Network-03-00006-V2 (1) - Not Read
Network-03-00006-V2 (1) - Not Read
1 Department of Computer Science, Slippery Rock University, Slippery Rock, PA 16057, USA
2 Computer Science & Engineering, Mississippi State University, Starkville, MS 39762, USA
* Correspondence: [email protected]
Abstract: During the recent decade, two variants of evolving computing networks have augmented
the Internet: (i) The Internet of Things (IoT) and (ii) Blockchain Network(s) (BCNs). The IoT is
a network of heterogeneous digital devices embedded with sensors and software for various au-
tomation and monitoring purposes. A Blockchain Network is a broadcast network of computing
nodes provisioned for validating digital transactions and recording the “well-formed” transactions
in a unique data storage called a blockchain ledger. The power of a blockchain network is that
(ideally) every node maintains its own copy of the ledger and takes part in validating the transactions.
Integrating IoT and BCNs brings promising applications in many areas, including education, health,
finance, agriculture, industry, and the environment. However, the complex, dynamic and heteroge-
neous computing and communication needs of IoT technologies, optionally integrated by blockchain
technologies (if mandated), draw several challenges on scaling, interoperability, and security goals.
In recent years, numerous models integrating IoT with blockchain networks have been proposed,
tested, and deployed for businesses. Numerous studies are underway to uncover the applications of
IoT and Blockchain technology. However, a close look reveals that very few applications successfully
cater to the security needs of an enterprise. Needless to say, it makes less sense to integrate blockchain
technology with an existing IoT that can serve the security need of an enterprise. In this article,
we investigate several frameworks for IoT operations, the applicability of integrating them with
blockchain technology, and due security considerations that the security personnel must make during
the deployment and operations of IoT and BCN. Furthermore, we discuss the underlying security
Citation: Adhikari, N.; Ramkumar,
concerns and recommendations for blockchain-integrated IoT networks.
M. IoT and Blockchain Integration:
Applications, Opportunities, and
Keywords: Internet of Thing(s); blockchain network; blockchain; Cybersecurity; privacy; integrity;
Challenges. Network 2023, 3, 115–141.
https://doi.org/10.3390/
smart city; smart home; IoT and blockchain
network3010006
in 1999 by Kevin Ashthon during his work at Procter & Gamble (https://bit.ly/2K5hUgH
(accessed on 25 July 2022)). The term eventually captured widespread attention in the
following decades.
IoT gained momentum in real-time sensing, effective information exchange, reduced
cost and energy, and improved work efficiency/productivity. In 2008, the International
Business Machines Corporation (IBM) introduced the concept of a “Smart Planet”. It
intends to employ massive IoTs to harvest IoT’s benefits [1]. A similar concept of “smart
city” is about the use of IoT to automate operations (for example, sensing, automating, and
monitoring) around public facilities such as buildings, public transit systems (including
buses, subways, light rail, commuter rail, trolleys, and ferries), streets installations (lamps,
traffic lights, notice boards, billboards), hospitals, schools, public offices, among others
inside the city premises [2]. An integral part of a “smart city” is the “smart home”,
which is about controlling and monitoring home appliances for audio, video, lighting,
cooking, cooling, heating, surveillance, freezing, and power, among others [1] through the
Internet applications.
The idea of integrating IoT has been expanding to the areas of self-driving technologies
(SDTs). Google, for instance, ventured into developing self-driving technology (SDT) at
the Google X lab in 2009. In 2020, Alibaba-funded start-up—AutoX—launched fully
driverless RoboTaxi in Shanghai, China (https://bbc.in/3iVFCmc (accessed on 14 June
2022)). Researchers are striving to enhance the safety and effectiveness of driverless
technologies to operate in complex, dynamic environments. During the recent decade, IoT
has been increasingly adopted in personal and public health [2,3], home [4], agriculture and
forestry [5–7], climate and meteorological studies [8], among others. In Section 3, we will
briefly discuss IoT applications grouped into seven different categories of IoT systems. In
the following section, let us briefly discuss the motivation and contribution of this article.
2. Architecture of IoT
Several previous works discuss the architecture of IoT systems. Bayılmış et al. [15]
discuss a six-layer IoT protocol stack. An article by Lao et al. [16] explains three- and
five-layered architecture. Ray [17] examines IoT architectures for domains such as health
care, smart society, and security. There are other efforts from commercial and standardiza-
tion bodies to define and describe IoT architectures. For instance, the Industrial Internet
Reference Architecture (IIRA) was jointly proposed by AT&T, Cisco, General Electric, IBM,
and Intel [9]. The IoT-A FP7 project produced the Internet of Things Architecture(IoT-A)
proposed the Reference Architecture (IIRA) (2017). The International Standardization
Organization (ISO) proposed the ISO Internet of Things Reference Architecture (IoT RA—
ISO/IEC WD 30141) in 2018. The IEEE P2413 WG proposed the IEEE Standard for an
Architectural Framework for the Internet of Things [18]. This work, however, outlines
simple four-layered IoT network architecture as depicted in Figure 1 (Left).
Figure 1. (Left) The general architecture of an IoT system consists of four major layers. The user
commands and data from sensors become exchanged through the gateway layer. (Right) Popular
instances of devices, protocols, or services in each layer of an IoT network. Discussion of the protocols
and services is out of the scope of this article.
Processor
Sensor ADC Storage TxRx
Power Unit
Power Source
Figure 2. Major internal components of a sensor or an actuator. The component ADC stands for
analog-to-digital converter, which converts an analog signal to a digital signal and vice-versa. TxRx
stands for transceiver, which transmits and receives data from processor storage.
located locally close to the gateway layer or in the cloud containing cloud storage engines
(https://bit.ly/3D5eqbC (accessed on 30 December 2022)) (for example, Amazon AWS,
Google, Dropbox, Alibaba, Tencent, etc.) and data exchange services. Some popular onsite
storage engines for IoT data are InfluxDB, CreateDB, Riak TS, MongoDB, RethinkDB, and
Cassandra, among other (https://www.intuz.com/guide-on-top-iot-databases (accessed
on 11 July 2022)).
