Nepal, S., Sheng, M.Z., 2016. IoT middleware: a
Liu, Z., Tang, S., Chow, S.S., Liu, Z., Long, Y., 2019. Fork-free hybrid consensus with survey on issues and enabling technologies. IEEE Internet of Things Journal. https://
flexible Proof-of-Activity. Future Generat. Comput. Syst. 96, 515–524. https://doi. doi.org/10.1109/jiot.2016.2615180, 1-1.
org/10.1016/j.future.2019.02.059. Novak, M., 2019. Crypto-friendliness: understanding blockchain public policy. Journal of
Liu, H., Han, D., Li, D., 2020. Fabric-iot: a blockchain-based access control system in IoT. Entrepreneurship and Public Policy 9 (2), 165–184. https://doi.org/10.1108/jepp-
IEEE Access 8, 18207–18218. https://doi.org/10.1109/access.2020.2968492. 03-2019-0014.
Lizcano, D., Lara, J.A., White, B., Aljawarneh, S., 2019. Blockchain-based approach to Odwyer, K., Malone, D., 2014. Bitcoin mining and its energy footprint. In: 25th IET Irish
create a model of trust in open and ubiquitous higher education. J. Comput. High Signals & Systems Conference 2014 and 2014 China-Ireland International
Educ. 32 (1), 109–134. https://doi.org/10.1007/s12528-019-09209-y. Conference on Information and Communities Technologies (ISSC 2014/CIICT 2014).
Lotti, L., 2016. Contemporary art, capitalization and the blockchain: on the autonomy https://doi.org/10.1049/cp.2014.0699.
and automation of art’s value. Finance and Society 2 (2), 96. https://doi.org/ Omar, A.A., Bhuiyan, M.Z., Basu, A., Kiyomoto, S., Rahman, M.S., 2019. Privacy-friendly
10.2218/finsoc.v2i2.1724. platform for healthcare data in cloud based on blockchain environment. Future
Lu, Y., 2018. Blockchain and the related issues: a review of current research topics. Generat. Comput. Syst. 95, 511–521. https://doi.org/10.1016/j.future.2018.12.044.
Journal of Management Analytics 5 (4), 231–255. https://doi.org/10.1080/ Ouaddah, A., Elkalam, A.A., Ouahman, A.A., 2016. FairAccess: a new Blockchain-based
23270012.2018.1516523. access control framework for the Internet of Things. Secur. Commun. Network. 9
Lu, Y., Huang, X., Dai, Y., Maharjan, S., Zhang, Y., 2020. Blockchain and federated (18), 5943–5964. https://doi.org/10.1002/sec.1748.
learning for privacy-preserved data sharing in industrial IoT. IEEE Transactions on Ozyilmaz, K.R., Yurdakul, A., 2019. Designing a blockchain-based IoT with Ethereum,
Industrial Informatics 16 (6), 4177–4186. https://doi.org/10.1109/ swarm, and LoRa: the software solution to create high availability with minimal
tii.2019.2942190. security risks. IEEE Consumer Electronics Magazine 8 (2), 28–34. https://doi.org/
Luo, T., Huang, J., Kanhere, S.S., Zhang, J., Das, S.K., 2019. Improving IoT data quality 10.1109/mce.2018.2880806.
in mobile crowd sensing: a cross validation approach. IEEE Internet of Things Pan, W., Zheng, F., Zhao, Y., Zhu, W., Jing, J., 2017. An efficient elliptic Curve
Journal 6 (3), 5651–5664. https://doi.org/10.1109/jiot.2019.2904704. cryptography signature server with GPU acceleration. IEEE Trans. Inf. Forensics
Luo, B., Li, X., Weng, J., Guo, J., Ma, J., 2020. Blockchain enabled trust-based location Secur. 12 (1), 111–122. https://doi.org/10.1109/tifs.2016.2603974.
privacy protection scheme in VANET. IEEE Trans. Veh. Technol. 69 (2), 2034–2048. Pervez, H., Muneeb, M., Irfan, M.U., Haq, I.U., 2018. A comparative analysis of DAG-
https://doi.org/10.1109/tvt.2019.2957744. based blockchain architectures. In: 2018 12th International Conference on Open
Luu, L., Chu, D.-H., Olickel, H., Saxena, P., Hobor, A., 2016. Making smart contracts Source Systems and Technologies (ICOSST). https://doi.org/10.1109/
smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and icosst.2018.8632193.
