Blockchain for the Internet of Things: A systematic literature review

In the Internet of Things (IoT) scenario, the block-chain and, in general, Peer-to-Peer approaches could play an important role in the development of decentralized and dataintensive applications running on billion of devices, preserving the privacy of the users. Our research goal is to understand whether the blockchain and Peer-to-Peer approaches can be employed to foster a decentralized and private-by-design IoT. As a first step in our research process, we conducted a Systematic Literature Review on the blockchain to gather knowledge on the current uses of this technology and to document its current degree of integrity, anonymity and adaptability. We found 18 use cases of blockchain in the literature. Four of these use cases are explicitly designed for IoT. We also found some use cases that are designed for a private-by-design data management. We also found several issues in the integrity, anonymity and adaptability. Regarding anonymity, we found that in the blockchain only pseudonymity is guaranteed. Regarding adaptability and integrity, we discovered that the integrity of the blockchain largely depends on the high difficulty of the Proof-of-Work and on the large number of honest miners, but at the same time a difficult Proof-of-Work limits the adaptability. We documented and categorized the current uses of the blockchain, and provided a few recommendations for future work to address the above-mentioned issues.

[1]  L. Ren Proof of Stake Velocity: Building the Social Currency of the Digital Age , 2014 .

[2]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[3]  Kartik Nayak,et al.  Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[4]  Pearl Brereton,et al.  Performing systematic literature reviews in software engineering , 2006, ICSE.

[5]  Measuring the Information Society Report , 2015 .

[6]  Jordi Herrera-Joancomartí,et al.  Research and Challenges on Bitcoin Anonymity , 2014, DPM/SETOP/QASA.

[7]  Shawn Wilkinson,et al.  Storj A Peer-to-Peer Cloud Storage Network , 2014 .

[8]  David Vandervort,et al.  Challenges and Opportunities Associated with a Bitcoin-Based Transaction Rating System , 2014, Financial Cryptography Workshops.

[9]  Muneeb Ali,et al.  Blockstack: Design and Implementation of a Global Naming System with Blockchains , 2016 .

[10]  Gareth W. Peters,et al.  Understanding Modern Banking Ledgers Through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money , 2015, ArXiv.

[11]  ISO / IEC 25010 : 2011 Systems and software engineering — Systems and software Quality Requirements and Evaluation ( SQuaRE ) — System and software quality models , 2013 .

[12]  Dragos Velicanu,et al.  CertCoin : A NameCoin Based Decentralized Authentication System 6 . 857 Class Project , 2014 .

[13]  Hubert Ritzdorf,et al.  Tampering with the Delivery of Blocks and Transactions in Bitcoin , 2015, IACR Cryptol. ePrint Arch..

[14]  Goutam Paul,et al.  Towards a More Democratic Mining in Bitcoins , 2014, ICISS.

[15]  Yu Zhang,et al.  An IoT electric business model based on the protocol of bitcoin , 2015, 2015 18th International Conference on Intelligence in Next Generation Networks.

[16]  Patrick D. McDaniel,et al.  An Analysis of Anonymity in Bitcoin Using P2P Network Traffic , 2014, Financial Cryptography.

[17]  Norman Meuschke,et al.  Decentralized Trusted Timestamping using the Crypto Currency Bitcoin , 2015, ArXiv.

[18]  Malte Möser,et al.  An inquiry into money laundering tools in the Bitcoin ecosystem , 2013, 2013 APWG eCrime Researchers Summit.

[19]  Sebastian Feld,et al.  Analyzing the Deployment of Bitcoin's P2P Network under an AS-level Perspective , 2014, ANT/SEIT.

[20]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[21]  Giuseppe Ateniese,et al.  From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain , 2015, NSS.

[22]  Alex Pentland,et al.  Enigma: Decentralized Computation Platform with Guaranteed Privacy , 2015, ArXiv.

[23]  Sarah Meiklejohn,et al.  Privacy-Enhancing Overlays in Bitcoin , 2015, Financial Cryptography Workshops.

[24]  Stefano Zanero,et al.  BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.

[25]  Trond Hønsi SpaceMint - A Cryptocurrency Based on Proofs of Space , 2017 .

[26]  Brian Neil Levine,et al.  Sybil-Resistant Mixing for Bitcoin , 2014, WPES.

[27]  Alan T. Litchfield,et al.  A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology , 2015, ACSC.

[28]  Elaine Shi,et al.  Bitter to Better - How to Make Bitcoin a Better Currency , 2012, Financial Cryptography.

[29]  Louise Axon,et al.  Privacy-awareness in blockchain-based PKI , 2015 .

[30]  Luke Valenta,et al.  Blindcoin: Blinded, Accountable Mixes for Bitcoin , 2015, Financial Cryptography Workshops.

[31]  Jega Anish Dev Bitcoin mining acceleration and performance quantification , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).

[32]  Dominic Wörner,et al.  When your sensor earns money: exchanging data for cash with Bitcoin , 2014, UbiComp Adjunct.

[33]  Ian Goldberg,et al.  Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage , 2017, Financial Cryptography.

[34]  Ethan Heilman,et al.  One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner (Poster Abstract) , 2014, Financial Cryptography Workshops.

[35]  Michael T. Goodrich,et al.  Accountable Storage , 2014, ACNS.