(6) Smart City IoT: Smart city IoTs are an extended version of the smart home IoT [1]. It
comprises many sensor technologies to sense an urban environment, streets, highways,
traffic, and vehicle mobility. Smart retail shopping, intelligent health services, and
smart parking are also an integral part of a smart city (https://en.wikipedia.org/wik
i/Smart_city (accessed on 22 July 2022)) [4].
(7) Vehicular IoT: Vehicular IoT can be considered one of the components of a smart city
IoT. Sensors that collect data from terrestrial and aerial vehicular devices constitute
vehicular IoT. The data may be helpful to route the vehicular devices efficiently or
may be helpful to collect environmental data such as temperature and humidity. For
instance, United Parcel Service (UPS), a shipping company, deploys sensors in its
transport vehicles to collect data such as mileage, speed, fuel cost, etc., for big data
analysis [26,27]. Unmanned aerial vehicles (UAVs) also use different sensor data to
optimize their route and operations to support “collaborative autonomous driving,
and advanced transportation [28]”.
4. Blockchain Technology
It is imperative to comprehend the components of the technology to understand
the value that blockchain technology brings to the realm of IoT ecosystems. The major
components of blockchain technology are (i) blockchain, (ii) blockchain networks, and
(iii) distributed consensus mechanism [16]. In this section, we explain the working principle
of blockchain technology and the types and features of blockchain networks.
Contrary to Wang et al. [20], blockchain data storage does not prevent forging and
tampering with the data; it serves as a deterrence against such activity. However, when
implementing blockchain in a decentralized network environment, one can achieve a higher
level of data recovery services.
Figure 3. (Left) Structure of a blockchain (ledger) as a sequence of data blocks Block 0, Block 1, and so
forth. Each block is linked to the previous block through a reference known as block hash, which is an
output of a cryptographic function of the content of the previous block. (Right) A simple blockchain
network with three nodes N1 , N2 , and N3 , each keeping a copy of a blockchain. As a transaction (Tj )
is received by a node (N2 ), it is broadcast to other nodes for execution.
Table 1. Capabilities of a Blockchain Network. Hybrid BCN is excluded from this table as it has
features from both public and private BCN.
Such application enhances data integrity, auditability, and efficiency for healthcare
and other related transactions and processes.
Only the affirmative answers to any of the above questions from involved researchers
would result in considering the resource for the study purpose.
Terminologies 1
“{Internet of Things, IoT} for Blockchain {Networks, technology }”
“Integration of {Internet of Things, IoT} and Blockchain {Networks, technology}”
“Challenges of {Internet of Things, IoT} and Blockchain {Networks, technology}”
“Issues in {Internet of Things, IoT} and Blockchain {Networks,technology} integration”
“Applications of Challenges of {Internet of Things, IoT} and Blockchain {Networks,
technology}“
“Merging Challenges of {Internet of Things, IoT} and Blockchain {Networks, technology}”
“Combining Challenges of {Internet of Things, IoT} and Blockchain {Networks, technology}”
“Combination of Challenges of {Internet of Things, IoT} and Blockchain {Networks,
technology}”
“{Using, Use of} Blockchain network for {health, hospitals, farm, farming, poultry, fishery}”
“{Using, Use of} Blockchain network for {agriculture, forestry, smart city, smart driving}”
“{Using, Use of} Blockchain network for {parking, war, smart grid, battle}”
1The terms in a {} are used independently to produce all possible, unique search terms. Each search term can be
used separately for a search or can be logically ORed with other search expressions.
encryption can decrypt the message using the private key. This scheme is also called public
key cryptography. Examples of algorithms based on asymmetric encryption schemes are
RSA, and ECDSA, among others [41,42].
(a) (b)
Figure 4. (a) A symmetric encryption scheme uses a single key, K for the encryption of a message, m
and decryption of the encrypted message (cipher), c. (b) An asymmetric encryption scheme uses two
different keys, KU and K R , for encryption and decryption.
6.1.3. Integrity
The property of message (or data) integrity [38] ensures that a message has not been
tampered with or altered on its storage site or in the transfer’s transit. The requirement of
message integrity is essential to a wide array of digital communications, such as emails,
and instant messaging, among others. For example, if Alice sends a message m to Bob,
the message integrity ensures that Bob receives a message m0 such that m = m0 . In the
context of IoT, data integrity ensures that the data exchanged between any two devices in an
IoT network do not suffer unintentional modifications. Alteration of position, navigation,
and timing of IoT sensors can severely hamper the effectiveness and trustworthiness of
IoT systems.
6.1.4. Availability
The property of availability [38] guarantees that services (e.g., web server, email server,
data server, telephone, power, network bandwidth, and so on) and resources (e.g., data,
storage engine, computational engine) are fully available when needed or requested by
their consumers such as human users, computing nodes, processes or other entities.
In the context of IoT, the availability property ensures that the components of IoT
networks, such as sensor nodes, gateway servers, and data servers, among others, are
available to each other and their users or owners. For instance, in an industrial IoT, tem-
perature sensors must be available for measuring temperature throughout the operational
time. In an agricultural IoT, losing equipment such as humidity and pesticide level mea-
suring sensors, among others, can highly disrupt the production and supply chain [43].
Another issue affecting IoT data availability may arise due to the proprietary lock-in effect,
where manufacturers or suppliers are forced to use outdated IoT products and services
and sometimes be denied to export IoT data (https://bit.ly/3WsFfgA (accessed on 29
December 2022)).