Communications Security. https://doi.org/10.1145/2976749.2978309. Pilkington, M., 2016. Blockchain technology: principles and applications. Research
Lyu, Q., Qi, Y., Zhang, X., Liu, H., Wang, Q., Zheng, N., 2020. SBAC: a secure blockchain- Handbook on Digital Transformations 225–253. https://doi.org/10.4337/
based access control framework for information-centric networking. J. Netw. 9781784717766.00019.
Comput. Appl. 149, 102444. https://doi.org/10.1016/j.jnca.2019.102444. Poongodi, T., Ramya, S.R., Suresh, P., Balusamy, B., 2020. Application of IoT in green
Madaan, G., Bhushan, B., Kumar, R., 2020. Blockchain-based cyberthreat mitigation computing. Advances in Greener Energy Technologies Green Energy and Technology
systems for smart vehicles and industrial automation. Studies in big data multimedia 295–323. https://doi.org/10.1007/978-981-15-4246-6_19.
technologies in the internet of things environment, pp. 13–32. https://doi.org/ Proof of Importance (PoI). (2015). Retrieved from https://sci.smithandcrown.com/gloss
10.1007/978-981-15-7965-3_2. ary/proof-of-importance (accessed July 15, 2020).
Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R.P., Ni, W., 2019. Anatomy of threats to Prybila, C., Schulte, S., Hochreiner, C., Weber, I., 2020. Runtime verification for business
the internet of things. IEEE Communications Surveys & Tutorials 21 (2), 1636–1675. processes utilizing the Bitcoin blockchain. Future Generat. Comput. Syst. 107,
https://doi.org/10.1109/comst.2018.2874978. 816–831. https://doi.org/10.1016/j.future.2017.08.024.
Makhdoom, I., Zhou, I., Abolhasan, M., Lipman, J., Ni, W., 2020. PrivySharing: a Qashlan, A., Nanda, P., He, X., 2019. Automated Ethereum smart contract for block chain
blockchain-based framework for privacy-preserving and secure data sharing in smart based smart home security. Smart Systems and IoT: Innovations in Computing Smart
cities. Comput. Secur. 88, 101653. https://doi.org/10.1016/j.cose.2019.101653.

23
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

Innovation, Systems and Technologies 313–326. https://doi.org/10.1007/978-981- She, W., Gu, Z.-H., Lyu, X.-K., Liu, Q., Tian, Z., Liu, W., 2019b. Homomorphic consortium
13-8406-6_31. blockchain for smart home system sensitive data privacy preserving. IEEE Access 7,
Qi, S., Lu, Y., Zheng, Y., Li, Y., Chen, X., 2020. Cpds: enabling compressed and private 62058–62070. https://doi.org/10.1109/access.2019.2916345.
data sharing for industrial IoT over blockchain. IEEE Transactions on Industrial Shen, M., Tang, X., Zhu, L., Du, X., Guizani, M., 2019. Privacy-preserving support vector
Informatics. https://doi.org/10.1109/tii.2020.2998166, 1-1. machine training over blockchain-based encrypted IoT data in smart cities. IEEE
Quincozes, S., Emilio, T., Kazienko, J., 2019. MQTT protocol: fundamentals, tools and Internet of Things Journal 6 (5), 7702–7712. https://doi.org/10.1109/
future directions. IEEE Latin America Transactions 17 (9), 1439–1448. https://doi. jiot.2019.2901840.
