Research Article
Open access
Published on 1 August 2023
Download pdf
Fang,C. (2023). A Survey of Blockchain IoT Integration. Applied and Computational Engineering,8,130-141.
Export citation

A Survey of Blockchain IoT Integration

Chuanwang Fang *,1,
  • 1 University of Electronic Science and Technology of China

* Author to whom correspondence should be addressed.

https://doi.org/10.54254/2755-2721/8/20230108

Abstract

The Internet of Things (IoT) brings people increasingly more convenience nowadays. However, due to the simple structure of most IoT devices and the limited budget when designing and building IoT systems, there are often security vulnerabilities in IoT systems. In addition, the accelerated growth of IoT devices and the data they generate also puts greater pressure on traditional centralised computing centers. Due to its openness, transparency, secure communication, and decentralisation, blockchain technology may solve these problems. This paper mainly studies the research trends of blockchain, IoT, and their integrated systems in recent years and puts forward issues worthy of attention in future development. This paper aims to help beginners get started with blockchain and IoT by providing an overview of blockchain, IoT, and their integration through reviewing and analysing literature. It recommends focusing on chain-chain communication security, new information compression and extraction methods, multi-dimensional evaluation of blockchain IoT systems, information security mechanisms against quantum computers in blockchain IoT integrated systems, and so on.

Keywords

Blockchain, Internet of things, Security, Privacy, Communication, Scalability

[1]. Leslie Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770–772, 1981.

[2]. Ralph C Merkle. Method of providing digital signatures, January 5 1982. US Patent 4,309,569.

[3]. Jae Cha Choon and Jung Hee Cheon. An identity-based signature from gap diffie-hellman groups. In International workshop on public key cryptography, pages 18–30. Springer, 2003.

[4]. Johannes G¨obel, Holger Paul Keeler, Anthony E Krzesinski, and Peter G Taylor. Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay. Performance Evaluation, 104:23–41, 2016.

[5]. Ittay Eyal and Emin G¨un Sirer. Majority is not enough: Bitcoin mining is vulnerable. Communications of the ACM, 61(7):95–102, 2018.

[6]. Primavera De Filippi, Morshed Mannan, and Wessel Reijers. Blockchain as a confidence machine: The problem of trust & challenges of governance. Technology in Society, 62:101284, 2020.

[7]. Lin Liu, Wei-Tek Tsai, Md Zakirul Alam Bhuiyan, Hao Peng, and Ming sheng Liu. Blockchainenabled fraud discovery through abnormal smart contract detection on ethereum. Future Generation Computer Systems, 128:158–166, 2022.

[8]. Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, and Aquinas Hobor. Making smart contracts smarter. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pages 254–269, 2016.

[9]. Sidney Amani, Myriam B´egel, Maksym Bortin, and Mark Staples. Towards verifying ethereum smart contract bytecode in isabelle/hol. In Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, pages 66–77, 2018.

[10]. Giuseppe Destefanis, Michele Marchesi, Marco Ortu, Roberto Tonelli, Andrea Bracciali, and Robert Hierons. Smart contracts vulnerabilities: a call for blockchain software engineering? In 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE), pages 19–25. IEEE, 2018.

[11]. Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, et al. Hyperledger fabric: a distributed operating system for permissioned blockchains. In Proceedings of the thirteenth EuroSys conference, pages 1–15, 2018.

[12]. Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, and Charalampos Papamanthou. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In 2016 IEEE symposium on security and pri- vacy (SP), pages 839–858. IEEE, 2016.

[13]. Wei Liang, Yang Yang, Ce Yang, Yonghua Hu, Songyou Xie, Kuan-Ching Li, and Jiannong Cao. Pdpchain: A consortium blockchain-based privacy protection scheme for personal data. IEEE Transactions on Reliability, 2022.

[14]. JD Bruce. The mini-blockchain scheme. White paper, page 10, 2014.

[15]. Ittay Eyal, Adem Efe Gencer, Emin G¨un Sirer, and Robbert Van Renesse. {Bitcoin-NG}: A scalable blockchain protocol. In 13th USENIX symposium on networked systems design and implementation (NSDI 16), pages 45–59, 2016.

[16]. Richard Dennis, Gareth Owenson, and Benjamin Aziz. A temporal blockchain: a formal analysis. In 2016 International Conference on Collaboration Technologies and Systems (CTS), pages 430–437. IEEE, 2016.

