A Review on the Use of Blockchain for the Internet of Things

The paradigm of Internet of Things (IoT) is paving the way for a world, where many of our daily objects will be interconnected and will interact with their environment in order to collect information and automate certain tasks. Such a vision requires, among other things, seamless authentication, data privacy, security, robustness against attacks, easy deployment, and self-maintenance. Such features can be brought by blockchain, a technology born with a cryptocurrency called Bitcoin. In this paper, a thorough review on how to adapt blockchain to the specific needs of IoT in order to develop Blockchain-based IoT (BIoT) applications is presented. After describing the basics of blockchain, the most relevant BIoT applications are described with the objective of emphasizing how blockchain can impact traditional cloud-centered IoT applications. Then, the current challenges and possible optimizations are detailed regarding many aspects that affect the design, development, and deployment of a BIoT application. Finally, some recommendations are enumerated with the aim of guiding future BIoT researchers and developers on some of the issues that will have to be tackled before deploying the next generation of BIoT applications.

[1]  Zhili Sun,et al.  Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.

[2]  Melanie Swan,et al.  Blockchain: Blueprint for a New Economy , 2015 .

[3]  L. Ren Proof of Stake Velocity: Building the Social Currency of the Digital Age , 2014 .

[4]  Dixys L. Hernández-Rojas,et al.  Design and Practical Evaluation of a Family of Lightweight Protocols for Heterogeneous Sensing through BLE Beacons in IoT Telemetry Applications , 2017, Sensors.

[5]  Soumya Kanti Datta,et al.  Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing , 2017, 2017 Global Internet of Things Summit (GIoTS).

[6]  Kishor S. Trivedi,et al.  Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric) , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).

[7]  Vijay Sivaraman,et al.  Secure lightweight context-driven data logging for bodyworn sensing devices , 2017, 2017 5th International Symposium on Digital Forensic and Security (ISDFS).

[8]  Joel J. P. C. Rodrigues,et al.  Decentralized Consensus for Edge-Centric Internet of Things: A Review, Taxonomy, and Research Issues , 2018, IEEE Access.

[9]  Axel Jantsch,et al.  The Benefits of Self-Awareness and Attention in Fog and Mist Computing , 2015, Computer.

[10]  Jordi Herrera-Joancomartí,et al.  An Integrated Reward and Reputation Mechanism for MCS Preserving Users' Privacy , 2015, DPM/QASA@ESORICS.

[11]  Tiago M. Fernández-Caramés,et al.  An Intelligent Power Outlet System for the Smart Home of the Internet of Things , 2015, Int. J. Distributed Sens. Networks.

[12]  Denis Lukianov,et al.  Compact Confidential Transactions for Bitcoin , 2015 .

[13]  David Mazières The Stellar Consensus Protocol : A Federated Model for Internet-level Consensus , 2015 .

[14]  Tiago M. Fernández-Caramés,et al.  Reverse engineering the communications protocol of an RFID public transportation card , 2017, 2017 IEEE International Conference on RFID (RFID).

[15]  P. Fraga-Lamas,et al.  Evolving military broadband wireless communication systems: WiMAX, LTE and WLAN , 2016, 2016 International Conference on Military Communications and Information Systems (ICMCIS).

[16]  Shin-Ming Cheng,et al.  On Designing Energy Efficient Wi-Fi P2P Connections for Internet of Things , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[17]  Zurina Mohd Hanapi,et al.  Comparison of ECC and RSA Algorithm in Resource Constrained Devices , 2013, 2013 International Conference on IT Convergence and Security (ICITCS).

[18]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[19]  Yu Zhang,et al.  An IoT electric business model based on the protocol of bitcoin , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.

[20]  Muhammad Ibrahim,et al.  Performance of WiMAX Security Algorithm (The Comparative Study of RSA Encryption Algorithm with ECC Encryption Algorithm) , 2009, 2009 International Conference on Computer Technology and Development.

[21]  Liming Zhu,et al.  Blockchain Based Data Integrity Service Framework for IoT Data , 2017, 2017 IEEE International Conference on Web Services (ICWS).

[22]  Mohamed Hamdi,et al.  Secure data aggregation with homomorphic primitives in wireless sensor networks: A critical survey and open research issues , 2016, 2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC).