Network 2023, 3 126
6.1.6. Anonymity
Anonymizing is a task of removing explicit identifications, such as name, geo-location,
address, date of birth, marital status, ethnicity, ZIP (zone improvement plan (ZIP) is a
number that specifies an individual destination post office or mail delivery area.) code,
SSNs (Social Security Numbers (SSN) are used to identify unique citizens in the USA. This
number is used for obtaining credit, opening a bank account, claiming government benefits,
and private insurance, purchase a home or a car, among others.), phone number, email
address, IP address, timestamp, or any relevant attributes from the data. In the context
of digital communication, the property of anonymity [44] refers to hiding users’ names
or relevant attributes such as date of birth, phone numbers, and emails, among others.
The property of anonymity is related to an individual’s privacy; however, anonymity may
be achieved by removing the personally identifiable information in a data or a message.
Privacy can be better preserved by anonymizing the data in transit or storage. For example,
the message m may be anonymized by removing explicit information about the sender,
Alice. Data without the details are of very little use to target specific user(s) and/or devices.
This property prevents unstoppable surveillance of the users or computing nodes, and
other analyses relevant to the person, things, or places.
6.1.7. Trustworthiness
The security of a system rests on the level of confidence one puts in security imple-
mentations and their execution. In other words, a system is secure as long as one trusts [45]
its operations and outputs. For instance, we trust the secrecy of encrypted data because we
have high confidence that the secret key is not exposed and the algorithm is not broken,
given that it is publicly available for everyone to break. However, the “trust” in a system
can be amplified by enforcing different strategies. For instance, compare the level of “trust”
between an airplane with a single turbo engine and the other with two turbo engines. Given
identical engines, the probability that an airplane with a single engine crashes is greater
than the probability of double engines. In other words, we are improving dependability
due to redundant engines. Similar is the case with the recently advancing blockchain
technology, which is discussed in the following section. It is used as an infrastructure to
raise trust in an output of a process being executed.
Such trust stem from the fact that the process outputs are verifiable (in terms of
correctness and completeness) by all of the participating computing nodes [29,45]. The
output is stored in storage whose integrity can be globally verified and backed up because
multiple clones exist in physically separated locations. The other property that blockchain
technology brings is fault tolerance, data security, and disaster recovery.
w.first.org/cvss/ (accessed on 31 December 2022)), attack tree, and security cards. Each
of these methodologies provides different ways to access the threats faced by underlying
information systems. However, because IoT technologies are evolving, the IoT may involve
devices with weak device manufacturing standards, and an attack surface could be huge
because of the vast network size.
In this section, we discuss a loosely coupled four-tier threat model for an IoT ecosystem
as depicted in Figure 5, where an external adversary may attack devices or services on
four different layers. For example, threats may occur to objects in the sensor layer. Such
threats may be the theft of the sensor objects, spoofing the sensor data, and jamming the
link between two sensor nodes, among others (https://bit.ly/3yYXm44 (accessed on 14
June 2022)).
Application,
DB Sink Layer Cloud Visualization, CC
Layer
External
Adversary Commands Data
Sensor Layer
Figure 5. The threat model shows the components of the general IoT architecture and their interac-
tions. Overall, the components and channels in an IoT form an attack surface. Three types of potential
threat actors, viz., (i) external adversary, (ii) internal compromised (malicious) gateway device gn in
the gateway layer, and (iii) regular malicious (internal) user.
real-time IoT data. Such access could adversely impact production, business negotiations,
and trade competency, among others [43]. An example of such an attack is ‘The Night
Dragon’ [23], where an attacker targeted and harvested a large amount of sensitive com-
petitive proprietary operations and project-financing information from multiple oil and
petrochemical companies in 2011.
such an attack is SkyJet [12]. Sontowski et al. [23] explain that other common attacks that
compromise a WiFi network are evil twin access points, key reinstallation attacks, Address
Resoulution Protocl (ARP) spoofing attacks, and DNS spoofing. An untrusted sensor node
in a network may request sensitive data from the coordinator, and vice versa. Network
nodes may enforce access control lists to manage the access of resources by participating
nodes in a network.
transactions, and edge devices issue, and validate transactions for a BCN. Nonetheless,
this model imposes redundancy in issuing transactions for a BCN, which is costly in
terms of bandwidth.
Application Layer
Sink Layer
ledger
b,c
ledger
a
s s s s Internet
IoT Network
Blockchain Network
Having discussed the models of IoT and blockchain network integration, the following
section discusses some compelling applications born out of IoT and blockchain integration.
physical unclonable functions (PUFs) to detect counterfeit IoT devices. Wu et al. [66]
simulated a system of assuring and detecting IoT data integrity using a distributed
blockchain system. Naresh et al. [] discussed a blockchain-based method to monitor
the topographic integrity of an IoT network.
of farm yield in the smart farming infrastructure not built with adequate security concerns,
and end-users neglect to perform the security hardening settings [22].
Concerning blockchain, relying on blockchain to protect data privacy is far from
efficient. It is because the data in a public blockchain are not generally encrypted to permit
public validations [14]. Incorporating private data in a public chain makes it harder to
securely share data between IoT nodes and relevant users’ private data. However, if
the user’s anonymity is only the security goal of an organization employing an IoT, the
anonymized user’s data (for example, transactional data from a smart electric meter) can
be provided to the public, blockchain network nodes for transaction validation. In that
case, the user’s unique account identity is sufficient for executing transactions [77].
8.2. Scalability
Scalability is another significant challenge to IoT as well as the blockchain network.
IoT devices are easier to operate in small numbers in a local setting. However, the real-
world requirements may demand the use of thousands of sensors (or actuators), which
demands high-level experts to deploy and address the scalability concerns. Sensors collect
very granular data values related to the environment of their deployments. It is crucial
to consider the expansibility of computing power, data storage, and bandwidth, among
others [78].
