Abstract
Internet of things (IoT) is seen as combinations of various communication technologies and embedded equipment such as sensors, micro-controllers, radio-frequency identification, wireless devices, etc., which work as a single unit to achieve a specific task in a smart way, i.e., with less human intervention, and decisions are made automatically. IoT is used in many sectors such as smart home automation, smart grids, smart cities, vehicular networks, etc. Due to easy accessibility and reachability to such devices or networks, there are severe security and privacy issues in IoT. User authentication, access control mechanism, confidentiality and data correctness are a few of the major concerns among them. Though it looks like conventional security concerns, but due to (i) the dynamic nature of IoT, (ii) the resource-scarce nature of the devices and (iii) different standards and communication stacks involved, traditional network security countermeasures may not be applied directly to IoT. In recent years, usage of blockchain technology to address various security issues, specifically data correctness, has opened up a facet for IoT to explore the option of using blockchain in IoT. Researchers have started investigating the same. Primitively, blockchain is a non-editable, decentralized and cryptographically secured ledger that is tolerant against byzantine failure. This nature of blockchain makes it an attractive alternative to address security issues such as data integrity, entity authentication, etc. Also, in an IoT environment, where devices are spread across a vast geographical area, it requires a decentralized validation mechanism that a blockchain provides. In this paper, we intend to make an exhaustive survey of various researches being carried out to secure IoT networks using blockchain technology. We also aim to provide a summarized view for various prospective research directions in IoT which can be addressed by blockchain technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805
Hammi MT, Hammi B, Bellot P, Serhrouchni A Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput Secur 78:126–142
Yuan R, Shumin L, Baogang Y (2007) Value chain oriented RFID system framework and enterprise application. Beijing: Sci (2007)
METRO Group Future Store Initiative. http://www.futurestore.org/
Vilamovska AM, Hattziandreu E, Schindler R, Van Oranje C, De Vries H, Krapelse J (2009) RFID application in healthcare—scoping and identifying areas for RFID deployment in healthcare delivery, RAND Eur
Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc netw 10(7):1497–1516
SENSEI FP7 Project, Scenario Portfolio, User and Context Requirements, Deliverable. http://www.sensei-project.eu/
Shantha JR (2016) A neoteric authentication scheme for Iot healthcare system. https://doi.org/10.5281/zenodo.192911
BUTLER Project. http://www.iot-butler.eu
Shin H, Lee HK, Cha HY, Heo SW, Kim H (2019) IoT security issues and light weight block cipher. In: International conference on artificial intelligence in information and communication (ICAIIC), IEEE, pp 381–384
Nabil D, Tandjaoui D, Romdhani I, Medjek F (2018) Trust management in internet of things. https://doi.org/10.4018/978-1-5225-5736-4.ch007
https://www.fool.com/investing/2018/04/11/20-real-world-uses-for-blockchain-technology.aspx
Guo, Y, Liang, C (2016) Blockchain application and outlook in the banking industry. Finan Innov 2(1):24
Yaga, D, Mell, P, Roby, N, Scarfone, K (2018) Blockchain technology overview (No. NIST Internal or Interagency Report (NISTIR) 8202 (Draft)), National Institute of Standards and Technology
Rifi, N, Rachkidi, E, Agoulmine, N, Taher, NC (2017) Towards using blockchain technology for IoT data access protection. In: 2017 IEEE 17th international conference on ubiquitous wireless broadband (ICUWB), IEEE, pp 1–5
Javaid, U, Aman, MN, Sikdar B (2018) BlockPro.: blockchain based data provenance and integrity for secure IoT environments. In: Proceedings of the 1st workshop on blockchain-enabled networked sensor systems, ACM, pp 13–18
Mining in Bitcoin. Available at: https://en.bitcoin.it/wiki/Mining/
Makhdoom, I, Abolhasan, M, Abbas H, Ni W (2019) Blockchain’s adoption in IoT: the challenges, and a way forward. J Netw Comput Appl 125:251–279
Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for IoT security and privacy: the case study of a smart home. In: 2017 IEEE international conference on pervasive computing and communications workshops, PerCom workshops, IEEE, pp 618–623
Zheng Z, Xie S, Dai HN, Wang H (2016) Blockchain challenges and opportunities: a survey. Work Pap
https://www.cloudflare.com/en-in/learning/ddos/what-is-a-ddos-attack/
Ming Z, Yang S, Li Q, Wang D, Xu M, Xu K Blockcloud: empowering IoT through a service-centric blockchain. Blockcloud Technical White Paper
Ali MS, Dolui K, Antonelli F (2017) IoT data privacy via blockchains and IPFS. In: Proceedings of the seventh international conference on the internet of things, ACM, pp 14
Qu C, Tao M, Zhang J, Hong X, Yuan R (2018) Blockchain based credibility verification method for IoT entities. Secur Commun Netw
Vučinić M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2015) OSCAR: object security architecture for the internet of things. Ad Hoc Netw 32:3–16
Seitz L, Selander G, Wahlstroem E, Erdtman S, Tschofenig H (2017) Authentication and authorization for constrained environments (ACE). Int Eng Task Force Int Draft Draft Ietf Aceoauth Authz 07 work Prog. Available at: https://datatracker.ietf.org/doc/html/draft-ietf-ace-oauth-authz-07
Alphand O, Amoretti M, Claeys T, Dall’Asta S, Duda A, Ferrari G, Zanichelli F (2017) IoT Chain: a blockchain security architecture for the internet of things. In: IEEE wireless communications and networking conference (WCNC), IEEE, pp 1–6
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patel, O., Patel, H. (2021). Blockchain-Based Mechanisms to Address IoT Security Issues: A Review. In: Kotecha, K., Piuri, V., Shah, H., Patel, R. (eds) Data Science and Intelligent Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 52. Springer, Singapore. https://doi.org/10.1007/978-981-15-4474-3_36
Download citation
DOI: https://doi.org/10.1007/978-981-15-4474-3_36
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4473-6
Online ISBN: 978-981-15-4474-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)