Survey on blockchain for Internet of Things

Abstract The Internet of Things (IoT) is poised to transform human life and unleash enormous economic benefit. However, inadequate data security and trust of current IoT are seriously limiting its adoption. Blockchain, a distributed and tamper-resistant ledger, maintains consistent records of data at different locations, and has the potential to address the data security concern in IoT networks. While providing data security to the IoT, Blockchain also encounters a number of critical challenges inherent in the IoT, such as a huge number of IoT devices, non-homogeneous network structure, limited computing power, low communication bandwidth, and error-prone radio links. This paper presents a comprehensive survey on existing Blockchain technologies with an emphasis on the IoT applications. The Blockchain technologies which can potentially address the critical challenges arising from the IoT and hence suit the IoT applications are identified with potential adaptations and enhancements elaborated on the Blockchain consensus protocols and data structures. Future research directions are collated for effective integration of Blockchain into the IoT networks.

[1]  Anas Abou El Kalam,et al.  FairAccess: a new Blockchain-based access control framework for the Internet of Things , 2016, Secur. Commun. Networks.

[2]  Sergey Zapechnikov,et al.  A blockchain-based access control system for cloud storage , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).

[3]  Fernando Pedone,et al.  High performance state-machine replication , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).

[4]  Kwangjo Kim,et al.  Blockchain-Based Decentralized Key Management System with Quantum Resistance , 2018, WISA.

[5]  Jaiteg Singh,et al.  Blockchain-Based Resource Discovery for the Intercloud , 2017, 2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS).

[6]  Mohamed Amine Ferrag,et al.  Blockchain Technologies for the Internet of Things: Research Issues and Challenges , 2018, IEEE Internet of Things Journal.

[7]  Bharat K. Bhargava,et al.  (WIP) Blockhub: Blockchain-Based Software Development System for Untrusted Environments , 2018, 2018 IEEE 11th International Conference on Cloud Computing (CLOUD).

[8]  Sunny King,et al.  PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .

[9]  Daniel R. Simon,et al.  Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.

[10]  Yun Peng,et al.  Efficient key management scheme for health blockchain , 2018, CAAI Trans. Intell. Technol..

[11]  Sooyong Park,et al.  Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.

[12]  Elaine Shi,et al.  The Honey Badger of BFT Protocols , 2016, CCS.

[13]  Sunghyun Cho,et al.  SCC: Storage Compression Consensus for Blockchain in Lightweight IoT Network , 2019, 2019 IEEE International Conference on Consumer Electronics (ICCE).

[14]  Marc Pilkington,et al.  Blockchain Technology: Principles and Applications , 2015 .

[15]  Geoffrey Ye Li,et al.  Hypergraph Theory: Applications in 5G Heterogeneous Ultra-Dense Networks , 2017, IEEE Communications Magazine.

[16]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[17]  Sitenkov Denis,et al.  Access Control in the Internet of Things , 2014 .

[18]  Fergal Reid,et al.  An Analysis of Anonymity in the Bitcoin System , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[19]  Yanxin Zhang,et al.  A decentralized solution for IoT data trusted exchange based-on blockchain , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).

[20]  Marko Vukolic,et al.  The next 700 BFT protocols , 2010, EuroSys '10.

[21]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[22]  Pengfei Wang,et al.  A Remote Attestation Security Model Based on Privacy-Preserving Blockchain for V2X , 2018, IEEE Access.

[23]  Iddo Bentov,et al.  Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake [Extended Abstract]y , 2014, PERV.

[24]  Wei Ni,et al.  Collaborative Authentication in Decentralized Dense Mobile Networks With Key Predistribution , 2017, IEEE Transactions on Information Forensics and Security.

[25]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[26]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[27]  Gordan Jezic,et al.  Beyond the Internet of Things: The Social Networking of Machines , 2016, Int. J. Distributed Sens. Networks.

[28]  Amos Fiat,et al.  Zero-knowledge proofs of identity , 1987, Journal of Cryptology.

[29]  Naoto Yanai,et al.  RBAC-SC: Role-Based Access Control Using Smart Contract , 2018, IEEE Access.

[30]  Mukesh Taneja,et al.  A framework for power saving in IoT networks , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[31]  Martijn Bastiaan,et al.  Preventing the 51%-Attack: a Stochastic Analysis of Two Phase Proof of Work in Bitcoin , 2015 .