org/10.1109/tla.2019.8931137. Sicari, S., Rizzardi, A., Cappiello, C., Miorandi, D., Coen-Porisini, A., 2017. Toward data
Radhakrishnan, G., Gopalakrishnan, V., 2020. Applications of internet of things (IOT) to governance in the internet of things. New Advances in the Internet of Things Studies
improve the stability of a grid connected power system using interline power flow in Computational Intelligence 59–74. https://doi.org/10.1007/978-3-319-58190-3_
controller. Microprocess. Microsyst. 76, 103038. https://doi.org/10.1016/j. 4.
micpro.2020.103038. Sicari, S., Rizzardi, A., Miorandi, D., Coen-Porisini, A., 2018. REATO: REActing TO
Rahman, M.A., Rashid, M.M., Hossain, M.S., Hassanain, E., Alhamid, M.F., Guizni, M., denial of service attacks in the internet of things. Comput. Network. 137, 37–48.
2019. Blockchain and IoT-based cognitive edge framework for sharing economy https://doi.org/10.1016/j.comnet.2018.03.020.
services in a smart city. IEEE Access 7, 18611–18621. https://doi.org/10.1109/ Sinche, S., Raposo, D., Armando, N., Rodrigues, A., Boavida, F., Pereira, V., Silva, J.S.,
access.2019.2896065. 2020. A survey of IoT management protocols and frameworks. IEEE
Rathi, R., Sharma, N., Manchanda, C., Bhushan, B., Grover, M., 2020. Security challenges Communications Surveys & Tutorials 22 (2), 1168–1190. https://doi.org/10.1109/
& controls in cyber physical system. In: 2020 IEEE 9th International Conference on comst.2019.2943087.
Communication Systems and Network Technologies (CSNT). https://doi.org/ Singh, A., Parizi, R.M., Zhang, Q., Choo, K.R., Dehghantanha, A., 2020. Blockchain smart
10.1109/csnt48778.2020.9115778. contracts formalization: approaches and challenges to address vulnerabilities.
Ren, C., Lyu, X., Ni, W., Tian, H., Song, W., Liu, R.P., 2020. Distributed online Comput. Secur. 88, 101654. https://doi.org/10.1016/j.cose.2019.101654.
optimization of fog computing for internet-of-things under finite device buffers. IEEE Sinha, P., Rai, A.K., Bhushan, B., 2019. Information Security threats and attacks with
Internet of Things Journal. https://doi.org/10.1109/jiot.2020.2979353, 1–1. conceivable counteraction. In: 2019 2nd International Conference on Intelligent
Restuccia, F., D’oro, S., Melodia, T., 2018. Securing the internet of things in the Age of Computing. Instrumentation and Control Technologies (ICICICT). https://doi.org/
machine learning and software-defined networking. IEEE Internet of Things Journal 10.1109/icicict46008.2019.8993384.
5 (6), 4829–4842. https://doi.org/10.1109/jiot.2018.2846040. Soni, S., Bhushan, B., 2019. A Comprehensive survey on Blockchain: working, security
Ritz, F., Zugenmaier, A., 2018. The impact of uncle rewards on selfish mining in analysis, privacy threats and potential applications. In: 2019 2nd International
Ethereum. In: 2018 IEEE European Symposium on Security and Privacy Workshops Conference on Intelligent Computing. Instrumentation and Control Technologies
(EuroS&PW). https://doi.org/10.1109/eurospw.2018.00013. (ICICICT). https://doi.org/10.1109/icicict46008.2019.8993210.
Rivera, A.O., Tosh, D.K., Njilla, L., 2019. Scalable blockchain implementation for edge- Su, L., Vaidya, N.H., 2017. Reaching approximate Byzantine consensus with multi-hop
based internet of things platform. In: MILCOM 2019 - 2019 IEEE Military communication. Inf. Comput. 255, 352–368. https://doi.org/10.1016/j.
