You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

3 March 2020

Proof of Concept of Scalable Integration of Internet of Things and Blockchain in Healthcare

and
Department of Electronics and Communication Engineering, National Institute of Technology, Tiruchirappalli, Tamil Nadu 620015, India
*
Author to whom correspondence should be addressed.

Abstract

The advent of Internet of Things (IoT) brought innovation along with unprecedented benefits of convenience and efficacy in many operations that were otherwise very cumbersome. This innovation explosion has surfaced a new dimension of vulnerability and physical threat to the data integrity of IoT networks. Implementing conventional cryptographic algorithms on IoT devices is not future-proof as these devices are constrained in terms of computational power, performance, and memory. In this paper, we are proposing a novel framework, a unique model that integrates IoT networks with a blockchain to address potential privacy and security threats for data integrity. Smart contracts are instrumental in this integration process and they are used to handle device authentication, authorization and access-control, and data management. We further share a new design model for interfaces to integrate both platforms while highlighting its performance results over the existing models. With the incorporation of off-chain data storage into the framework, overall scalability of the system can be increased. Finally, our research concludes how the proposed framework can be fused virtually into any existing IoT applications with minimal modifications.

1. Introduction

With the advancements in technology, miniaturization due to modern VLSI (Very Large Scale Integration) related technologies, industries are evolving to meet the ever increasing needs of the society. Internet of Things, as coined by Kevin Ashton [1], has revolutionized the world with its potential to build cost-effective applications. The Internet of Things is meant for collaboration between networked devices that have built-in intelligence. IoT is a technology that has emerged from a combination of different technologies such as Machine-to-Machine communication, RFID, Supervisory Control and Data Acquisition (SCADA), and Wireless Sensor Networks. IoT provides a way to access and connect to devices that have unique identity. The dynamic, self-adaptive, and self-configurable nature of IoT network distinguishes them from the conventional wireless networks.
The general IoT structure is shown in Figure 1. The layered architecture provides a variety of services at different levels which are essential for managing communication across different applications running over the entire network. These services include sensing data in the environment where the device is deployed, reacting to the commands based on the given criteria (ex. turning on a relay), processing the raw data, storing it for analysis purpose, communicating the data to a control node, and sharing of data with other applications. IoT has rapidly transformed the business facet with its broad spectrum of applications. The technology is instrumental in building applications such as smart cities, smart homes, smart agriculture, intelligent transport, and advanced medical and health applications [2,3,4,5,6,7,8].
Figure 1. Generalized IoT structure.
Security in IoT is still a factor of concern and boundless applications of the IoT technology portend a wide range of security challenges [9,10]. Unauthorized access and data manipulation have become common threats in these networks. A survey [11] claims that, in the past three years, more than 20% of the organizations have suffered at least one IoT based attack. It also forecasts that the amount spent on the security of the IoT devices would increase to $3.1 billion dollars. IoT is a network of devices, constrained in terms of computational power and memory, and are battery power operated in the majority of the cases. For effective utilization of the energy by IoT devices, the authors of [12] proposed two powerful energy optimization techniques, namely, batching and Computation Off-loading to MCU (Micro Controller Unit). As the number of IoT devices grow across the world, the impact of these devices on the surrounding environment is of paramount importance. In [13], the authors proposed a three-step leverage free green energy solution that involves providing green energy harvesting, wireless green energy charging, and green energy balancing.
The rest of the paper is organized as follows. Section 2 elaborates on the existing security mechanisms in the IoT networks and the blockchain, and elucidates the need for the integration of these two technologies. In Section 3, the proposed integration framework along with the key design issues are discussed. Section 4 evaluates the framework by considering a healthcare use case and discusses various functional aspects. Conclusions are presented in Section 5.

3. Proposed Framework

Figure 4 shows the overall structure of the proposed framework. It is a three-layer structure that accommodates all functionalities required for the integration process.
Figure 4. Proposed framework for IoT and blockchain integration.