[32]  Wade Trappe,et al.  A Security Framework for the Internet of Things in the Future Internet Architecture , 2017, Future Internet.

[33]  Tianqing Zhu,et al.  A blockchain-based location privacy-preserving crowdsensing system , 2019, Future Gener. Comput. Syst..

[34]  Wei Ni,et al.  Anatomy of Threats to the Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[35]  Chun Chen,et al.  Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.

[36]  Soohyung Kim,et al.  Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[37]  Ilias Politis,et al.  Enhancing SDN security for IoT-related deployments through blockchain , 2017, 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).

[38]  William C. Chu,et al.  Digital Asset Management with Distributed Permission over Blockchain and Attribute-Based Access Control , 2018, 2018 IEEE International Conference on Services Computing (SCC).

[39]  Young-Sik Jeong,et al.  DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.

[40]  Douglas C. Schmidt,et al.  Proposal for Chapter 3 Blockchain Technology Use Cases in Healthcare , 2018 .

[41]  Alessandro Bassi,et al.  From today's INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view , 2010, IEEE Wireless Communications.

[42]  Richard D. Schlichting,et al.  Fail-stop processors: an approach to designing fault-tolerant computing systems , 1981, TOCS.

[43]  Aviv Zohar,et al.  Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains , 2013, IACR Cryptol. ePrint Arch..

[44]  Peter Friess,et al.  Internet of Things Strategic Research Roadmap , 2011 .

[45]  Albert Levi,et al.  A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems , 2018, IEEE Communications Surveys & Tutorials.

[46]  Nir Kshetri,et al.  Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.

[47]  Georgios B. Giannakis,et al.  Kernel-Based Reconstruction of Space-Time Functions on Dynamic Graphs , 2016, IEEE Journal of Selected Topics in Signal Processing.

[48]  Danny Dolev,et al.  Authenticated Algorithms for Byzantine Agreement , 1983, SIAM J. Comput..

[49]  Leandros A. Maglaras,et al.  A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems , 2016, IEEE Transactions on Industrial Informatics.

[50]  Neil W. Bergmann,et al.  IoT Privacy and Security Challenges for Smart Home Environments , 2016, Inf..

[51]  Teresa Riesgo,et al.  The Extreme Edge at the Bottom of the Internet of Things: A Review , 2019, IEEE Sensors Journal.

[52]  Gareth W. Peters,et al.  Understanding Modern Banking Ledgers Through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money , 2015, ArXiv.

[53]  Georgios B. Giannakis,et al.  On energy efficiency and optimum resource allocation of relay transmissions in the low-power regime , 2005, IEEE Transactions on Wireless Communications.

[54]  Qingju Wang,et al.  When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.

[55]  Barbara Liskov,et al.  Viewstamped Replication: A New Primary Copy Method to Support Highly-Available Distributed Systems , 1999, PODC '88.

[56]  Sepandar D. Kamvar,et al.  Motivating urban cycling through a blockchain-based financial incentives system , 2017, UbiComp/ISWC Adjunct.

[57]  David Kotz,et al.  Privacy in mobile technology for personal healthcare , 2012, CSUR.

[58]  Elaine Shi,et al.  Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions , 2015, CCS.

[59]  Lei Yang,et al.  Crowd-Empowered Privacy-Preserving Data Aggregation for Mobile Crowdsensing , 2018, MobiHoc.

[60]  Max Mühlhäuser,et al.  Towards Blockchain-Based Collaborative Intrusion Detection Systems , 2017, CRITIS.

[61]  Qichao Zhang,et al.  A Blockchain-based key Management Scheme for Named Data Networking , 2018, 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).

[62]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[63]  Fenghua Li,et al.  Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario , 2019, IEEE Access.

[64]  Miklos A. Vasarhelyi,et al.  Toward Blockchain-Based Accounting and Assurance , 2017, J. Inf. Syst..

[65]  J. Potts,et al.  Economics of Blockchain , 2016 .

[66]  Siraj Raval,et al.  Decentralized Applications: Harnessing Bitcoin's Blockchain Technology , 2016 .

[67]  Yunhao Liu,et al.  Big Data: A Survey , 2014, Mob. Networks Appl..

[68]  Mauro Conti,et al.  Efficient physical intrusion detection in Internet of Things: A Node deployment approach , 2019, Comput. Networks.