Communications Conference (MILCOM). https://doi.org/10.1109/ ic.2016.12.003.
milcom47813.2019.9020726. Tendermint. Available online. https://tendermint.com. (Accessed 19 July 2020).
Rouhani, S., Deters, R., 2019. Security, performance, and applications of smart contracts: Tran-Dang, H., Kim, D., 2018. An information framework for internet of things services
a systematic survey. IEEE Access 7, 50759–50779. https://doi.org/10.1109/ in physical internet. IEEE Access 6, 43967–43977. https://doi.org/10.1109/
access.2019.2911031. access.2018.2864310.
Sabrina, F., 2019. Blockchain and structural relationship based access control for IoT: a Tschorsch, F., Scheuermann, B., 2016. Bitcoin and beyond: a technical survey on
smart city use case. In: 2019 IEEE 44th Conference on Local Computer Networks decentralized digital currencies. IEEE Communications Surveys & Tutorials 18 (3),
(LCN). https://doi.org/10.1109/lcn44214.2019.8990757. 2084–2123. https://doi.org/10.1109/comst.2016.2535718.
Saleh, F., 2018. Blockchain without waste: proof-of-stake. SSRN Electronic Journal. Vaio, A.D., Varriale, L., 2020. Blockchain technology in supply chain management for
https://doi.org/10.2139/ssrn.3183935. sustainable performance: evidence from the airport industry. Int. J. Inf. Manag. 52,
Salman, T., Zolanvari, M., Erbad, A., Jain, R., Samaka, M., 2019. Security services using 102014. https://doi.org/10.1016/j.ijinfomgt.2019.09.010.
blockchains: a state of the art survey. IEEE Communications Surveys & Tutorials 21 Valdivia, L.J., Del-Valle-Soto, C., Rodriguez, J., Alcaraz, M., 2019. Decentralization: the
(1), 858–880. https://doi.org/10.1109/comst.2018.2863956. failed promise of cryptocurrencies. IT Professional 21 (2), 33–40. https://doi.org/
Sankar, L.S., Sindhu, M., Sethumadhavan, M., 2017. Survey of consensus protocols on 10.1109/mitp.2018.2876932.
blockchain applications. In: 2017 4th International Conference on Advanced Varshney, T., Sharma, N., Kaushik, I., Bhushan, B., 2019. Architectural model of security
Computing and Communication Systems (ICACCS). https://doi.org/10.1109/ threats & their countermeasures in IoT. In: 2019 International Conference on
icaccs.2017.8014672. Computing, Communication, and Intelligent Systems (ICCCIS). https://doi.org/
Sasson, E.B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M., 2014. 10.1109/icccis48478.2019.8974544.
Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE Venkatesh, V., Kang, K., Wang, B., Zhong, R.Y., Zhang, A., 2020. System architecture for
Symposium on Security and Privacy. https://doi.org/10.1109/sp.2014.36. blockchain based transparency of supply chain social sustainability. Robot. Comput.
Sayeed, S., Marco-Gisbert, H., Caira, T., 2020. Smart contract: attacks and protections. Integrated Manuf. 63, 101896. https://doi.org/10.1016/j.rcim.2019.101896.
IEEE Access 8, 24416–24427. https://doi.org/10.1109/access.2020.2970495. Wahyudi, A., Pekkola, S., Janssen, M., 2018. Representational quality challenges of big
Schneider, S., Leyer, M., Tate, M., 2020. The transformational impact of blockchain data: insights from comparative case studies. Lecture Notes in Computer Science
technology on business models and ecosystems: a symbiosis of human and Challenges and Opportunities in the Digital Era 520–538. https://doi.org/10.1007/
technology agents. IEEE Trans. Eng. Manag. 1–12. https://doi.org/10.1109/ 978-3-030-02131-3_46.
tem.2020.2972037. Wamba, S.F., Queiroz, M.M., 2020. Blockchain in the operations and supply chain
Schrijvers, O., Bonneau, J., Boneh, D., Roughgarden, T., 2017. Incentive compatibility of management: benefits, challenges and future research opportunities. Int. J. Inf.
bitcoin mining pool reward functions. Financial Cryptography and Data Security Manag. 52, 102064. https://doi.org/10.1016/j.ijinfomgt.2019.102064.