[23]  Paul G. Spirakis,et al.  NanoPeer networks and P2P worlds , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[24]  H. Viswanathan,et al.  THE FUTURE of THE INTERNET of THINGS , 2016 .

[25]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[26]  Jeremy Clark,et al.  Mixcoin: Anonymity for Bitcoin with Accountable Mixes , 2014, Financial Cryptography.

[27]  Michael Naehrig,et al.  Elliptic Curve Cryptography in Practice , 2014, Financial Cryptography.

[28]  James V. Neel,et al.  lessons from , 2010 .

[29]  Máire O'Neill,et al.  Practical homomorphic encryption: A survey , 2014, 2014 IEEE International Symposium on Circuits and Systems (ISCAS).

[30]  Malte Möser,et al.  An inquiry into money laundering tools in the Bitcoin ecosystem , 2013, 2013 APWG eCrime Researchers Summit.

[31]  Nabil Bouzerna,et al.  Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[32]  Erfaneh Noroozi,et al.  Energy analysis for wireless sensor networks , 2010, 2010 2nd International Conference on Mechanical and Electronics Engineering.

[33]  Thomas Lundqvist,et al.  Thing-to-thing electricity micro payments using blockchain technology , 2017, 2017 Global Internet of Things Summit (GIoTS).

[34]  Paulo Roberto de Oliveira,et al.  Energy Consumption Analysis of the Cryptographic Key Generation Process of RSA and ECC Algorithms in Embedded Systems , 2014, IEEE Latin America Transactions.

[35]  Kung Chen,et al.  On design issues and architectural styles for blockchain-driven IoT services , 2017, 2017 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW).

[36]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.

[37]  Jason Cooper,et al.  Securing user identity and transactions symbiotically: IoT meets blockchain , 2017, 2017 Global Internet of Things Summit (GIoTS).

[38]  Tiago M. Fernández-Caramés,et al.  Enabling automatic event detection for the pipe workshop of the shipyard 4.0 , 2017, 2017 56th FITCE Congress.

[39]  Shawn Wilkinson,et al.  Storj A Peer-to-Peer Cloud Storage Network , 2014 .

[40]  Fred B. Schneider,et al.  Federated Identity Management Systems: A Privacy-Based Characterization , 2013, IEEE Security & Privacy.

[41]  Ralph Deters,et al.  Internet of Smart Things - IoST: Using Blockchain and CLIPS to Make Things Autonomous , 2017, 2017 IEEE International Conference on Cognitive Computing (ICCC).

[42]  Sachchidanand Singh,et al.  Blockchain: Future of financial and cyber security , 2016, 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).

[43]  Eng-Thiam Yeoh,et al.  Comparison of ECC and RSA algorithm in multipurpose smart card application , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[44]  Primavera De Filippi,et al.  Decentralized Blockchain Technology and the Rise of Lex Cryptographia , 2015 .

[45]  Stefan Dziembowski,et al.  Proofs of Space , 2015, CRYPTO.

[46]  Paula Fraga Lamas Enabling technologies and cyber-physical systems for mission-critical scenarios , 2017 .

[47]  Susan Landau,et al.  Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations , 2014, IEEE Security & Privacy.

[48]  Siraj Raval,et al.  Decentralized Applications: Harnessing Bitcoin's Blockchain Technology , 2016 .

[49]  J. D. Bruce The Mini-Blockchain Scheme , 2014 .

[50]  Tiago M. Fernández-Caramés,et al.  A Review on Industrial Augmented Reality Systems for the Industry 4.0 Shipyard , 2018, IEEE Access.

[51]  David Cleary,et al.  P2P Mobile Sensor Networks , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[52]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[53]  Michael Bedford Taylor,et al.  The Evolution of Bitcoin Hardware , 2017, Computer.

[54]  Aleksandr Ometov,et al.  Feasibility characterization of cryptographic primitives for constrained (wearable) IoT devices , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[55]  G. E. Town,et al.  Towards an internet of energy , 2016, 2016 IEEE International Conference on Power System Technology (POWERCON).

[56]  Stuart Haber,et al.  How to time-stamp a digital document , 1990, Journal of Cryptology.

[57]  Marko Vukolic,et al.  The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.

[58]  Tiago M. Fernández-Caramés,et al.  A Review on Internet of Things for Defense and Public Safety , 2016, Sensors.

[59]  Emin Gün Sirer,et al.  Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.