[17]. Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, and Ewerton Andrade. Redactable blockchain–or–rewriting history in bitcoin and friends. In 2017 IEEE European symposium on security and privacy (EuroS&P), pages 111– 126. IEEE, 2017.

[18]. Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, and Xiaojiang Du. Scalable and redactable blockchain with update and anonymity. Information Sciences, 546:25–41, 2021.

[19]. Tien Tuan Anh Dinh, Rui Liu, Meihui Zhang, Gang Chen, Beng Chin Ooi, and Ji Wang. Untangling blockchain: A data processing view of blockchain systems. IEEE transactions on knowledge and data engineering, 30(7):1366– 1385, 2018.

[20]. Huang Tangsen, Xiaowu Li, and Xiangdong Ying. A blockchain-based node selection algorithm in cognitive wireless networks. IEEE Access, 8:207156– 207166, 2020.

[21]. Timothy Nugent, David Upton, and Mihai Cimpoesu. Improving data transparency in clinical trials using blockchain smart contracts. F1000Research, 5, 2016.

[22]. Atin Angrish, Benjamin Craver, Mahmud Hasan, and Binil Starly. A case study for blockchain in manufacturing:“fabrec”: A prototype for peer-to-peer network of manufacturing nodes. Procedia Manufacturing, 26:1180– 1192, 2018.

[23]. Lennart Bader, Jens Christoph B¨urger, Roman Matzutt, and Klaus Wehrle. Smart contractbased car insurance policies. In 2018 IEEE Globecom workshops (GC wkshps), pages 1–7. IEEE, 2018.

[24]. Aditya Asgaonkar and Bhaskar Krishnamachari. Solving the buyer and seller’s dilemma: A dual-deposit escrow smart contract for provably cheat-proof delivery and payment for a digital good without a trusted mediator. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pages 262–267. IEEE, 2019.

[25]. Hossain Kordestani, Kamel Barkaoui, and Wagdy Zahran. Hapichain: a blockchain-based framework for patient-centric telemedicine. In 2020 IEEE 8th International Conference on Serious Games and Applications for Health (SeGAH), pages 1–6. IEEE, 2020.

[26]. Nouf Alkaabi, Khaled Salah, Raja Jayaraman, Junaid Arshad, Mohammed Omar, et al. Blockchain-based traceability and management for additive manufacturing. IEEE access, 8:188363–188377, 2020.

[27]. Parikshit N Mahalle, Bayu Anggorojati, Neeli R Prasad, and Ramjee Prasad. Identity authentication and capability based access control (ia-cac) for the internet of things. Journal of Cyber Security and Mobility, 1(4):309–348, 2013.

[28]. Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, and Yuqing Zhang. Discovering and understanding the security hazards in the interactions between {IoT} devices, mobile apps, and clouds on smart home platforms. In 28th USENIX security symposium (USENIX security 19), pages 1133– 1150, 2019.

[29]. Moez Krichen and Roobaea Alroobaea. A new model-based framework for testing security of iot systems in smart cities using attack trees and price timed automata. In 14th international conference on evaluation of novel approaches to software engineering, pages 570–577. SCITEPRESS-Science and Technology Publications, 2019.

[30]. Guilin Zhao and Liudong Xing. Reliability analysis of iot systems with competitions from cascading probabilistic function dependence. Reliability Engineering & System Safety, 198:106812, 2020.

[31]. Alaeddine Mihoub, Ouissem Ben Fredj, Omar Cheikhrouhou, Abdelouahid Derhab, and Moez Krichen. Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques. Computers & Electrical Engineering, 98:107716, 2022.

[32]. Sergey Efremov, Nikolay Pilipenko, and Leonid Voskov. An integrated approach to common problems in the internet of things. Procedia Engineering, 100:1215– 1223, 2015.

[33]. David J Wu, Ankur Taly, Asim Shankar, and Dan Boneh. Privacy, discovery, and authentication for the internet of things. In European Symposium on Research in Computer Security, pages 301–319. Springer, 2016.

[34]. Yuvraj Sahni, Jiannong Cao, Shigeng Zhang, and Lei Yang. Edge mesh: A new paradigm to enable distributed intelligence in internet of things. IEEE access, 5:16441–16458, 2017.

[35]. Qiao Qi, Xiaoming Chen, Caijun Zhong, and Zhaoyang Zhang. Integration of energy, computation and communication in 6g cellular internet of things. IEEE Communications Letters, 24(6):1333– 1337, 2020.