Lecture Notes in Computer Science 477–498. https://doi.org/10.1007/978-3-662- Wang, X., Weili, J., Chai, J., 2018a. The research on the incentive method of consortium
54970-4_28. blockchain based on practical Byzantine Fault tolerant. In: 2018 11th International
Schwartz, David, Youngs, Noah, Arthur, Britto, 2014. The Ripple Protocol Consensus Symposium on Computational Intelligence and Design (ISCID). https://doi.org/
Algorithm, vol. 5. Ripple Labs Inc White Paper. 10.1109/iscid.2018.10136.
Sekaran, R., Patan, R., Raveendran, A., Al-Turjman, F., Ramachandran, M., Mostarda, L., Wang, S., Wang, J., Wang, X., Qiu, T., Yuan, Y., Ouyang, L., Wang, F., 2018b. Blockchain-
2020. Survival study on blockchain based 6G-enabled mobile edge computation for powered Parallel healthcare systems based on the ACP approach. IEEE Transactions
IoT automation. IEEE Access 8, 143453–143463. https://doi.org/10.1109/ on Computational Social Systems 5 (4), 942–950. https://doi.org/10.1109/
access.2020.3013946. tcss.2018.2865526.
Sengupta, J., Ruj, S., Bit, S.D., 2020. A comprehensive survey on attacks, security issues Wang, Y., Cai, S., Lin, C., Chen, Z., Wang, T., Gao, Z., Zhou, C., 2019a. Study of
and blockchain solutions for IoT and IIoT. J. Netw. Comput. Appl. 149, 102481. blockchains’s consensus mechanism based on credit. IEEE Access 7, 10224–10231.
https://doi.org/10.1016/j.jnca.2019.102481. https://doi.org/10.1109/access.2019.2891065.
Sethi, R., Bhushan, B., Sharma, N., Kumar, R., Kaushik, I., 2020. Applicability of Wang, S., Ouyang, L., Yuan, Y., Ni, X., Han, X., Wang, F.-Y., 2019b. Blockchain-enabled
industrial IoT in diversified sectors: evolution, applications and challenges. Studies smart contracts: architecture, applications, and future trends. IEEE Transactions on
in big data multimedia technologies in the internet of things environment, Systems, Man, and Cybernetics: Systems 49 (11), 2266–2277. https://doi.org/
pp. 45–67. https://doi.org/10.1007/978-981-15-7965-3_4. 10.1109/tsmc.2019.2895123.
Shafagh, H., Burkhalter, L., Hithnawi, A., Duquennoy, S., 2017. Towards blockchain- Wang, W., Hoang, D.T., Hu, P., Xiong, Z., Niyato, D., Wang, P., et al., 2019c. A survey on
based auditable storage and sharing of IoT data. In: Proceedings of the 2017 on consensus mechanisms and mining strategy management in blockchain networks.
Cloud Computing Security Workshop - CCSW, vol. 17. https://doi.org/10.1145/ IEEE Access 7, 22328–22370. https://doi.org/10.1109/access.2019.2896108.
3140649.3140656. Wang, S., Li, D., Zhang, Y., Chen, J., 2019d. Smart contract-based product traceability
Shahnaz, A., Qamar, U., Khalid, A., 2019. Using blockchain for electronic health records. system in the supply chain scenario. IEEE Access 7, 115122–115133. https://doi.
IEEE Access 7, 147782–147795. https://doi.org/10.1109/access.2019.2946373. org/10.1109/access.2019.2935873.
