RetractedArticlePDF Available

Abstract and Figures

The Internet of Things (IoT) refers to the interconnection of smart devices to collect data and make intelligent decisions. However, a lack of intrinsic security measures makes next generation IoT more vulnerable to privacy and security threats. With its “security by design,” Blockchain (BC) can help in addressing major security requirements in IoT. Blockchain is an ever-growing list of records that are linked and protected using cryptographic methods. It offers its users the flexibility to conduct transactions with lower costs and faster speeds. Blockchain ledgers are also decentralized and a ledger is maintained at each node in the network. Blockchain’s security and adaptability help in making even entire systems on it a much easily task with the benefit of decentralization. BC capabilities like immutability, transparency, auditability, data encryption, and operational resilience can help solve most architectural shortcomings of IoT. In the vision of the Internet of Things, traditional devices are becoming smarter and more autonomous. This vision is becoming reality as technology advances but there are still challenges to be resolved. This is especially true in a security domain like data trust, and with the expected evolution of the IoT in the coming years, it is important to ensure that this great source of data arrives. This paper began with an overview of blockchain and IoT, as well as explore the IoT blockchain application challenges. This article also focuses to review the most relevant tasks to analyse how IoT blockchain can improve and examine current research concerns and developments in the use of blockchain-related techniques and technologies in the context of IoT security in depth. One of the best parts of working or learning about blockchain and its application is the curiosity about how it can impact the things that we have been accustomed to without trying to improve and make things more efficient and productive.
This content is subject to copyright. Terms and conditions apply.
Review Article
Next Generation IoT and Blockchain Integration
Sarvesh Tanwar,
1
Neelam Gupta,
1
Celestine Iwendi ,
2
Karan Kumar ,
3
and Mamdouh Alenezi
4
1
Amity Institute of Information Technology, Amity University Uttar Pradesh, Noida, India
2
School of Creative Technologies, University of Bolton, Bolton BL3 5AB, UK
3
Electronics and Communication Engineering Department, Maharishi Markandeshwar Engineering College,
Maharishi Markandeshwar (Deemed to Be University), Mullana, Ambala, 133207 Haryana, India
4
College of Computer & Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia
Correspondence should be addressed to Celestine Iwendi; celestine.iwendi@ieee.org, Karan Kumar; karan.170987@gmail.com,
and Mamdouh Alenezi; malenezi@psu.edu.sa
Received 15 July 2022; Accepted 11 August 2022; Published 24 August 2022
Academic Editor: Sweta Bhattacharya
Copyright © 2022 Sarvesh Tanwar et al. This is an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is
properly cited.
The Internet of Things (IoT) refers to the interconnection of smart devices to collect data and make intelligent decisions. However,
a lack of intrinsic security measures makes next generation IoT more vulnerable to privacy and security threats. With its security
by design,Blockchain (BC) can help in addressing major security requirements in IoT. Blockchain is an ever-growing list of
records that are linked and protected using cryptographic methods. It oers its users the exibility to conduct transactions
with lower costs and faster speeds. Blockchain ledgers are also decentralized and a ledger is maintained at each node in the
network. Blockchains security and adaptability help in making even entire systems on it a much easily task with the benetof
decentralization. BC capabilities like immutability, transparency, auditability, data encryption, and operational resilience can
help solve most architectural shortcomings of IoT. In the vision of the Internet of Things, traditional devices are becoming
smarter and more autonomous. This vision is becoming reality as technology advances but there are still challenges to be
resolved. This is especially true in a security domain like data trust, and with the expected evolution of the IoT in the coming
years, it is important to ensure that this great source of data arrives. This paper began with an overview of blockchain and IoT,
as well as explore the IoT blockchain application challenges. This article also focuses to review the most relevant tasks to
analyse how IoT blockchain can improve and examine current research concerns and developments in the use of blockchain-
related techniques and technologies in the context of IoT security in depth. One of the best parts of working or learning about
blockchain and its application is the curiosity about how it can impact the things that we have been accustomed to without
trying to improve and make things more ecient and productive.
1. Introduction
Recently, the rapid advancement of blockchain technology
and digital currencies has had an impact on the nancial
industry, resulting in the creation of a new crypto economy.
These usages are growing with the number of areas such as
Internet, banking sector, industry, and medical center secu-
rity. In addition, IoT [1] has expanded its adoption by the
development of urban development around the world. The
IoT has evolved into a collection of technologies ranging
from wireless sensor networks (WSN) to radio frequency
identication. (RFID) is used to identify, exploit, and com-
municate on the Internet. Today, IoT devices can range from
wearables to hardware development platforms to electronic
devices. IoT plays an important role in transforming todays
cities into smart cities with a wide range of applications that
can be used in many sectors of society. Various research [2]
reports predict that the number of connected devices will
reach 20 to 50 billion by 2020, mainly due to the large num-
ber of devices that IoT can deploy.
The IoT envisions a fully connected world where mea-
surable information can communicate and interact with
Hindawi
Journal of Sensors
Volume 2022, Article ID 9077348, 14 pages
https://doi.org/10.1155/2022/9077348
objects. This allows a digital representation of the real
world, and it can develop many smart applications in var-
ious industries, including smart home, wearables, smart
city, healthcare, automotive, environment, smart water,
and smart grid. A screenshot of a word cloud built in
the research is utilizing the most commonly appearing
authors keywords, as shown in Figure 1. To increase pro-
ductivity, IoT applications [3] in the digital industry are
very clear, generating large amounts of data requires a
long connection and energy. Limited storage, compute,
networking, and power supply capabilities pose a number
of challenges. Standard mechanisms and protocols must
support the massive expansion of IoT. This separation
has led to a decrease in vertical silos and the adoption
of IoT to reduce the diversity present in the region. How-
ever, in addition to the diversity and inclusion challenges
that exist in the IoT, data credibility is also an important
issue to consider when dealing with data from nancial
and government institutions. But how can we ensure that
information received from external parties and other
external bodies. IoT companies will not be distorted/
altered/falsied in any way? This question is dicult to
answer in a centralized architecture [4, 40]. Unreliable
organizations may modify the information according to
their own interests. As such, the information they provide
may be completely uncertain. This raises the need to verify
that the data has never been updated. One way to trust
IoT data is to use a distributed service that all stakeholders
trust to ensure that the data remains unchanged. If all par-
ticipants have data, there is a way to verify that the data
has not been tampered with since it was rst dened.
Moreover, a system that guarantees the reliability of infor-
mation will enable governments to securely share and
share information with citizens.
The appearance of smart contracts, which are personal
computer conventions meant to work with, conrm, and
sanction naturally the exchange and arrangement among
various deceptive gatherings, has therefore resulted in cut-
ting edge decentralized apps without the involvement of a
presumed outsider. Despite the positive aspects of clever
agreements, a few concerns, like security risks, aws, and
real concerns, continue to sabotage their acceptance. For
over 10 years, the blockchain [5] has been laid out as an
innovation where a circulated data set records every one of
the exchanges that have occurred in a distributed organiza-
tion. Viewed as a disseminated guring worldview eectively
beats the issue connected with the trust of an incorporated
party. Hence, in a blockchain network, a few hubs work
together among them to get and keep a bunch of shared
exchange records in a disseminated manner without
depending on any conded in party. In 2008, Satoshi Naka-
moto presented Bitcoin that was the main proposed crypto-
graphic money presenting the blockchain as an appropriated
infrastructural innovation. It permitted clients to safely
move cryptographic forms of money, known as bitcoins
without a unied controller. In addition, Ethereum, NXT,
and Hyperledger Fabric (world greatest open source block-
chain made by Linux Establishment in which organizations
like IBM were a giver) were likewise proposed as
blockchain-based frameworks utilized for the digital money
[6]. Not at all like Bitcoin, they can utilize shrewd agree-
ments. Blockchain innovation covers conventional agree-
ments by including the terms of arrangements between at
least two gatherings, however, outperforms them because
of brilliant agreements via computerizing the execution of
arrangements in a dispersed climate when conditions are
met.
Despite the fact that smart contracts have recently
acquired traction, they nevertheless face numerous chal-
lenges. For example, due to its re-entrancy weakness, the
Decentralized Independent Association (DAO) agreement
was controlled to take around 2 million Ether (50 million
USD at the time) [2, 7]. Aside from the issue of weakness,
brilliant agreements confront a number of challenges,
including questions of protection, legality, and execution.
The following paper is represented as follows: Section 2
presents about Internet of Things with IoT security and
security using blockchain. The literature review about inte-
gration of IoT blockchain and timeline over the last six year
is presented in Section 3. Section 4 describes the blockchain
and IoT integration with importance of integration. Chal-
lenges of integration of IoT in blockchain are presented in
Section 5. The nal section of the paper includes some con-
cluding observations.
Figure 1: A snapshot of a word cloud built in the research utilizing the most commonly appearing authors keywords.
2 Journal of Sensors
1.1. AuthorsContributions. Authors addressed major secu-
rity requirements in IoT and provided solution by intro-
ducing BC capabilities to overcome IoT security issues.
Searching relevant documents is an important component
of performing a systematic review. This article focused
on the review of the most relevant publications in the eld
of IoT and BC integration. The investigation is based on
publications found in the Scopus electronic database to
analyse how IoT BC can be improved and examined cur-
rent research.
