Sei sulla pagina 1di 7

Block Chain Technology for Internet of Things

Research Goals

The purpose of this research is to analyze existing studies, analyze their findings and summarize the
efforts of research into Blockchain applications for improve IoT Reliability. To assist in focusing the work,
we developed three research questions, which are shown in Table below

No Research Question Discussion


1 What are the characteristic of Blockchain technology is a concept of recording transactions
Blockchain Technology between interacting entities in a log and arranged
sequentially. This concept produces an ability to increase
the level of trust in data, decentralize data supervision,
increase data security and protect data privacy.
2 What the similarity of Blockchain The Internet of Things has problems in terms of security,
Technology with Problem of IoT trust in data, scalability and disruption. Blockchain has the
Reliability? ability to overcome these problems as it has done in the
financial sector with Bitcoin one of them. But IoT has other
characteristics, namely heterogeneity and low specification
of devices (low cost, low storage, low processing)
3 How Blockchain Technology How Blockchain technology in terms of architecture,
implemented for IoT to algorithms, and mechanisms is can be used to solve IoT
improve Reliability when the problems on the Reliability side. Review is done to see the
system has to scale up? implementation of the Blockchain or part of the blockchain
to increase the reliability or partial reliability of IoT.
No Title Author Published Problem Method Conclusion
1 IoT security : Review Ahmad, Future IoT devices have limited computing, Review of communication protocols and There are many questions and
, blockchain solutions Minhaj Generation storage and networking. Vulnerability network architecture and analyze problems about security on IoT that
, and open Salah, Computer will be even greater. The growth in the potential attack, threats and existing have not been answered. Research on
challenges (Ahmad Khaled Systems, 2018 number of devices is getting faster. An solutions. Mapping of problems and security specifically for IoT
and Salah, 2018) Vol 82 anticipation is needed to minimize the solutions is available. Analysis of infrastructure is still limited.
holes that appear. blockchain technology as a solution.
2 Bubbles of Trust: A Hammi, Computers and The IoT system works in full automatic. Build buble of trust, a decentralized The system built produces the
decentralized Mohamed Security 2018 Vol So that each entity must be able to method capable of identifying and expected level of security and is more
blockchain-based Tahar 78 authenticate and recognize between authenticating devices. Furthermore, efficient and low cost.
authentication Hammi, devices to maintain data integrity and this method is able to maintain data
system for IoT Badis change. This condition opens up integrity and availability. This method
(Hammi et al., 2018) Bellot, malicious use and user opportunities. uses security advantages from the
Patrick The limitations of IoT device blockchain which makes a virtual secure
Serhrouchn capabilities make it difficult to add its zone that is useful for identifying and
i, Ahmed own authentication function. trusting each others. The method was
built using the Etherium Blockchain
application.
3 Blockchain-based Lee, Journal of Embedded systems are increasingly Propose an updated firmware method The firmware update method can
secure firmware Boohyung Supercomputing developing with the advent of IoT. for the entity / device authentication reduce attacks or threats. But this
update for Lee, Jong 2017 Vol 73 Limited specifications open mechanism. Update firmware adopts process requires a data stream so that
embedded devices in Hyouk Issues 3 opportunities for attacks and threats. the technology that is on the Blockchain, it increases network traffic and will
an Internet of Things Plus the absence of user involvement which is to check the firmware version overload the network if a scale up
environment (Lee adds to the potential for penetrated of the device before data system occurs.
and Lee, 2017) holes. communication is performed. If it's not
up to date, the latest firmware
download and validation process is
done.
4 Blockchain Minoli, Internet of IoT deployment extends to increase the Developing Blockchain Technology as a As a security mechanism, the
mechanisms for IoT Daniel Things Journal area of attack. IoT implementation security component of IoT. The concept blockchain can anticipate problems
security (Minoli and Occhiogros 2018 must include a security system to is to record all transactions or data with data changes that are not allowed.
Occhiogrosso, 2018) so, Vol 18 Issues 1-2 maintain reliability. There has been a changes that occur at each node and But on the other hand additional
Benedict lot of research on IoT security but there store them in a secure database. Change activities result in increased traffic and
are still many that have not been information will be shared with all nodes response time.
touched according to the variation and so that it will be known if there are
complexity of the IoT system. changes that are not allowed
5 The Internet of Posadas Jr., Journal of IoT is expanding and expansion is The Blockchain technology that is Blockchain Technology is able to
Things: the GDPR and Dalmacio V Internet Law increasing in its nodes. The problem successful in validating and ensuring provide Individual data guarantees
the Blockchain May 2018 that arises is security and data privacy data integrity in BitCoin financial from IoT. Security and privacy
Be Incompatible. Vol 21 Issues 11 when there is no standardization of transactions opens opportunities to be guarantee.
(Posadas Jr., 2018) devices and communication protocols. applied on IoT.
6 Towards Qian, Computers and Rapid development of IoT opens the In this study, a potential threat analysis The research results are that the
decentralized IoT Yongfeng Electrical risk of data security. The perceived approach was carried out by dividing the blockchain is able to authenticate
security Jiang, Engineering benefits of IoT often forget the security three layers, namely perception, devices with the support of
enhancement: A Yingying Journal threat to data flowing. networking and application layer. Each understanding the potential attacks on
blockchain approach Chen, Jing 2018 layer is analyzed for potential threats. each layer. This capability will increase
(Qian et al., 2018) Zhang, Yu Vol 72 The second approach is high level system reliability. Problems that arise
Song, security management using blockchain are increased network traffic and
Jeungeun technology specifically for different identification of devices that need
Zhou, Ming devices further verification.
Pustišek,