Concerning blockchain, regular (miner) nodes in the network require higher band-
width, storage, and computational power. Specifically, computational power becomes more
important if the blockchain network employs PoW as a consensus mechanism. Since IoT
devices have minimal computational and storage capability, such nodes do not help use
a blockchain network regular nodes [16]. Efforts are in progress to develop blockchain
and IoT network protocols for efficient transaction validations [77]. Techniques such as
off-chain transaction processing and network (or transaction or state) sharding (Sharding
is the practice of segmenting an extensive network into subnets or large databases into
smaller databases.) [79] techniques have been proposed and are under testing to improve
the throughput of a blockchain network.
encryption (ABE) as proposed by Goyal et al. [83]. It has been used on different occasions
to secure data on the cloud. Studies such as [84–86] leverage a homomorphic crypto-system
to encrypt locations and distance measurements harvested by such IoT. With statistical
or machine learning based on IoT data, different privacy-preserving methods such as
highlighted in [86–88] can be employed on IoT data. To generate machine learning models,
federated machine learning models as specified by Yang et al. [89] can be employed to
avoid data transfer from end devices to the remote machines. Over-the-air communication
is encrypted using a secret key exchanged between the nodes.
9.3. Authentication
An essential step in securing IoT connections and data, and avoiding attacks such as
spoofing and eavesdropping, is to use a secure protocol such as TLS/SSL. TLS/SSL is a
cryptographic protocol for secure communication, where end devices are authenticated
before initiating data exchange. Ibrahim et al. [4] applied SSL/TLS to secure intelligent
home IoT while preserving the speed and agility of device and data access. Attribute-based
encryption (ABE) was used for key management, and homomorphic encryption was used
for data aggregation. Network authentication policies, the distribution, and the storage of
encryption keys should be commissioned securely.
9.5. Authorization
Proper authorization of IoT devices provides proper access to their users. For example,
in an industry setting, mission-critical devices need to be accessible to higher privileged
users such as administrators. Goyal et al. [84] demonstrated access control policies to limit
the operations performed by different users on IoT devices in domestic settings. There are
various types of access control mechanisms [91], such as discretionary access control (DAC),
mandatory access control (MAC), role-based access control (RBAC), and attribute-based
access control (ABAC), among others. Specially designed languages such as web ontology
language (OWL) [48] have been used in formulating complex relationships between users
and resources and the security policies for cloud storage and smart farming operations.
9.6. Availability
Chao et al. [26] proposed a BCN-based information exchange network for UAVs to
ensure data transmission security and resilience against blocking line-of-sight. Applications
can use a quieter channel and agile frequency to overcome the problem of blocking of
line-of-sight of network receivers [82]. Zigbee, for instance, uses frame counters to defend
Network 2023, 3 135
against MIM. Additionally, to protect from unauthorized control, network keys should
be regularly changed [82]. It is recommended to use an intrusion detection system (IDS)
for possible attacks on the system [92]. Availability can be promoted by using redundant
nodes deployed for the critical IoT nodes, which operate in case the original nodes are out
of service for various reasons [46]. Modern security techniques exploit artificial intelligence
and machine learning to defend an IoT network, such as smart farming, smart home, and
smart health, among others [23,93,94]. A system’s security lies in detecting any tampering
or ongoing attack on a system. Efficient intrusion detection is a framework to continuously
monitor any malicious activity on an IoT network. Monshizadeh et al. [92] discussed
a software-defined network with detection as a service that enables early detection of
network anomalies.
9.7. Trustworthiness
As mentioned in Section 6.1.7, trustworthiness is an ultimate requirement of an infor-
mation system. It can only be confirmed if other security requirements, such as privacy,
integrity, and availability, are guaranteed. For instance, as IEEE Standards for Blockchain-
based IoT Data Management [45] outlines, a framework of blockchain-based IoT for data
management must contain a batch of trusted sensing, storage, communication, and net-
working to monitor any malicious activity on an IoT network continuously information
system can be significantly promoted by augmenting it with a blockchain-based solution.
• Data protection and recovery management: Critical asset produced by an IoT is the
vast set of application-specific data. Implementing adequate data backup procedures
is crucial to avoid data loss during an attack or a disaster. User access and data
encryption should also be properly managed to prevent information leaks.
Author Contributions: Conceptualization, N.A.; software, N.A.; validation, M.R. formal analysis,
N.A. and M.R.; investigation, N.A.; resources, N.A.; writing—original draft preparation, N.A.;
writing—review and editing, M.R.; visualization, N.A.; supervision, N.A and M.R. All authors have
read and agreed to the published version of the manuscript.
Funding: This research received no external funding.
Acknowledgments: N. Adhikari would like to thank Sam Thangiah, Chair of the Computer Science
Department at Slippery Rock University, for lending tools for provisioning the IoT system(s) in the
lab, and Vibha Acharya for encouraging in the research endeavors.
Conflicts of Interest: The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
LTE-M data
LoRa Long Range
MAC Mandatory Access Control
MIM Man-in-the-Middle
NFC Near Field Communication
OWL Web Ontology Language
PASTA Process for Attack Simulation and Threat Analysis
PoS Proof of Stake
PoW Proof of Work
RBAC Role Based Access Control
RFID Radio Frequency Identification
RSA Rivest–Shamir–Adleman Algorithm
TCP Transport Control Protocol
TLS/SSL Transport Layer Securuirty/Socket Layer Security
TXN Transactions (Plr. TXNs)
Temp. Temperature
UAV Unmanned Aerial Vehicle
WIMAX Worldwide Interoperability for Microwave Access
WWW World Wide Web
ZB Zettabytes
References
1. Ainane, N.; Ouzzif, M.; Bouragba, K. Data security of smart cities. In Proceedings of the 3rd International Conference on Smart
City Applications, Tetouan, Morocco, 10–11 October 2018. [CrossRef]
2. YIN, Y.; Zeng, Y.; Chen, X.; Fan, Y. The internet of things in healthcare: An overview. J. Ind. Inf. Integr. 2016, 1, 3–13. [CrossRef]
3. Arunkumar, N.; Pandimurugan, V.; Hema, M.S.; Azath, H.; Hariharasitaraman, S.; Thilagaraj, M.; Govindan, P. A Versatile and
Ubiquitous IoT-Based Smart Metabolic and Immune Monitoring System. Comput. Intell. Neurosci. 2022, 2022, 9441357. [CrossRef]
[PubMed]
4. Ibrahim, J.M.; Karami, A.; Jafari, F. A secure smart home using Internet-of-Things. In Proceedings of the 9th International
Conference on Information Management and Engineering, Barcelona, Spain, 9–11 October 2017; pp. 69–74. [CrossRef]
5. Dineva, K.; Atanasova, T. Design of Salable IoT Architecture based on AWS for Smart Livestock. Animal 2021, 11, 2697. [CrossRef]
[PubMed]
6. Sudha, M.K.; Manorama, M.; Aditi, T. Smart Agricultural Decision Support Systems for Predicting Soil Nutrition Value Using IoT
and Ridge Regression. Agris Online Pap. Econ. Inform. 2022, 14, 95–106. [CrossRef]
7. Oliver, S.T.; González-Pérez, A.; Guijarro, J.H. An IoT proposal for monitoring vineyards called senviro for agriculture. In
Proceedings of the 8th International Conference on the Internet of Things, IOT 2018, Santa Barbara, CA, USA, 15–18 October 2018.
