You are currently viewing a new version of our website. To view the old version click .
Future Internet
  • Review
  • Open Access

21 July 2022

Internet of Things and Blockchain Integration: Security, Privacy, Technical, and Design Challenges

,
,
and
1
Management Information Systems Department, College of Business, American University of the Middle East, Egaila 15453, Kuwait
2
Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK
*
Author to whom correspondence should be addressed.
This article belongs to the Section Internet of Things

Abstract

The Internet of things model enables a world in which all of our everyday devices can be integrated and communicate with each other and their surroundings to gather and share data and simplify task implementation. Such an Internet of things environment would require seamless authentication, data protection, stability, attack resistance, ease of deployment, and self-maintenance, among other things. Blockchain, a technology that was born with the cryptocurrency Bitcoin, may fulfill Internet of things requirements. However, due to the characteristics of both Internet of things devices and Blockchain technology, integrating Blockchain and the Internet of things can cause several challenges. Despite a large number of papers that have been published in the field of Blockchain and the Internet of things, the problems of this combination remain unclear and scattered. Accordingly, this paper aims to provide a comprehensive survey of the challenges related to Blockchain–Internet of things integration by evaluating the related peer-reviewed literature. The paper also discusses some of the recommendations for reducing the effects of these challenges. Moreover, the paper discusses some of the unsolved concerns that must be addressed before the next generation of integrated Blockchain–Internet of things applications can be deployed. Lastly, future trends in the context of Blockchain–Internet of things integration are discussed.

1. Introduction

Academics, researchers, and entrepreneurs are all interested in the Internet of things (IoT) these days because of its ability to provide novel services across a wide range of applications such as COVID-19 [] and intelligent healthcare []. The IoT connects diverse things and devices to establish a physical network where processing, sensing, and communication activities are automatically managed without human intervention []. In the last decade, there has been significant growth in the number of IoT devices on the market. The number of IoT devices on the market is nearing 25 billion, with predictions that this number will rise to 50 billion by the end of 2025 []. To achieve such massive development, new arrangements are required, such as following the centralized IoT–cloud approach. The organization’s system for cloud computing and data processing is referred to as IoT–cloud architecture. Here, the cloud manages and visualizes data flows from IoT devices while processing and analyzing them []. Although this approach may work well today, the projected development indicates that new approaches will be required in the future [,] due to several challenges of the centralized IoT–cloud approach. The following are some of the problems that a centralized IoT–cloud architecture faces [,,,,]: (1) if the centralized server fails, the entire network system is at risk of being paralyzed and interrupted; (2) data fraud makes it difficult for IoT devices owners to trust partners who have oversight and access to the collected data; (3) data maintained in centralized clouds lack accountability and traceability because they depend on a trusted third party to store and retain data; (4) the central architecture is no longer robust enough to handle vast amounts of data and end-to-end interactions as a result of the rapid growth of IoT applications. Furthermore, due to the variety of smart devices on the market, maintaining and updating these devices are almost impossible; (5) since transparency is critical for promoting security and trust when designing next-generation IoT solutions, open-source techniques should be considered; (6) because most safe cryptographic methods need a large amount of processing power and energy, the encryption process is a big barrier due to the heterogeneity and limited compute capacity of IoT devices; (7) due to the constantly increasing number of IoT devices number, relevant IoT ecosystems must accommodate future network development while also processing a huge volume of data exchanged in a high-performance manner. The abovementioned challenges cannot be achieved in centralized IoT–cloud architecture. These problems necessitate a rethinking of the IoT’s structure. Although decentralized systems for enormous peer-to-peer (P2P) wireless sensor networks have been developed in the past to overcome the drawbacks of the centralized IoT–cloud architecture, security and privacy requirements were lacking until the advent of Blockchain (BC) technology [].
BC can carry out, organize, and monitor transactions provided by several devices without the need for a centralized cloud. To validate a transaction, BC is a decentralized system that does not require trust among participants. Its origins can be traced back to the cryptocurrency Bitcoin system []. The integration of BC and IoT (BIoT) may result in several benefits [,,,] for IoT security. Firstly, it provides a P2P framework that does not require a middle layer such as a third trusted party. Secondly, BC technology has no single point of failure, and, when it is used with smart contracts, it enables more secure transactions, which protects against various scams since smart contracts provide access control and improve stability, confidentiality, and authentication. By ensuring the data are cryptographically encrypted and signed by the rightful sender, BC ensures data confidentiality and authentication. Thirdly, the capacity of the entire network can be expanded due to its P2P nature. Fourthly, BC enables transactions to be performed quickly. Once built and attached to the BC network, each IoT device will get symmetric key pair, eliminating the need for key management and delivery in the BC network. As a consequence, lightweight authentication protocols can be used. The need for computing and memory capacity in IoT devices can be met and organized by these lightweight protocols. Fifthly, the immutability of IoT using data logs stored on BC ensures traceability and transparency. Lastly, due to its tamper-proof design and safe storage, BC may enable the secure release of software updates to IoT devices.
Despite all of the above advantages, BIoT integration may pose several challenges [,,,,,]. Mission-critical situations, in particular, raise additional questions. Since BIoT integration is a dynamic process influenced by multiple interrelated factors, adding BC to the IoT ecosystem adds more organizational and technological requirements. Hence, this paper aims to provide a comprehensive survey about BIoT integration challenges. Consequently, this paper focuses on the following research questions:
  • RQ1: What are the current challenges that face BIoT integration?
  • RQ2: What recommendations have been provided in the literature to overcome these challenges?
  • RQ3: What are the future concerns and research trends for BIoT integration?
This paper has several key contributions. Firstly, although BC has been in use for some years, little thorough research on BIoT challenges exists. This article provides a comprehensive survey of BIoT challenges based on a survey of the existing literature on BIoT integration. This survey might be one of several studies that look into these issues in depth. Seven challenges categories were identified in this paper: security, privacy preservation, technical considerations, scalability, computational processing, characteristic considerations, regulations and guidelines, and BIoT design. Secondly, in addition to exploring the problems of BIoT, this paper also reports the recommended solutions to these challenges. The majority of reviewed studies recommended turning the BC phase into another layer (i.e., not an IoT device), such as a fog layer, edge layer, software-defined networking (SDN), or cloud layer as IoT is still in its infancy. Thirdy, the current research problems of IoT decentralization using BC, as well as future challenges in the field, are presented in depth. Seven future BIoT challenges were identified: security, privacy, communication and consensus mechanism, scalability and capability constraints, standardization and regulations, BC platform, and big data. Lastly, potential BIoT integration trends were explored. New BC-based business models, AI, quantum computing, double-chained IoT security, and IoT, BC, and 6G interoperability are among these trends.
The paper performed a thorough study of the literature by searching the related papers in major scholarly databases (IEEE Xplore, Springer Link, Wiley Online Library, ACM digital library, MDPI Online, Science Direct, Emerald Insight, and SAGE Publication) to identify and consider the current state of BIoT challenges, as well as future research directions. According to the databases scanned, the use of various BC platforms has been the subject of several journal and conference publications in the field of BIoT such as Bitcoin, Ethereum, Multichain, and Hyperledger Fabric. Table 1 summarizes the abbreviations that appeared in this article. The remainder of the article is structured as follows: Section 2 presents the background and related work; Section 3 responds to the research questions; future research trends and directions are explored in Section 4; the findings’ discussion and limitations are presented in Section 5; Section 6 concludes the paper.
Table 1. Table of abbreviations used in the article.