2. The Internet of Things
The way we interact with the environment and each other
has changed dramatically Internet of Things (IoT) technol-
ogy is a very widespread technology. It should shape human
life. Make big nancial gains IoT and blockchain technology
can present a variety of challenges. Some IoT devices are
sold with built-in functionality to connect to the embedded
blockchain [8]. The company responsible for Ethereum
allows the use of nodes on devices such as Odroid, Beagle-
bone, and Ethereum. Raspberry Pi Similarly, EthRaspbian,
and Raspnode have the ability to install Bitcoin, Litecoin,
and Ethereum nodes on the Raspberry PI. The Raspnode
Wi-Fi Router Wallet also supports Litecoin and Bitcoin.
Anrouter R-LTC also has this capability. Litecoin is mined,
so this router can be easily installed on the IoT network as
part of the Fog computing platform. It is still in its infancy
and requires a lot of research for further integration. Some
IoT devices also have a mining function. Not all IoT devices
have this capability. Because it requires high-end hardware
and invalidation on IoT devices, IoT mining is often not
found to solve these challenges. The Internet of Things
(IoT) oers a multitude of aspects of life. Our daily life is
strongly inuenced by the many applications in areas such
as healthcare and manufacturing. IoT plays an important
role in transforming homes into smart homes and cities.
Blockchain has to deal with many inherent complexities of
IoT [9] to become a smart city. Isolated integrating block-
chain with IoT will build trust between customers and
devices and reduce costs such as cutting out middlemen.
Transactions will be much faster, and for blockchain integra-
tion to work primarily for IoT purposes, it is necessary to
connect some aspects like scalability. Collaboration security
requires transcending blockchain into the IoT. Blockchain
is for them to harness the power of each other. Blockchain
and IoT are interdependent and evolving. Blockchain is an
opportunity provided by IoT, and IoT is essential to the
functions of blockchain exist. Blockchain provides a service
layer for integration with standard IoT frameworks. In gen-
eral, frameworks play three main roles: sensors, miners, and
agents. IoT sensors receive data and interact with services
using blockchain agents. The sensors are not integrated with
the blockchain function [10]. Transactions in the form of
sensory information can be interpreted and then transmitted
over a network. These agents also provide security through
the use of private keys. IoT devices do not have this security.
Network miners use the main function of the blockchain to
verify transactions and place them in blocks.
The Internet of Things, as shown in Figure 2, is made up
of devices that generate, process, and share massive volumes
of security and safety-critical data as well as privacy-sensitive
data, making them attractive targets for cyberattacks [43].
Many of the new networkable devices that make up the
Internet of Things [11] are low-power and lightweight.
These devices must concentrate the majority of their avail-
able energy and processing to executing core application
functions, making it dicult to enable security and privacy
in a cost-eective manner. In terms of energy usage and pro-
cessing overhead, traditional security methods are often too
expensive for IoT. Furthermore, because of the diculty of
scale, the many-to-one nature of the trac, and single point
of failure, many state-of-the-art security frameworks are
extremely centralized and hence are not necessarily well-
suited for IoT.
2.1. IoT Security. Notwithstanding the benets provided by
IoT services, where IoT technology is successfully imple-
mented on lamps, refrigerators, air conditioners, washing
machines, wristwatches, mobile phones, etc., managing IoT
[12] communications has become a challenge. A large num-
ber of IoT devices can be installed anywhere the end-user
Internet of things
Network suitable for the exchange between objects.
Distribution of connected objects particularly in smart stores.
Datavenue: Data & IoT solution and services for businesses regarding collection,
storage, security, processing and availability of data generated by connected objects.
Value added services in health, wellbeing, the connected home
on the smart city.
Figure 2: Internet of Things.
3Journal of Sensors
wants, leaving them unattended and being a desirable target
for others to attack. In addition, manufacturers do not con-
sider the security of these devices because of the large-scale
deployment of IoT devices. For bulk-manufactured devices,
default usernames and passwords are the same. Many IoT
devices are shipped with a preprogrammed key that cannot
be changed. In addition, IoT networks are heterogeneous
and dynamic in nature, allowing various (untrusted) devices
to indenitely join the network. In the event of a hack,
device intentions may dier during connection time, or
malicious devices may masquerade as benign. Data integrity
is another issue in IoT security. One of the most important
IoT applications is the decision support system [3]. The
information gathered by the sensors can be used to make
timely decisions. As a result, the system must be protected
from injection attacks, which attempt to inject false mea-
sures and thus inuence decision-making.
2.2. IoT Security Using Blockchain. Moving towards decen-
tralized architectures, blockchain technology has gained tre-
mendous attention in terms of addressing security,
anonymity, traceability, and centralization. Entities and
methods are enforcing security and privacy properties in dif-
ferent tiers of IoT security using blockchain, as shown in
Table 1. The security [13] of this technology stems from
the use of hash functions to chain blocks to ensure immuta-
bility, as well as the use of encryption and digital signatures
to secure data. The distributed nature of the blockchain
ensures its availability. Enabling blockchain technology in
IoT can help to achieve a properly distributed consensus
based IoT system that overcomes security issues. Even if this
is an ideal match, it is still a challenging endeavor. Most
existing blockchain schemes do not work in the IoT ecosys-
tem and cannot meet the specic needs of the IoT. IoT envi-
ronments are resource-constrained, computationally,
power-intensive, and storage-constrained, resulting in high
computational complexity, limited scalability, high band-
width overhead, and high latency blockchain. There are
some devices that are not recommended to be use with
IoT. This is due to how the Block name manages device
identities [14]. The author uses an open source implementa-
tion of the Kademlia Distributed Hash Table (DHT) which
provides the secure encrypted communication, thus dene
how devices are used with smart contracts. Fakhri and Muti-
jarsa built IoT systems with and without blockchain and
compared the two approaches. MQTT is a communication
protocol used in IoT systems that do not use blockchain.
Ethereum was used as a blockchain platform, along with a
smart contract, in the other system. The security levels of
both IoT systems were evaluated by simulating attacks and
observing their security features. The results of the tests
showed that the IoT system based on blockchain technology
had a higher level of security than the IoT system that did
not use blockchain technology. Mik presented a novel
hybrid blockchain architecture for IoT, referred to as Hybrid
IoT. In Hybrid IoT [15], subgroups of IoT devices, referred
to as PoW (proof of work) subblockchains, were created.
The connection between the PoW subblockchains was then
made using a Byzantine Fault Tolerance (BFT) interconnec-
tor framework, such as Cosmos or Polkadot. The authors
work focused on the formation of PoW subblockchains that
are guided by a set of metrics, dimensions, and bounds. The
performance evaluation validated the PoW subblockchain
design according to the guidelines of the sweet-spot. The
results showed that the guidelines of sweet-spot help to pre-
vent security vulnerabilities. To provide an IoT network with
a scalable and dynamic communication architecture, a
dynamic blockchain-based trust system was proposed in.
The proposed architecture practically labelled all IoT devices
and mapped them as full nodes and lightweight nodes. If the
attacker pretends to be a full node, high-level security veri-
cation will either catch him or make the attack extremely
costly [4]. It is also dicult if the attacker just wants to pre-
tend to be a lightweight node because all history is recorded
and the attacker must fake everything all over again each
time they try to attack. However, IoT with blockchain topol-
ogy should not only manage the ID but also protect the
information exchanged in the IoT network.
3. Literature Review
Various problems in IoT despite authentication and best
methods for incorporating security such as Zhen Ling, Junz-
hou Luo et al. (2017), Yiling Xu et al. (2017), Chao Gao et al.
(2017), Kui Wu et al. (2017), and Xinwen Fu et al. (2017)
found that there are numerous challenges that arise when
there is an authentication method (2017). The lack of an
authentication mechanism in the IoT is the fundamental
Table 1: Entities and methods enforcing security and privacy properties in dierent tiers.
Properties Smart home Overlay network Cloud storage
Identity and authentication Ledger of transaction Signatures Block-number along with hash
Access control Policy header and transactions in BC Multiset transaction Block-number with hash
Protocol and network Encryption Encryption Encryption
Privacy Not-private PK or ID Block-number along with hash
Trust Predened Verication Signed hash of data
Nonreputation Encryption Signatures Signed hash of data
Policy enforcement Policy header PK lists Accounting
Authorization Policy header and transactions List of keys Accounting
Fault tolerance Medium High Low
4 Journal of Sensors
83
205
128
107
39
7
0
50
100
150
200
250
2022 2021 2020 2019 2018 2017
No. of documents
Year
No. of documents published by authors per year
(a)
113
74
46
39
36
33
21
20
20
19
17
15
0 20 40 60 80 100 120
India
China
United states
Australia
United kingdom
Saudi arabia
South korea
Canada
United arab emirates
Italy
Egypt
France
Documents
Documents by country (Territory)
Country (Territory)
(b)
Figure 3: Continued.
5Journal of Sensors
cause for this. Despite the fact that most IoT [16] apps have
authentication enabled, there are security concerns that lead
to data loss. Some of the diculties are as follows. The
authors oer a case study on a smart plug system in which
they eectively exploit protocols and launch attacks such as
brute force, device scanning, rmware assault, and spoong
attack. Their experiments reveal that they are capable of
gaining the upper hand.
