Skip to main content

Blockchain-Based Mechanisms to Address IoT Security Issues: A Review

  • Conference paper
  • First Online:
Book cover Data Science and Intelligent Applications

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 52))

Abstract

Internet of things (IoT) is seen as combinations of various communication technologies and embedded equipment such as sensors, micro-controllers, radio-frequency identification, wireless devices, etc., which work as a single unit to achieve a specific task in a smart way, i.e., with less human intervention, and decisions are made automatically. IoT is used in many sectors such as smart home automation, smart grids, smart cities, vehicular networks, etc. Due to easy accessibility and reachability to such devices or networks, there are severe security and privacy issues in IoT. User authentication, access control mechanism, confidentiality and data correctness are a few of the major concerns among them. Though it looks like conventional security concerns, but due to (i) the dynamic nature of IoT, (ii) the resource-scarce nature of the devices and (iii) different standards and communication stacks involved, traditional network security countermeasures may not be applied directly to IoT. In recent years, usage of blockchain technology to address various security issues, specifically data correctness, has opened up a facet for IoT to explore the option of using blockchain in IoT. Researchers have started investigating the same. Primitively, blockchain is a non-editable, decentralized and cryptographically secured ledger that is tolerant against byzantine failure. This nature of blockchain makes it an attractive alternative to address security issues such as data integrity, entity authentication, etc. Also, in an IoT environment, where devices are spread across a vast geographical area, it requires a decentralized validation mechanism that a blockchain provides. In this paper, we intend to make an exhaustive survey of various researches being carried out to secure IoT networks using blockchain technology. We also aim to provide a summarized view for various prospective research directions in IoT which can be addressed by blockchain technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805

    Google Scholar 

  2. Hammi MT, Hammi B, Bellot P, Serhrouchni A Bubbles of trust: a decentralized blockchain-based authentication system for IoT. Comput Secur 78:126–142

    Google Scholar 

  3. Yuan R, Shumin L, Baogang Y (2007) Value chain oriented RFID system framework and enterprise application. Beijing: Sci (2007)

    Google Scholar 

  4. METRO Group Future Store Initiative. http://www.futurestore.org/

  5. Vilamovska AM, Hattziandreu E, Schindler R, Van Oranje C, De Vries H, Krapelse J (2009) RFID application in healthcare—scoping and identifying areas for RFID deployment in healthcare delivery, RAND Eur

    Google Scholar 

  6. Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc netw 10(7):1497–1516

    Google Scholar 

  7. SENSEI FP7 Project, Scenario Portfolio, User and Context Requirements, Deliverable. http://www.sensei-project.eu/

  8. Shantha JR (2016) A neoteric authentication scheme for Iot healthcare system. https://doi.org/10.5281/zenodo.192911

  9. BUTLER Project. http://www.iot-butler.eu

  10. Shin H, Lee HK, Cha HY, Heo SW, Kim H (2019) IoT security issues and light weight block cipher. In: International conference on artificial intelligence in information and communication (ICAIIC), IEEE, pp 381–384

    Google Scholar 

  11. Nabil D, Tandjaoui D, Romdhani I, Medjek F (2018) Trust management in internet of things. https://doi.org/10.4018/978-1-5225-5736-4.ch007

  12. https://www.fool.com/investing/2018/04/11/20-real-world-uses-for-blockchain-technology.aspx

  13. Guo, Y, Liang, C (2016) Blockchain application and outlook in the banking industry. Finan Innov 2(1):24

    Google Scholar 

  14. Yaga, D, Mell, P, Roby, N, Scarfone, K (2018) Blockchain technology overview (No. NIST Internal or Interagency Report (NISTIR) 8202 (Draft)), National Institute of Standards and Technology

    Google Scholar 

  15. Rifi, N, Rachkidi, E, Agoulmine, N, Taher, NC (2017) Towards using blockchain technology for IoT data access protection. In: 2017 IEEE 17th international conference on ubiquitous wireless broadband (ICUWB), IEEE, pp 1–5

    Google Scholar 

  16. Javaid, U, Aman, MN, Sikdar B (2018) BlockPro.: blockchain based data provenance and integrity for secure IoT environments. In: Proceedings of the 1st workshop on blockchain-enabled networked sensor systems, ACM, pp 13–18

    Google Scholar 

  17. Mining in Bitcoin. Available at: https://en.bitcoin.it/wiki/Mining/

  18. Makhdoom, I, Abolhasan, M, Abbas H, Ni W (2019) Blockchain’s adoption in IoT: the challenges, and a way forward. J Netw Comput Appl 125:251–279

    Google Scholar 

  19. Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for IoT security and privacy: the case study of a smart home. In: 2017 IEEE international conference on pervasive computing and communications workshops, PerCom workshops, IEEE, pp 618–623

    Google Scholar 

  20. Zheng Z, Xie S, Dai HN, Wang H (2016) Blockchain challenges and opportunities: a survey. Work Pap

    Google Scholar 

  21. https://www.cloudflare.com/en-in/learning/ddos/what-is-a-ddos-attack/

  22. Ming Z, Yang S, Li Q, Wang D, Xu M, Xu K Blockcloud: empowering IoT through a service-centric blockchain. Blockcloud Technical White Paper

    Google Scholar 

  23. Ali MS, Dolui K, Antonelli F (2017) IoT data privacy via blockchains and IPFS. In: Proceedings of the seventh international conference on the internet of things, ACM, pp 14

    Google Scholar 

  24. https://hackernoon.com/top-12-blockchain-development-tools-to-build-blockchain-ecosystem-371a1b587248

  25. Qu C, Tao M, Zhang J, Hong X, Yuan R (2018) Blockchain based credibility verification method for IoT entities. Secur Commun Netw

    Google Scholar 

  26. Vučinić M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2015) OSCAR: object security architecture for the internet of things. Ad Hoc Netw 32:3–16

    Google Scholar 

  27. Seitz L, Selander G, Wahlstroem E, Erdtman S, Tschofenig H (2017) Authentication and authorization for constrained environments (ACE). Int Eng Task Force Int Draft Draft Ietf Aceoauth Authz 07 work Prog. Available at: https://datatracker.ietf.org/doc/html/draft-ietf-ace-oauth-authz-07

  28. Alphand O, Amoretti M, Claeys T, Dall’Asta S, Duda A, Ferrari G, Zanichelli F (2017) IoT Chain: a blockchain security architecture for the internet of things. In: IEEE wireless communications and networking conference (WCNC), IEEE, pp 1–6

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ochchhav Patel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patel, O., Patel, H. (2021). Blockchain-Based Mechanisms to Address IoT Security Issues: A Review. In: Kotecha, K., Piuri, V., Shah, H., Patel, R. (eds) Data Science and Intelligent Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 52. Springer, Singapore. https://doi.org/10.1007/978-981-15-4474-3_36

Download citation

Publish with us

Policies and ethics