3. RQ 1 and RQ 2—Current Challenges and Recommendations to Enhance BIoT Integration

This section answers the first and second research questions (i.e., RQ1: What are the challenges that face BIoT integration? RQ2: What recommendations have been provided in literature to overcome these challenges?). We looked through the pertinent literature to get the answers to the research questions. The search strategy used all well-known databases, including IEEE, MDPI, and Elsevier. This paper only contains academic papers that were authored in English. The full text, abstract, and title of the chosen papers were then examined. The study was excluded if it did not demonstrate any focus on IoT and BC. Table 5 displays the search terms, databases, exclusion criteria, and publications that were ultimately chosen.
Table 5. Selected article process.
Although BC technology can be one of the most appealing options to deal with the security and privacy difficulties in IoT, many researchers and academics have suggested numerous research papers that promoted the notion of BIoT integration. Most IoT security and privacy frameworks are centralized and, therefore, not well suited for IoT due to the difficulty of scale, traffic, and single point of failure []. Moreover, the danger of device spoofing, erroneous authentication, and decreased data exchange reliability are still facing BIoT [,]. In this section, a comprehensive taxonomy of the current BIoT challenges, as well as recommendations to mitigate the effects of these challenges, are discussed. It is worth noting that the majority of the research focused on Bitcoin’s application in the IoT context; therefore, these challenges are concentrated on Bitcoin. Despite the ongoing debate about Bitcoin’s applicability in an IoT setting, this study only reports on an assessment of the existing literature in the field’s top academic databases.
Seven challenge themes were synthesized from the literature: security, privacy, technical consideration, scalability, computational processing, regulations and guidelines, and BIoT design. Under each of these categories, several challenges are discussed. The taxonomy of current BIoT challenges is shown in Figure 2. According to the current research, these BIoT integration issues are mostly based on the Bitcoin BC disadvantages. Moreover, a lack of BC capabilities is the primary cause of regulations and standards, as well as BIoT design difficulties. On the other hand, both IoT and BC concerns affect privacy, security, computational processing, technical considerations, and scalability. These problems will have an influence on the performance of BIoT integration in any of these scenarios. Accordingly, it is essential to investigate the overall impact of all of these difficulties on BIoT integration.
Figure 2. BIoT integration current challenges.

3.1. BC-Based Security Issues

The security model incorporates confidentiality (the capacity to keep data hidden from unauthorized users), integrity (the consistency and correctness of data throughout its life cycle), and availability (i.e., ensures that data are available to the users at a required range of performance in any situation); it is regarded as one of the most critical concepts for ensuring security in any form [,,]. Furthermore, security challenges associated with the nature of BC including BC security vulnerabilities, smart contract vulnerabilities, trust management, and authentication (i.e., using personal identification to validate requests) are other concepts that are required for implementing policy, and limiting access should be discussed [,,].
Although all BCs utilize cryptographic protocols to protect their data and activities, this does not mean that they are without flaws [,]. Accordingly, for heterogeneous devices, a multilayer security architecture must be developed. Before any amenities are delivered to users, the framework should first adapt to current resources and make judgments about the security methods to apply at the IoT levels. Intelligence is required for such an adjustable security framework that is susceptible to resource standardization for deployment in IoT systems []. In this section, we look at how employing BC in IoT applications might jeopardize the security concepts and requirements mentioned above. In addition, the recommended solutions are discussed. Table 6 highlights the solutions recommended for addressing security challenges.
Table 6. Recommendations for reducing the negative impact of security challenges.

3.1.1. Confidentiality

Cryptography and encryption technologies are commonly used in private BC to ensure confidentiality. Allowing any network member to access, write, audit, and maintain the blocks is a standard approach to ensure availability in public BC. Only preselected nodes can read or write in private BC. Transactions can only be performed by participants or preselected nodes who hold the private keys for authentication []. Furthermore, the devices that will be used as nodes may present a confidentiality challenge. These node devices may vary in terms of security policies implemented due to limitations in specifications, capabilities, manufacturer restrictions, or challenges in the configurations and programming [,]. Multichain enables integrated management of user permissions to ensure that only selected participants may access transactions, restrict the types of transactions that are authorized (authorization ensures that the user has permission to conduct a certain activity), and mine new blocks safely without the need for PoW and associated expenses. BCs of the private and consortium types aid in the solution of this problem, but they restrict user access and limit the degree of decentralization. As a result, for certain use-cases, an optimal tradeoff should be implemented [].
Because transaction pattern analysis may be used to establish the identities of users or devices secured by public keys, it is difficult to reveal an IoT private transaction history in a public BC. Entities must completely grasp their privacy demands to evaluate if a private or hybrid BC is best suited to their needs []. A BC technique known as Mimblewimble should also be discussed, which is a method of organizing and storing transactions in such a way that all transactions appear to an outsider to be random data. Only the participants in the transaction have access to the data. As a result, Mimblewimble is also associated with the notion of confidential transactions [].

3.1.2. Integrity

A BC registry is particularly useful in keeping data on a distributed infrastructure that is very resistant to physical damage []. However, because of computing, communication, and service capabilities, the quantity of data created in the IoT varies by location and device. IoT sensors are often basic and cannot be successfully monitored for an extended period. This increases security concerns. Furthermore, terminal devices seldom employ security features; as a result, attackers may simply gain passwords and other identifying information, which they can then use to publish and disseminate false information []. Moreover, IoT devices often deliver data straight to the control center in a wireless manner after data collection. However, without adequate shielding, this technique is immediately exposed. This will result in the collection of a huge quantity of basic data, as well as the disclosure of personal and private data. It even poses problems with social and public safety [].
BCs are notable for their resilience and irreversibility. Because of the system’s irreversible and immutable nature, smart contract code bugs are highly dangerous. Moreover, because BC data are immutable, new technology such as quantum computing potentially jeopardizes public BCs with encrypted data []. Data or transactions that have been saved on the BC cannot be easily changed. Although BC assures authenticity, it cannot guarantee data correctness. If the saved document, for example, includes erroneous or wrong information, it will waste resources. The BC is a tamper-proof ledger, but if an error occurs, the loss may be irreversible. This differs from a centralized solution, which may roll back the database in the event of an error [,]. This problem appears to be tough to tackle at the moment; it is based on increasing the degree of centralization. This, however, is subject to the underlying application context. Due to the need for monitoring in many circumstances, the criteria should not be entirely decentralized [].
As a consequence, the IoT data record and block sequence are synchronized. Inconsistent (forked) BCs can originate from incomplete or inconsistent records []. One solution to the inconsistency problem is the hierarchical design of the BC []. The data from the whole network are verified and stored in the higher main BC. To accomplish block management, the lower sub-BC controls data for particular physical locations or device components and blocks BC data for distinct levels []. Moreover, one of the most often used authentication techniques in IoT is message identification and authentication, which is a protective mechanism for ensuring the integrity and security of data when transferring data [].

3.1.3. Availability

Availability and consistency in BIoT are tightly linked together in a reversal relationship. If the availability is increased, then the consistency will be decreased, and vice versa. For example, Ethereum is considered faster than Bitcoin as shown clearly in the quicker block time, whereas it is less secure as the process of adding mined blocks requires multiple confirmations by many BC applications to prevent transactions from a double-spending attack, which happens when an attacker obtains service or commodities from the account holder, and then manages to restructure the transaction ledger so that the crediting transaction is reversed [,]. Moreover, BIoT is exposed to a 51% attack which will cause the availability to be controlled by the attackers. Among the main attacks is the distributed denial of service (DDoS) which can abuse the process of authentication and trust by harming the system with an out-of-control number of requests to update and insert new records [,].
During information transfer, sophisticated security procedures are frequently ignored. As a result, attackers have the chance to intrude while data are being sent. Once this occurs, it will have an impact on the IoT system, leading user rights to be violated and the system to fail to execute specific duties []. The IoT captures substantial data and stores substantial personal and private information about users, such as passwords and personal preferences. All countermeasures should be examined about the stored data, including strategies to prevent data theft and destruction, as well as ways to prepare in advance if the aforesaid circumstance arises. Furthermore, the IoT system would appear to malfunction if data are maliciously combined with “dirty” data. As a result, it is also important to think about dealing with data cleaning and other events [].

3.1.4. Authentication

Authentication challenges in BIoT range from the increase in storage size and computing power overhead to openness against certain types of attacks []. In the IoT, public key infrastructures (PKIs) make authentication and identity management easier. At the moment, the most widely used PKIs are certificate authorities and a web of trust grounded on somewhat excellent privacy []. However, because the growing number of devices would necessitate significant processing and storage requirements to allow for continuous message exchange and confirmation of identity, these traditional solutions cannot fulfill identity management needs [].
To resolve these challenges, combining smart contracts with lightweight encryption methods to handle identities automatically is an interesting research proposal. We may develop specific smart contracts that contain [] (1) a device recording containing device type, expiry date, public key, and so on, (2) information updating when a new IoT device enters the network that may include firmware upgrade and expiration date, and (3) obsolescence of devices that may include device registration, identity verification, and information update. Furthermore, by synchronizing the data stored in the BC, the full node may synchronize the state of identity-related smart contracts to offer identity authentication. Similarly, the lightweight node may successfully authenticate additional IoT devices after querying the complete node []. The decentralized identity management strategy, which makes use of BC immutability and automated smart contract execution, not only avoids identity fraud but also lowers the cost of developing trust in IoT systems when compared to CA-based techniques [].
The user’s identification in several services (e.g., smart city) is currently given via central authority-managed digital identity management systems. Self-sovereign identity (SSI) and decentralized identity (DID) allow people to fully manage their digital identities without the need for a third-party intermediary. This gives consumers control over how their identifiable data are shared. BC-enabled IoT services, SSI, and DID can be used for decentralized authentication and authorization. DID and SSI, on the other hand, present several difficulties, including human dependence such as losing the private user’s key []. Identity identification and message authentication are two types of network authentication. To ensure dependability, identity authentication requires a key. One of the most often used authentication techniques in IoT is message identification and authentication, which is a protective mechanism for ensuring the integrity and security of data when transferring data [].