[CrossRef]
8. Ahire, D.B.; Gond, D.V.J.; Ahire, N.L. IoT Based Real-Time Monitoring of Meteorological Data: A Review. In Proceedings of the
3rd International Conference on Contents, Computing & Communication (ICCCC-2022), Nashik, India, 26–27 February 2022;
pp. 1–12. [CrossRef]
9. Casola, V.; De Benedictis, A.; Rak, M.; Villano, U. Toward the automation of threat modeling and risk assessment in IoT systems.
Internet Things 2019, 7, 100056. [CrossRef]
10. Pennino, D.; Pizzonia, M.; Vitaletti, A.; Zecchini, M. Blockchain as IoT Economy Enabler: A Review of Architectural Aspects.
J. Sens. Actuator Netw. 2022, 11, 20. [CrossRef]
11. Huh, S.; Cho, S.; Kim, S. Managing IoT devices using blockchain platform. In Proceedings of the International Conference on
Advanced Communication Technology, ICACT, PyeongChang, Republic of Korea, 19–22 February 2017; pp. 464–467. [CrossRef]
12. Mehta, P.; Gupta, R.; Tanwar, S. Blockchain envisioned UAV networks: Challenges, solutions, and comparisons. Comput. Commun.
2020, 151, 518–538. [CrossRef]
13. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. Technical Report. 2008. Available online: bitcoin.org (accessed on
19 September 2022).
14. Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 2014, 151, 1–32 2019.
15. Bayılmış, C.; Ebleme, M.A.; Çavuşoğlu, Ü.; Küçük, K.; Sevin, A. A survey on communication protocols and performance
evaluations for Internet of Things. Digit. Commun. Netw. 2022, 8, 1094–1104. [CrossRef]
16. Lao, L.; Li, Z.; Hou, S.; Xiao, B.; Guo, S.; Yang, Y. A survey of IoT applications in blockchain systems: Architecture, consensus,
and traffic modeling. ACM Comput. Surv. 2020, 53, 1–32. [CrossRef]
17. Ray, P.P. A survey on Internet of Things architectures. J. King Saud Univ. Comput. Inf. Sci. 2018, 30, 291–319. [CrossRef]
18. Lea, P. Internet of Things for Architects, 1st ed.; Packt Publishing: Birmingham, UK, 2018; pp. 1–676.
19. Dahlberg, R.; Pulls, T.; Peeters, R. Efficient Sparse Merkle Trees Caching Strategies and Secure (Non-) Membership Proofs. Lect.
Notes Comput. Sci. 2016, 10014 LNCS, 199–215. [CrossRef]
Network 2023, 3 138
20. Wang, G.; Shi, Z.; Nixon, M.; Han, S. ChainSplitter: Towards blockchain-based industrial IoT architecture for supporting
hierarchical storage. In Proceedings of the 2019 2nd IEEE International Conference on Blockchain, Blockchain 2019, Atlanta, GA,
USA, 14–17 July 2019; pp. 166–175. [CrossRef]
21. McGrath, M.J.; Scanaill, C.N. Sensor Technologies—Healthcare, Wellness and Environmental Applications; Apress: Berkeley, CA, USA,
2013; pp. 1–302. [CrossRef]
22. Gupta, M.; Abdelsalam, M.; Khorsandroo, S.; Mittal, S. Security and Privacy in Smart Farming: Challenges and Opportunities.
IEEE Access 2020, 8, 34564–34584. [CrossRef]
23. Sontowski, S.; Gupta, M.; Laya Chukkapalli, S.S.; Abdelsalam, M.; Mittal, S.; Joshi, A.; Sandhu, R. Cyber Attacks on Smart
Farming Infrastructure. In Proceedings of the 2020 IEEE 6th International Conference on Collaboration and Internet Computing,
CIC 2020, Virtual, 1–3 December 2020; Institute of Electrical and Electronics Engineers Inc.: Interlaken, Switzerland, 2020;
pp. 135–143. [CrossRef]
24. Mann, S. Historical account of the ‘WearComp’ and ‘WearCam’ inventions developed for applications in ‘personal imaging’. In
Proceedings of the International Symposium on Wearable Computers, Digest of Papers, Cambridge, MA, USA, 13–14 October
1997; pp. 66–73. [CrossRef]
25. Tariq, N.; Qamar, A.; Asim, M.; Khan, F.A. Blockchain and smart healthcare security: A survey. In Procedia Computer Science;
Elsevier: Amsterdam, The Netherlands, 2020; Volume 175, pp. 615–620. [CrossRef]
26. Chao, H.; Maheshwari, A.; Sudarsanan, V.; Tamaskar, S.; Delaurentis, D.A. UAV traffic information exchange network. In
Proceedings of the 2018 Aviation Technology, Integration, and Operations Conference, Atlanta, GA, USA, 25–29 June 2018.