In the importance of authentication in IoT systems [40],
authentication is the cornerstone of providing good security.
In IoT systems and m2m applications, a variety of authenti-
cation mechanisms are used. These authentication proce-
dures are simple and rely on XOR and hash operations to
communicate inside the IoT technology ecosystem [17].
Leakage of critical data is a major concern in many IoT net-
works Munindar P. Singh et al. (2017) and Muhammad
Shahzad et al (2017). The fundamental cause, according to
the authors, is that IoT networks lack authentication proce-
dures. The authors suggest alternative approaches for user
identication and authorization for IoT networks that lack
traditional user interfaces. The authors discuss why authen-
tication is critical in an IoT network. They also [41] provide
a solution for overcoming the lack of a traditional user inter-
face for IOT networks.
The search approach should be thorough and objective,
as well as simple and repeatable. The search is restricted
from 2017 to 2022. The work done on blockchain and Inter-
net of Things integration in the last six years is given below,
as shown in Figures 3(a)3(c).
This investigation is based on publications found in the
Scopus electronic database. Searching is an important com-
ponent of performing a systematic review. In our search,
we employed terms such as keywords, title, authors, abstract,
references, and index/subject terms, as shown in Figures 4(a)
and 4(b). And historiography and average citation per year
are shown in Tables 2 and 3. Authors have worked on vari-
ous next generation IoT and Blockchain Integration con-
cepts for the last seven years, as shown in Table 4.
Table 2 presented historiography based on clustering in
Figure 4(b).
Blockchain is an ever-growing list of records that are
linked and protected using cryptographic methods. It also
oers its users the exibility to conduct transactions with
lower costs and faster speeds. This is presented in Table 3
in the form of citations.
4. Blockchain and IoT Integration
IoT is transforming and optimizing manual workows to
become part of the digital age. By receiving a large amount
of information that provides a level of knowledge that has
never been heard before, this knowledge facilitates the devel-
opment of intelligent applications, such as improving the
management and quality of peoples lives through the digiti-
zation of city services. In the past few years [2], Cloud com-
puting technology has contributed to the IoTs essential
functions for analysing and processing data and turn them
into real-time actions and knowledge. Unprecedented
growth in the IoT [18] has opened up new opportunities
for communities, such as mechanisms for accessing and
sharing information. The open data paradigm is the primary
guide to these initiatives. However, one of the most impor-
tant vulnerabilities of these initiatives which happened in
many the situation is lack of condence. A centralized
38%
25%
8%
8%
4%
4%
4%3% 3%3%
Documents by subject area
Computer science
Engineering
Decision sciences
Mathematics
Social sciences
Business, management
and accounting
Physics and astronomy
Energy
(c)
Figure 3: (a) The annual and cumulative numbers of research documents related to blockchain and IoT integration. (b) The country and
cumulative numbers of research documents related to blockchain and IoT integration. (c) The subject area and cumulative numbers of
research documents related to blockchain and IoT integration.
6 Journal of Sensors
architecture like the one used in cloud computing is crucial
to the development of IoT. They act as a black box, and net-
work participants do not have a clear vision of where and
how to use the information they provide.
The integration of promising technologies such as IoT
and cloud computing has proven invaluable. In the same
way, we recognize the enormous potential of blockchain in
revolutionizing the IoT [19]. Blockchain can empower the
IoT by providing reliable sharing services. The information
is reliable and traceable. The source of information can be
identied at any time. And the data will remain unchanged
over time. Improve safety where IoT data should be shared
securely between large numbers of participants. This inte-
gration represents a major revolution. For example, thor-
ough traceability in many food products is a key factor in
ensuring food safety. Food traceability may require the par-
ticipation of a large number of participants: production,
feeding, treatment, distribution, etc. A leak in any part of
the chain could lead to a breach and slows down the process
of nding infections. This can have a devastating impact on
citizenslives and cause enormous economic costs to compa-
nies, sectors, and countries. In the event of a food-borne out-
break, better controls in these areas would increase food
safety [6, 20], improved sharing of information between par-
ticipants, reduce search time in case of foodborne outbreaks
and saving human lives. In addition, in other areas such as
smart cities and smart cars, trusted sharing of information
can be benecial to include new participants in the ecosys-
tem and contribute to improving service and acceptance.
Therefore, the use of blockchain can complement the IoT
with reliable and secure data. This became known, as men-
tioned, where blockchain technology was identied as the
DE AU AU_CO
(a)
Centrality
Impact
Internet of things - conf 32.8%
Blockchain - conf 35.7%
Block-chain - conf 29.6%
Internet of things - conf 50.6%
Blockchain - conf 47.6%
Block-chain - conf 46.4%
Internet of things - conf 16.7%
Blockchain - conf 16.7%
Block-chain - conf 24%
(b)
Figure 4: (a) A screenshot of the three elds plot in bibliometric analysis created based on keywords, authors with authors country. (b)
Clustering by coupling map.
7Journal of Sensors
key to solving scalability problems, privacy and reliability
associated with the IoT paradigm, increased security, trust
and lowering costs were all cited as top benets of Block-
chain/IoT, as shown in Table 5.
From our perspective, IoT can benet greatly from
blockchain functionality and will help to develop the current
IoT technology in the future. It is worth noting that there are
still a number of research challenges and open issues that
need to be explored in order to seamlessly integrate these
two technologies, and this research topic is still in its prelim-
inary stages, especially improvements that this integration
can bring (but not limited to):
Decentralization and scalability: the transition from a
centralized architecture to a distributed P2P removes the
center of failure and bottlenecks [21]. It also prevents situa-
tions where few powerful companies control the processing
and storage of many people. Other benets along with the
decentralization of the architecture is to improve the sys-
tems fault tolerance and scalability, and it reduces IoT silos
and contributes to further improvements in IoT scalability.
Identity: using common blockchain participants can
identify every device. The data provided and entered into
the system are immutable and uniquely identies the actual
data provided by the device. Additionally, the blockchain
can provide distributed authentication and device authoriza-
tion for IoT applications. It will represent improvements in
IoT and participants.
Autonomy: Blockchain technology powers next-
generation application features [22]. This makes it possible
to develop intelligent automated assets and hardware as a
service. With blockchain, devices can interact without
servers involved. IoT applications may benet from this
functionality in application procurement.
Reliability: IoT data remains immutable and distributed
over time in the blockchain. System participants can verify
the accuracy of the information and ensure that it has not
been tampered with. In addition, this technology allows the
collection and monitoring of sensor data. Trust is an impor-
tant part of the blockchain brought by the IoT.
Security: data and communications can be secured by
storing blockchain transactions. Blockchains can be used to
translate device messages into transactions [23]. Validated
by smart contract, in this way, communication between
devices is secure. Todays secure standard protocols used in
the IoT can be extended with blockchain applications.
Services market: Blockchain can accelerate the creation
of the IoT ecosystem of services and data markets. There,
transactions between colleagues can be done without
employees, and microservices can easily implement and
make micropayments. It can be done safely in an unreliable
environment. This will improve IoT connectivity and access
to IoT data on the blockchain.
Secure code alignment: uses secure, unmodied block-
chain storage. The code can be secured and securely inserted
into the device [24]. Manufacturers can track status and
update with condence. IoT middleware can take advantage
of this capability to securely update their IoT devices.
4.1. Blockchain Technology Solution to IoT. The challenges
that IoT systems confront might be solved more eectively
with blockchain technology. The number of interacting items
or devices in IoT systems is likely to expand in the future. As
the number of gadgets increases, they will attempt to commu-
nicate with one another, resulting in the internet becoming a
medium. Because most acquired data in IoT devices is stored
on central servers, this would provide a number of challenges.
If devices wish to access data, they must communicate via a
centralized network, [8] with data owing through a central
server. Decentralized or dispersed networks with peer-to-
Table 2: Historiography.
Paper Title DOI Year Cluster
Bodkhe, 2020, Trans emerg
telecommun technol Blockchain for precision irrigation: opportunities and challenges 10.1002/ett.4059 2020 1
Li, 2022, Trans emerg
telecommun technol
Blockchain as a service models in the internet of things
management: systematic review 10.1002/ett.4139 2022 1
Khan, 2021, Electronics
(Switzerland) Reliable Internet of Things: challenges and future trends 10.3390/
electronics10192377 2021 2
Guru, 2021, Electronics
(Switzerland)
Approaches towards blockchain innovation: a survey and future
directions
10.3390/
electronics10101219 2021 2
Sadawi, 2021, IEEE access A survey on the integration of blockchain with IoT to enhance
performance and eliminate challenges
10.1109/
ACCESS.2021.3070555 2021 2
Tran, 2021, J network comput
appl
Integrating blockchain and Internet of Things systems: a
systematic review on objectives and designs
10.1016/
j.jnca.2020.102844 2021 3
Alkhateeb, 2022, Sensors Hybrid blockchain platforms for the Internet of Things (IoT): a
systematic literature review 10.3390/s22041304 2022 3
Table 3: Average citation per year.