3.1.5. Vulnerabilities

Mining vulnerabilities: The integration of BC with IoT is exposed to miners’ attacks. These attackers’ miners may control the BC if they dominated the power of the consensus mechanism []. The attacker (miner) keeps the mined blocks in a private branch instead of broadcasting them until it becomes longer than the public chain and then releases them once to force the BC to change the public chain and gain the rewards of this process [,]. This kind of attack will cause a waste of resources and may affect the performance of the fog network that uses BC [,]. BIoT applications that use smart contracts are exposed to certain types of software vulnerabilities which can be used by attackers to harm the architecture [,,].
Attacks: Although using BC technology enhances the security of IoT applications, BIoT integration is still exposed to certain types of security vulnerabilities. BIoT applications are open to the application-dependent and application-free of attacks []. BioT is exposed to the majority attack (also called 51% attack) which will cause the availability to be controlled by the attackers (e.g., Ethereum and Bitcoin) [,]. Several attacks have been identified in the literature and are explained as follows:
(1)
The DDoS attack can abuse the process of authentication and trust by harming the system with an out-of-control number of requests to update and insert new records []. Latency and, in some cases, the use of low-performance devices in the BIoT applications will make this architecture exposed to race attacks [].
(2)
The smart contract attack occurs when a customer uses the same cryptocurrency for several transactions. In a PoW-based BC, this type of attack is particularly simple to execute since the attacker may take advantage of the interval between the commencement and confirmation of two transactions to start an attack rapidly [].
(3)
Border gateway mechanism (BGP) hijacking is another attack. BGP is a de facto directing mechanism that controls the delivery of IP packets to their final terminus. Attackers either use or modify BGP routing to intercept BC’s network traffic []. Because of the extreme concentration of some Bitcoin mining pools, BGP hijacking will have a significant impact if they are targeted. The attackers can essentially divide the Bitcoin network or slow down block propagation.
(4)
Manipulation attacks (i.e., unlawfully intercepting, modifying, or deleting sensitive data while they are being sent or stored) include four types: the eclipse, overlay, man-in-the-middle (MiTM), and tampering attack. (A) The attacker can use the eclipse attack to monopolize the target’s outgoing and incoming networks, thereby separating the victim from the others in the network [,]. The attacker can then alter the victim’s awareness of the BC or allow the victim to leftover computational resources on outdated perceptions of the BC. In addition, the attacker can use the victim’s computational capacity to carry out its harmful operations [,]. (B) The overlay attack, which utilizes the receiver’s public key, makes use of BC flaws to maliciously wrap an encrypted quantity to a novel transaction []. Addressing this attack can be achieved by verifying the timestamps. As a result, diverse inputs underneath the same dealer can be detected and linked to several transactions. (C) MiTM attacks take advantage of flaws such as private key leaks to spoof two parties’ identities and surreptitiously interrupt and manipulate their communications. Some BC frameworks, including Ethereum and Bitcoin, are still vulnerable to this attack []. (D) In the tampering attack, the attackers try to change the signed transactions that are being distributed in the network, such as the addresses and other data, before propagating them to the P2P network for validation []. Bitcoin, Litecoin, and Monero are PoW cryptocurrency-based ledgers that are particularly vulnerable to this attack.
(5)
Identity-based attacks: The adversary’s goal here is to create a false identity, pose as a genuine user, and obtain access to and influence the targeted system. Several attacks can be listed under identity-based attacks [,]. (1) Replay attacks are designed to spoof two parties’ identities, interrupt their data, and repeat them to their intended terminuses. Such attacks come as a result of the disorientation that certain nodes may suffer during a soft or a hard fork, and they are frequently carried out via vulnerable cryptocurrency-based protocols. (2) Key attacks (which make use of flaws in key schemes) allow unauthorized users to control the identities of the nodes that are participating through improper usage or storage of the keys. (3) In Sybil attacks, the attacker uses leaked keys to build a large number of false identities that may serve as authenticating nodes and undertake malicious transactions to boost or decrease the reputation level of the nodes that are being targeted. (4) In impersonation attacks, opponents can use weak or leaked private keys to impersonate genuine users and undertake unauthorized operations in the system.
(6)
Whitewashing attacks: In these attacks, nodes with a bad reputation take advantage of several system flaws to re-enter the BC with new identities. There is currently no formal solution to this assault; instead, TrustChain gives nodes with new identities lesser priorities and capabilities [].
(7)
Quantum computing may be viewed as a danger to Bitcoin, since the computational capacity of these machines may be sufficient to compromise the integrity of digital signatures. It will just take a few minutes for a brute-force attack to crack the encryption and get the encryption keys []. Furthermore, technology advances with time, and new vulnerabilities and security flaws are discovered every day [].
(8)
The liveness attack is another attack described in the literature that allows a low-mining-power attacker to interrupt communications between subgroups with equivalent mining power for a short period []. The balance attack against PoW-based BC is another attack [], in which an attacker can temporarily disrupt communications between subgroups.

3.1.6. Trust Management

While actual collaboration is required to complete specific services and operations, establishing trustworthy cooperation and confidence in an IoT system is difficult as each node can join and exit the system at any moment, and nodes’ identities can be anonymous [,]. Accordingly, trust management is among the key challenges when adopting BIoT as IoT needs to connect hundreds of devices to form P2P data delivering and sharing [,]. The following are some of the trust difficulties that have been found in the literature:
(1)
Trusting the software updates for fog node devices and trusting the owners of those devices are among the most common challenges for IoT device permissions and communications when using BC [,].
(2)
Another challenge related to trust is granularity (i.e., resolution of the measured and recorded physical quantity), which is the amount of confidence that should be placed in the party providing the service and the extent to which the service receiver to pay for is trusted. For example, if an electric grid service provider wishes to be paid for every watt of electricity provided as it is provided, this may place undue stress on the system [].
(3)
Another related problem is that it is difficult to implement real transaction validation. For example, a service provider could send out 10 W of electricity, but the receiver might only report 9 W. What is the best way to deal with this collision? The meters must be calibrated. Then, an independent method of determining the quantity of power sent and received is required [].
(4)
Lastly, because of the trust difficulties, rating agencies may be able to give information on trust. This is similar to how online marketplaces like eBay employ ratings for sellers and customers. The resolution of trust takes place outside of the BC environment. As a result, while sending and receiving a specific quantity of Bitcoin is guaranteed, the service it may represent is not [].
To mitigate the challenge of trust, a global reputation assessment model based on BC technology to improve the efficacy of the above trust models can be used []. Establishing a node assessment mechanism grounded on irreversible block data is one such option. First, with BC technology, any node in the block can obtain the behavior data of other nodes. The reputation of the nodes would be computed automatically after inserting their activity data into the reputation evaluation algorithm. When calculating reputation, the kind of behavior and timeliness should be taken into account, since these two factors represent the node’s performance over time and impact the ultimate reputation distribution []. As a result, while choosing the appropriate sort of behavior and timescale, it is critical to consider the nodes’ motivations and preferences to effectively govern node behavior and develop trust [,]. Moreover, since the BC is unable to validate external data, it must be digitized to achieve its full worth. There are two types of solutions that might be considered. One is the addition of a third party who can vouch for the accuracy of the input data. However, part of the decentralization feature may be sacrificed as a result. Another option is to use innovative approaches to tackle asset digitization challenges. This may need the creation of IoT devices capable of enabling exclusive identification [].

3.1.7. Learned Lessons

As this study discovered, BIoT-based applications may face a variety of security challenges, including multiple threats, trust, data availability, confidentiality, and integrity. To address these challenges, numerous interesting solutions have been developed, including leveraging a combination of private and public BCs, integrating smart contracts with lightweight encryption approaches, and message identification and authentication. While some of these techniques may provide solutions to current challenges, these solutions may not be enough if quantum computing takes place, for instance. Other solutions, such as the global reputation model [] to ensure trust, seem to be very hard to achieve due to the heterogeneity of IoT devices and standards.