[CrossRef]
27. Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A Survey on internet of Things: Architecture, Enabling Technologies,
Security and Privacy, and Applications. IEEE internet Things J. 2017, 4, 642–646. [CrossRef]
28. Peng, C.; Wu, C.; Gao, L.; Zhang, J.; Yau, K.L.A.; Ji, Y. Blockchain for Vehicular internet of Things: Recent Advances and Open
Issues. Sensors 2020, 20, 5079. [CrossRef] [PubMed]
29. Ramkumar, M.; Adhikari, N. Blockchain Based Redistricting with Public Participation. J. Inf. Secur. 2022, 13, 140–164. [CrossRef]
30. Ali, M.S.; Vecchio, M.; Pincheira, M.; Dolui, K.; Antonelli, F.; Rehmani, M.H. Applications of Blockchains in the internet of Things:
A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2019, 21, 1676–1717. [CrossRef]
31. Alotaibi, B. Utilizing Blockchain to Overcome Cyber Security Concerns in the internet of Things: A Review. IEEE Sens. J. 2019,
19, 10953–10971. [CrossRef]
32. Xu, J. The Application of Blockchain Technology in Equity Incentive. E3S Web Conf. 2021, 235, 15–18. [CrossRef]
33. Vora, G. Cryptocurrencies: Are Disruptive Financial Innovations Here? Mod. Econ. 2015, 06, 816–832.
[CrossRef]
34. Hou, H. The Application of Blockchain Technology in E-Government in China. In Proceedings of the 6th International Conference
on Computer Communication and Networks (ICCCN), Vancouver, BC, Canada, 31 July–3 August 2017; Volume 235, pp. 1–4.
[CrossRef]
35. Casino, F.; Dasaklis, T.K.; Patsakis, C. A systematic literature review of blockchain-based applications: Current status, classification
and open issues. Telemat. Inform. 2019, 36, 55–81. [CrossRef]
36. Saxena, S.; Shao, D.; Nikiforova, A.; Thapliyal, R. Invoking blockchain technology in e-government services: A cybernetic
perspective. Digit. Policy Regul. Gov. 2022, 24, 246–258. [CrossRef]
37. Kassen, M. Blockchain and e-government innovation: Automation of public information processes. Inf. Syst. 2022, 103, 101862.
[CrossRef]
38. Stallings, W. Cryptography and Network Security: Principles and Practice 7th Global Edition, 7th ed.; Pearson Education Limited:
Harlow, UK, 2017.
39. Tiedemann, P. The Human Right to Privacy Philos. Found. Hum. Right 2020. 44, 197–214. [CrossRef]
40. Tawalbeh, L.; Muheidat, F.; Tawalbeh, M.; Quwaider, M. IoT Privacy and Security: Challenges and Solutions. Appl. Sci. 2020, 10,
4102. [CrossRef]
41. Pass, R.; Shelat, A. A Course in Cryptography, 3rd ed.; Printed Online 2010; pp. 1–192. Available online: https://bit.ly/3GZEiGN
(accessed on 19 December 2022)
42. Bruce, S. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd ed.; John Wiley & Sons, Inc: New York, NY, USA,
1996.
43. Brown, A.; Bethel, G.; Koehler, S. Threats To Percision Agriculture. Technical Report, 2018. Available online: https://bit.ly/3XN
sSwC (accessed on 20 October 2022)
44. Samarati, P.; Sweeney, L. Protecting privacy when disclosing information: k-anonymity and its enforcement through generaliza-
tion and suppression. In Proceedings of the IEEE Symposium on Research in Security and Privacy (S&P), Oakland, CA, USA, 3–6
May 1998.
45. IEEE Std 2144.1-2020; IEEE Standard for Framework of Blockchain-based Internet of Things (IoT ) Data Management. 2021.
Institute of Electrical and Electronics Engineers Inc.: New York, USA, 2021; pp. 1–20. [CrossRef]
46. Bradbury, M.; Jhumka, A.; Watson, T.; Flores, D.; Burton, J.; Butler, M. Threat-modeling-guided Trust-based Task Offloading for
Resource-constrained internet of Things. ACM Trans. Sens. Netw. 2022, 18, 1–41. [CrossRef]
Network 2023, 3 139
47. Hilt, S.; Kropotov, V.; Mercês, F.; Rosario, M.; Sancho, D. The internet of Things in the Cybercrime Underground. Available online:
https://bit.ly/2lZRnKv (accessed on 20 December 2022)
48. Chukkapalli, S.S.L.; Piplai, A.; Mittal, S.; Gupta, M.; Joshi, A. A Smart-Farming Ontology for Attribute Based Access Control. In
Proceedings of the 2020 IEEE 6th Intl Conference on Big Data Security on Cloud, BigDataSecurity 2020, 2020 IEEE Intl Conference
on High Performance and Smart Computing, HPSC 2020 and 2020 IEEE Intl Conference on Intelligent Data and Security, IDS
2020, Baltimore, MD, USA, 25–27 May 2020; pp. 29–34. [CrossRef]
49. Line, M.B.; Zand, A.; Stringhini, G.; Kemmerer, R. Targeted attacks against industrial control systems: Is the power industry
prepared? In Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing
Machinery, Scottsdale, AZ, USA, 3–7 November 2014; Volume 2014, pp. 13–22. [CrossRef]
50. Nguyen, A.; Yosinski, J.; Clune, J. Deep Neural Networks are Easily Fooled: High Confidence Predictions for Unrecognizable
Images. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, USA, 7–12
June 2015.
51. Tyagi, T. Botnet of Things: Menace to Internet of Things. In Proceedings of the third International Conference on Computing:
Communication, Network and Security (IC3NS-2018), Sikar, Rajasthan, India, 25–27 October 2018; pp. 61–65.
52. Wüst, K.; Gervais, A. Do you need a Blockchain? In Proceedings of the 2018 Crypto Valley Conference on Blockchain Technology
(CVCBT), Zug, Switzerland, 20–22 June 2018; pp. 45–54. [CrossRef]
53. Reyna, A.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On blockchain and its integration with IoT. Challenges and opportunities.