3.1. Application Layer

This layer provides an interface between the IoT devices and the blockchain services. The legitimate IoT devices and other system users can access the system services such as database storage, access control, and communication between other user applications. The users in the proposed model can be physical IoT devices with sensors installed or any Decentralized Application (DApp) browsers such as Metamask [45]. These browsers are usually provided with developer tools, preferably a Graphical User Interface, which helps programmers to develop application-specific functions. Each user of the system will be assigned a set of roles based on which they get services from the business layer.

3.2. Business Layer

This layer is the core of framework and contains all the logic required to run different applications in the system. It acts as an abstraction layer between the IoT applications and the blockchain. The functions specified in this layer are reusable and are coded purely based on the application requirements. Services such as smart contracts, user validations, access control, etc. reside in this layer.

3.3. Storage Layer

Data privacy is a major constraint for sensitive data stored in the network. To increase privacy, the data stored in the blockchain are encrypted [46]. However, data encrypted by the users are visible to all the peers in the network. Therefore, in order to protect sensitive data, the proposed model uses off-chain data storage. The sensitive data are stored in a private database, and the blockchain stores associate information required for validating the integrity of data with a timestamp. This method of storing data is usually termed as off-chain storing. Figure 5 illustrates this process. Storing of associate data in the blockchain also allows verification of immutability.
Figure 5. Off-chain based data storage mechanism.
By avoiding bottlenecks and single points of failure, the system can be designed to be fault-tolerant. The off-chain mechanism is best suited for IoT applications because storing such large volumes of data over the chain is expensive. The business layer contains dedicated control mechanisms to ensure that the off-chain database can only be accessed by authorized entities.
In the next section, the performance of the proposed framework is evaluated by considering a healthcare system. Then, the components of the system, software, hardware, and other issues related to the system are described in detail.

4. System Evaluation

In order to evaluate the performance of the proposed framework, a healthcare use case has been developed using the features mentioned in the proposed framework. Figure 6 shows the overall scenario of the healthcare system. This system uses an Ethereum based permissioned blockchain. The permissioned blockchain is the one that allows only known nodes into the network which are given complete authority to validate the transaction blocks. Various nodes in the system are described below:
Figure 6. Overview of the use case scenario.
  • IoT Device: This device is attached to the patient body to monitor vital parameters such as heart rate and body temperature. Sensors that read these parameters from the body are attached to the controller in the device. Processing of raw data received from the sensors, framing the data for storage purposes, communication, and networking functions will be taken care of by this device. All the interactions will go through the blockchain network, and each of these transactions are stored as immutable records inside the network. The sensitive data from the device are stored in the off-chain database.
  • Off-Chain Database: This is the database in which the body vital parameters and other patient records are stored. Access to this database is controlled by the smart contract. Read or write operations on this database are based on the privileges assigned to the users by the system supervisor. There are security mechanisms employed at the database level to accommodate data privacy and integrity. Optionally, data can be hashed before being stored in the database.
  • Doctor: A doctor can use a DApp to access the database to monitor the concerned patient’s body vital parameters and prescribe medicines based on the observations. Only authorized doctors are allowed to view data of a particular patient or to prescribe medication.
  • Pharmacy: The pharmacist, using a DApp, can access medical prescription of a particular patient upon proving his identity. He can also access the address of the patient so that the medicines can be directly delivered at the patient’s site.
  • Insurance Company: The insurance company is another component in this system who can access the services using a DApp. When a claim is made by the patient, he has the authority to verify the patient records.
The advantages of this system are:
  • It provides real-time monitoring of patient’s critical conditions.
  • It provides security to the sensitive data of the patient.
  • It helps in making the insurance claiming process transparent as the records inside the blockchain are immutable and provide end-to-end traceability.

4.1. Implementation Details

4.1.1. System Supervisor

System supervisor is the one who resides in the hospital management and is responsible for assigning privileges and different access permissions to the system users. There are four nodes in this system, and the privileges for each node are listed in Table 3. The smart contract deployment is also the responsibility of the supervisor.
Table 3. Privileges assigned to the users of the system.