3.2. BC-Based Privacy

Similar to security, the privacy model contains various goals and requirements that must be accomplished to protect privacy, including identity privacy (i.e., hidden user identification from unauthorized users), data privacy (i.e., data is only accessible to authorized users), location privacy (i.e., unauthorized parties are unaware of the user’s location), and usage privacy (i.e., unauthorized parties are unaware of use patterns) [,,]. Below, four challenges of BIoT privacy preservation are discussed: data privacy, identity privacy, location privacy, and user privacy. Table 7 highlights the solutions recommended for addressing privacy challenges.
Table 7. Recommendations for reducing the negative impact of privacy challenges.

3.2.1. Identity Privacy

When it comes to privacy, anonymity is a huge worry for BC platforms, and it may be a key deciding factor in which platform to choose. The fundamental challenge is that all transactions are openly documented and accessible to anybody, on public platforms []. The selected anonymity strategy fails if the transactions can be connected to their owners or if the owners’ identities are revealed []. The owners of transactions should not be identified by any participants in the network in an ideal scenario [].
BIoT shares transactions with other parties and will identify its users by public or hash key, which means that, if attackers analyze the traffic and transactions of the BC, they will be able to identify the actual identity of the users []. Furthermore, the devices that will be used as nodes also present another privacy challenge. These node devices may vary in terms of security policies implemented due to limitations in specifications, capabilities, manufacturer restrictions, or challenges in the configurations and programming [].
Existing systems have used a variety of tactics with varying degrees of anonymity. Because the identity of the users is unknown and should not become known, public BCs necessitate a higher level of privacy []. To improve the amount of anonymity, Bitcoin uses the change address approach, which involves using various addresses for various transactions []. Zerocash and Zerocoin, two popular proposals to address Bitcoin’s anonymity problem, suggest that Bitcoin extensions have unidentified transactions, obscuring the sender, recipient, and information itself. On the other hand, to make transactions undetectable, Monero uses a ring of signatures., making it impossible to link them to a specific person or machine []. The Ethereum team is working with Zcash to implement a zero-knowledge succinct non-interactive argument of knowledge (zkSNARK) transaction mechanism. The method allows you to conceal a transaction and keep it fully confidential []. HLF offers a control service for identity and access using private channels to enable privacy control on BC networks. Users may regulate and restrict access to their shared information in the network []. Members of the network are identified by their public identities; however, they are not required to be aware of the information exchanged in the network [].
Pseudonymization is the dispensation of personal data in such a way that it can no longer be linked to a specific person without the help of supplementary information. Supplementary data are stored separately and are subject to technological and organizational safeguards to prevent personal data from being linked to an identified or identifiable natural person. []. In most cases, pseudonymization is accomplished by substituting user identities with pseudonyms, i.e., particular form identifiers that do not enable the re-identification of persons on their own. Because each wallet user is assigned a unique address that appears to be random (i.e., produced by cryptographic procedures and serving as a pseudonym), BC cryptocurrency platforms such as Ethereum and Bitcoin adopt pseudonymization procedures.
Other approaches to improve anonymity include blind signatures, homomorphic commitments, ring signatures, composite signatures, mixing services, and zero-knowledge proof []. To commit data without exposing them to others, homomorphic commitments employ homomorphic encryption. Confidential transactions leverage homomorphic promises to mask transaction amounts. Before signing the message, the message owner blindfolds the content using a blinding factor, which is a type of digital signature. Because they allow a person to sign a communication without understanding what it contains, blind signatures are commonly employed in privacy-related applications. A ring signature is a digital signature used to sign a message’s content by a group member. Identifying the actual signing member of a group is computationally impossible. The ring signature used in the Monero platform combines confidential transactions with ring signature and produces ring confidential transactions. A composite signature is made up of several separate signatures that are not in any particular order. Individual signatures might be difficult to compute from a composite signature. Composite signatures can be used to make Bitcoin-like currency more anonymous. Mixing services received from several clients can also be used for anonymization. It is impossible to track the activities of users using the mixing service [].

3.2.2. Data Privacy

One of the most important characteristics of BC technology is its immutability. As a result, it is critical to ensure that data, such as healthcare data, are correct [,]. Although BC is considered everlasting storage, in reality, some cases decline this claim. For example, in 2014, some hackers were able to steal almost eight million Vericoins from the cryptocurrency exchange platform called MintPal []. Wallet apps are one source of vulnerabilities in Bitcoin that might expose transaction data. Ethereum’s data and contracts are encoded but not encrypted.
HLF devotes a significant chunk of its protocol to addressing security concerns such as preventing transactions from being connected to users, access control techniques, and digital signatures. However, not all of these functions have yet been implemented. Data in the public BC can be encrypted to improve privacy. Hawk keeps track of transactions that are encrypted []. The Hawk compiler is in charge of transforming programmers’ generic code into cryptographic primitives that allow for transactional information anonymity. In addition to encryption, the Enigma project divides data into unidentifiable bits and distributes them over the network in such a manner that no node ever gets access. It stores data references in a decentralized off-chain distributed hash-table (DHT) (decentralized storage that searches for information using pairs of keys and each node is accountable for several keys) that is accessible via the BC []. Because private BCs must offer authentication and authorization procedures by definition, the challenge of data privacy can be addressed in different ways. In Ethereum, cryptography is used to limit the exposure of sensitive data and data segmentation to improve data privacy. Multichain has user permissions built in to limit perceptibility and set limits on allowed and miners.
Another way to protect data privacy is to store sensitive information outside the BC (i.e., off-chain) []. Because it would be impossible to store significant amounts of data inside the BC, this method benefits systems that manage big volumes of data []. Furthermore, they are well suited to systems that handle extremely sensitive data and require stricter access controls, such as healthcare applications. In this method, the public BC can store newscaster data, allowing evidence of data integrity and time stamps to be provided. Users may examine the BC to verify data without authorities, and data are safely kept outside. These off-chain sources should not be a source of single-point failure and should be fault-tolerant [,].
Other approaches to improve data privacy include confidential transactions, homomorphic encryption, and BC segregation []. In confidential transactions, several solutions are available to implement this strategy on a BC platform (i.e., hiding data from unauthorized third parties while still allowing transactions to be completed) such as Besu (an Apache 2.0 licensed open-source enterprise Ethereum) in Hyperledger and Parity (open-source-based Ethereum application) in Ethereum. Homomorphic encryption might be used to transfer and conduct operations on data without disclosing their secret values, thus embodying the aforementioned concept of secret transactions in some way. In Ethereum and Quorum, privacy techniques based on homomorphic encryption are available. There is no common ledger with all transactions visible to all members in BC segregation; rather, just a portion of these transactions are accessible to all members []. As a result, unauthorized third parties are unable to learn of the presence of transactions that they should not be aware of. Several platforms, including HLF, EOSIO, Corda, and Hyperledger Iroha, provide privacy methods based on BC segregation. Only a preset and identifiable group of members share in a given communication in Corda, while the rest of the network is oblivious to the transaction [].

3.2.3. Location Privacy

Pseudonymization can help in hiding the location of users. However, to avoid complications emerging from the use of a single pseudonym, a user may be connected with many pseudonyms (or addresses) to avoid transactions relating to a single user from being linked []. Utilizing one-time addresses for this purpose will rapidly result in a huge number of addresses per participant. Bitcoin, Ethereum, Monero, and other cryptocurrencies include privacy measures based on one-time addresses []. The usage of so-called stealth addresses, which were created for financial BC platforms to ensure payee anonymity, is a good example of BC technology. The payer produces a one-time address for each transaction with a single payee by suitably applying cryptographic processes. This technique is used in Bitcoin and can be applied by other platforms, such as Ethereum and Monero []. Moreover, the BC segregation technique can be used to ensure location privacy [].

3.2.4. Usage Privacy

Although each BC user has a public pseudonymous address, all transactional data such as receiver and sender are accessible by all participants. Users’ activity can be monitored by examining the data saved on the BC. Real users’ identities might be discovered by merging the information analyzed from the BC with specific external data. When a user’s identity is disclosed, all of the user’s actions will be tracked, and their personal data, including financial secrets, will be revealed [].
As for location privacy, the BC segregation technique can help in maintaining usage privacy []. Litecoin announced that MW would be included to improve privacy. Cryptographic commitment methods, such as the Pedersen commitment, provide another approach to obfuscate transaction information. By using these methods, a sender can commit transaction data and communicate the commitment rather than the data []. The sender cannot later mislead about a fictitious value of the original data (which remains hidden). Third parties may be able to verify that a transaction’s input and output numbers are similar without disclosing them in financial transactions if such guarantees are made (e.g., cryptocurrencies). Other cryptographic promises, such as the Ouroboros Crypsinous BC, are also utilized [].