Year NMeanTCperArt MeanTCperYear CitableYears
2018 18 35.78 8.94 4
2019 35 37.71 12.57 3
2020 40 18.07 9.04 2
2021 63 6.27 6.27 1
2022 42 0.74 0
8 Journal of Sensors
peer networking (PPN), distributed le sharing (DFS), and
autonomous device coordination (ADC) capabilities are one
of the best ways to tackle this [25]. These three roles may be
carried out by blockchain, allowing IoT systems to track a
large number of linked and networked devices. BC enables
IoT systems to coordinate the processing of transactions
between devices. BC will improve the security and dependabil-
ity of IoT systems, making them more resilient. With the sup-
port of a distributed ledger, BC enables for speedier peer-to-
peer communications.
4.2. Blockchain Scalability in IoT. Blockchain has gained
popularity as a result of the use of Bitcoin for online transac-
tions that do not require third-party security. However, the
most dicult challenge for blockchain providers is the scal-
ability. Scalability issues must be addressed to integrate IoT
and blockchain. On the one hand, because of their sheer
number, IoT devices will generate transactions at a rate that
current blockchain [10] solutions will not be able to handle.
However, owing to resource constraints, it is impossible to
implement blockchain peers on IoT devices. Both technolo-
gies cannot directly be integrated in their current state [26].
To address the issue of scalability, various techniques such as
Segwit, Sharding, block size increase, POS, and o-chain
state have been proposed. Segwit, or segregated witness, is
a scalability solution that increases the number of transac-
tions in a block while keeping the block size constant. By
removing the signature data from the Bitcoin transaction, a
segregated witness creates room for new transactions.
Biswas et al. proposed a framework that enables the block-
chain ledger to scale across all peers by establishing a local peer
network. It limited the number of transactions that enter the
global blockchain by implementing a scalable local ledger
while maintaining peer validation of transactions at both the
local and global levels. The results of the implementation
testbed showed that signicant improvements in the
Table 4: Authors have worked on various IoT and Blockchain Integration concepts for the last seven years.
References Year Objectives Future scope
[16] 2016
IoT middleware, cloud platforms, and cloud infrastructures
are all surveyed as integration components. Additionally,
certain integration ideas and data analytics methods are
reviewed, along with various diculties and unresolved
research problems.
Users can choose the essential components depending on
their own needs in order to achieve a smooth integration
based on the comparisons performed and the aspects
examined.
[29] 2017
A test bed is described to compare central and local data
processing and highlight benets of distributing data
across multiple locations in a network.
Using test bed, this system oers network saving, real-time
processing, intelligent local data processing, and potential
local processing mechanisms within the smart grid.
[30] 2018
It discusses several application areas, groups the literature
that is now available into these categories, introduces two
usage patternsdevice manipulation and data
management, and provides information on the stage of
development of some of the solutions currently available.
The machine economy was created as a result of attempts
to commercialise data due to the prevalence of IoT devices
and rising data creation. The use of BC to address the issue
of data trading and interchange is an example of how this
could be applied in the real world.
[34] 2019
Implementation of ve privacy-preserving techniques,
including privacy protection, encoding, private enterprises,
combining, and discrepancy secrecy, in blockchain-based
IoT systems.
Before being put into use, blockchain-based IoT devices
need to be protected against a number of privacy issues.
[36] 2020 A case study is implemented in a smart IoT system
utilizing the Ethereum-based Blockchain technology.
The IoT smart environment is created using sensor devices,
and on the Ethereum platform, devices are authorised
using the Dec AUTH protocol.
[40] 2021 The suggested BaaU-based framework for trustworthiness
in the HIoT systems of the future.
Next-generation healthcare IoT (HIoT) applications may
be one of the industries that the blockchain network will
likely revolutionize as a technical improvement.
[41] 2022
A cooperative data sharing system where numerous data
sources and consumers work together to complete data
sharing tasks using cloud-edge computing and blockchain
technology.
The outcomes demonstrated that it can be helpful in
examining the eectiveness of any blockchain-enabled data
sharing system. This will facilitate the successful
implementation of ecient data exchange systems.
Table 5: Benet of implementing integrated IoT with Blockchain networks.
Benets 1
St
choice 2
nd
choice Sum
Increased security and trust in shared multiparty transactions and data 33% 30% 63%
Increase in business eciency and lowering costs 27% 29% 56%
Increase in revenue and business opportunities 21% 22% 43%
Improved constituent or participant experiences 19% 17% 37%
9Journal of Sensors
transaction rate and ledger weight were possible. This would
improve the scalability of large-scale business transactions in
IoT [27] and address the issue of memory requirements for
storing blocks. However, the current implementation and
evaluation have been carried out in part on virtual machines,
with the application written in Node-red.
There are several elds that deploy IoT systems for all
the advantage that it provides such as the ability to capture
the data and communicate with its peer devices without
any human or machine intervention. During these interac-
tions, there is a high possibility of the data leakage. In order
to overcome this, there are various methods that are
employed to address this area of security.
4.3. Importance of Combining IoT with Blockchain. For
industries, IIoT (Industrial Internet of Things) [14] [28] is
an inseparable part. Here, people are made mandate for
delivering IIoT systems that are secure, general, and scalable.
Due to problems like malicious attacks and single point of
failure, the existing IIoT systems are unstable in providing
services. Although blockchain is a technology that has qual-
ities like security promise and recovery combing IoT, and
blockchain is interesting. Most of the IoT devices are power
constrained and are not suitable for blockchain though it has
low-throughput and less power-intensive. For the purpose of
protecting the sensitive data condentiality, authors came up
with a method that regulates the access to sensor data.
In a centralized architecture, there are problems associ-
ated with obstacles and the center of failure. Moving to a
peer-to-peer architecture solves this problem. Because the
storage space is decentralized, small businesses can control
and process the data, unlike a centralized architecture where
large businesses can control the data [22]. This allows for
better fault tolerance and system scalability. The identity of
the connected device is important because it can lead to
security and reliability issues. All connected devices can be
uniquely identied through a single blockchain system. Cre-
dentials are also required to identify the data that devices
receive. Blockchain also provides authentication for IoT
devices.
Many standalone smart devices can be made using block-
chain technology, which enables advancedfunctionstobeinte-
grated into smart hardware. Smart devices can also interact with
each other without an IoT server. It can be used for modular
applications. The system is also reliable as there is no risk of data
loss from the blockchain. Users can verify data integrity, and
data will remain intact. The system can track and account for
data, so reliability is an important factor in integration consid-
erations [15]. The system is also secure as the data is stored as
blockchain transactions. This allows you to change the type of
transactions monitored by smart contracts. A secure key can
be provided to be securely embedded into IoT devices, allowing
organizations to secretly track and update devices. It can also
create an environment conducive to market exploitation [29].
Transactions between dierent actors can be done without an
agency, and micropayments can be made instantly even if there
is no trust between dierent people. It can improve IoT by pro-
viding more blockchain insights.
When integrating a blockchain, it is important to con-
sider whether the devices in the system can interact with
each other. A new layer known as fog computing has been
added between IoT devices and cloud computing for better
integration. Blockchain technology has the following advan-
tages for large scale IoT systems, as shown in Figure 5.
Communication between two IoT devices is fast and
secure. They can also work oine and have the ability to
communicate with each other using routing techniques, so
they do not need a blockchain to communicate. Only a small
amount of data is stored in the blockchain. It is used in
applications that require minimal delay [30], on the other
hand, for communication between the IoT and the block-
chain, all data recording all interactions that occur must pass
through the blockchain. This ensures that all interactions
can be tracked and recorded. In eect, this increases band-
width usage. Therefore, this can be considered as a major
limitation of blockchain. When communicating with hybrid
technologies, small units of information are shared with the
blockchain. Although the IoT [31] connection is direct, it is
dicult to choose which interventions must be carried out
during operation by the blockchain. Fog computing, which
Tamper proof
data
Trustless &
P2P msg.
possibility
Robust Highly
reliable
Cost
reduction
Elimination of
single control
authority
Records
historic action
More private
data
Accelerate
transactions Built in trust Distributed le
sharing
Permits self-
directed
functioning
Figure 5: Blockchain technology have the following advantages for large scale IoT systems.
10 Journal of Sensors
uses gateways and other devices for mining, has overcome
these limitations, but the use of this technology is growing
rapidly. But it is not necessary to use it everywhere. It should
only be used for required applications. In general, private use
of blockchain may not be suitable for applications that
require high performance. However, hybrid techniques
may be required to increase eciency. Wust and Gervais
introduced a process that identies blockchain requirements
based on their application.
To facilitate the integration of IoT and blockchain, major
companies are teaming up and selling o-the-shelf devices
[32]. Some IoT devices are sold with built-in functionality
to connect to the EthEmbeddedblockchain, and the com-
pany responsible for Ethereum allows nodes to be installed
on devices such as Odroid, Beaglebone, and Raspberry Pi.
Congure Bitcoins, Litecoins, and Ethereum nodes in the
Raspberry PI a. The RaspnodeWiFi Router also supports
wallet support for Litecoin and Bitcoin. The R-LTC Anrou-
ter can also mine Litecoin, which makes this router easy to
set up. It is still in its infancy and requires extensive research
for further integration. Some IoT devices also have mining
capabilities. Not all IoT devices have this capability. Since
it requires high-quality hardware and is not valid on IoT
devices, you will generally not nd mining with IoT.