Sharma, P.K., Kumar, N., Park, J.H., 2020. Blockchain Technology toward Green IoT: Wang, X., Zha, X., Ni, W., Liu, R.P., Guo, Y.J., Niu, X., Zheng, K., 2019e. Survey on
Opportunities and Challenges. IEEE Network, pp. 1–7. https://doi.org/10.1109/ blockchain for internet of things. Comput. Commun. 136, 10–29. https://doi.org/
mnet.001.1900526. 10.1016/j.comcom.2019.01.006.
She, W., Gu, Z., Lyu, X., Liu, Q., Tian, Z., Liu, W., 2019a. Homomorphic consortium Wang, Q., Zhu, X., Ni, Y., Gu, L., Zhu, H., 2020a. Blockchain for the IoT and industrial
blockchain for smart home system sensitive data privacy preserving. IEEE Access 7, IoT: a review. Internet of Things 10, 100081. https://doi.org/10.1016/j.
62058–62070. https://doi.org/10.1109/access.2019.2916345. iot.2019.100081.

24
S. Saxena et al. Journal of Network and Computer Applications 181 (2021) 103050

Wang, Z., Luo, N., Zhou, P., 2020b. GuardHealth: blockchain empowered secure data Yin, C., Xi, J., Sun, R., Wang, J., 2018. Location privacy protection based on differential
management and Graph Convolutional Network enabled anomaly detection in smart privacy strategy for big data in industrial internet of things. IEEE Transactions on
healthcare. J. Parallel Distr. Comput. 142, 1–12. https://doi.org/10.1016/j. Industrial Informatics 14 (8), 3628–3636. https://doi.org/10.1109/
jpdc.2020.03.004. tii.2017.2773646.
Wei, P., Wang, D., Zhao, Y., Tyagi, S.K., Kumar, N., 2020. Blockchain data-based cloud Yin, B., Wu, Y., Hu, T., Dong, J., Jiang, Z., 2020. An efficient collaboration and incentive
data integrity protection mechanism. Future Generat. Comput. Syst. 102, 902–911. mechanism for internet of vehicles (IoV) with secured information exchange based
https://doi.org/10.1016/j.future.2019.09.028. on blockchains. IEEE Internet of Things Journal 7 (3), 1582–1593. https://doi.org/
What is a DAO?. Available. https://blockchainhub.net/dao-decentralized-autonomous-o 10.1109/jiot.2019.2949088.
rganization/. (Accessed 15 July 2020). Yuan, Y., Wang, F.-Y., 2018. Blockchain and cryptocurrencies: model, techniques, and
Wood, G., Ethereum, “, 2014. A Secure Decentralised Generalised Transaction Ledger, applications. IEEE Transactions on Systems, Man, and Cybernetics: Systems 48 (9),
vol. 151. Ethereum Project Yellow Paper. 1421–1428. https://doi.org/10.1109/tsmc.2018.2854904.
Wu, B., Li, Q., Xu, K., Li, R., Liu, Z., 2018. SmartRetro: blockchain-based incentives for Zha, X., Zheng, K., Zhang, D., 2016. Anti-pollution source location privacy preserving
distributed IoT retrospective detection. In: 2018 IEEE 15th International Conference scheme in wireless sensor networks. In: 2016 13th Annual IEEE International
on Mobile Ad Hoc and Sensor Systems (MASS). https://doi.org/10.1109/ Conference on Sensing, Communication, and Networking (SECON). https://doi.org/
mass.2018.00053. 10.1109/sahcn.2016.7732970.
Wu, M., Wang, K., Cai, X., Guo, S., Guo, M., Rong, C., 2019a. A comprehensive survey of Zhang, X., Chen, X., 2019. Data security sharing and storage based on a consortium
blockchain: from theory to IoT applications and beyond. IEEE Internet of Things blockchain in a vehicular ad-hoc network. IEEE Access 7, 58241–58254. https://doi.
Journal 6 (5), 8114–8154. https://doi.org/10.1109/jiot.2019.2922538. org/10.1109/access.2018.2890736.