3.2.5. Learned Lessons

Privacy preservation should be monitored against four entities; identity, data, location, and usage privacies. While the majority of the previous efforts in this context focused on addressing identity and data privacies in IoT-based applications, location, and usage privacies have not been paid enough attention. Decentralized access control incorporated in smart contracts, block headers, or even the BC’s transactions have been offered as possible options to handle the privacy of BIoT-based apps. Another promising solution is by deploying a tiered architecture, in which isolated private BCs are linked by a public BC. However, data integrity within private BCs remains an issue in a tiered architecture. In BC, preventing double-spending and ensuring auditability necessitates the sacrifice of anonymity. While current explorations have suggested interesting answers, protecting privacy in public IoT-based applications continues to be a research difficulty.

3.3. BC-Based Technical Considerations

Unlike conventional BC approaches that are generally applied to a dispersed system (e.g., the bandwidth, consensus algorithms, and cryptographic mechanisms), physical features ground the IoT devices’ communication. The communication between the nodes will be uneven if the communication quality is inadequate. This will result in issues such as the inability to validate the block and the waste of computer resources, thereby destroying the BC system’s consistency [,]. The creation rate of BCs and the capacity of blocks, on the other hand, are quite high because of the huge number of IoT devices and transactions. Although BC can improve IoT security, its implementation in IoT is incompatible with BC’s limited block capacity and channel propagation []. As a result, the use of BC improves the security of IoT. However, in practice, some technical problems exist including consensus algorithms, smart contracts, unstable communication, network bandwidth, cryptographic mechanisms, and cryptographic keys []. Table 8 highlights the solutions recommended addressing technical challenges.
Table 8. Recommendations for reducing the negative impact of technical challenges.

3.3.1. Consensus Algorithms

Even though the PoW mining method overcomes the problem of transaction reliability, it wastes substantial resources. Mining incentives can also result in extremely concentrated mining pools. With just seven transactions per second, the decentralized architecture provides a long-term consensus period []. The BFT method is used to create the consensus mechanism in the consortium chain, which overcomes the problem of the PoW algorithm’s low efficiency and excessive resource consumption. For complete P2P communication monitoring of abnormal activity, the BFT algorithm offers a high number of signature confirmations []. However, because of the high communication complexity, the system has substantial overhead, which affects consensus competence. This falls well short of BC’s expectations for IoT security. As a result, to satisfy the development of BIoT requirements, consensus methods must be updated and enhanced [,].
In most cases, IoT devices communicate tasks to gateways that can complete the work. Off-chain solutions may increase functionality by transmitting data outside the chain to reduce latency []. While several projects are aimed at incorporating complete BC nodes into IoT devices, mining remains a major stumbling block in the IoT because of its restrictions. The IoT is largely made up of devices with limited resources, yet it has tremendous processing capacity on a global scale. Babelchain, for example, adapts PoW for IoT applications using a new consensus method named proof of understanding (PoU). PoU, rather than hiring miners to decode hash problems, translates from other protocols, requiring fewer energy resources []. While tackling important difficulties in IoT connectivity, the effort is mainly focused on practical processing. Rather than agreeing on transaction status, participants agree on the communication’s meaning (i.e., format, action, and content).
Alzahrani et al. [] proposed a consensus method based on game theory. A variable number of validators is decided dynamically on the basis of game theory in their consensus method. The chance of danger is reduced by selecting just a legitimate number of honest validators. Chen et al. [] proposed an AI-based consensus method to combine the benefits of PoW, PoS, and DPoS. Chaudhry and Yousaf [] discussed designing consensus mechanisms for different applications including BC type, scalability, fault tolerance, throughput, and bandwidth. However, all these solutions are yet to be further investigated [].

3.3.2. Smart Contracts

As BC-based programs, smart contracts enable the automatic storing of legally binding agreements on the BC. This feature enables a BC to go from a certain application area, such as financial transactions, to the management of a larger variety of transactions and assets [,]. Smart contracts, on the other hand, are vulnerable to several attacks, including timestamp (changing the block timestamp value to the node’s maximum future time limit) and transaction-ordering dependencies (when the block’s timestamp is used for certain contract decisions, but timestamps may be modified by miners), reentrancy vulnerability (when a function calls an untrusted contract before resolving any consequences), and Mishan (where the transaction may be reversed if the exceptions made were not correctly managed) []. Furthermore, contract execution by computers has various disadvantages since it exposes them to technology issues such as hackers, viruses, and communication failures []. In addition, smart contracts may become overburdened in situations when several data sources are necessary. Smart contracts are distributed and decentralized; however, they do not spread performing tasks to manage enormous numbers of tasks [].
Because of the serious consequences that might emerge from smart contracts’ vulnerability, academics have developed several approaches and tools to detect these flaws. To strengthen the security of smart contracts, model inspection, symbolic accomplishment, and theorem proving can be employed []. Theorem proving is the most common way to formalize smart contracts, which is mathematically modeled while the desired qualities to be demonstrated are expressed. Due to its appropriateness for any system that can be described mathematically, theorem proving may be regarded as an adaptable verification approach. Symbolic execution, which is a software testing approach that aids in the development of data and evidence of a program’s quality, is a delicate solution in which several execution pathways are methodically evaluated at the same time, without the need for real inputs. Symbolic execution has led to significant advances in several important software dependability applications, and it is the most widely used methodology for detecting vulnerabilities in EVM bytecode. Model inspection, which is an automated formal verification methodology that applies to systems that may be described using a finite-state model, deploys model checking software, such as NuSMV, to verify the results. Model inspection is most commonly used with Solidity language, although it may also be used to validate contracts written in other languages.
Smart contracts are irreversible and aid in the establishment of trust between contractual parties. However, even in the event of flaws, vulnerabilities, or new business-logic specifications, a smart contract’s code is typically not upgradeable. The modified code of the smart contract is usually deployed in a new case with a new contract address, which might cause difficulties []. One technique to upgrade a smart contract is to delegate calls from the proxy contract to the new logic contract. The data are held by the proxy contract, while the logic contract performs the new logic. For each change, the logic contract identity is restructured in the proxy contract [].

3.3.3. Unstable Communication

BC is built on the assumption of steady network connections that is not viable for IoT, which frequently has poor network IoT device connectivity or network instability owing to node failure. In most situations, the state of IoT devices cannot be determined until they are tested, while, in others, the devices function normally for a length of time before changing due to a variety of factors such as disconnection, short-circuit, and program obsolescence []. IoT devices, unlike computer nodes on the Internet, are influenced by the transfer of physical underlying data. Wireless access allows IoT devices to connect, such as distributed drones and automobile network connections. If the wireless link’s quality is inadequate, the node’s information transfer will become unstable, which results in a change in the BC network’s topology []. Some device information would be unavailable to the verification node, which would lead to incomplete data processing. Because of the enormous number of interconnections and broadcasts between nodes, broadcast storms can quickly occur, consuming too much network capacity. As a result, the IoT network’s performance may be impaired, if not completely shut down.
Edge computing, as a form of cloud computing, can handle dispersed node communication. The challenge of network bandwidth requirements may arise []. Side-chains, notary systems, hash locking, and standardization are all possible answers []. Moreover, inter-BC communication protocols can be utilized to address projects that are focused on interoperability []. Limiting the consensus over various network sections or linking numerous BC by establishing inter-BC communication represents two more viable BC-based solutions [].

3.3.4. IoT-Based Heterogeneous Devices

IoT devices are available in a wide range of sizes and designs; they operate on several operating systems and, of course, have varying performance characteristics. The variety of devices adds another layer of difficulty to the BIoT integration []. As low-cost, low-power devices grow increasingly common, the BIoT integration may become increasingly vulnerable to hardware flaws. Furthermore, because of the large degree of heterogeneity across IoT devices, the original BC architecture, which just employs an “address” to describe a node, is unsuitable for IoT devices []. Moreover, multilevel security systems must be created for heterogeneous devices [,]. Before delivering services to users, the system should first adapt to current resources and make judgments about the security methods to apply at the IoT levels. Intelligence is required for such a dynamic system [].