4.1.2. Software

Among the available blockchain development platforms, the most popular are Ethereum, Hyperledger [47], and IBM Blockchain [48]. For the evaluation of this model, Ethereum is being used as a platform. The software packages and libraries used in the design are listed in Table 4.
Table 4. Packages and Libraries used in the system design.
An Ethereum node is created by using geth. geth is the implementation of Ethereum node in Go language. Truffle [49], an Ethereum based development and testing framework that is built over the Ethereum Virtual Machine (EVM), has been used for generating executable byte code. Truffle has in-built support for smart contracts’ compilation and linking. The environment of the Truffle framework also supports binary management and smart contract deployment. It also supports automated contract testing for rapid prototyping of applications. In order to reduce the computational costs and complexity, this model uses lightweight smart contracts instead of conventional consensus mechanisms [50] to record transactions and allow access to the resources.
Solidity, the official programming language to build smart contracts in Ethereum based blockchains, is used to code the smart contracts. Web3.py, a Python API based on web3.js, provides interaction between applications and the smart contracts. Smart contracts play a vital role in the proposed integration model. The functions provided by the smart contract interface and their description are given in Table 5.
Table 5. Functions used in smart contracts and their description.
The system assumes that all the users have a private key and public keys of all the entities which are involved in communication.
The APIs to interact with smart contracts are written using Python. Peer connectivity between the heterogeneous nodes (miner and IoT devices) poses a challenge in the system design. The enode information about a particular node can be used to add peers to the miners. Algorithms 1–5 for various operations performed by the user are given below.
Algorithm 1: Storing patient body vital parameters in the database
Input: patientID, patient_body_parameters
Output: Body parameters are stored in the database and Transaction is recorded.
pragma solidity ^0.5.12;
mapping(address => bool) authorizedPatients;
 if( isPatientAuthorized(patientID))
  store the patient body parameters in corresponding patient’s record;
  transaction is recorded in the blockchain;
  store the transaction hash and block number in the patient record;
 }
 else
  Revert the transaction;
   function public isPatientAuthorized(address patientID) public view return (bool approved)
 {
    return authorizedPatients[patientID];
 }
Algorithm 2: Monitoring patient body vital parameters
Input: patientID, doctorID
Output: patient_body_parameters
pragma solidity ^0.5.12;
mapping(address => address) authorizedDoctor;
 if( isDoctorAuthorized(patientID))
 {
  Read the patient body parameters;
  transaction is recorded in the blockchain;
 }
 else
Revert the transaction;
 function public isDoctorAuthorized(address patientID) public view return (bool display)
 {
   if(msg.sender == authorizedDoctor(patientID))
    return true;
   else
    return false;
 }
Algorithm 3: Update patient prescription
Input: patientID, doctorID, prescription
Output: Patient record update with new prescription
pragma solidity ^0.5.12;
 mapping(address => address) authorizedDoctor;
 if( isDoctorAuthorized(patientID))
 {
  Update the prescription in the corresponding patient’s record;
  transaction is recorded in the blockchain;
 }
 else
  Revert the transaction;
 function public isDoctorAuthorized(address patientID) public view return (bool display)
 {
   if(msg.sender == authorizedDoctor(patientID))
    return true;
   else
    return false;
 }
Algorithm 4: Accessing patient’s prescription
Input: patientID, pharmaID,
Output: Prescription of the patient
pragma solidity ^0.5.12;
 mapping(address => address) authorizedPharma;
 if( isPharmacyAuthorized(patientID))
 {
  Get prescription of the patient from the database
  transaction is recorded in the blockchain;
 }
 else
  Revert the transaction;
 function public isPharmacyAuthorized(address patientID) public view return (bool display)
 {
   if(msg.sender == authorizedPharma(patientID))
    return true;
   else
    return false;
 }
Algorithm 5: Accessing patient’s medical records by the insurer
Input: patientID, insurerID,
Output: Records of the patient
pragma solidity ^0.5.12;
 mapping(address => address) authorizedInsurer;
 if( isInsurerAuthorized(patientID))
 {
  Get patient’s record from the database;
  transaction is recorded in the blockchain;
 }
 else
  Revert the transaction;
 function public isInsurerAuthorized(address patientID) public view return (bool display)
 {
   if(msg.sender == authorizedInsurer(patientID))
    return true;
   else
    return false;
 }