There are other ways to integrate blockchain with the
IoT, including integration with cloud computing. Devices
have been integrated in this way for many years to address
IoT shortcomings such as storage, access, and compute,
but cloud computing operates in a centralized framework.
It is therefore unreliable and secure when information is
shared with specic recipients. Therefore, blockchain is pre-
ferred over cloud computing to solve this problem.
4.4. Blockchain Used Because of Its Decentralized Nature in
Various Applications. The scattered nature of IoT networks
and their huge scale, according to several academics, is a
big concern, as shown in Figure 6. Even though, the Decen-
tralized nature of blockchain techniques provide privacy and
security, they are not ideal for devices with limited resources
due to delays, considerable energy use, and computational
overhead. These elements dene the smart home tiers dif-
ferent key functions and components [33]. A component
called miner is used to handle the home writersinternal
and external communications. This component is a high-
resource gadget that is always online. Auditing and manag-
ing communications are two more responsibilities of the
miner. Blockchains retain security goals such as integrity,
availability, and secrecy. Because of the dierent security
threats that have been put on the global IoT network, the
advantages that may be derived from IoT networks may
exceed the risks. Data stored on the central server is subject
to DDoS and Sybil attacks, as well as single point failure,
which reduces the availability of services and exposes the
sensor data stored in the data center.
4.4.1. Potential of Smart Contracts (SC) in Blockchain. SC are
well suited for business activities that involve purchase or
exchange of goods, services, and rights, especially when fre-
quent transactions occur among a network of parties and
manual tasks are performed by counterparties for each
transaction [2]. This application is a match for many nan-
cial services transactions (e.g., simplifying automatic divi-
dend payments, stock splits and cryptographic signatures
on stock certicates, and streamlining over-the-counter
agreements). It also [41] describes many supply chain,
manufacturing, and retail transactions. However, the tech-
nology is still in its infancy, so most use cases of smart con-
tracts today consist of the transfer of cryptocurrency [34]
and recording/changing ownership of land or other assets.
4.4.2. Could Blockchain Technology Can Be a Remedy? Yes.
The blockchain technology could be one of the remedies
for addressing the security and privacy issues in IoT. This
is because, the blockchain technology eliminates the central
server concept of IoT and allows the data to ow through
the blockchain distributed ledger for each transaction with
appropriate authentication.
0
Architecture
Cryptography
Transaction management
Encryption
Dierential privacy
Private contract
Mixing
Consensus mechanism
Access management
Multi-packet transactions
Timestamp obfuscation
10
20
30
40
50
60
Blockchain technology applications in IoT
Blockchain usage
Figure 6: Application types.
11Journal of Sensors
5. Challenges
Storage capacity and scalabilityit is still debatable whether
blockchain scalability and storage capacity issues are wide-
spread. And in combination with IoT applications, it
becomes even more dicult. However, for this reason,
Blockchain technology may seem unsuitable for IoT, but
the challenges involved can be avoided or completely mini-
mized: some IoT devices can generate large amounts of data
[18] [35]. This makes integration dicult. This is because
the ubiquitous blockchain cannot handle such large transac-
tions. Therefore, it is benecial to address these issues before
combining the two technologies. Today, only a small per-
centage of IoT big data is useful for knowledge extraction
and production operations. Therefore, many researchers
have proposed ltering methods. Normalize and compress
IoT data to reduce it. IoT includes devices such as embedded
devices and communication devices. This stores the amount
of data that the IoT provides to the blockchain. Data com-
pression can reduce the data we transmit, process, and store
from the IoT. Finally, negotiated protocols can be used to
increase allocated bandwidth and reduce contract latency.
This improves the integration between IoT and blockchain.
Security by insucient eciency and a large number of
uneven devicessecurity challenges in IoT applications
need to be addressed at dierent levels. Moreover, IoT
environments have various characteristics such as wireless
communication, mobility, etc. that compound security chal-
lenges. A full security analysis has been performed. It is
important to build a highly secure IoT. Due to the increasing
number of attacks and their severe impact, blockchain is con-
sidered the crucial technology to support much-needed secu-
rity advancements in IoT, but the integrity of data generated
by IoT [9] remains a major challenge. By integrating the two
technologies, blockchain can ensure that the data transmit-
ted through the chain remains intact and changes can be
detected. Therefore, when the data reaches its destination,
the corrupted data stays that way. Apart from suspicious
sources, corrupted data in IoT [36] can come from many
other sources. Factors such as disturbance, device failure,
environment, and type of participant play a role in the
integrity of the IoT framework. Sometimes, IoT devices do
not perform well and are dicult to detect until they are
properly secured. Sometimes, it works ne at rst and
works due to hardware or software issues. Eavesdropping,
throttling, or denial of service (DOS) is a major threat that
can have a huge impact on the IoT and therefore needs to
be addressed. Test it properly before combining it. They
must be properly positioned and packaged to avoid physical
damage and include an instant device error detection
mechanism.
Cost and energyBlockchain adoption is hampered by a
lack of processing capacity. For example, Bitcoin mining
necessitates a signicant degree of energy to verify and vali-
date exchanges.
Complexity and inactivitydue to the proprietary
nature of blockchain-based trades, it may take several
hours for all gatherings to update their corresponding
records.
Adoption and mindfulnessthe lack of attention and
reception is one of the most fundamental challenges in
blockchain innovation. Many people, for example, have a
limited understanding of how it works.
Limitation of capacity and adaptationas previously
said, the storage limit and adaptability of blockchain are still
being debated, however, when it comes to IoT applications,
the inherent limit and versatility constraints exacerbate these
issues. In this respect, blockchain may appear to be unsuit-
able for IoT applications [37]; however, there are ways to
alleviate or avoid these limitations. This constraint addresses
a signicant barrier to blockchain integration in the IoT,
where devices can continuously generate terabytes (GBs) of
data. It has been discovered that several existing blockchain
operations can only handle a few transactions per second,
which could be a bottleneck for the IoT.
Condentiality and information securitymany IoT appli-
cations operate with private information, such as when a device
is attached to an individual, as in the e-healthcare situation,
thus, it is critical to solve the issue of data security and anonym-
ity. Although Blockchain is touted as the greatest solution for
addressing the personalities of IoT [3841] leaders, there may
be applications where anonymity is required, similar to Bitcoin.
This is the case with a wearable that can hide an individuals
identity when delivering personal information, or with clever
cars that preserve the security of customersschedules.
Brilliant agreementsalthough brilliant agreements
have been identied as the ideal application of blockchain
innovation, there are still a few issues to be resolved, as pre-
viously said. The use of clever contracts in IoT [4244]
might be benecial, but the way they integrate into IoT
applications is dierent [45, 46].
6. Conclusion and Future Scope
Blockchain aims to revolutionize the next generation IoT.
This review has provided a comprehensive overview of the
interaction between blockchain technology and the IoT
model. Implementing restrictions is important for integrat-
ing blockchain and IoT into government infrastructure. This
recognition will accelerate engagement between citizens,
governments, and businesses. Consensus will play an impor-
tant role in integrating IoT as part of the process of mining
and distributing more blockchains. Research eorts should
be made to ensure the security and privacy of key technolo-
gies such as IoT and blockchain. One of the biggest concerns
about blockchain is that people are taking advantage of this
situation, especially in the context of the instability of digital
currency. The paper then also went on to explain and chro-
nologically introduce articles on Internet of Things, IoT
security using blockchain, Blockchain scalability in IoT,
and new challenges and opportunities in IoT and defense
mechanisms, as well as using blockchain to ensure conden-
tiality, authentication, access control, trust, and reputation.
Although enabling IoT data security, blockchain has numer-
ous signicant problems. For a successful blockchain and
IoT integration, an analysis of the key problems of block-
chain and IoT integration should be investigated, consider-
ing the issues raised in this study. As future work, we
12 Journal of Sensors
intend to investigate how blockchain, edge computing, and
IoT can complement each other in their integration, as well
as how edge computings many security and data integrity
issues may be handled by using blockchain technology.
Finally, we intend to launch a variety of blockchain applica-
tions in the IoT because of blockchains autonomy to foster
the creation of next generation IoT markets. The whole
prospect of working on blockchain to maybe one day create
something that has never been done before is the motivation
behind trying to make this decentralized app.
Data Availability
No data were used to support this study.
Conflicts of Interest
We declared no competing interest exists.
Acknowledgments
The authors would like to acknowledge the support of Prince
Sultan University for paying the Article Processing Charges
(APC) of this publication.
References
[1] S. N. Khan, F. Loukil, C. Ghedira-Guegan, E. Benkhelifa, and
A. Bani-Hani, Blockchain smart contracts: applications, chal-
lenges, and future trends,Peer-to-peer Networking and Appli-
cations, vol. 14, no. 5, pp. 29012925, 2021.
[2] C. McPhee and A. Ljutic, Editorial: Blockchain,Manage-
ment Review, vol. 7, no. 10, pp. 35, 2017.
[3] A. Angrish, B. Craver, M. Hasan, and B. Starly, A case study
for Blockchain in manufacturing: "FabRec": a prototype for
peer- to-peer network of manufacturing nodes,Procedia
Manufacturing, vol. 26, pp. 11801192, 2018.