Future Gener. Comput. Syst. 2018, 88, 173–190. [CrossRef]
54. Dedeoglu, V.; Jurdak, R.; Putra, G.D.; Dorri, A.; Kanhere, S.S. A Trust Architecture for Blockchain in IoT. In Proceedings of the
16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Houston, TX, USA,
2–14 November 2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 190–199. [CrossRef]
55. Tang, B.; Kang, H.; Fan, J.; Li, Q.; Sandhu, R. IoT Passport: A Blockchain-Based Trust Framework for Collaborative internet-of-
Things. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, Toronto, ON, Canada, 3–6
June 2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 83–92. [CrossRef]
56. Ji, Y.; Xiao, X.; Wu, F.; Chen, F.; Liu, S. BIDAC: Blockchain-Enabled Identity-Based Data Access Control in IoT. In Proceedings of
the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, Melbourne, Australia,
14–17 December 2021; Association for Computing Machinery: New York, NY, USA, 2021; pp. 400–405. [CrossRef]
57. Muzammal, S.M.; Murugesan, R.K. Enhanced Authentication and Access Control in internet of Things: A Potential Blockchain-
Based Method. Int. J. Grid Util. Comput. 2021, 12, 469–485. [CrossRef]
58. Zhang, Y.; Li, B.; Liu, B.; Wu, J.; Wang, Y.; Yang, X. An Attribute-Based Collaborative Access Control Scheme Using Blockchain for
IoT Devices. Electronics 2020, 9, 285. [CrossRef]
59. Pal, S.; Dorri, A.; Jurdak, R. Blockchain for IoT access control: Recent trends and future research directions. J. Netw. Comput. Appl.
2022, 203, 103371. [CrossRef]
60. Košt’ál, K.; Helebrandt, P.; Belluš, M.; Ries, M.; Kotuliak, I. Management and Monitoring of IoT Devices Using Blockchain. Sensors
2019, 19, 856. [CrossRef]
61. Banerjee, S.; Bera, B.; Das, A.K.; Chattopadhyay, S.; Khan, M.K.; Rodrigues, J.J. Private blockchain-envisioned multi-authority
CP-ABE-based user access control scheme in IIoT. Comput. Commun. 2021, 169, 99–113. [CrossRef]
62. Iftekhar, A.; Cui, X.; Tao, Q.; Zheng, C. Hyperledger Fabric Access Control System for internet of Things Layer in Blockchain-Based
Applications. Entropy 2021, 23, 1054. [CrossRef] [PubMed]
63. Tan, L.; Shi, N.; Yu, K.; Aloqaily, M.; Jararweh, Y. A Blockchain-Empowered Access Control Framework for Smart Devices in
Green internet of Things. ACM Trans. Internet Technol. 2021, 21, 80. [CrossRef]
64. Tan, L.; Yu, K.; Yang, C.; Bashir, A.K. A Blockchain-Based Shamir’s Threshold Cryptography for Data Protection in Industrial
internet of Things of Smart City. In Proceedings of the 1st Workshop on Artificial Intelligence and Blockchain Technologies for
Smart Cities with 6G, New Orleans, LA, USA, 25–29 October 2021; Association for Computing Machinery: New York, NY, USA,
2021; pp. 13–18. [CrossRef]
65. Negka, L.; Gketsios, G.; Anagnostopoulos, N.A.; Spathoulas, G.; Kakarountas, A.; Katzenbeisser, S. Employing Blockchain
and Physical Unclonable Functions for Counterfeit IoT Devices Detection. In Proceedings of the International Conference on
Omni-Layer Intelligent Systems, Crete, Greece, 5–7 May 2019; Association for Computing Machinery: New York, NY, USA, 2019;
pp. 172–178. [CrossRef]
66. WU, X.; Kong, F.; Shi, J.; Bao, L.; Gao, F.; Li, J. A Blockchain internet of Things Data Integrity Detection Model. In Proceedings of
the International Conference on Advanced Information Science and System, Singapore, 15–17 November 2019; Association for
Computing Machinery: New York, NY, USA, 2019. [CrossRef]
67. Nuss, M.; Puchta, A.; Kunz, M. Towards Blockchain-Based Identity and Access Management for internet of Things in Enterprises.
In Trust, Privacy and Security in Digital Business; Furnell, S., Mouratidis, H., Pernul, G., Eds.; Springer International Publishing:
Cham, Switzerland, 2018; pp. 167–181.
68. Vallois, V.; Mehaoua, A.; Amziani, M. Blockchain-based Identity and Access Management in Industrial IoT Systems. In
Proceedings of the 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM), Bordeaux, France, 18–20
May 2021; pp. 623–627.
69. Lee, J.H. BIDaaS: Blockchain Based ID As a Service. IEEE Access 2018, 6, 2274–2278. [CrossRef]
Network 2023, 3 140
70. Sigwart, M.; Borkowski, M.; Peise, M.; Schulte, S.; Tai, S. Blockchain-Based Data Provenance for the internet of Things. In
Proceedings of the 9th International Conference on the internet of Things, Bilbao, Spain, 22–25 October 2019; Association for
Computing Machinery: New York, NY, USA, 2019. [CrossRef]
71. El Kafhali, S.; Chahir, C.; Hanini, M.; Salah, K. Architecture to Manage internet of Things Data Using Blockchain and Fog
Computing. In Proceedings of the 4th International Conference on Big Data and Internet of Things, Tangier-Tetuan, Morocco,
23–24 October 2019; Association for Computing Machinery: New York, NY, USA, 2019. [CrossRef]
72. Fan, Q.; Chen, J.; Deborah, L.J.; Luo, M. A secure and efficient authentication and data sharing scheme for internet of Things
based on blockchain. J. Syst. Archit. 2021, 117, 102112. [CrossRef]
73. Chi, J.; Li, Y.; Huang, J.; Liu, J.; Jin, Y.; Chen, C.; Qiu, T. A secure and efficient data sharing scheme based on blockchain in
industrial internet of Things. J. Netw. Comput. Appl. 2020, 167, 102710. [CrossRef]
74. Mohammed, S.; Fiaidhi, J.; Ramos, C.; Kim, T.H.; Fang, W.C.; Abdelzaher, T. Blockchain in ECommerce: A Special Issue of the
ACM Transactions on internet of ThingsBlockchain in ECommerce: A Special Issue of the ACM Transactions on internet of Things.