4.1.3. Hardware

In this use case, we have devised two medical IoT devices, one using Raspberry Pi 3 Model B [51] and the other using Raspberry Pi 3 Model B+ [52], to collect body vital parameters from the patient’s body and to store in the off-chain database after proper authentication. Application frameworks such as [53] also used Raspberry Pi based mini computers to successfully evaluate the performance of IoT based logistics test bed. The MAX30100 Pulse Oximeter sensor and MAX30205 body temperature sensor and Pmod TMP3 temperature sensor from Digilent Inc. are used to measure heart rate, body temperature, and room temperature, respectively. Both of the devices are loaded with the necessary libraries and packages to accomplish the job of a blockchain node and carry out the transactions with other nodes in the network.
The hardware setup is shown in Figure 7. The system contains one miner (Figure 7(a)), which is a high end computing system running on an Intel Core i7 8th Generation processor, 2.2 GHz clock frequency, 24 GB RAM, and 1 TB secondary storage. The operating system used is Ubuntu 18.04. The two IoT devices using Raspberry Pi boards are shown in Figure 7b,c.
Figure 7. Hardware Setup (a) miner; (b) medical IoT Device-1 (Raspberry Pi 3 Model B+); (c) medical IoT Device-2 (Raspberry Pi 3 Model B).

4.2. Analysis

In the proposed model, each user is assigned with a restricted level of privileges. Access to the database is provided only to the authorized users. The framework provides a two-tier security for the resource access with a blockchain self-security mechanism at the first stage and smart contract based access control at the second stage.
Table 6 lists the average time taken by different processes in the proposed model. Various parameters related to the blockchain process are detailed below.
Table 6. Average time taken by different processes in the system.
  • Transaction Confirmation time: A node in the chain is expected to validate each transaction of every block. Hence, transaction validation is one of the major tasks in the blockchain. The computational power of the system has an unswerving effect on the transaction confirmation time. The average transaction confirmation time of the system is 1.7 seconds.
  • Block Time: The block time is defined as the amount of time it takes for the miner to generate a new block. In Ethereum, the block time is between 10–20 seconds. In the proposed use case, it is 11.21 seconds.
  • Migration and Deployment Time: It is the amount of time taken by the smart contract testing framework (Truffle in this case) to compile the smart contract and push it on to the Ethereum network. It took 9.14 seconds to deploy the smart contract in this use case.
  • Deployment Cost: It is the fee paid by the user to push the smart contract application on the Ethereum blockchain. The deployment cost in the proposed model is 0.00179117 ETH.
Figure 8 demonstrates the result of storage of the body vital parameters in the database after successful authentication. SHA-3 256 has been used to store the transactional hashes inside the blocks.
Figure 8. Result demonstrating successful storing of patient body vital parameters.
The proposed framework is compared with the relative works in the same domain, and the comparative analysis is summarized in Table 7.
Table 7. Comparative analysis of proposed framework with related works.