[69]  Awais Ahmad,et al.  Urban planning and building smart cities based on the Internet of Things using Big Data analytics , 2016, Comput. Networks.

[70]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[71]  Joseph K. Liu,et al.  Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract) , 2004, ACISP.

[72]  Eli Ben-Sasson,et al.  Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[73]  Baijian Yang,et al.  Blockchain-Based Whitelisting for Consumer IoT Devices and Home Networks , 2018, SIGITE.

[74]  Peng Jiang,et al.  An Intelligent Outlier Detection Method With One Class Support Tucker Machine and Genetic Algorithm Toward Big Sensor Data in Internet of Things , 2019, IEEE Transactions on Industrial Electronics.

[75]  Prateek Saxena,et al.  A Secure Sharding Protocol For Open Blockchains , 2016, CCS.

[76]  Wenjing Lou,et al.  Attribute-based on-demand multicast group setup with membership anonymity , 2008, SecureComm.

[77]  Rengarajan Amirtharajan,et al.  Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique , 2016, Int. J. Digit. Multim. Broadcast..

[78]  Wei Peng,et al.  A Blockchain-Based Authentication and Security Mechanism for IoT , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).

[79]  Wei Ni,et al.  Optimal Schedule of Mobile Edge Computing for Internet of Things Using Partial Information , 2017, IEEE Journal on Selected Areas in Communications.

[80]  Kim-Kwang Raymond Choo,et al.  Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices , 2018, IEEE Consumer Electronics Magazine.

[81]  Oscar Novo,et al.  Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.

[82]  Fan Zhang,et al.  Town Crier: An Authenticated Data Feed for Smart Contracts , 2016, CCS.

[83]  Elaine Shi,et al.  Permacoin: Repurposing Bitcoin Work for Data Preservation , 2014, 2014 IEEE Symposium on Security and Privacy.

[84]  Lei Yang,et al.  Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC , 2018, Wirel. Commun. Mob. Comput..

[85]  Chen Li,et al.  A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT , 2019, IEEE Access.

[86]  Salil S. Kanhere,et al.  Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[87]  Madhusudan Singh,et al.  Introduce reward-based intelligent vehicles communication using blockchain , 2017, 2017 International SoC Design Conference (ISOCC).

[88]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[89]  Yannan Li,et al.  Blockchain based Privacy-Preserving Software Updates with Proof-of-Delivery for Internet of Things , 2019, J. Parallel Distributed Comput..

[90]  Sam Toueg,et al.  Asynchronous consensus and broadcast protocols , 1985, JACM.

[91]  Abdellah Ait Ouahman,et al.  Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT , 2017 .

[92]  Ittay Eyal,et al.  The Miner's Dilemma , 2014, 2015 IEEE Symposium on Security and Privacy.

[93]  Juan M. Corchado,et al.  Non-linear adaptive closed-loop control system for improved efficiency in IoT-blockchain management , 2019, Inf. Fusion.

[94]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[95]  Kung Chen,et al.  On design issues and architectural styles for blockchain-driven IoT services , 2017, 2017 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW).

[96]  Panayiotis Kotzanikolaou,et al.  Evaluating Common Privacy Vulnerabilities in Internet Service Providers , 2009, e-Democracy.

[97]  Wen-Long Chin,et al.  Energy Big Data Security Threats in IoT-Based Smart Grid Communications , 2017, IEEE Communications Magazine.

[98]  Biswanath Mukherjee,et al.  A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[99]  Lei Yang,et al.  Dynamic Pricing for Privacy-Preserving Mobile Crowdsensing: A Reinforcement Learning Approach , 2019, IEEE Network.

[100]  Abdulmotaleb El-Saddik,et al.  Toward Social Internet of Vehicles: Concept, Architecture, and Applications , 2015, IEEE Access.

[101]  Zhu Han,et al.  Optimal Pricing-Based Edge Computing Resource Management in Mobile Blockchain , 2017, 2018 IEEE International Conference on Communications (ICC).

[102]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[103]  Pin Lv,et al.  An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains , 2019, IEEE Access.

[104]  Xiaoyu Hong,et al.  Blockchain Based Credibility Verification Method for IoT Entities , 2018, Secur. Commun. Networks.

[105]  Der-Jiunn Deng,et al.  On decentralized group key management mechanism for vehicular ad hoc networks , 2016, Secur. Commun. Networks.