[36]. Ali Hassan Sodhro, Sandeep Pirbhulal, Zongwei Luo, Khan Muhammad, and Noman Zahid Zahid. Toward 6g architecture for energy-efficient communication in iot-enabled smart automation systems. IEEE Internet of Things Journal, 8(7):5141–5148, 2020.

[37]. Sofiane Hamrioui and Pascal Lorenz. Bio inspired routing algorithm and efficient communications within iot. IEEE Network, 31(5):74–79, 2017.

[38]. Khadak Singh Bhandari, In-Ho Ra, and Gihwan Cho. Multi-topology based qos-differentiation in rpl for internet of things applications. IEEE Access, 8:96686–96705, 2020.

[39]. Khadak Singh Bhandari and GI Hwan Cho. An energy efficient routing approach for cloudassisted green industrial iot networks. Sustainability, 12(18):7358, 2020.

[40]. Gianluca Aloi, Giuseppe Caliciuri, Giancarlo Fortino, Raffaele Gravina, Pasquale Pace, Wilma Russo, and Claudio Savaglio. Enabling iot interoperability through opportunistic smartphone-based mobile gateways. Journal of Network and Computer Applications, 81:74–84, 2017.

[41]. Adnan Akbar, George Kousiouris, Haris Pervaiz, Juan Sancho, Paula TaShma, Francois Carrez, and Klaus Moessner. Real-time probabilistic data fusion for large-scale iot applications. Ieee Access, 6:10015– 10027, 2018.

[42]. Leila Fatmasari Rahman, Tanir Ozcelebi, and Johan Lukkien. Understanding iot systems: a life cycle approach. Procedia computer science, 130:1057– 1062, 2018.

[43]. Athul Jayaram. Smart retail 4.0 iot consumer retailer model for retail intelligence and strategic marketing of in-store products. Proceedings of the 17th international business horizonINBUSH ERA-2017, Noida, India, 9, 2017.

[44]. Julia Lee. Internet of things based deadbolt lock latch strike location smart sensor, January 26 2017. US Patent App. 14/804,146.

[45]. Leo John Baptist Andrews, Linesh Raja, and Suresh Shanmugasundaram. Mobile androidbased remote patient monitoring system through wearable sensors. Journal of Discrete Mathematical Sciences and Cryptography, 22(4):557–568, 2019.

[46]. R Vijaya Saraswathi, Sravani Nalluri, Somula Ramasubbareddy, K Govinda, and E Swetha. Brilliant corp yield prediction utilizing internet of things. In data engineering and communication technology, pages 893–902. Springer, 2020.

[47]. Chui Young Yoon. Measurement model of smart factory technology in manufacturing fields based on iiot and cps. In Proceedings of the 2019 International Conference on Artificial Intelligence, Robotics and Control, pages 80–84, 2019.

[48]. Mohamed Tahar Hammi, Badis Hammi, Patrick Bellot, and Ahmed Serhrouchni. Bubbles of trust: A decentralized blockchain-based authenti- cation system for iot. Computers & Security, 78:126– 142, 2018.

[49]. Yong Yu, Yannan Li, Junfeng Tian, and Jianwei Liu. Blockchain-based solutions to security and privacy issues in the internet of things. IEEE Wireless Communications, 25(6):12– 18, 2018.

[50]. Jiawen Kang, Zehui Xiong, Dusit Niyato, Dongdong Ye, Dong In Kim, and Jun Zhao. Toward secure blockchain-enabled internet of vehicles: Optimizing consensus management using reputation and contract theory. IEEE Transactions on Vehicular Technology, 68(3):2906– 2920, 2019.

[51]. Junqin Huang, Linghe Kong, Guihai Chen, Min-You Wu, Xue Liu, and Peng Zeng. Towards secure industrial iot: Blockchain system with credit-based consensus mechanism. IEEE Transactions on Industrial Informatics, 15(6):3680–3689, 2019.

[52]. Jawad Ali, Toqeer Ali, Yazed Alsaawy, Ahmad Shahrafidz Khalid, and Shahrulniza Musa. Blockchain-based smart-iot trust zone measurement architecture. In Proceedings of the International Conference on Omni-Layer Intelligent Systems, pages 152– 157, 2019.

[53]. Soumyashree S Panda, Utkalika Satapathy, Bhabendu K Mohanta, Debasish Jena, and Debasis Gountia. A blockchain based decentralized au- thentication framework for resource constrained iot devices. In 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pages 1–6. IEEE, 2019.