4.2.1. Discussion

The proposed model is successfully implemented over an Ethereum based permissioned blockchain. It is evident that, even though the integration of IoT devices with blockchain is complex, the in-built features such as transaction validations by all the peers and immutability of the transactions inside the blocks make this option a better choice for securing the IoT applications. Any alteration or device compromise can be easily identified by the other nodes in the network. This framework also offers a better security solution for IoT devices compared to the traditional security services offered by PKI systems. The two key challenges, namely confidentiality and scalability, are addressed with the off-chain solution. The advantages derived by the IoT applications from this integration process are discussed below:
  • Scalability: Scalability is defined as the ability of an information system to maintain its equilibrium state with increased storage volume. Scalability is a key issue in the integration of blockchain and IoT as IoT devices are growing rapidly and their applications, in general, generate huge volumes of data. In [50,54], the scalability is achieved at the cost of increased complexity due to the clustering of nodes, and lifetime management of these clusters. In addition, the method described in [54] requires each node to store at least one local blockchain at any instance of time and hence it is not suitable for memory-constrained IoT devices. Furthermore, with off-chain data storage mechanisms, only associated data are stored in blockchain, and sensitive data are stored in the off-chain database. This reduces the transaction data size and increases the number of transactions that can be accommodated within the block. Hence, throughput and scalability of the overall system are enhanced.
  • Confidentiality: As the proposed model uses permissioned blockchain, only authorized users are allowed to access the blockchain network. Since only authorized users can access on-chain as well as off-chain data, the confidentiality of the data is preserved.
  • Access control and tamper-proof: Role-based access to the database is enabled by the smart contract that is deployed on the blockchain platform. The tamperproof nature of the blockchain makes it even more difficult for someone to modify the transaction data on chain.
The novelty of the proposed framework is derived from the fact that it creates an ecosystem wherein traditional IoT devices having insecure data transfer, storage constraints, and insufficient privacy mechanisms can function seamlessly in a decentralized distributed and trustworthy system. The off-chain mechanism allows a means to relocate the storage and computational processes without compromising the inherent features of the blockchain technology. This feature is especially useful to combat the expensive storage and processing charges when this permissioned chain is connected to the Ethereum main chain.

5. Conclusions

The growth rate of IoT devices is tremendous, and there is always a need for the development of improved and efficient protocols to meet the required standards in terms of data privacy and security in IoT networks. Limitations such as scalability, latency, and packet loss are the major hurdles in the conventional IoT security protocols. A framework that uses integration of IoT and blockchain has been proposed in this paper to address these issues. With this integration model, the IoT applications can now use the inherent features of blockchain such as immutable record keeping as well as end-to-end traceability. A proof of concept has been developed based on the healthcare system for evaluating the performance of this framework. The system has been implemented on a permissioned Ethereum blockchain platform which supports smart contracts. Four different users with different privilege levels of access have been considered. The performance of this system is compared with similar models in terms of access control, scalability, and confidentiality to highlight the significance of the proposed model. This framework serves as a single-point solution for all the security needs of resource-constrained IoT networks. The framework provides a cost effective solution for many real-time applications where security is pivotal. More matured and value-added solutions can be built over the blockchain to further enhance the scalability and security of IoT applications in the future. This work can be further broadened to encompass social network applications so as to make blockchain inclusive in order to derive the benefits of both the applications resulting in secure social platforms.