Matevž
7 On blockchain and its Reyna, Ana Future The Internet of Things and Blockchain The paper discusses the calculation of Block chains will be able to increase IoT
integration with IoT. Martín, Generation are potential technologies that emerge quality indicators and specifications of reliability, especially in terms of data
Challenges and Cristian Computer simultaneously. IoT provides powerful the blockchain implementation such as trust and device authentication. The
opportunities Chen, Systems Journal service features for humans. The response time, energy consumption, problem that still arises is anticipation
(Reyna et al., 2018) Jaime 2018 Blockchain opens opportunities for storage capacy, traffic limitation etc. The of scalability and storage capacity.
Soler, Vol 88 increased security and trust in the data implementation of blockchain outside
Enrique sent and transactions between points. the IoT outlines its strengths and
Díaz, Can both of them be integrated to weaknesses. The implementation of
Manuel strengthen each other? blockchain is also presented in the
scheme and architecture.
8 Branch based Singh, Computer Intelligent Vehicle is an implementation The Blockchain concept is applied in Blockchain implementation in the
blockchain Madhusud Networks Journal of IoT. Data sent to and from the building data security and privacy and financial field does not require critical
technology in an 2018 Vol 145 vehicle needs to be guaranteed trust, building a trustworthy environment. The response times such as Intelligence
intelligent vehicle Kim, Shiho security and response time. architecture used is developing the Vehicle. In the case of nodes or limited
(Singh and Kim, Blockchain Local Database (LDB) and the vehicles Blockchain is still able to
2018) Main Blockchain. guarantee data security, but the
addition of vehicles and information
source points will increase the
response time. Branching algorithms
and the LDB concept provide an
opportunity to anticipate the problem
of response time.
9 Сryptocurrency and Sopilnyk, Path of Science IoT requires recording data transaction Research compiles descriptions of Standardization of IoT development is
Internet of Things: Lyubomyr Journal 2018 activities and encrypting sent data to crypto curency architecture and needed from the side of the device in
Problems of Shevchuk, Vol 4 Issues 9 ensure security. Crypto currency has integration with IoT Devices. Limitations terms of perception / sensor and
Implementation and Andriy this mechanism but runs on a system of IoT devices will be analyzed and communication protocol. This is
Realization (Sopilnyk Kopytko, with a standard device. While IoT synchronized with crypto curency needed to minimize security threats.
et al., 2018) Vasyl devices come from various factories, algorithm needs.
Sopilnyk, brands and various protocols and
Rostyslav specifications.
Yankovska,
Larysa
10 NormaChain: A Liu, IEEE Internet of IoT Based E Commerce is a new NormaChain developed that is a System testing is done with several
Blockchain-based Chunchi Things Journal business process. An e commerce modification of the Blockchain with attack models. Experiments show that
Normalized Xiao, 2018 Vol 4662 transaction that utilizes IoT technology. decentralization using the 3 layer our system is not only efficient on
Autonomous Yinhao An autonomous, light and legitimate architecture as well as the public key transaction handling, and is also
Transaction Javangula, system. The problem is still on the searchable encryption scheme. Both accurate on privacy-preserving illegal
Settlement System Vishesh security side and the area of the hole methods result in transparent criminal keyword search.
for IoT-based E- Hu, Qin increases when the scale up system. transactions and ease of scale up. Public
commerce (Liu et al., Wang, Blockchain implementation can answer key mechanism can anticipate illegal
2018) Shengling the issue of decentralization and transactions.
Cheng, security and user trust. But the
Xiuzhen Blockchain needs relatively high
computing, which reduces system
reliability.
11 A blockchain-based Ryu, Jung The Journal of Digital forensic on IoT-based systems is Digital investigators use the blockchain The Blockchain technology approach to
decentralized Hyun Supercomputing, still very limited due to the approach to build a system security building frameworks is able to maintain
efficient Sharma, 2019 heterogeneity of devices, infrastructure analysis framework. All communications data integrity in IoT. However, further
investigation Pradip and work environment. on IoT are stored as transactions on the research is needed related to the
framework for IoT Kumar Blockchain. Ledger data is information calculation time requirements and the
digital forensics (Ryu Jo, Jeong to do security analysis by devices, computational complexity of the
et al., 2019) Hoon supervisors, service providers and framework
Park, Jong others.
Hyuk
12 Performance Teng, IEEE Transactions IoT provides the potential for Develop Deep Reinforcement Learning DRL-based performance optimization
Optimization for Yinglei on Industrial implementation in the industry. Many Concept to optimize the framework by framework for blockchain-enabled IIoT
Blockchain-Enabled Leung, Informatics, 2019 developments are carried out, one of paying attention to security parameters, systems produces increased scalability
Industrial Internet of Victor which is to improve the quality or scalability, and latency and without reducing the quality of other
Things (IIoT) Systems: Song, Mei throughput of the system. Device decentralized. Optimization is done for parameters. Further research is to
A Deep Yu, Richard heterogeneity is an obstacle in the Blockchain technology. make a compromise between
Reinforcement Liu, preparation of IoT design frameworks parameters in the optimization
Learning Approach Mengting for industry. process.
(Teng et al., 2019)
13 Blockchain based Zhao, Yanqi arXiv Computer The lack of an IoT device standard has The method of blockchain based The proposed method provides a good
Privacy-Preserving Liu, Yiming Science 2019 caused many devices with very low privacy-preserving software updates solution from the results of the
Software Updates Yu, Yong quality side, not optimal design. This protocol is used to anticipate problems simulation process but still gives
with Proof-of- Li, Yannan condition opens the space for the with devices that are not good. The problems in its computation. If
Delivery for Internet greater vulnerability. mechanism is to update the protocol implemented in a real device with
of Things. (Zhao et used. Delivery of software updates uses limited specifications, the computation
al., 2019) an incentive transaction mechanism to takes a lot of time so that delay will
protect the privacy of the device. appear in the process.