[106]  Joaquín B. Ordieres Meré,et al.  [WiP] IoT Blockchain Technologies for Smart Sensors Based on Raspberry Pi , 2018, 2018 IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA).

[107]  Prateek Saxena,et al.  SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains , 2015, IACR Cryptol. ePrint Arch..

[108]  Jong Hyuk Park,et al.  Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City , 2017, J. Inf. Process. Syst..

[109]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[110]  Leslie Lamport,et al.  The part-time parliament , 1998, TOCS.

[111]  Zhili Sun,et al.  Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems , 2017, IEEE Internet of Things Journal.

[112]  Xiaojiang Du,et al.  Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid , 2017, IEEE Access.

[113]  Arda Yurdakul,et al.  Integrating low-power IoT devices to a blockchain-based infrastructure: work-in-progress , 2017, EMSOFT '17.

[114]  Chunhua Su,et al.  A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things , 2018, IEEE Access.

[115]  Zhou Xin,et al.  Study on insulation detection method of electric vehicles based on single point of failure model , 2016, 2016 11th International Forum on Strategic Technology (IFOST).

[116]  André Schiper,et al.  The Heard-Of model: computing in distributed systems with benign faults , 2009, Distributed Computing.

[117]  Pieter Wuille,et al.  Enabling Blockchain Innovations with Pegged Sidechains , 2014 .

[118]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[119]  Panganamala Ramana Kumar,et al.  Real-time communication over unreliable wireless links: a theory and its applications , 2012, IEEE Wireless Communications.

[120]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[121]  Rajappa Muthaiah,et al.  A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System , 2015, Wirel. Pers. Commun..

[122]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[123]  Kemal Akkaya,et al.  A Network Coding Based Information Spreading Approach for Permissioned Blockchain in IoT Settings , 2018, MobiQuitous.

[124]  Dusit Niyato,et al.  Optimal Auction for Edge Computing Resource Management in Mobile Blockchain Networks: A Deep Learning Approach , 2017, 2018 IEEE International Conference on Communications (ICC).

[125]  Marko Vukolic,et al.  The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.

[126]  Zhiqi Shen,et al.  Blockchain and IoT based Food Traceability for Smart Agriculture , 2018, ICCSE'18.

[127]  Donggang Liu,et al.  Protecting Location Privacy in Sensor Networks against a Global Eavesdropper , 2012, IEEE Transactions on Mobile Computing.

[128]  Feng Gao,et al.  A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks , 2018, IEEE Network.

[129]  Ghassan O. Karame,et al.  Double-spending fast payments in bitcoin , 2012, CCS.

[130]  Liming Zhu,et al.  Blockchain Based Data Integrity Service Framework for IoT Data , 2017, 2017 IEEE International Conference on Web Services (ICWS).

[131]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[132]  Nikolay Teslya,et al.  Blockchain-based platform architecture for industrial IoT , 2017, 2017 21st Conference of Open Innovations Association (FRUCT).

[133]  Achour Mostéfaoui,et al.  A versatile and modular consensus protocol , 2002, Proceedings International Conference on Dependable Systems and Networks.

[134]  Suresh Sankaranarayanan,et al.  Publish/subscribe based multi-tier edge computational model in Internet of Things for latency reduction , 2019, J. Parallel Distributed Comput..

[135]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.

[136]  Aloknath De,et al.  Continuous Security in IoT Using Blockchain , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[137]  Adi Shamir,et al.  Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.

[138]  Oliver Günther,et al.  Security challenges of the EPCglobal network , 2009, CACM.

[139]  Lv Jin-na Group Key Agreement Protocol Based on m-tree and DH Protocol , 2010 .

[140]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[141]  Wei Ni,et al.  Big Data Analytics and Network Calculus Enabling Intelligent Management of Autonomous Vehicles in a Smart City , 2019, IEEE Internet of Things Journal.

[142]  Jeremy Clark,et al.  Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges , 2015, CCS.

[143]  Miguel Castro,et al.  Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.

[144]  Alex Biryukov,et al.  Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.

[145]  William C. Chu,et al.  TBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).

[146]  Jong-Il Park,et al.  IoT Delegate: Smart Home Framework for Heterogeneous IoT Service Collaboration , 2016, KSII Trans. Internet Inf. Syst..

[147]  Xiaohong Jiang,et al.  Smart Contract-Based Access Control for the Internet of Things , 2018, IEEE Internet of Things Journal.