Author Contributions

Both authors contributed equally to the entire work. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ashton, K. That Internet of Things Thing. RFID J. 2009, 22, 97–114. [Google Scholar]
  2. Rajab, H.; Cinkel, T. IoT based Smart Cities. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC), Rome, Italy, 19–21 June 2018; pp. 1–4. [Google Scholar]
  3. Miguez, F.; Fernandez-Caranes, T.M.; Fraga-Lamas, P.; Castedo, L. Design, Implementation and Practical Evaluation of an IoT Home Automation System for Fog Computing Applications Based on MQTT and Zigbee-WiFi Sensor Nodes. Sensors 2018, 18, 2660. [Google Scholar] [CrossRef] [PubMed]
  4. Verma, H.; Jain, M.; Goel, K.; Vikram, A.; Verma, G. Smart home system based on Internet of Things. In Proceedings of the 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 16–18 March 2016; pp. 2073–2075. [Google Scholar]
  5. Li, W.; Logenthiran, T.; Phan, V.; Woo, W.L. A Novel Smart Energy Theft System (SETS) for IoT-Based Smart Home. IEEE Internet Things J. 2019, 6, 5531–5539. [Google Scholar] [CrossRef]
  6. Satamraju, K.P.; Shaik, K.; Vellanki, N. RURAL BRIDGE: A novel system for smart and co-operative farming using IoT architecture. In Proceedings of the 2017 International Conference on Multimedia, Signal Processing and Communication Technologies (IMPACT), Aligarh, India, 24–26 November 2017; 2017; pp. 22–26. [Google Scholar]
  7. Agale, R.R.; Gaikwad, D.P. Automated Irrigation and Crop Security System in Agriculture Using Internet of Things. In Proceedings of the 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, 17–18 August 2017; pp. 1–5. [Google Scholar]
  8. Herrera-Quintero, L.F.; Vega-Alfonso, J.C.; Banse, K.B.A.; Carrillo Zambrano, E. Smart ITS Sensor for the Transportation Planning Based on IoT Approaches Using Serverless and Microservices Architecture. IEEE Intelligent Transp. Sys. Magazine. 2018, 10, 17–27. [Google Scholar] [CrossRef]
  9. Neshenko, N.; Bou-Harb, E.; Crichigno, J.; Kaddoum, G.; Ghani, N. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations. IEEE Comm. Surveys & Tutorials. 2019, 21, 2702–2733. [Google Scholar]
  10. Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. IEEE Access 2019, 7, 82721–82743. [Google Scholar] [CrossRef]
  11. Forecast: IoT Security, Worldwide. 2018. Available online: https://www.gartner.com/en/newsroom/press-releases/2018-03-21-gartner-says-worldwide-iot-security-spending-will-reach-1-point-5-billion-in-2018 (accessed on 21 October 2019).
  12. Zhao, S.; Rengasamy, P.V.; Zhang, H.; Bhuyan, S.; Nachiappan, N.C.; Sivasubramaniam, A.; Kandemir, M.T.; Das, C. Understanding Energy Efficiency in IoT App Executions. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019; pp. 742–755. [Google Scholar]
  13. Liu, X.; Ansari, N. Toward Green IoT: Energy Solutions and Key Challenges. IEEE Comms. Magazine 2019, 57, 104–110. [Google Scholar] [CrossRef]
  14. El-hajj, M.; Fadlallah, A.; Chamoun, M.; Serhrouchni, A. A Survey of Internet of Things (IoT) Authentication Schemes. Sensors 2019, 19, 1141. [Google Scholar] [CrossRef]
  15. Celia, L.; Cungang, Y. (WIP) Authenticated Key Management Protocols for Internet of Things. In Proceedings of the 2018 IEEE International Congress on Internet of Things (ICIOT), San Francisco, CA, USA, 2–7 July 2018; pp. 126–129. [Google Scholar]
  16. Roman, R.; Rios, R.; Onieva, J.A.; Lopez, J. Immune System for the Internet of Things Using Edge Technologies. IEEE Internet Things J. 2019, 6, 4774–4781. [Google Scholar] [CrossRef]
  17. Han, Z.; Li, X.; Huang, K.; Feng, Z. A Software Defined Network-Based Security Assessment Framework for CloudIoT. IEEE Internet Things J. 2018, 5, 1424–1434. [Google Scholar] [CrossRef]