3.3.5. IoT-Based Network Bandwidth

The use of BC has grown in popularity, as has the number of nodes. Only some nodes are coupled in a P2P architectural network, and the present network can meet bandwidth needs. In the future, the number of nodes in BC will rapidly expand. Because of the enormous number of interconnections and broadcasts between nodes, broadcast storms can form quickly, consuming too much network capacity. As a result, the IoT network’s performance may be impaired, if not completely shut down []. Edge computing can handle dispersed node communication. The challenge of network bandwidth needs for large-scale deployment of BCs is expected to be overcome in IoT [].

3.3.6. Cryptographic Mechanism

The PoW algorithm is utilized to build the consensus process in the public BC. Although the PoW mining method overcomes the problem of transaction steadiness, it wastes many resources. Mining incentives can also result in extremely concentrated mining pools. With just seven transactions per second, the decentralized architecture provides a long-term consensus period []. The BFT algorithm is used to create the consensus mechanism in the BC consortium, which overcomes the problem of the PoW method’s low efficiency and excessive resource consumption. For complete P2P communication monitoring of aberrant activity, the BFT algorithm offers a high number of signature verifications. However, communication complexity is substantial, resulting in system overhead [].
When employing BC, the private key is considered as the IoT device’s identification and security credential, produced and managed by the IoT device rather than third-party organizations. Because the Elliptic Curve Digital Signing Algorithm cannot create enough arbitrariness, it can lead to a vulnerability where an attacker may obtain the user’s private key []. The user’s private key cannot be restored after it has been lost. If the user’s private key is obtained by attackers, the user’s BC account is vulnerable to tampering. Because the BC is not reliant on any centralized third-party entities, it is impossible to follow the criminal’s activities and retrieve the changed BC information if the user’s private key is taken.
Ethereum and Bitcoin, as the top BC platforms, are not well suited to meet the demands of a large number of users, since they can only guarantee a modest maximum number of transactions. As a result, sharding techniques, as well as off-chain and side-chain techniques, have already demonstrated a high level of potential for addressing scalability issues. For BC applications, privacy is also a sensitive and crucial subject. All transaction data are publicly accessible in public BCs; nevertheless, openness in BC must be balanced with the security of personal and sensitive data. BCs of the private and consortium types alleviate this problem; however, they limit user access, limiting decentralization. The security degree of BC is determined by the consensus technique employed. For example, PoW-based consensus is subject to a 51% attack, but BFT-based consensus is vulnerable to a 33% attack. Small BCs with fewer users are more vulnerable to these attacks, whereas large BCs can provide far greater security but suffer from power centralization and hashing. As a result, for certain use-cases, an optimal tradeoff should be implemented. The BC community is working on improving and adapting consensus procedures to make them more efficient and secure [].

3.3.7. Cryptographic Keys

To provide privacy and security in a BC, public-key cryptography is required. However, the limited resources IoT devices fail to meet the computational requirements of contemporary safe cryptographic methods. When used on IoT devices, asymmetric cryptography based on RSA is particularly sluggish and energy-intensive. As a result, not only should the computing load and memory be considered when selecting a cryptographic system, but also the amount of energy spent []. Most IoT devices cannot use the current RSA key sizes. Since the failure of 768 bit and 1024 bit RSA implementations in 2010, a 2048-bit key is a minimum size considered safe. Although it is conceivable, using a 2048 bit certificate with an ephemeral key exchange technique imposes significant overhead and computation requirements that are impossible to meet on the restricted hardware [,].
Elliptic Curve Cryptography (ECC) (where cryptographic keys can be generated more efficiently, smaller, and quicker using Elliptic Curve Theory-based PKI), on the other hand, is a significantly lighter substitute to RSA. ECC has previously been demonstrated to beat the power consumption and speed of RSA when used on resource-limited systems []. Hash functions are particularly important in BC since they are used to sign transactions. As a result, hash functions must be safe in IoT applications (i.e., they must not produce collisions), be quick, and spend as little energy as feasible []. SHA-256d, SHA-256, and Scrypt (an algorithm that makes big attacks on the hardware more expensive by requiring substantial memory) are the most common BC hash algorithms (used by Litecoin, Gridcoin, and Dogecoin) []. SHA-256’s performance has been tested on a variety of IoT devices, including wearables. Researchers that looked at the footprint and energy need of SHA-256 in ASICs concluded that using Advanced Encryption Standard (AES) is more efficient. Other researchers recommended utilizing ciphers such as Simon because of the power restrictions, but more research and practical evaluations of real-world BIoT applications are still required [,].

3.3.8. Learned Lessons

According to our study, various elements can cause technical challenges, including communication and bandwidth, cryptographic mechanisms and algorithms, heterogeneity of IoT devices, and smart contract architecture. Despite several solutions provided to address these challenges, mining remains a major issue in the IoT due to its limitations. A smart contract code is typically not upgradeable; furthermore, more BC nodes will increase exponentially in the near future limiting the bandwidth, and BC is built on the assumption of steady connections, which is not feasible for IoT, which frequently has poor network connections.

3.4. BC-Based Scalability

Scalability refers to the capacity of BC’s IoT environments to operate without sacrificing QoS as the number of IoT devices grows []. BC-based transactions, unlike standard transactions, are implemented in every single node and ledger. Shared ledgers will become safer and more scalable for data storage if the BC is implemented. However, numerous challenges must be addressed, including the ledger storage facility, limited technological progress, a qualified staff, a lack of standards, time fluctuations and processing speed, computing capacity, and scalability challenges [,]. An interesting research topic in BC-based systems is storage []. Scalability in the context of BCs relates to several factors, including storage, block size, and transaction cost. Table 9 highlights the solutions recommended addressing scalability challenges.
Table 9. Recommendations for reducing the negative impact of scalability challenges.

3.4.1. Storage

Storage is one of the main issues of the integrated architecture between IoT and BC. For instance, to add a new node, all the previously used nodes need to store the complete chain to validate the new node because the underlying BC framework is constantly becoming larger, which makes it a complex and error-prone process []. Every member in the BC network keeps a local copy of the entire distributed ledger. When a new block is verified, it is broadcast over the whole P2P network, and each node adds the approved block to its ledger. This places a strain on the storage capacity available to IoT devices. If 1000 users trade a single 2 MB image every day in a BC application, a BC node would require around 730 GB annually []. As a result, when BC works with IoT data, the difficulty is to manage the growing data storage requirements. Moreover, unlike traditional paradigms, cryptographic algorithms must be constrained to function within the restricted storage capacity of IoT devices. The storage requirements for broadcasts necessary for exchanging keys must be met to ensure effective employment of communication protocols and security for IoT []. One of the consequences of a BC-enabled environment is that accounting ledgers may need to be kept for an infinite period. This necessitates offloading accounting data from IoT devices to local or distant servers in the case of IoT devices. Although storage prices are continually decreasing, solution providers must select where and when these data are kept [].
Filtering, compressing, and normalizing IoT data have been recommended using several approaches. Saving data supplied by the IoT is useful on many levels since it covers target services, communication, and embedded devices. Data compression reduces the amount of time it takes to process, transmit, and store created data. Furthermore, as demonstrated by Bitcoin-NG, BC’s consensus mechanism, which generates bottlenecks, may be changed to increase bandwidth and minimize transaction latency, leading to better IoT transitions []. Another concept is to merge the BC with the current P2P storage, which enables storing huge amounts of data off the chain, to alleviate the storage problem. Using the DHT, the method creates off-chain storage. The raw data are kept on the DHT off-chain, with just the data references remaining on the BC. The SHA-256 hash is used as a reference. The InterPlanetary File System (IPFS) is a P2P dispersed file system that combines principles from earlier P2P systems such as BitTorrent protocol, DHT, Git, and self-certified filesystems. Filecoin acts as an incentive layer on top of IPFS to provide a completely distributed file storage system []. Desema, a decentralized service marketplace system based on Ethereum and IPFS, has been presented. Service metadata and big data are kept off-chain in the Desema system, with Ethereum merely storing data references [].

3.4.2. Block Size

The amount of storage and bandwidth available in BC is increasing all the time. This is due to the log’s increasing size and the increasing quantity of data it holds [,]. A freshly created transaction is validated by adding it to a block in the BC. The size of the block might impact the amount of time it takes to insert and validate data []. When it comes to the block size, the current platforms have taken different approaches. Bitcoin is one of the systems with the lowest block sizes, with block sizes capped at 1 MB []. Any block that exceeds this restriction is considered illegitimate. This restriction impacts the maximum number of transactions that may be included in each block, resulting in competition between transactions, favoring those with greater fees []. Multichain has increased this restriction to 32 MB block sizes, and they aim to expand it much more in the future []. Other platforms, like Ethereum and HLF, have chosen to use variable-length blocks [].