[4] T. Justinia, Blockchain technologies: opportunities for solving
real-world problems in healthcare and biomedical sciences,
Acta Informatica Medica, vol. 27, no. 4, pp. 284291, 2019.
[5] M. Andoni, V. Robu, D. Flynn et al., Blockchain technology in
the energy sector: a systematic review of challenges and oppor-
tunities,Renewable and Sustainable Energy Reviews, vol. 100,
pp. 143174, 2019.
[6] M. Alharby and A. Van Moorsel, Blockchain-based smart
contracts: a systematic mapping study,2017, http://arxiv
.org/abs/1710.06372.
[7] M. Iansiti and K. R. Lakhani, Harvard Business Review,
HBR, R1701J, Jan-Feb, 2017.
[8] I. Karamitsos, M. Papadaki, and N. B. Al Barghuthi, Design of
the blockchain smart contract: a use case for real estate,Jour-
nal of Information Security, vol. 9, no. 3, pp. 177190, 2018.
[9] S. Nakamoto, Bitcoin whitepaper,vol. 17, no. 7, p. 2019,
2008, URL: https://bitcoin.org/bitcoin.pdf-.
[10] Z. Wang, H. Jin, W. Dai, K. K. R. Choo, and D. Zou, Ether-
eum smart contract security research: survey and future
research opportunities,Frontiers of Computer Science,
vol. 15, no. 2, pp. 118, 2021.
[11] A. H. Mohammed, A. A. Abdulateef, and I. A. Abdulateef,
Hyperledger, Ethereum and blockchain technology: a short
overview,in 2021 3rd International Congress on Human-
Computer Interaction, Optimization and Robotic Applications
(HORA), pp. 16, Ankara, Turkey, 2021.
[12] H. Xiaoting and N. Li, Subject information integration of
higher education institutions in the context of Web3. 0,in
2010 The 2nd International Conference on Industrial Mechatro-
nics and Automation,vol.2,pp.170173, Wuhan, China, 2010.
[13] M. Hamilton, Blockchain distributed ledger technology: an
introduction and focus on smart contracts,Journal of Corpo-
rate Accounting & Finance, vol. 31, no. 2, pp. 712, 2020.
[14] W. Metcalfe, Ethereum, Smart Contracts, DApps, Blockchain
and Crypt Currency, 2020.
[15] E. Mik, Smart contracts: terminology, technical limitations
and real world complexity,Law, Innovation and Technology,
vol. 9, no. 2, pp. 269300, 2017.
[16] M. Díaz, C. Martín, and B. Rubio, State-of-the-art, challenges,
and open issues in the integration of internet of things and
cloud computing,Journal of Network and Computer Applica-
tions, vol. 67, pp. 99117, 2016.
[17] J. Rivera and R. Van Der Meulen, Gartner,Forecast Alert:
Internet of ThingsEndpoints and Associated Services, World-
wide, Gartner, Ed., 2016.
[18] K. Zīle and R. Strazdiņa, Blockchain use cases and their feasi-
bility,Applied Computer Systems, vol. 23, no. 1, pp. 1220,
2018.
[19] M. A. Engelhardt, Hitching healthcare to the chain: an intro-
duction to blockchain technology in the healthcare sector,
Technology Innovation Management Review, vol. 7, no. 10,
pp. 2234, 2017.
[20] S. Nakamoto, Bitcoin: a peer-to-peer electronic cash system,
Decentralized Business Review, p. 21260, 2008.
[21] A. M. Antonopoulos, Mastering Bitcoin: Unlocking Digital
Cryptocurrencies, O'Reilly Media, Inc., 2014.
[22] Z. Zheng, S. Xie, H. N. Dai, X. Chen, and H. WangBlockchain
challenges and opportunities: a survey,International Journal of
Web and Grid Services,vol.14,no.4,pp.352375, 2018.
[23] N. Radziwill, Blockchain revolution: how the technology
behind bitcoin is changing money, business, and the world,
The Quality Management Journal, vol. 25, no. 1, pp. 64-65,
2018.
[24] E. Androulaki, A. Barger, V. Bortnikov et al., Hyperledger
fabric: a distributed operating system for permissioned block-
chains,in Proceedings of the thirteenth EuroSys conference,
pp. 115, 2018.
[25] J. Kennedy, $1.4 bn investment in blockchain start-ups in last
9 months, says PwC expert,Silicon.com, vol. 4, 2016.
[26] I. Eyal, A. E. Gencer, E. G. Sirer, and R. Van Renesse, {Bit-
coin-NG}: a scalable blockchain protocol,in 13th USENIX
symposium on networked systems design and implementation
(NSDI 16), pp. 4559, 2016.
[27] N. M. Kumar and P. K. Mallick, Blockchain technology for
security issues and challenges in IoT,Procedia Computer Sci-
ence, vol. 132, pp. 18151823, 2018.
[28] J. Bhosale and S. Mavale, Volatility of select crypto-curren-
cies: a comparison of Bitcoin, Ethereum and Litecoin,Annual
Research Journal of SCMS Pune, vol. 6, 2018.
[29] U. Ahsan and A. Bais, Distributed big data management in
smart grid,in 2017 26th Wireless and Optical Communication
Conference (WOCC), pp. 16, Newark, NJ, USA, 2017.
[30] A. Panarello, N. Tapas, G. Merlino, F. Longo, and A. Puliato,
Blockchain and iot integration: a systematic survey,Sensors,
vol. 18, no. 8, p. 2575, 2018.
13Journal of Sensors
[31] A. Reyna, C. Martín, J. Chen, E. Soler, and M. Díaz, On block-
chain and its integration with IoT. Challenges and opportunities,
Future Generation Computer Systems,vol.88,pp.173190, 2018.
[32] H. F. Atlam, M. A. Azad, A. G. Alzahrani, and G. Wills, A
review of blockchain in internet of things and AI,Big Data
and Cognitive Computing, vol. 4, no. 4, p. 28, 2020.
[33] C. Nartey, E. T. Tchao, J. D. Gadze et al., On blockchain and
IoT integration platforms: current implementation challenges
and future perspectives,Wireless Communications and
Mobile Computing, vol. 2021, 25 pages, 2021.
[34] M. U. Hassan, M. H. Rehmani, and J. Chen, Privacy preserva-
tion in blockchain based IoT systems: integration issues, pros-
pects, challenges, and future research directions,Future
Generation Computer Systems, vol. 97, pp. 512529, 2019.
[35] A. Al Sadawi, M. S. Hassan, and M. Ndiaye, A survey on the
integration of blockchain with IoT to enhance performance
and eliminate challenges,IEEE Access, vol. 9, pp. 54478
54497, 2021.
[36] B. K. Mohanta, D. Jena, S. Ramasubbareddy, M. Daneshmand,
and A. H. Gandomi, Addressing security and privacy issues of
IoT using blockchain technology,IEEE Internet of Things
Journal, vol. 8, no. 2, pp. 881888, 2021.
[37] E. A. Shammar, A. T. Zahary, and A. A. Al-Shargabi, A survey
of IoT and blockchain integration: security perspective,IEEE
Access, vol. 9, pp. 156114156150, 2021.
[38] S. K. Lo, Y. Liu, S. Y. Chia et al., Analysis of blockchain solu-
tions for IoT: a systematic literature review,IEEE Access,
vol. 7, pp. 5882258835, 2019.
[39] T. Alam, Blockchain and its role in the internet of things
(IoT),International Journal of Scientic Research in Com-
puter Science, Engineering and Information Technology,
vol. 5, no. 1, pp. 151157, 2019.
[40] A. O. Almagrabi, R. Ali, D. Alghazzawi, A. AlBarakati, and
T. Khurshaid, Blockchain-as-a-utility for next-generation
healthcare internet of things,CMC-Computers Materials &
Continua, vol. 68, no. 1, pp. 359376, 2021.
[41] M. M. Mijwil, K. Aggarwal, D. S. Mutar, N. Mansour, and R. S.
Singh, The position of articial intelligence in the future of
education: an overview,Journal of Applied Sciences, vol. 10,
no. 2, 2022.
[42] S. D. Okegbile, J. Cai, and A. S. Alfa, Performance analysis of
blockchain-enabled data sharing scheme in cloud-edge
computing-based IoT networks,IEEE Internet of Things Jour-
nal, 2022.
[43] A. Alsharef, K. Aggarwal, M. Kumar, and A. Mishra, Review
of ML and AutoML solutions to forecast time-series data,
Archives of Computational Methods in Engineering, pp. 115,
2022.
[44] L. Kakkar, D. Gupta, S. Saxena, and S. Tanwar, IoT architec-
tures and its security: a review,in Proceedings of the Second
International Conference on Information Management and
Machine Intelligence, pp. 8794, Springer, Singapore, 2021.
[45] M. M. Mijwil, D. S. Mutar, Y. Filali, K. Aggarwal, and H. Al-
Shahwani, Comparison between expert systems, machine
learning, and big data: an overview,Journal of Applied Sci-
ences, vol. 10, no. 1, 2022.