  18. Mansoor, K.; Ghani, A.; Chaudhry, S.A.; Shamshirband, S.; Ghayyur, S.A.K. Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography. Sensors 2019, 19, 4752. [Google Scholar] [CrossRef] [PubMed]
  19. Giaretta, A.; Dragoni, N.; Massacci, F. IoT Security Configurability with Security-by-Contract. Sensors 2019, 19, 4121. [Google Scholar] [CrossRef] [PubMed]
  20. Ali, B.; Awad, A.I. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes. Sensors 2018, 18, 817. [Google Scholar] [CrossRef] [PubMed]
  21. Babaei, A.; Schiele, G. Physical Unclonable Functions in the Internet of Things: State of the Art and Open Challenges. Sensors 2019, 19, 3208. [Google Scholar] [CrossRef]
  22. Satamraju, K.P.; Malarkodi, B. Design and Evaluation of a Lightweight Security Framework for IoT Applications. In Proceedings of the TENCON 2019–2019 IEEE Region 10 Conference (TENCON), Kochi, India, 17–20 October 2019; pp. 522–526. [Google Scholar]
  23. IoTIFY, a cloud based IoT performance testing platform. Available online: https://iotify.io/ (accessed on 24 September 2019).
  24. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 24 October 2019).
  25. Wang, R.; He, J.; Liu, C.; Li, Q.; Tsai, W.; Deng, E. A Privacy-Aware PKI System Based on Permissioned Blockchains. In Proceedings of the 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), Beijing, China, 23–25 November 2018; pp. 928–931. [Google Scholar]
  26. Ali Syed, T.; Alzahrani, A.; Jan, S.; Siddiqui, M.S.; Nadeem, A.; Alghamdi, T. A Comparative Analysis of Blockchain Architecture and its Applications: Problems and Recommendations. IEEE Access 2019, 7, 176838–176869. [Google Scholar] [CrossRef]
  27. Salman, T.; Zolanvari, M.; Erbad, A.; Jain, R.; Samaka, M. Security Services Using Blockchains: A State of the Art Survey. IEEE Comm. Surveys Tutorials 2019, 21, 858–880. [Google Scholar] [CrossRef]
  28. Wang, W.; Hoang, D.T.; Hu, P.; Xiong, Z.; Niyato, D.; Wang, P.; Wen, Y.; Kim, D.I. A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks. IEEE Access 2019, 7, 22328–22370. [Google Scholar] [CrossRef]
  29. Zheng, W.; Zheng, Z.; Chen, X.; Dai, K.; Li, P.; Chen, R. NutBaaS: A Blockchain-as-a-Service Platform. IEEE Access 2019, 7, 134422–134433. [Google Scholar] [CrossRef]
  30. Tijan, E.; Aksentijević, S.; Ivanić, K.; Jardas, M. Blockchain Technology Implementation in Logistics. Sustainability 2019, 11, 1185. [Google Scholar]
  31. Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Comm. Surveys & Tutorials 2015, 17, 2347–2376. [Google Scholar]
  32. Wan, J.; Li, J.; Imran, M.; Li, D.; Fazal-e-Amin. A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory. IEEE Trans. Ind. Inform. 2019, 15, 3652–3660. [Google Scholar] [CrossRef]
  33. Zheng, D.; Jing, C.; Guo, R.; Gao, S.; Wang, L. A Traceable Blockchain-Based Access Authentication System With Privacy Preservation in VANETs. IEEE Access 2019, 7, 117716–117726. [Google Scholar] [CrossRef]
  34. Sun, Y.; Zhang, L.; Feng, G.; Yang, B.; Cao, B.; Imran, M.A. Blockchain-Enabled Wireless Internet of Things: Performance Analysis and Optimal Communication Node Deployment. IEEE Internet Things J. 2019, 6, 5791–5802. [Google Scholar] [CrossRef]
  35. Lindsay, J. Smart Contracts for Incentivizing Sensor Based Mobile Smart City Applications. In Proceedings of the 2018 IEEE International Smart Cities Conference (ISC2), Kansas City, MO, USA, 16–19 September 2018; pp. 1–4. [Google Scholar]
  36. Zhang, Y.; Kasahara, S.; Shen, Y.; Jiang, X.; Wan, J. Smart Contract-Based Access Control for the Internet of Things. IEEE Internet Things J. 2019, 6, 1594–1605. [Google Scholar] [CrossRef]
  37. Zhang, K.; Mao, Y.; Leng, S.; He, Y.; Maharajan, S.; Gjessing, S.; Zhang, Y.; Tsang, D.H.K. Optimal Charging Schemes for Electric Vehicles in Smart Grid: A Contract Theoretic Approach. IEEE Trans. Intell. Transp. Sys. 2018, 19, 3046–3058. [Google Scholar]