[60]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[61]  Vallipuram Muthukkumarasamy,et al.  Securing Smart Cities Using Blockchain Technology , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[62]  Xianbin Wang,et al.  Recursive Principal Component Analysis-Based Data Outlier Detection and Sensor Data Aggregation in IoT Systems , 2017, IEEE Internet of Things Journal.

[63]  Martin Feldhofer,et al.  A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.

[64]  John K. Ousterhout,et al.  In Search of an Understandable Consensus Algorithm , 2014, USENIX ATC.

[65]  Ibrar Yaqoob,et al.  Big IoT Data Analytics: Architecture, Opportunities, and Open Research Challenges , 2017, IEEE Access.

[66]  Alfred Menezes,et al.  A Riddle Wrapped in an Enigma , 2016, IEEE Security & Privacy.

[67]  Norman Meuschke,et al.  Decentralized Trusted Timestamping using the Crypto Currency Bitcoin , 2015, ArXiv.

[68]  Ben A. Amaba,et al.  Blockchain technology innovations , 2017, 2017 IEEE Technology & Engineering Management Conference (TEMSCON).

[69]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[70]  M. Gonzalez-Lopez,et al.  Maritime Freight Container Management System Using RFID , 2010 .

[71]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[72]  Shin'ichiro Matsuo,et al.  Long-Term Public Blockchain: Resilience against Compromise of Underlying Cryptography , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).

[73]  Tiago M. Fernández-Caramés,et al.  Towards the Internet of Smart Trains: A Review on Industrial IoT-Connected Railways , 2017, Sensors.

[74]  Paula Fraga-Lamas,et al.  Enabling technologies and cyber-physical systems for mission-critical scenarios , 2017 .

[75]  Bryan Ford,et al.  Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[76]  Tiago M. Fernández-Caramés,et al.  A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications , 2017, Sensors.

[77]  Roberto Di Pietro,et al.  CONNECT: CONtextual NamE disCovery for blockchain-based services in the IoT , 2017, 2017 IEEE International Conference on Communications (ICC).

[78]  PRADIP KUMAR SHARMA,et al.  A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT , 2018, IEEE Access.

[79]  Juan Carlos De Martin,et al.  Blockchain for the Internet of Things: A systematic literature review , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).

[80]  Masaki Bandai,et al.  Energy-Efficient Mobile P2P Communications Based on Context Awareness , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).

[81]  Torsten Braun,et al.  Passively Track WiFi Users With an Enhanced Particle Filter Using Power-Based Ranging , 2017, IEEE Transactions on Wireless Communications.

[82]  David Wolinsky,et al.  Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning , 2015, 2016 IEEE Symposium on Security and Privacy (SP).

[83]  Luis Castedo,et al.  A Methodology for Evaluating Security in Commercial RFID Systems , 2017 .

[84]  Sooyong Park,et al.  Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.

[85]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[86]  Alexandru Stanciu,et al.  Blockchain Based Distributed Control System for Edge Computing , 2017, 2017 21st International Conference on Control Systems and Computer Science (CSCS).

[87]  Srikanth V. Krishnamurthy,et al.  Malicious co-residency on the cloud: Attacks and defense , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[88]  Roy H. Campbell,et al.  World of Empowered IoT Users , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).

[89]  Marko Vukolic,et al.  Non-determinism in Byzantine Fault-Tolerant Replication , 2016, OPODIS.

[90]  John Gray,et al.  IoT-Based Techniques for Online M2M-Interactive Itemized Data Registration and Offline Information Traceability in a Digital Manufacturing System , 2017, IEEE Transactions on Industrial Informatics.

[91]  David Schwartz,et al.  The Ripple Protocol Consensus Algorithm , 2014 .

[92]  Feng Wang,et al.  Survey on swarm intelligence based routing protocols for wireless sensor networks: An extensive study , 2016, 2016 IEEE International Conference on Industrial Technology (ICIT).

[93]  Burkhard Stiller,et al.  Blockchains everywhere - a use-case of blockchains in the pharma supply-chain , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[94]  Ralph Deters,et al.  Hosting Virtual IoT Resources on Edge-Hosts with Blockchain , 2016, 2016 IEEE International Conference on Computer and Information Technology (CIT).

[95]  Tiago M. Fernández-Caramés,et al.  A Practical Evaluation of Commercial Industrial Augmented Reality Systems in an Industry 4.0 Shipyard , 2018, IEEE Access.