[46] S. Tanwar, T. Paul, K. Singh, M. Joshi, and A. Rana, Classi-
cation and imapct of cyber threats in India: a review,in 2020
8th International Conference on Reliability, Infocom Technolo-
gies and Optimization (Trends and Future Directions)(I-
CRITO), pp. 129135, Noida, India, 2020.
14 Journal of Sensors
... The process of gathering raw data such as text, audio, video, or images and the addition of a few appropriate labels in a way that an ML solution can easily identify what data is all about is termed ad data labeling. A training dataset is imported into supervised learning [15]. The training dataset is a large dataset that is used to train ML solutions for predicting the result. ...
... Technology has emerged as a ray of hope to overcome the constraints of the healthcare system. There are qualified healthcare professionals, tech-equipped health devices, and hospitals on one end, and at the same time, the increasing cost of medical facilities exists on the other end [15]. Initially, it is important to accept and acknowledge the challenges of healthcare associated with different parameters. ...
Article
Full-text available
Machine learning (ML) is a versatile technology that has the potential to revolutionize various industries. ML can predict future trends in customer expectations that allow organizations to develop new products accordingly. ML is a crucial field of data science that uses different algorithms to predict insights and improve decision-making. The widespread acceptance of ML algorithms ML can provide helpful information using the enormous volume of health data generated regularly. Quicker diagnoses by doctors can be delivered by adopting ML techniques that can bring down medical charges and applying pattern identification algorithms to examine medical images. Every technology brings its challenges; in the same way, ML also has several challenges in healthcare that need to be acknowledged before we witness complete automation in medical diagnosis. People are still forbidden to share their personal information with intermediaries for treatment. Medical record governance is essential to ensure that health records are not missed. Manual diagnosis often goes in the wrong direction, as doctors are also human. Lack of communication between medical workers and patients, considering the insufficient data to diagnose disease, sometimes results in deteriorating health conditions. This paper deals with an introduction to machine learning. These ML algorithms are widely used for health diagnosis, a comparison analysis of literature work that has been done so far, existing challenges of the healthcare system, healthcare industry using machine learning applications, real-life use cases, practical implementation of disease prediction, and conclusion with its future scope.
... In general operating independently, they aim to detect and mitigate malicious activities surpassing the first security layer of the networks [Heidari andJabraeil Jamali 2022, Hara andShiomoto 2020]. However, mainly in Internet of Things (IoT), the growing number of devices in numerous application domains hampers their inter-operation and resilience in such environments [Abikoye et al. 2021, Tanwar et al. 2022]. Therefore, a seamless integration of such heterogeneous IoT networks claim for secure environments for device operation by robust and integrated approaches. ...
Conference Paper
Full-text available
Integrating thousands of smart devices over the various IoT domains will require the devices to deliver services free of threats. Although intrusion detection systems (IDS) offer a multi-layer of protection to IoT networks, they commonly operate in isolation, thus restraining their application in integrated environments. In this context, collaboration among IDS emerges as an alternative to enhance intrusion detection, relying on their knowledge about faced threats. However, collaborative IDS (CIDS) generally exchange messages through centralized entities, disregarding direct communication among IDS. This work proposes a collaborative network IDS (C-NIDS) that integrates standalone NIDS for sharing information about detected and mitigated threats, improving overall intrusion detection. Evaluation results showed that C-NIDS achieved an attack detection rate of 99%, enhancing the attack mitigation by up to 50% compared to non-collaborative scenarios.
... The IOT-based blockchain architecture is an interesting contrast to the conventional, centralized paradigm that struggles to fulfil specific IOT requirements [10]. Cloud management services can utilize blockchain technology and distributed ledger to integrate with applications, creating a reliable cognitive information system that streamlines management tasks and ensures data security [6]. ...
Article
Full-text available
The rise of cloud computing has transformed the way data is stored and managed, yet it has also brought about major security issues, especially concerning the secure transfer of data within cloud systems. In response to these challenges, this research develops a comprehensive cyber-security trust model that provides multi-risk protection for secure data transmission in cloud computing, ensuring the highest level of privacy and data security. This innovative approach aims to ensure the secure transmission of data in cloud computing while harnessing the combined strengths of Quantum Key Distribution (QKD) and Advanced Encryption Algorithm. As cloud environments become integral to modern business operations, safeguarding data against a multitude of security risks, including traditional and emerging threats, is paramount. The Cyber-Security Trust Model leverages blockchain to establish a transparent and tamper-resistant ledger of all data transactions within the cloud. This blockchain layer enhances data integrity, auditability, and traceability while also providing a decentralized and trust-based framework for authentication and authorization. The Multi-Risk Protection Model incorporates both Quantum Key Distribution (QKD) and a Modified Advanced Encryption Standard (MAES) to offer multi-layered defence mechanisms. Through rigorous testing and analysis, this study demonstrates the feasibility and effectiveness of the proposed Cyber-Security Trust Model with a Merkle tree-based solution for data integrity verification. It makes a significant impact on the field of secure data transmission in cloud computing by providing strong protection against a constantly changing set of security threats. MATLAB is employed to conduct rigorous experiments, analyse results, and validate the model’s performance in various cloud computing scenarios. The findings of the proposed study show the proposed method, combining Quantum Key Distribution (QKD) and Modified AES (MAES), stands out with exceptional performance, featuring encryption and decryption times of 2.25ms and 1.071ms, respectively. The proposed system outperforms all others, boasting an impressive accuracy rate of 99.84%. This research signifies a ground-breaking advancement in cloud computing security, addressing a spectrum of traditional and emerging threats through a multi-risk protection model incorporating Quantum Key Distribution (QKD) and MAES while demonstrating exceptional performance in rigorous experiments.
... Security is the main issue for the implementation of IoT infrastructures because IoT devices made by different vendors and the combination of them in one system make trust issues, so research is required to make one common blockchain-based security framework for all vendor IoT devices and all follow that framework during the implementation of the system [76,77]. Data generated by IoT devices is stored in the cloud, but data is tampered with due to a lack of new security techniques, which impacts the accuracy of IoT systems [78,79]. In the future implementation of blockchain, security techniques will increase cloud data security, so research is required to develop new security techniques/protocols to protect cloud/IoT data from hackers [80]. ...
Article
Nowadays, Blockchain is very popular among industries to solve security issues of information systems. The Internet of Things (IoT) has security issues during multi-organization communication, and any organization approves no such robust framework. The combination of blockchain technology with IoT makes it more secure and solves the problem of multi-organization communication issues. There are many blockchain applications developed for the security of IoT, but these are only suitable for some types of IoT infrastructure. This paper introduces the architecture and case studies of blockchain applications. The application scenarios of the Blockchain combined with the Internet of Things, and finally discussed four common issues of the combination of the Blockchain and the Internet of Things.
... Recently Abdelmaboud et al. 54 gave insights into applications and their integration scenario to blockchain but limited discussion on consensus and smart contracts. Moreover, Tanwar et al. 55 have developed detailed taxonomy and next-generation IoT and blockchain integration. Li et al. 56 proposed new insights on service models on blockchain, named as Blockchain-as-a-Service for cloud providers. ...
Preprint
Recently, blockchain-based IoT solutions have been proposed that address trust limitation by maintaining data consistency, immutability, and chronology in IoT environments. However, IoT ecosystems are resource-constrained and have low bandwidth and finite computing power of sensor nodes. Thus, the inclusion of blockchain requires an effective policy design regarding consensus and smart contract environments in heterogeneous IoT applications. Recent studies have presented blockchain as a potential solution in IoT, but an effective view of consensus and smart contract design to meet the end application requirements is an open problem. Motivated by the same, the survey presents the integration of suitable low-powered consensus protocols and smart contract design to assess and validate the blockchain-IoT ecosystems. We discuss the key blockchain concepts and present the scalability and performance issues of consensus protocols to support IoT. Further, we discuss smart contract vulnerabilities and blockchain attacks. Open issues and future directions are presented, supported through a case study of low-powered consensus protocol design in the blockchain- IoT ecosystem. The survey intends to drive novel solutions for future consensus and safe, smart contract designs to support applicative IoT ecosyst
... Blockchain technology's integration into smart homes allays serious security issues like a single source of failure, privacy, authentication, and authorization. Blockchain technology is based on a distributed, encrypted digital ledger [5]. It utilizes a distributed information system that maintains track of a series of blocks instead of conventional centralized networks. ...
Article
Full-text available
With the rapid advancement of technology, smart home environments have become increasingly popular, offering convenience and automation to homeowners. However, as these smart homes become more interconnected and integrated into 5G networks, security concerns arise, especially with the potential for unauthorized access and control. To address these security challenges, this research proposes a novel Robot Operating System based Ethereum blockchain (ROS-EB) that is responsible for secure and private data storage. In this research we reduce high complexity. The registration contract is performed by a certificate authority, and the key is generated using the Enhanced Elliptic Curve Digital Signature (EECDS) algorithm which improves the secure and private communication between the users, IoT devices, and edge-gateway. To increase security, we perform secure authentication by creating an effective methodology based on the Touch Well before Use (TWU) method which protects against attacks. The Adaptive Neuro-Fuzzy Inference System (ANFIS) is used for role-based access control and judge contracts. To improve secure service providing, we perform the detection of malicious and vulnerable users using Improved Cuckoo Optimization and Support Vector Machine (ICO-SVM) and Gated Recurrent Unit and Residual Neural Network (GRU-ResNNet) algorithm in ROS-EB which reduces the vulnerability in the smart home. For improving QoS, we have provided sufficient security service in the smart home environment (i.e. adjusting temperature, turning on/off lights, adjusting watering system and mantrap) by using multi-contract. The performance metrics such as Communication delay, register contract, access contract, detection time, and Energy consumed were assessed.