3.4.3. Cost and Transaction Fees

Public BCs are more expensive when it comes to transaction costs. Bitcoin, for example, is thought to have a rather high transaction cost. This is hardly surprising, given that the nodes participating in the process of reaching a distributed consensus must be compensated financially. Ethereum’s costs are smaller than Bitcoin’s, yet they still add up to a significant amount. A user can reduce fees by combining numerous transactions into one bigger transaction. Because the nodes in permissioned BCs know each other, obtaining a distributed consensus is not as CPU-intensive; alternatively, less expensive protocols may be employed. In fact, in the vast majority of situations, the costs may be agreed upon in advance by the participants [].
When it comes to design, the cost is a delicate topic. The cost is made up of two parts: design and operation. The cost of implementing and running a BC-based system, on the other hand, remains unknown []. Other than Bitcoin BC, there are few BC systems in full production at the moment. It is impossible to estimate the cost of implementing and running a system based on BC at scale. As a result, focused studies to determine the possible cost of a BC-based system are required. Simulating and evaluating the BC-based system such as NYUAD, City of Things, and SmartSantander is one option []. High costs for IoT systems are inconvenient. Tangle, an IOTA framework, might help to overcome this problem in part [].

3.4.4. Learned Lessons

According to this research, the three parameters that determine the scalability of BIoT are storage, transaction cost, and block size. Several solutions have been offered to overcome scalability difficulties, but the off-chain technique may be the most promising solution, mainly for off-chain computation and storage in FC, where a big number of resources is dispersed and can give sufficient capacity for devices to conduct compute-intensive jobs in real-time. FC, on the other hand, does not include infinite storage. That is, because of the massive volume of data generated by BIoT applications, FC will be insufficient to handle it, at least in its current form and capabilities.

3.5. Computational Processing

Although IoT devices’ processing capabilities are improving, participating as a node capable of contributing a transaction to a BC is still computationally demanding. IoT devices have limited resources. These devices often have limited computational capabilities, weak network connectivity, low battery capacity, and limited storage. BCs, on the other hand, have their unique set of criteria. Because BC data are large, it is impossible to keep the entire BC in each IoT device, especially since the IoT creates vast amounts of data in real-time, exacerbating the problem []. In most circumstances, the devices function normally for a length of time before changing due to a variety of factors such as disconnection, short circuits, and program obsolescence. The following discussion goes over these challenges. Most IoT devices are short of the computing capacity needed to perform the computations required to interact with BC directly []. Computational processing in the context of BCs relates to several factors, time latency, power, and transaction throughput. Table 10 highlights the solutions recommended to addressing computational challenges.
Table 10. Recommendations for reducing the negative impact of computational challenges.
Resource management is a significant concern for the IoT. A matching contract for resource provisioning is utilized in this distributed integration system to couple a resource request with a resource offer. It identifies the characteristics of computing resources related to CPU type, disk space, and RAM, and it executes the pairing with various regulations. Add-on devices that provide specific processing capabilities are increasingly becoming accessible, even if the IoT device itself does not have the requisite computational capability []. The Intel Movidius neural computing stick, for example, integrates deep neural networks in hardware for tasks such as filtering and object identification. Moreover, feasible solutions will include data chunking or the detection of indicators such as departures from predicted thresholds. More computational power is necessary for IoT or edge-of-network devices to accomplish such processing []. Due to resource limits, consensus mechanisms must be redesigned to be energy-efficient and lightweight, as well as improved energy collecting strategies [].

3.5.1. Time

Latency refers to the length of transaction processing time []. The growing number of nodes and transactions may result in an increase in the mining and validating block’s time. Even while public BCs can help speed up the insertion of a new block, it is still challenging to add blocks at the pace that IoT data are created []. The latency limitation has a substantial impact on scalability capabilities []. In addition to processing at local nodes, data transmission across nodes contributes to the latency. The latency of the BC network is determined by both of these delays. Forking is caused by latency caused by propagation delays. A miner who is not a broadcasting miner may broadcast their block in a network before receiving another miner’s block. Miners can own several blocks as a result of the forking effect []. In healthcare, authenticating a block takes around 10 min, which might compromise security countermeasures during that time. Because any delay might affect exam analysis, healthcare systems must be flexible and available at all times []. BC transactions need time to be processed, which will lead to extra latency once applied in BIoT [].
Feasible solutions may include data chunking or the detection of indicators such as departures from predicted thresholds. Propagation delay must be kept to a minimum to avoid the forking effect. The closest neighbor selection (CNS) technique was utilized in [] to decrease the propagation latency in the BC network. Another method of avoiding the forking impact is to utilize acknowledgment when a new block is received, to signal whether or not forking has happened []. Following the fork, the process of block generation is restarted. This procedure repeats itself until the block is updated without forking. Because there is a chance of a rollback if a lengthy chain does not include the necessary block in the future, the forking effect produces probabilistic confirmation of transactions [].

3.5.2. Power

Computational power is necessary for IoT devices to execute the consensus process. BC is built on the assumption of steady network connections, which frequently have weak network IoT device connections or an unstable network owing to node failure due to battery life, for instance. Moreover, the consensus technique needs a large amount of computational power, which costs energy, making it impractical for low-power IoT devices []. Mining devices’ hardware necessitates substantial computing power, which raises the cost of implementation and limits the design options for device kinds. For example, the PoW is deemed costly in terms of computing power and storage requirements []. According to Ghosh Bouri [], up to January 2022, the worldwide Bitcoin yearly electricity consumption was about 130 TWh (terawatt-hours of energy), equating to around 75 megatons of carbon dioxide (MtCO2) annual emissions. High computational power is necessary to keep transaction data encrypted, which consumes substantial electricity power []. Despite the highly promising attempts to use different algorithms, these algorithms are still in their early stages. Other algorithms have limitations that some applications cannot tolerate; this may motivate the research community to seek out other alternatives to the PoW algorithms while maintaining the excellent security and dependability that PoW provides. As a result, studying energy-efficient consensus techniques for BC systems is intriguing [,].

3.5.3. Throughput

Throughput refers to the maximum processed number of transactions in a given amount of time. The throughput is calculated by dividing the number of transactions per second by the number of concurrent workloads and IoT nodes. IoT gadgets create terabytes of data in real time, but BC is not intended to store that much data []. Only a few transactions per second are processed by some BCs such as Bitcoin. This is undeniably a constraint for BIoT systems. Implementing consortiums or private BCs may help in this case []. Quick synchronization of new Blocks across BC nodes necessitates more bandwidth, which can enhance BC throughput. As a result, increasing BC throughput due to numerous transactions in IoT systems is a difficulty []. The BC implementation architecture, on the other hand, needs the execution of a huge number of transactions each minute. This makes BIoT integration challenging in either way.
Although Bitcoin is one of the most popular platforms, it is also one of the least scalable, due to the PoW algorithm and blocks size limitations, which result in a low transaction rate []. While Ethereum’s smart contracts, which allow for the execution of sophisticated logic, enable a wide range of transaction types and block sizes, transaction validation still takes a long time []. Public permissioned systems can manage significantly greater transaction rates; HLF can handle 100,000 transactions per second []. In terms of transaction rates, private BCs offer no benefit over public permissioned BCs. Multichain, on the other hand, has the benefit of being Bitcoin-compatible [,]. As a result, appropriate schemes must be carefully devised to enhance the throughput of BC systems while keeping sufficient security to handle billions of IoT devices and sustain a large number of real-world transactions. Many ways to enhance the throughput of BC systems have now been proposed [,,,,].
  • Segregated witness, commonly known as SegWit, is where digital signatures are separated from the rest of the transactions and moved to the end of the block. As a result, transaction sizes are smaller, and one block may carry more transactions.
  • Off-chain transactions: Here, if nodes make several transactions, off-chain micropayment channels are formed between them to carry out serval transactions off the chain rapidly, and BC only processes the final payment transaction.
  • Sharding is a useful method for enhancing the horizontal scalability of BC systems. Nodes are partitioned into shards using BC sharding. Only a tiny percentage of all transactions are processed by each shard. Transactions are handled in parallel in this manner. Two examples of sharding BC systems are Elastico and OmniLedger.
  • Reduced block interval time: Block generation in BC systems consists of two processes: transaction serialization and leader selection. The selection of one or more leader nodes is the responsibility of the leader election. Transaction serialization refers to the validation of transactions and the generation of new blocks by the chosen leader nodes. Leader nodes are picked at a low pace to reduce collisions during leader elections. Every 10 min, for example, the Bitcoin BC leader node is chosen. Each leader election in a typical BC system can only create one new block. Transaction validation and block creation are delayed due to the connection of leader election and transaction serialization. Rapid transaction serialization and slow leader selection need to be separated to minimize block interval time and enhance throughput. Many alternatives, including ByzCoin, Bitcoin-NG, and Solida, have incorporated the concept.
  • Systems based on TDAG: TDAG is the next step of BC’s development. In a TDAG-based system, transactions are immediately added to a graph, creating a graph of transactions. IOTA is an example of a TDAG system. IOTA’s underlying technology is Tangle. When a new transaction is added to the IOTA Tangle, it selects between two prior transactions to approve. When a transaction is authorized by a large number of other transactions, it is said to be confirmed. Because transactions are added quickly in blocks, IOTA outperforms traditional BC systems in terms of throughput.