[96]  Feng Tian,et al.  An agri-food supply chain traceability system for China based on RFID & blockchain technology , 2016, 2016 13th International Conference on Service Systems and Service Management (ICSSSM).

[97]  Erwin Anggadjaja,et al.  Internet of Things: Over-the-Air (OTA) firmware update in Lightweight mesh network protocol for smart urban development , 2016, 2016 22nd Asia-Pacific Conference on Communications (APCC).

[98]  Giuseppe Ateniese,et al.  From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain , 2015, NSS.

[99]  Susan Landau,et al.  Making Sense from Snowden: What's Significant in the NSA Surveillance Revelations , 2013, IEEE Security & Privacy.

[100]  Tiago M. Fernández-Caramés,et al.  Smart Pipe System for a Shipyard 4.0 , 2016, Sensors.

[101]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[102]  Cheng Li,et al.  A Blockchain Based New Secure Multi-Layer Network Model for Internet of Things , 2017, 2017 IEEE International Congress on Internet of Things (ICIOT).

[103]  Jeffrey H. Reed,et al.  Wireless distributed computing: a survey of research challenges , 2012, IEEE Communications Magazine.

[104]  Tiago M. Fernández-Caramés,et al.  VineSens: An Eco-Smart Decision-Support Viticulture System , 2017, Sensors.

[105]  Ralph Deters,et al.  Blockchain as a Service for IoT , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[106]  Luke Valenta,et al.  Blindcoin: Blinded, Accountable Mixes for Bitcoin , 2015, Financial Cryptography Workshops.

[107]  A. Takura,et al.  A secure and trusted time stamping authority , 1999, 1999 Internet Workshop. IWS99. (Cat. No.99EX385).

[108]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[109]  Anastas Mishev,et al.  Blockchain solutions for big data challenges: A literature review , 2017, IEEE EUROCON 2017 -17th International Conference on Smart Technologies.

[110]  Vineet Sahula,et al.  Lightweight security algorithm for low power IoT devices , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[111]  Mohsen Guizani,et al.  Softwarization of Internet of Things Infrastructure for Secure and Smart Healthcare , 2017, Computer.

[112]  Zonyin Shae,et al.  On the Design of a Blockchain Platform for Clinical Trial and Precision Medicine , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[113]  Tiago M. Fernández-Caramés,et al.  Real-time personal protective equipment monitoring system , 2012, Comput. Commun..

[114]  Salil S. Kanhere,et al.  Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[115]  Daniel Jeswin Nallathambi,et al.  Use of honeypots for mitigating DoS attacks targeted on IoT networks , 2017, 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP).

[116]  Thomas Shrimpton,et al.  Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.

[117]  Muneeb Ali,et al.  CSN: a network protocol for serving dynamic queries in large-scale wireless sensor networks , 2004, Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004..

[118]  Michael Schukat,et al.  Zero-knowledge proofs in M2M communication , 2014 .

[119]  S A R A H M E I K L E J O H N,et al.  A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .

[120]  Bruce Schneier,et al.  Practical cryptography , 2003 .

[121]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[122]  Matthew J. Fanto,et al.  SP 800-52. Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations , 2005 .

[123]  Luís Veiga,et al.  Energy Efficiency Dilemma: P2P-cloud vs. Datacenter , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.

[124]  Nirvana Meratnia,et al.  Sensor fusion-based event detection in Wireless Sensor Networks , 2009, 2009 6th Annual International Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous.

[125]  Tiago M. Fernández-Caramés,et al.  Reverse Engineering and Security Evaluation of Commercial Tags for RFID-Based IoT Applications , 2016, Sensors.

[126]  Peiqing Zhang,et al.  Towards green P2P: Analysis of energy consumption in P2P and approaches to control , 2012, 2012 International Conference on High Performance Computing & Simulation (HPCS).

[127]  Matthew J. Fanto,et al.  Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations | NIST , 2005 .

[128]  Michael T. Goodrich,et al.  Accountable Storage , 2014, ACNS.

[129]  Albert Levi,et al.  Performance evaluation of public-key cryptosystem operations in WTLS protocol , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[130]  Georgios Kambourakis,et al.  The Mirai botnet and the IoT Zombie Armies , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).