14 Stochastic Blockchain Chen, Yu IEEE Transactions The IoT system uses the concept of Developed Stochastic Blockchain With the simulation shown that
for IoT Data Integrity Jia on Network Public Key Infrastructure to ensure data mechanism. This concept of holding a computation is carried out on selected
(Chen, Wang and Wang, Li Science and security and integrity. This concept is secure key is not carried out on all nodes nodes still results in a 90% chance of
Wang, 2018) Chun Engineering 2018 vulnerable to attacks for concentrated but at a certain point has the chance or defense success.
Wang, Shu systems. With the improvement of the possibility of an attack. With this pattern
decentralization that Blockchain has, it is expected that it does not burden all
these weaknesses can be corrected. nodes so that the process delay and
New problems arise, namely the response time are not too disturbed
characteristics of IoT devices that are
low storage and low computation.
Blockchain computing cannot be done
quickly with IoT nodes.
15 Technology Pundir, 2019 IEEE 9th Supply chain is the main component in Blockchain and IoT development for Combinative technology can play
Integration for Ashok Annual a business. The process of supervision, digitizing supply chain a Pallet Renting significant role in supply chain
Improved Kumar Computing and data validation and data access is only Vendor business. Digitizing is done in management. Blockchains make supply
Performance: A Case Devpriya, Communication owned by several parties. This the life cycle of the process and Pallet chain resilient, truly distributed peer-
Study in Digitization Jadhav Workshop and condition results in asymmetrical and Renting, Asset Management and to-peer systems and provide the
of Supply Chain with Chakrabort Conference inefficient access and control. Framework development services. Ability to interact with peers in a
Integration of y, Mrinmoy (CCWC), 2019 Blockchain technology with IoT trusted, auditable manner.
Internet of Things Ganpathy, provides opportunities to make supply
and Blockchain L chains more automated, trustworthy
Technology (Pundir and secure.
et al., 2019)
16 Blockchain-based Sharma, IEEE Transactions Digital technology is developing into Development of blockchain technology Simulation successfully proves the
Distributed Pradip on Industrial the field of automotive technology. Not in ensuring data integrity. Technology concept, providing opportunities for
Framework for Kumar Informatics, 2018 only in the internal development of built using the concept of block chain to wider implementation.
Automotive Industry Kumar, vehicles but also to changes in business form a framework. The compiled
in a Smart City Neeraj processes. Government, industry and algorithms were tested using etherium.
(Sharma, Kumar and Park, J. H. users experience changes related to the
Park, 2018) implementation of intelligence and
autonomous systems. The issue of
integrity and trustworthy data is the
main problem along with the wider
utilization.
Conclusion and Future Work

References

Ahmad, M. and Salah, K. (2018) ‘IoT security : Review , blockchain solutions , and open challenges’,
Future Generation Computer Systems. Elsevier B.V., 82, pp. 395–411. doi: 10.1016/j.future.2017.11.022.