[148]  Ahmed Serhrouchni,et al.  Decentralized Access Control Mechanism with Temporal Dimension Based on Blockchain , 2017, 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE).

[149]  Ilsun You,et al.  Content Recommendation Algorithm for Intelligent Navigator in Fog Computing Based IoT Environment , 2019, IEEE Access.

[150]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[151]  Nabil Bouzerna,et al.  Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[152]  Yang Xu,et al.  Decentralized group key management for hierarchical access control using multilinear forms , 2016, Concurr. Comput. Pract. Exp..

[153]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[154]  Nabil Rifi,et al.  Blockchain Technology: Is It a Good Candidate for Securing IoT Sensitive Medical Data? , 2018, Wirel. Commun. Mob. Comput..

[155]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[156]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[157]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[158]  Laurence T. Yang,et al.  Data Mining for Internet of Things: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[159]  Klara Nahrstedt,et al.  INCEPTION: incentivizing privacy-preserving data aggregation for mobile crowd sensing systems , 2016, MobiHoc.

[160]  Yousof Al-Hammadi,et al.  Blockchain-based Ownership Management for Medical IoT (MIoT) Devices , 2018, 2018 International Conference on Innovations in Information Technology (IIT).

[161]  Ke Xiao,et al.  A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications , 2018, IEEE Access.

[162]  Nai-Wei Lo,et al.  An Over-the-Blockchain Firmware Update Framework for IoT Devices , 2018, 2018 IEEE Conference on Dependable and Secure Computing (DSC).

[163]  Xiao Liu,et al.  Service matchmaking for Internet of Things based on probabilistic topic model , 2019, Future Gener. Comput. Syst..

[164]  Qi He,et al.  SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).

[165]  Shen Noether,et al.  Ring Confidential Transactions , 2016, Ledger.

[166]  Antonio Puliafito,et al.  Blockchain and IoT Integration: A Systematic Survey , 2018, Sensors.

[167]  Sun Jingtao,et al.  Steiner tree based optimal resource caching scheme in fog computing , 2015, China Communications.

[168]  Haoyu Wang,et al.  Survey on Blockchain for Internet of Things , 2019, J. Internet Serv. Inf. Secur..

[169]  Stamatis Karnouskos,et al.  Cyber-Physical Systems in the SmartGrid , 2011, 2011 9th IEEE International Conference on Industrial Informatics.

[170]  Abbas Jamalipour,et al.  Blockchain in IoT Security: A Survey , 2018, 2018 28th International Telecommunication Networks and Applications Conference (ITNAC).

[171]  Ethan Heilman,et al.  Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network , 2020, IACR Cryptol. ePrint Arch..

[172]  Theodora A. Varvarigou,et al.  Implementation of smart contracts for blockchain based IoT applications , 2018, 2018 9th International Conference on the Network of the Future (NOF).

[173]  Rogério de Lemos,et al.  Self-Adaptation Made Easy with Blockchains , 2018, 2018 IEEE/ACM 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).

[174]  Aggelos Kiayias,et al.  Proof-of-Burn , 2020, IACR Cryptol. ePrint Arch..

[175]  Donald E. Eastlake,et al.  US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF) , 2011, RFC.

[176]  Vladimiro Sassone,et al.  A Blockchain-based Infrastructure for Reliable and Cost-effective IoT-aided Smart Grids , 2018, IoT 2018.

[177]  Giuseppe Piro,et al.  When Blockchain Makes Ephemeral Keys Authentic: A Novel Key Agreement Mechanism in the IoT World , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).

[178]  Ruoyu Li,et al.  SmartRetro: Blockchain-Based Incentives for Distributed IoT Retrospective Detection , 2018, 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).

[179]  Kim-Kwang Raymond Choo,et al.  Blockchain-Based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual Design , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).

[180]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[181]  Özgür B. Akan,et al.  Spatio-temporal correlation: theory and applications for wireless sensor networks , 2004, Comput. Networks.

[182]  Bryan Ford,et al.  Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing , 2016, USENIX Security Symposium.

[183]  Smruti R. Sarangi,et al.  Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..

[184]  Andrej Kos,et al.  Approaches to Front-End IoT Application Development for the Ethereum Blockchain , 2017, IIKI.

[185]  Nabil Rifi,et al.  Towards using blockchain technology for IoT data access protection , 2017, 2017 IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB).

[186]  Matthew Green,et al.  Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.