ACM Trans. Internet Technol. 2021, 21, 11–55. [CrossRef]
75. Jain, R.; Dogra, A. Solar Energy Distribution Using Blockchain and IoT Integration. In Proceedings of the 2019 International
Electronics Communication Conference, Okinawa, Japan, 7–9 July 2021; Association for Computing Machinery: New York, NY,
USA, 2019; pp. 118–123. [CrossRef]
76. Khorasany, M.; Dorri, A.; Razzaghi, R.; Jurdak, R. Lightweight blockchain framework for location-aware peer-to-peer energy
trading. Int. J. Electr. Power Energy Syst. 2021, 127, 106610. [CrossRef]
77. Attaran, M. Blockchain technology in healthcare: Challenges and opportunities. Int. J. Healthc. Manag. 2022, 15, 70–83. [CrossRef]
78. Bataineh, M.R.; Mardini, W.; Khamayseh, Y.M.; Yassein, M.M.B. Novel and Secure Blockchain Framework for Health Applications
in IoT. IEEE Access 2022, 10, 14914–14926. [CrossRef]
79. Wang, L. The Challenge and Prospect of Scalability of Blockchain Technology. In Proceedings of the 2021 5th International
Conference on Computer Science and Artificial Intelligence, Beijing, China, 4–6 December 2021; pp. 296–301. [CrossRef]
80. Gazis, V. A Survey of Standards for Machine-to-Machine and the internet of Things. IEEE Commun. Surv. Tutor. 2017, 19, 482–511.
[CrossRef]
81. Bertino, E.; Sandhu, R.; Thuraisingham, B.; Ray, I.; Li, W.; Gupta, M.; Mittal, S. Security and Privacy for Emerging IoT and
CPS Domains. In Proceedings of the Association for Computing Machinery (ACM), Baltimore, MD, USA, 24–27 April 2022;
pp. 336–337. [CrossRef]
82. Maximizing Security in Zigbee Networks. Available online: https://bit.ly/3GVr4ed (accessed on 19 December 2022)
83. Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In
Proceedings of the ACM Conference on Computer and Communications Security, Taipei, Taiwan, 21–24 March 2006; pp. 89–98.
[CrossRef]
84. Goyal, G.; Lie, P.; Sural, S. Securing Smart Home IoT Systems with Attribute-Based Access Control. In Proceedings of the 2022
ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Baltimore, DC, USA, 27 April 2022; ACM: Baltimore, DC,
USA, 2022; pp. 37–46. [CrossRef]
85. Li, M.; Yu, S.; Zheng, Y.; Ren, K.; Lou, W. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 131–143. [CrossRef]
86. Yan, Q.; Lou, J.; Vuran, M.C.; Irmak, S. Scalable Privacy-preserving Geo-distance Evaluation for Precision Agriculture IoT Systems.
ACM Trans. Sens. Netw. 2021, 17, 1–30. [CrossRef]
87. Bertino, E.; Carminati, B.; Ferrari, E.; Thuraisingham, B.; Gupta, A. Selective and Authentic Third-Party Distribution of XML
Documents. IEEE Trans. Knowl. Data Eng. 2004, 16, 1263–1278. [CrossRef]
88. Al-Rubaie, M.; Chang, J.M. Privacy-Preserving Machine Learning: Threats and Solutions. IEEE Secur. Priv. 2019, 17, 49–58.
[CrossRef]
89. Yang, Q.; Liu, Y.; Chen, T.; Tong, Y. Federated Machine Learning: Concept and Applications. ACM Trans. Intell. Syst. Technol.
2019, 10, 1–19. [CrossRef]
90. Stirapongsasuti, S. Decision Making Support for Privacy Data Upload in Smart Home. In Proceedings of the Adjunct: Adjunct
Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the
2019 ACM International Symposium on Wearable Computers, London, UK, 9–13 September 2019; Association for Computing
Machinery: New York, NY, USA, 2019; pp. 214–217. [CrossRef]
91. Sandhu, R.S.; Samarati, P. Access Control: Principles and Practice. IEEE Commun. Mag. 1994, 32, 40–48.
[CrossRef]
92. Monshizadeh, M.; Khatri, V.; Kantola, R. Detection as a service: An SDN application. In Proceedings of the International Confer-
ence on Advanced Communication Technology, ICACT, Pyeongchang, Republic of Korea, 19–22 February 2017; pp. 285–290.
[CrossRef]
93. Ullah, Z.; Al-Turjman, F.; Mostarda, L.; Gagliardi, R. Applications of Artificial Intelligence and Machine learning in smart cities.
Comput. Commun. 2020, 154, 313–323. [CrossRef]
Network 2023, 3 141
94. Chukkapalli, S.S.L.; Mittal, S.; Gupta, M.; Abdelsalam, M.; Joshi, A.; Sandhu5, R.; Joshi, K. Ontologies and artificial intelligence systems
for the cooperative smart farming ecosystem. IEEE Access 2020, 8, 164045–164064. [CrossRef]
95. CIS Controls Version 8. Available online: https://bit.ly/3kDgHnK (accessed on 19 December 2022)
96. Iqbal, W.; Abbas, H.; Daneshmand, M.; Rauf, B.; Bangash, Y.A. An In-Depth Analysis of IoT Security Requirements, Challenges,
and Their Countermeasures via Software-Defined Security. IEEE Internet Things J. 2020, 7, 10250–10276. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.