[131]  Pieter Wuille,et al.  Enabling Blockchain Innovations with Pegged Sidechains , 2014 .

[132]  Hongjin Kim,et al.  Blockchain based smart door lock system , 2017, 2017 International Conference on Information and Communication Technology Convergence (ICTC).

[133]  Thomas M. Chen,et al.  Lessons from Stuxnet , 2011, Computer.

[134]  Salil S. Kanhere,et al.  Blockchain in internet of things: Challenges and Solutions , 2016, ArXiv.

[135]  C. Copeland,et al.  Tangaroa : a Byzantine Fault Tolerant Raft , 2014 .

[136]  Gregory D. Durgin,et al.  On the Simon Cipher 4-block key schedule as a hash , 2017, 2017 IEEE International Conference on RFID (RFID).

[137]  Iddo Bentov,et al.  Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.

[138]  Mun Choon Chan,et al.  Pallas: Self-Bootstrapping Fine-Grained Passive Indoor Localization Using WiFi Monitors , 2017, IEEE Transactions on Mobile Computing.

[139]  Kun Peng,et al.  Attack against a batch zero-knowledge proof system , 2012, IET Inf. Secur..

[140]  Tiago M. Fernández-Caramés,et al.  Home Automation System Based on Intelligent Transducer Enablers , 2016, Sensors.

[141]  Dongxi Liu,et al.  Lightweight Mutual Authentication for IoT and Its Applications , 2017, IEEE Transactions on Sustainable Computing.

[142]  B. F. França,et al.  Homomorphic Mini-blockchain Scheme , 2015 .

[143]  Paula Fraga-Lamas,et al.  Unleashing the Potential of LTE for Next Generation Railway Communications , 2015, Nets4Cars/Nets4Trains/Nets4Aircraft.

[144]  Pinyi Ren,et al.  Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations , 2016, IEEE Access.

[145]  Nicolas Courtois,et al.  Could Bitcoin transactions be 100x faster? , 2014, 2014 11th International Conference on Security and Cryptography (SECRYPT).

[146]  Xin Li,et al.  An IoT Data Communication Framework for Authenticity and Integrity , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[147]  Athanasios V. Vasilakos,et al.  IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges , 2017, IEEE Internet of Things Journal.

[148]  Ralph Deters,et al.  Wearable IoT Data Architecture , 2017, 2017 IEEE World Congress on Services (SERVICES).

[149]  Young-Sik Jeong,et al.  DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.

[150]  Nir Kshetri,et al.  Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.

[151]  Kwangjo Kim,et al.  TM-Coin: Trustworthy management of TCB measurements in IoT , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[152]  George Danezis,et al.  Statistical Disclosure or Intersection Attacks on Anonymity Systems , 2004, Information Hiding.

[153]  Tiago M. Fernández-Caramés,et al.  RSS stabilization techniques for a real-time passive UHF RFID pipe monitoring system for smart shipyards , 2017, 2017 IEEE International Conference on RFID (RFID).

[154]  Wei Xu,et al.  EEP2P: An energy-efficient and economy-efficient P2P network protocol , 2014, International Green Computing Conference.

[155]  Arjen K. Lenstra,et al.  Factorization of a 768-Bit RSA Modulus , 2010, CRYPTO.

[156]  N. Kshetri Blockchain's roles in strengthening cybersecurity and protecting privacy , 2017 .

[157]  Tiago M. Fernández-Caramés,et al.  An Electricity Price-Aware Open-Source Smart Socket for the Internet of Energy , 2017, Sensors.

[158]  Omar Alfandi,et al.  Analysis of cloud computing attacks and countermeasures , 2016, 2016 18th International Conference on Advanced Communication Technology (ICACT).

[159]  Prashant Nalini Vasudevan,et al.  Proofs of Useful Work , 2017, IACR Cryptol. ePrint Arch..

[160]  Dominic Wörner,et al.  When your sensor earns money: exchanging data for cash with Bitcoin , 2014, UbiComp Adjunct.

[161]  Todd M. Austin,et al.  Fault-based attack of RSA authentication , 2010, 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010).

[162]  Nicola Fabiano,et al.  The Internet of Things ecosystem: The blockchain and privacy issues. The challenge for a global privacy standard , 2017, 2017 International Conference on Internet of Things for the Global Community (IoTGC).

[163]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[164]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[165]  Soohyung Kim,et al.  Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).