[187]  Denise Demirel,et al.  How to Securely Prolong the Computational Bindingness of Pedersen Commitments , 2015, IACR Cryptol. ePrint Arch..

[188]  J. Efrim Boritz,et al.  IS practitioners' views on core concepts of information integrity , 2005, Int. J. Account. Inf. Syst..

[189]  André Ricardo Abed Grégio,et al.  ControlChain: Blockchain as a Central Enabler for Access Control Authorizations in the IoT , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[190]  Wei Ni,et al.  Virus Propagation Modeling and Convergence Analysis in Large-Scale Networks , 2016, IEEE Transactions on Information Forensics and Security.

[191]  Rocio Maciel,et al.  A Use Case in Cybersecurity based in Blockchain to deal with the security and privacy of citizens and Smart Cities Cyberinfrastructures , 2018, 2018 IEEE International Smart Cities Conference (ISC2).

[192]  Wei Ni,et al.  The Impact of Link Duration on the Integrity of Distributed Mobile Networks , 2018, IEEE Transactions on Information Forensics and Security.

[193]  Robert H. Deng,et al.  Lightweight Break-Glass Access Control System for Healthcare Internet-of-Things , 2018, IEEE Transactions on Industrial Informatics.

[194]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.

[195]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[196]  Wei Peng,et al.  Combination of Cloud Computing and Internet of Things (IOT) in Medical Monitoring Systems , 2015 .

[197]  Ghassan O. Karame,et al.  Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.

[198]  Matthias Fitzi,et al.  Efficient Byzantine Agreement Secure Against General Adversaries , 1998, DISC.

[199]  Yu-Chee Tseng,et al.  An Energy-Efficient Sleep Scheduling With QoS Consideration in 3GPP LTE-Advanced Networks for Internet of Things , 2013, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.

[200]  Luming Tan,et al.  Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[201]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[202]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[203]  Patrick D. McDaniel,et al.  An Analysis of Anonymity in Bitcoin Using P2P Network Traffic , 2014, Financial Cryptography.

[204]  Tam Le,et al.  CapChain: A Privacy Preserving Access Control Framework Based on Blockchain for Pervasive Environments , 2018, 2018 IEEE International Conference on Smart Computing (SMARTCOMP).

[205]  Sam Toueg,et al.  Distributed agreement in the presence of processor and communication faults , 1986, IEEE Transactions on Software Engineering.

[206]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[207]  Yaling Zhang,et al.  A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems , 2018, IEEE Access.

[208]  Ebraheim Alsaadi,et al.  Internet of Things : Features , Challenges , and Vulnerabilities Authors , 2015 .

[209]  Freddy K. Santoso,et al.  Securing IoT for smart home system , 2015, 2015 International Symposium on Consumer Electronics (ISCE).

[210]  Nicolas Courtois,et al.  Stealth Address and Key Management Techniques in Blockchain Systems , 2017, ICISSP.

[211]  Gautam Srivastava,et al.  A Decentralized Privacy-Preserving Healthcare Blockchain for IoT , 2019, Sensors.

[212]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.

[213]  Naixue Xiong,et al.  A novel code data dissemination scheme for Internet of Things through mobile vehicle of smart cities , 2019, Future Gener. Comput. Syst..

[214]  Ki-Hyung Kim,et al.  Dynamic Access Control Scheme for IoT Devices using Blockchain , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).

[215]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[216]  Arda Yurdakul,et al.  Designing a Blockchain-Based IoT With Ethereum, Swarm, and LoRa: The Software Solution to Create High Availability With Minimal Security Risks , 2018, IEEE Consumer Electronics Magazine.

[217]  Liu Qian,et al.  Cooperative differential game for model energy-bandwidth efficiency tradeoff in the Internet of Things , 2014, China Communications.

[218]  Prem Prakash Jayaraman,et al.  QDaS: Quality driven data summarisation for effective storage management in Internet of Things , 2019, J. Parallel Distributed Comput..

[219]  Aron Laszka,et al.  When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools , 2015, Financial Cryptography Workshops.

[220]  Mohamed A. El-Sharkawi,et al.  Optimal Scheduling of Vehicle-to-Grid Energy and Ancillary Services , 2012, IEEE Transactions on Smart Grid.

[221]  Jun-Ho Huh,et al.  A Study on Improvement of Blockchain Application to Overcome Vulnerability of IoT Multiplatform Security , 2019, Energies.