Chen, Y. J., Wang, L. C. and Wang, S. (2018) ‘Stochastic Blockchain for IoT Data Integrity’, IEEE
Transactions on Network Science and Engineering. IEEE, PP(c), p. 1. doi: 10.1109/TNSE.2018.2887236.

Hammi, M. T. et al. (2018) ‘Bubbles of Trust: A decentralized blockchain-based authentication system for
IoT’, Computers and Security. Elsevier Ltd, 78, pp. 126–142. doi: 10.1016/j.cose.2018.06.004.

Lee, B. and Lee, J. H. (2017) ‘Blockchain-based secure firmware update for embedded devices in an
Internet of Things environment’, Journal of Supercomputing, 73(3), pp. 1152–1167. doi:
10.1007/s11227-016-1870-0.

Liu, C. et al. (2018) ‘NormaChain: A Blockchain-based Normalized Autonomous Transaction Settlement


System for IoT-based E-commerce’, IEEE Internet of Things Journal, 4662(c), pp. 1–14. doi:
10.1109/JIOT.2018.2877634.

Minoli, D. and Occhiogrosso, B. (2018) ‘Blockchain mechanisms for IoT security’, Internet of Things.
Elsevier B.V., 1–2, pp. 1–13. doi: 10.1016/j.iot.2018.05.002.

Posadas Jr., D. V (2018) ‘the Internet of Things: the Gdpr and the Blockchain May Be Incompatible.’,
Journal of Internet Law, 21(11), pp. 1–29. Available at: http://esc-
web.lib.cbs.dk/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=131103583
&site=ehost-live&scope=site.

Pundir, A. K. et al. (2019) ‘Technology Integration for Improved Performance: A Case Study in
Digitization of Supply Chain with Integration of Internet of Things and Blockchain Technology’, 2019 IEEE
9th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, pp. 0170–0176. doi:
10.1109/CCWC.2019.8666484.

Qian, Y. et al. (2018) ‘Towards decentralized IoT security enhancement: A blockchain approach’,
Computers and Electrical Engineering. Elsevier Ltd, 72, pp. 266–273. doi:
10.1016/j.compeleceng.2018.08.021.

Reyna, A. et al. (2018) ‘On blockchain and its integration with IoT. Challenges and opportunities’, Future
Generation Computer Systems, 88, pp. 173–190. doi: 10.1016/j.future.2018.05.046.

Ryu, J. H. et al. (2019) ‘A blockchain-based decentralized efficient investigation framework for IoT digital
forensics’, The Journal of Supercomputing. Springer US, (0123456789). doi: 10.1007/s11227-019-02779-
9.

Sharma, P. K., Kumar, N. and Park, J. H. (2018) ‘Blockchain-based Distributed Framework for Automotive
Industry in a Smart City’, IEEE Transactions on Industrial Informatics. IEEE, PP(c), p. 1. doi:
10.1109/TII.2018.2887101.

Singh, M. and Kim, S. (2018) ‘Branch based blockchain technology in intelligent vehicle’, Computer
Networks. Elsevier B.V., 145, pp. 219–231. doi: 10.1016/j.comnet.2018.08.016.

Sopilnyk, L. et al. (2018) ‘Сryptocurrency and Internet of Things: Problems of Implementation and
Realization’, Path of Science, 4(9), pp. 2001–2006. doi: 10.22178/pos.38-1.

Teng, Y. et al. (2019) ‘Performance Optimization for Blockchain-Enabled Industrial Internet of Things
(IIoT) Systems: A Deep Reinforcement Learning Approach’, IEEE Transactions on Industrial Informatics.
IEEE, PP(c), pp. 1–1. doi: 10.1109/tii.2019.2897805.

Zhao, Y. et al. (2019) ‘Blockchain based Privacy-Preserving Software Updates with Proof-of-Delivery for
Internet of Things.’, arXiv Computer Science. doi: arXiv:1902.03712v1.

Potrebbero piacerti anche