Wu, J., Xiong, F., Li, C., 2019b. Application of internet of things and blockchain Zhang, Y., Wen, J., 2016. The IoT electric business model: using blockchain technology
technologies to improve accounting information quality. IEEE Access 7, for the internet of things. Peer-to-Peer Networking and Applications 10 (4),
100090–100098. https://doi.org/10.1109/access.2019.2930637. 983–994. https://doi.org/10.1007/s12083-016-0456-1.
Wu, H., Wolter, K., Jiao, P., Deng, Y., Zhao, Y., Xu, M., 2020. EEDTO: an energy-efficient Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., Wan, J., 2019. Smart contract-based access
dynamic task offloading algorithm for blockchain-enabled IoT-edge-cloud control for the internet of things. IEEE Internet of Things Journal 6 (2), 1594–1605.
orchestrated computing. IEEE Internet of Things Journal. https://doi.org/10.1109/ https://doi.org/10.1109/jiot.2018.2847705.
jiot.2020.3033521, 1-1. Zhao, L., Yu, J., 2019. Evaluating DAG-based blockchains for IoT. In: 2019 18th IEEE
Xia, Q., Sifah, E.B., Asamoah, K.O., Gao, J., Du, X., Guizani, M., 2017. MeDShare: trust- International Conference on Trust, Security and Privacy in Computing and
less medical data sharing among cloud service providers via blockchain. IEEE Access Communications/13th IEEE International Conference on Big Data Science and
5, 14757–14767. https://doi.org/10.1109/access.2017.2730843. Engineering (TrustCom/BigDataSE). https://doi.org/10.1109/trustcom/
Xiong, J., Ren, J., Chen, L., Yao, Z., Lin, M., Wu, D., Niu, B., 2019. Enhancing privacy and bigdatase.2019.00074.
availability for data clustering in intelligent electrical service of IoT. IEEE Internet of Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H., 2017. An overview of blockchain
Things Journal 6 (2), 1530–1540. https://doi.org/10.1109/jiot.2018.2842773. technology: architecture, consensus, and future trends. In: 2017 IEEE International
Xu, R., Wang, R., Guan, Z., Wu, L., Wu, J., Du, X., 2017a. Achieving efficient detection Congress on Big Data (BigData Congress). https://doi.org/10.1109/
against false data injection attacks in smart grid. IEEE Access 5, 13787–13798. bigdatacongress.2017.85.
https://doi.org/10.1109/access.2017.2728681. Zheng, Z., Xie, S., Dai, H.N., Chen, X., Wang, H., 2018. Blockchain challenges and
Xu, R., Wang, R., Guan, Z., Wu, L., Wu, J., Du, X., 2017b. Achieving efficient detection opportunities: a survey. Int. J. Web Grid Serv. 14 (4), 352. https://doi.org/10.1504/
against false data injection attacks in smart grid. IEEE Access 5, 13787–13798. ijwgs.2018.095647.
https://doi.org/10.1109/access.2017.2728681.
Xu, X., Zeng, Z., Yang, S., Shao, H., 2020a. A novel blockchain framework for industrial
Shivam Saxena is a graduate student of Department of Computer Science and Engineering,
IoT edge computing. Sensors 20 (7), 2061. https://doi.org/10.3390/s20072061.
HMR Institute of Technology and Management, New Delhi, India. He has completed
Xu, J., Wang, S., Zhou, A., Yang, F., 2020b. Edgence: a blockchain-enabled edge-
several training modules and developed projects based on blockchain technology and
computing platform for intelligent IoT-based dApps. China Communications 17 (4),
smart contracts. He is IEEE student member. He has published several research papers in
78–87. https://doi.org/10.23919/jcc.2020.04.008.
reputed international conferences. His research area includes Internet of Things, Block­
Xu, X., Zhang, X., Gao, H., Xue, Y., Qi, L., Dou, W., 2020c. BeCome: blockchain-enabled
chain and Supply Chain Management.