Article
Full-text available
Time-series forecasting is a significant discipline of data modeling where past observations of the same variable are analyzed to predict the future values of the time series. Its prominence lies in different use cases where it is required, including economic, weather, stock price, business development, and other use cases. In this work, a review was conducted on the methods of analyzing time series starting from the traditional linear modeling techniques until the automated machine learning (AutoML) frameworks, including deep learning models. The objective of this review article is to support identifying the time-series forecasting challenge and the different techniques to meet the challenge. This work can be additionally an assist and a reference for researchers and industries demanding to use AutoML to solve the problem of forecasting. It identifies the gaps of the previous works and techniques used to solve the problem of forecasting time series.
Article
Full-text available
In the modern era, artificial intelligence applications have become one of the most essential and prominent aspirations of countries in their various organisations and sectors, especially the education sector, due to the ability of these techniques to help this sector to develop rapidly and increase productivity by imparting scientific material in a beautiful way to the learners. This article provides an overview of the significance of artificial intelligence applications and their role in learning, and how they can be employed in the future. All information in this scenario is collected from a set of studies published in the time of COVID-19 pandemic between 2019 and 2021. This scenario concluded that artificial intelligence is the future that is constantly growing and can be benefited from in the field of education and must be properly exploited to build a new world that depends heavily on digital societies.
Article
Full-text available
Today, the science of artificial intelligence has become one of the most important sciences in creating intelligent computer programs that simulate the human mind. The goal of artificial intelligence in the medical field is to assist doctors and health care workers in diagnosing diseases and clinical treatment, reducing the rate of medical error, and saving lives of citizens. The main and widely used technologies are expert systems, machine learning and big data. In the article, a brief overview of the three mentioned techniques will be provided to make it easier for readers to understand these techniques and their importance.
Article
Full-text available
Blockchain has recently attracted significant academic attention in research fields beyond the financial industry. In the Internet of Things (IoT), blockchain can be used to create a decentralized, reliable, and secure environment. The use of blockchain in IoT applications is still in its early stages, particularly at the low end of the computing spectrum. As a result, the future roadmap is hazy, and several challenges and questions must be addressed. Several articles combining blockchain technology with IoT have recently been released, but they are limited to shallow technological potential discussions, with very few providing an in-depth examination of the complexities of implementing blockchain technology for IoT. Therefore, this paper aims to coherently and comprehensively provide current cutting-edge efforts in this direction. It provides a literature review of IoT and blockchain integration by examining current research issues and trends in the applications of blockchain-related approaches and technologies within the IoT security context. We have surveyed published articles from 2017 to 2021 on blockchain-based solutions for IoT security, taking into consideration different security areas and then, we have organized the available articles according to these areas. The surveyed articles have been chronologically organized in tables for better clarity. In this paper, we try to investigate the vital issues and challenges to the integration of IoT and blockchain, and then investigate the research efforts that have been conducted so far to overcome these challenges.
Article
Full-text available
Digitization and automation have engulfed every scope and sphere of life. Internet of Things (IoT) has been the main enabler of the revolution. There still exist challenges in IoT that need to be addressed such as the limited address space for the increasing number of devices when using IPv4 and IPv6 as well as key security issues such as vulnerable access control mechanisms. Blockchain is a distributed ledger technology that has immense benefits such as enhanced security and traceability. Thus, blockchain can serve as a good foundation for applications based on transaction and interactions. IoT implementations and applications are by definition distributed. This means blockchain can help to solve most of the security vulnerabilities and traceability concerns of IoTs by using blockchain as a ledger that can keep track of how devices interact, in which state they are and how they transact with other IoT devices. IoT applications have been mainly implemented with technologies such as cloud and fog computing, and AI to help address some of its key challenges. The key implementation challenges and technical choices to consider in making a successful blockchain IoT (BIoT) project are clearly outlined in this paper. The security and privacy aspect of BIoT applications are also analyzed, and several relevant solutions to improve the scalability and throughput of such applications are proposed. The paper also reviews integration schemes and monitoring frameworks for BIoT applications. A hybrid blockchain IoT integration architecture that makes use of containerization is proposed.
Article
Full-text available
In recent years, the rapid development of blockchain technology and cryptocurrencies has influenced the financial industry by creating a new crypto-economy. Then, next-generation decentralized applications without involving a trusted third-party have emerged thanks to the appearance of smart contracts, which are computer protocols designed to facilitate, verify, and enforce automatically the negotiation and agreement among multiple untrustworthy parties. Despite the bright side of smart contracts, several concerns continue to undermine their adoption, such as security threats, vulnerabilities, and legal issues. In this paper, we present a comprehensive survey of blockchain-enabled smart contracts from both technical and usage points of view. To do so, we present a taxonomy of existing blockchain-enabled smart contract solutions, categorize the included research papers, and discuss the existing smart contract-based studies. Based on the findings from the survey, we identify a set of challenges and open issues that need to be addressed in future studies. Finally, we identify future trends.
Article
Full-text available
Internet of things IoT is playing a remarkable role in the advancement of many fields such as healthcare, smart grids, supply chain management, etc. It also eases people’s daily lives and enhances their interaction with each other as well as with their surroundings and the environment in a broader scope. IoT performs this role utilizing devices and sensors of different shapes and sizes ranging from small embedded sensors and wearable devices all the way to automated systems. However, IoT networks are growing in size, complexity, and number of connected devices. As a result, many challenges and problems arise such as security, authenticity, reliability, and scalability. Based on that and taking into account the anticipated evolution of the IoT, it is extremely vital not only to maintain but to increase confidence in and reliance on IoT systems by tackling the aforementioned issues. The emergence of blockchain opened the door to solve some challenges related to IoT networks. Blockchain characteristics such as security, transparency, reliability, and traceability make it the perfect candidate to improve IoT systems, solve their problems, and support their future expansion. This paper demonstrates the major challenges facing IoT systems and blockchain’s proposed role in solving them. It also evaluates the position of current researches in the field of merging blockchain with IoT networks and the latest implementation stages. Additionally, it discusses the issues related to the IoT-blockchain integration itself. Finally, this research proposes an architectural design to integrate IoT with blockchain in two layers using dew and cloudlet computing. Our aim is to benefit from blockchain features and services to guarantee a decentralized data storage and processing and address security and anonymity challenges and achieve transparency and efficient authentication service.
Article
Full-text available
The scope of the Internet of Things (IoT) applications varies from strategic applications, such as smart grids, smart transportation, smart security, and smart healthcare, to industrial applications such as smart manufacturing, smart logistics, smart banking, and smart insurance. In the advancement of the IoT, connected devices become smart and intelligent with the help of sensors and actuators. However, issues and challenges need to be addressed regarding the data reliability and protection for signicant nextgeneration IoT applications like smart healthcare. For these next-generation applications, there is a requirement for far-reaching privacy and security in the IoT. Recently, blockchain systems have emerged as a key technology that changes the way we exchange data. This emerging technology has revealed encouraging implementation scenarios, such as secured digital currencies. As a technical advancement, the blockchain network has the high possibility of transforming various industries, and the next-generation healthcare IoT (HIoT) can be one of those applications. There have been several studies on the integration of blockchain networks and IoT. However, blockchain-as-autility (BaaU) for privacy and security in HIoT systems requires a systematic framework. This paper reviews blockchain networks and proposes BaaU as one of the enablers. The proposed BaaU-based framework for trustworthiness in the next-generation HIoT systems is divided into two scenarios. The rst scenario suggests that a healthcare service provider integrates IoT sensors such as body sensors to receive and transmit information to a blockchain network on the IoT devices. The second proposed scenario recommends implementing smart contracts, such as Ethereum, to automate and control the trusted devices' subscription in the HIoT services.
Article
Blockchain and cloud-edge computing techniques are promising technologies for next-generation, secure, and privacy-preserving data-sharing systems. By integrating these technologies, the data demands of many data users, such as research institutes, hospitals, manufacturers, etc., can be met. Despite this promising integration, it is yet to be understood how the vulnerability and uncertainties of wireless communication links between the data producers, blockchain systems, cloud-edge computing-based platforms, and data users, as well as unstable validation parameters can affect the overall performance of such blockchain-enabled data-sharing systems. In this article, we considered a collaborative data-sharing scheme, where multiple data providers and data users collaborate to accomplish data-sharing tasks through the proposed blockchain and cloud-edge computing schemes. We considered the spatial distribution of data providers and data users to follow the independent homogeneous Poisson point process, while the transactions generation rate at each node was also modeled using an independent Bernoulli process. We then obtained analyses for some selected performance metrics of interest and evaluate the performance of the system. The obtained results showed that the proposed analyses can be useful in investigating the performance of any blockchain-enabled data-sharing system. This will aid successful deployments of effective data-sharing systems.