  38. Thomas, L.; Long, C.; Burnap, P.; Wu, J.; Jenkins, N. Automation of the supplier role in the GB power system using blockchain-based smart contracts. CIRED-Open Access Proc. J. 2017, 1, 2619–2623. [Google Scholar] [CrossRef]
  39. Cruz, J.P.; Kaji, Y.; Yanai, N. RBAC-SC: Role-Based Access Control Using Smart Contract. IEEE Access 2018, 6, 12240–12251. [Google Scholar] [CrossRef]
  40. Chain of Things. 2017. Available online: https://www.blockchainofthings.com/ (accessed on 24 October 2019).
  41. Ethereum: a global, open-source platform for decentralized applications. Available online: https://ethereum.org/ (accessed on 24 October 2019).
  42. Ozyilmaz, K.R.; Yurdakul, A. Designing a Blockchain-Based IoT with Ethereum, Swarm, and LoRa: The Software Solution to Create High Availability with Minimal Security Risks. IEEE Consumer Elec. Mag. 2019, 8, 28–34. [Google Scholar] [CrossRef]
  43. Ali, M.S.; Vecchio, M.; Antonelli, F. Enabling a Blockchain-Based IoT Edge. IEEE Internet Things Mag. 2018, 1, 24–29. [Google Scholar] [CrossRef]
  44. Lo, S.K.; Liu, Y.; Chia, S.Y.; Xu, X.; Lu, Q.; Zhu, L.; Ning, H. Analysis of Blockchain Solutions for IoT: A Systematic Literature Review. IEEE Access 2019, 7, 58822–58835. [Google Scholar] [CrossRef]
  45. Metamask - Brings Ethereum to your browser. Available online: https://metamask.io/ (accessed on 24 October 2019).
  46. Kosba, A.; Miller, A.; Shi, E.; Wen, Z.; Papamanthou, C. Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2016; pp. 839–858. [Google Scholar]
  47. Hyperledger: Open Source blockchain Technologies. Available online: https://www.hyperledger.org/ (accessed on 24 October 2019).
  48. IBM Enterprise Blockchain Solutions and Services. Available online: https://www.ibm.com/in-en/blockchain (accessed on 24 October 2019).
  49. Truffle Suite: Sweet Suite for Smart Contracts. Available online: https://www.trufflesuite.com (accessed on 24 October 2019).
  50. Bach, L.M.; Mihaljevic, B.; Zagar, M. Comparative analysis of blockchain consensus algorithms. In Proceedings of the 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 21–25 May 2018; pp. 1545–1550. [Google Scholar]
  51. Raspberry Pi 3 Model B. Available online: https://www.raspberrypi.org/products/raspberry-pi-3-model-b/ (accessed on 24 October 2019).
  52. Raspberry Pi 3 Model B+. Available online: https://www.raspberrypi.org/products/raspberry-pi-3-model-b-plus/ (accessed on 24 October 2019).
  53. Aksentijević, S.; Krnjak, D.; Tijan, E. Logistics environment awareness system prototype based on modular Internet of Things platform. Pomorstvo 2015, 29, 170–179. [Google Scholar]
  54. Ismail, L.; Materwala, H.; Zeadally, S. Lightweight Blockchain for Healthcare. IEEE Access 2019, 7, 149935–149951. [Google Scholar] [CrossRef]
  55. Ren, Y.; Leng, Y.; Zhu, F.; Wang, J.; Kim, H.J. Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network. Sensors 2019, 19, 2395. [Google Scholar] [CrossRef]
  56. Hang, L.; Kim, D.H. Design and Implementation of an Integrated IoT Blockchain Platform for Sensing Data Integrity. Sensors (Basel) 2019, 19, 2228. [Google Scholar] [CrossRef] [PubMed]
  57. Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasubramanian, V. Continuous patient monitoring with a patient centric agent: A block architecture. IEEE Access 2018, 6, 32700–32726. [Google Scholar] [CrossRef]
  58. Shahid, A.R.; Pissinou, N.; Staier, C.; Kwan, R. Sensor-Chain: A Lightweight Scalable Blockchain Framework for Internet of Things. In Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Atlanta, GA, USA, 14–17 July 2019; pp. 1154–1161. [Google Scholar]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.