computation offloading for IoT in mobile edge computing. IEEE Transactions on
Industrial Informatics 16 (6), 4187–4195. https://doi.org/10.1109/
tii.2019.2936869. Bharat Bhushan received the B.Tech. degree in computer science and engineering from
Yadav, S., Singh, S.P., 2020. Blockchain critical success factors for sustainable supply SHIATS, Allahabad, India in 2012, and the M.Tech degree in information security from
chain. Resour. Conserv. Recycl. 152, 104505. https://doi.org/10.1016/j. Birla Institute of Technology, Mesra, Jharkhand, India in 2015, and is currently working
resconrec.2019.104505. toward the Ph.D. degree at Birla Institute of Technology, Mesra, Jharkhand, India. From
Yamada, Y., Shinkuma, R., Iwai, T., Onishi, T., Nobukiyo, T., Satoda, K., 2018. Temporal 2012 through 2013, he worked as a network engineer at HCL Infosystems Ltd., Noida,
traffic smoothing for IoT traffic in mobile networks. Comput. Network. 146, India. Currently, he is working as assistant professor in the Department of Computer
115–124. https://doi.org/10.1016/j.comnet.2018.08.020. Science and Engineering, School of Engineering and Technology, Sharda university. He is
Yang, Z., Zheng, K., Yang, K., Leung, V.C.M., 2017. A blockchain-based reputation IEEE student member. He has published more than 50 scientific research publications in
system for data credibility assessment in vehicular networks. In: 2017 IEEE 28th reputed International Journals and Conferences including 7 SCI Indexed journal publica­
Annual International Symposium on Personal, Indoor, and Mobile Radio tions. His research interests include Wireless Sensor Networks, Internet of Things and
Communications (PIMRC). https://doi.org/10.1109/pimrc.2017.8292724. Blockchain.
Yang, F., Zhou, W., Wu, Q., Long, R., Xiong, N.N., Zhou, M., 2019. Delegated proof of
stake with downgrade: a secure and efficient blockchain consensus algorithm with
Dr. Mohd Abdul Ahad is currently working in the Department of Computer Science and
downgrade mechanism. IEEE Access 7, 118541–118555. https://doi.org/10.1109/
Engineering, School of Engineering Sciences and Technology, Jamia Hamdard, New Delhi,
access.2019.2935149.
India. He has a rich experience of more than 11 years in the field of Computer Science and
Yao, H., Mai, T., Wang, J., Ji, Z., Jiang, C., Qian, Y., 2019. Resource trading in
Engineering. He obtained his Ph.D. degree in the field of Big Data Architecture. His
blockchain-based industrial internet of things. IEEE Transactions on Industrial
research areas include big data architecture, Distributed Computing, IoT, Sustainable
Informatics 15 (6), 3602–3609. https://doi.org/10.1109/tii.2019.2902563.
Computing and Blockchain Technology. He has published several research papers in
Yazdinejad, A., Srivastava, G., Parizi, R.M., Dehghantanha, A., Karimipour, H.,
various International Journals of repute. He has chaired several sessions in International
Karizno, S.R., 2020. SLPoW: secure and low latency proof of work protocol for
Conferences of Springer, Elsevier etc. He is a Certified Microsoft Innovative Educator and a
blockchain in green IoT networks. In: 2020 IEEE 91st Vehicular Technology
certified Google Educator. He is a life member of Indian Society of Technical Education
Conference (VTC2020-Spring). https://doi.org/10.1109/vtc2020-
(ISTE) as well as an active member of IEEE and ACM.
spring48590.2020.9129462.
Yetis, R., Sahingoz, O.K., 2019. Blockchain based secure communication for IoT devices
in smart cities. In: 2019 7th International Istanbul Smart Grids and Cities Congress
and Fair (ICSG). https://doi.org/10.1109/sgcf.2019.8782285.

25

You might also like