[54]. Songlin He, Qiang Tang, Chase Qishi Wu, and Xuewen Shen. Decentral- izing iot management systems using blockchain for censorship resistance. IEEE Transactions on Industrial Informatics, 16(1):715–727, 2019.

[55]. Basudeb Bera, Durbadal Chattaraj, and Ashok Kumar Das. Designing secure blockchain-based access control scheme in iot-enabled internet of drones deployment. Computer Communications, 153:229–249, 2020.

[56]. Kazım Rıfat zyılmaz and Arda Yurdakul. Work-in-progress: Integrating low-power iot devices to a blockchain-based infrastructure. In 2017 International Conference on Embedded Software (EMSOFT), pages 1–2. IEEE, 2017.

[57]. Pradip Kumar Sharma, Mu-Yen Chen, and Jong Hyuk Park. A software defined fog node based distributed blockchain cloud architecture for iot. Ieee Access, 6:115– 124, 2017.

[58]. Haoli Sun, Song Hua, Ence Zhou, Bingfeng Pi, Jun Sun, and Kazuhiro Yamashita. Using ethereum blockchain in internet of things: A solution for electric vehicle battery refueling. In International Conference on Blockchain, pages 3– 17. Springer, 2018.

[59]. Ali Dorri, Salil S Kanhere, Raja Jurdak, and Praveen Gauravaram. Lsb: A lightweight scalable blockchain for iot security and anonymity. Journal of Parallel and Distributed Computing, 134:180– 197, 2019.

[60]. Laizhong Cui, Shu Yang, Ziteng Chen, Yi Pan, Mingwei Xu, and Ke Xu. An efficient and compacted dag-based blockchain protocol for industrial internet of things. IEEE Transactions on Industrial Informatics, 16(6):4134– 4145, 2019.

[61]. Md Ashraf Uddin, Andrew Stranieri, Iqbal Gondal, and Venki Balasubramanian. An efficient selective miner consensus protocol in blockchain oriented iot smart monitoring. In 2019 IEEE International Conference on Industrial Technology (ICIT), pages 1135–1142. IEEE, 2019.

[62]. Yuna Jiang, Yi Zhong, and Xiaohu Ge. Smart contract-based data commodity transactions for industrial internet of things. IEEE Access, 7:180856–180866, 2019.

[63]. Yu Zhang and Jiangtao Wen. An iot electric business model based on the protocol of bitcoin. In 2015 18th international conference on intelligence in next generation networks, pages 184– 191. IEEE, 2015.

[64]. Konstantinos Christidis and Michael Devetsikiotis. Blockchains and smart contracts for the internet of things. Ieee Access, 4:2292–2303, 2016.

[65]. Marlene Kuhn, Huong Giang Nguyen, Heiner Otten, and J¨org Franke. Blockchain enabled traceability–securing process quality in manufacturing chains in the age of autonomous driving. In 2018 IEEE International Conference on Technology Management, Operations and Decisions (ICTMOD) , pages 131–136. IEEE, 2018.

[66]. Regio A Michelin, Ali Dorri, Marco Steger, Roben C Lunardi, Salil S Kanhere, Raja Jurdak, and Avelino F Zorzo. Speedychain: A framework for decoupling data from blockchain for smart cities. In Proceedings of the 15th EAI international conference on mobile and ubiquitous systems: Computing, networking and services, pages 145–154, 2018.

[67]. Amal Alahmadi and Xiaodong Lin. Towards secure and fair iiot-enabled supply chain management via blockchain-based smart contracts. In ICC 2019-2019 IEEE International Conference on Communications (ICC), pages 1–7. IEEE, 2019.

[68]. Rubina Akter, Mohtasin Golam, Van-Sang Doan, Jae-Min Lee, and Dong-Seong Kim. Iomt-net: Blockchain integrated unauthorized uav localization using lightweight convolution neural network for internet of military things. IEEE Internet of Things Journal, 2022.

Cite this article

Fang,C. (2023). A Survey of Blockchain IoT Integration. Applied and Computational Engineering,8,130-141.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title: Proceedings of the 2023 International Conference on Software Engineering and Machine Learning

Conference website: http://www.confseml.org
ISBN:978-1-915371-63-8(Print) / 978-1-915371-64-5(Online)
Conference date: 19 April 2023
Editor:Anil Fernando, Marwan Omar
Series: Applied and Computational Engineering
Volume number: Vol.8
ISSN:2755-2721(Print) / 2755-273X(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).