3.5.4. Learned Lessons

According to this article, the three factors controlling the computational processing of BIoT applications are response time, power, and transaction throughput. Because of their considerable networking overheads and performance, BCs are limited in their applicability across constrained IoT devices. A possible approach is end-to-end communications over the BC, by employing computationally capable IoT gateways. However, the challenge in this manner is getting users to transmit their transactions to the gateways without depending on a centralized system. On the other hand, off-chain solutions may increase functionality by transmitting data outside the chain to reduce latency. Moreover, the collaborative design with FC may be useful, in which FC server can conduct the heavy operation and enhance the response time. Yet, privacy and security will be other issues of off-chain computational services.

3.6. Regulations and Guidelines

There is a lack of regulation when it comes to BC-related applications and operations. To ensure the continued and robust growth of the BC ecosystem, we need competent and consistent rules and regulations. Regulations in the context of BCs relate to several factors, including lack of standards, incentive and punishment mechanisms, and lack of awareness. Table 11 highlights the best practices for addressing guidelines and governance challenges.
Table 11. Recommendations for reducing the negative impact of regulations challenges.

3.6.1. Lack of Standards

Regulators face several challenges as a result of BC’s creative nature. The existing centralized regulatory structure, however, is incompatible with the BC decentralized model, particularly for public networks, because territorial rules are an issue. BC may have some illegal content data stored on this architecture, which may lead to legal complications for all the members of the architecture including the miners [,]. The smart contract used in BIoT does not follow any legal informants outside the transacting groups. Therefore, it makes the integration exposed to many attacks that cannot be followed by law enforcement and will lead to conflicts among transacting groups. However, a government or another authority might use smart contracts to integrate laws and legislations into the source code to control block-related matters as part of a BC agreement [].
Interoperability is critical for allowing communication across different BC networks. Although the lack of standards in BC benefits developers, it creates substantial communication challenges owing to a lack of interoperability. The availability of various BC networks with various consensus models, transaction processes, and smart contract functionality is a big barrier to interoperability []. Using existing standards in BC networks is one option for dealing with this problem. For example, in their BC-based supply chain operations, IBM and Microsoft use GS1-based data standards to ensure compatibility []. Another option is to create new standards []. The Enterprise Ethereum Alliance (EEA), for example, has released a standard version of the Ethereum BC.
The International Organization for Standardization (ISO) has established and developed several BC and distributed ledger projects since 2016 []. This investigation is only the beginning of the process of ensuring that the BC and the regulations are in sync. Both the industry authorities and the governments face difficulty in figuring out how to enhance the lawful conduct of BCs and associated technology. Japan, Singapore, and Switzerland are among the nations considering BC-friendly laws []. However, because each distributed ledger has no central management, worldwide standards should be developed. The European Union Parliament has previously passed a BC resolution titled “Distributed ledger technologies and BC: fostering trust via disintermediation”. Furthermore, the International Association for Trusted Blockchain Applications (IATBA) was founded, bringing together BC vendors and users from around the world with representatives from governmental and standard-setting bodies. Therefore, policymakers can intervene in the BIoT industry by developing security and privacy norms and standards [].

3.6.2. Incentive and Punishment Mechanisms

Different incentive strategies are employed to mine blocks in BC networks. PoW is used by some, whereas PoS is used by others. There are, however, several other algorithms. Mining rewards and the payout for executing a contract are the incentive mechanisms used in BCs. Choosing the right reward for the BC application is a delicate matter that has ramifications for nodes and miners []. To demonstrate the problem, the first miner who solves the puzzle of PoW will be paid a specific quantity of bitcoins in Bitcoin BC []. It may be presumed that nodes are self-interested; thus, incentive mechanisms are required to incentivize these nodes to donate their efforts to data verification. In cases where a collection of nodes generates blocks collectively, the allocation of rewards among these nodes must be properly structured []. Punishment mechanisms, on the other hand, are required for BC systems to avoid double-spending attacks and penalize malevolent nodes. The confirmation time is one approach, which means that a node’s economic incentives can only be used after a substantial confirmation period. Once a poison transaction is discovered within the confirmation period, the malicious node’s economic incentives will be nullified. Another option is to make use of the deposit. Nodes must deposit BC systems before they may create new blocks. The nodes are punished and lose a portion of their deposit if a poison transaction occurs. This method relies heavily on a proper deposit amount. If the deposit is too little, malicious nodes will be unaffected. Acting as a node to produce new blocks is costly if the deposit is too big, and a casual node is incapable of doing so, resulting in centralization. As a result, efficient reward and punishment systems must be properly devised to attract more companies and individuals to engage in BC-based smart cities [].

3.6.3. Lack of Awareness

Nodes were not intended to locate one another since BC was not developed for the IoT from the start []. BIoT integration is affected by the level of knowledge and awareness about both technologies, BC and IoT, which is very low in most of the domains, as the distance between what people in different domains know and the cutting edge of industrial technology continues to increase []. Furthermore, materials that provide an integrated picture of new technologies such as cloud computing, IoT, security, encryption, and BC are severely lacking. Accordingly, the National Security Agency in the United States has been financing efforts to provide teaching materials in cybersecurity-related subjects [].
To allow the use of BC technology in the healthcare industry, a cultural transformation is necessary. The majority of existing healthcare systems are centralized and manual, making them vulnerable to data breaches and single points of failure. On the other hand, in the present BC scene, there are not enough individuals who are sufficiently educated or equipped to manage sophisticated P2P networks [,]. The demand for BC-related employment has risen by about 2000% in the past few years. Finding skilled coders, on the other hand, has become a major issue. Because BC technology is still in its infancy, it will take time for the development community to embrace it [].

3.6.4. Learned Lessons

According to this article, the regulations and guidelines concerns of BIoT are characterized by a lack of standards, regulations, awareness, and incentive and punishment policies. Despite its security characteristics, BC use is restricted because of a lack of norms and regulations. For instance, attackers might use exploitable gaps in smart contracts to launch assaults like the DAO hack [].

3.7. BIoT Design

IoT may benefit from BC technology in a variety of ways. However, because they were not designed specifically to support IoT contexts, different BC components must be tuned to make them suitable for such settings [,]. IoT applications create substantial traffic; thus, the design of BIoT apps needs to be tailored to handle it. In this section, we discuss the BIoT architectures and BC platforms that enhance BIoT integration. Table 12 highlights the solutions recommended for addressing design challenges.
Table 12. Recommendations for reducing the negative impact of design challenges.

3.7.1. BIoT Architecture

The architecture supporting a BC needs to be tailored to the volume of traffic generated by IoT applications. Such an issue is more prevalent in classic cloud-based architecture, in which the node uses IoT gateways to send data to the cloud []. Traditional cloud-based IoT designs have several flaws such as the potential to disrupt the whole network by executing DoS attacks if only one device is compromised [,]. Traditional cloud-based IoT designs rely on the cloud; however, the degree of reliance varies greatly in practice. There are additional gateways that do more complex functions (for example, sensor fusion), although, in most cloud-based applications, the majority of the processing is conducted in the cloud [,]. The architectural issues connected with BIoT service providers have been examined in several designs suggested in the literature. Liao et al. [] examined four architectures, including totally distributed, distributed things, fully centralized things, and faux distributed things. In most situations, the completely distributed design must be followed by BIoT architectures; however, in cases of cost or power constraints, alternate techniques may be appropriate. Dorri et al. [] presented a hypothetical lightweight architecture for BIoT applications that reduce the communication overhead caused by BC. The suggested architecture is separated into three layers: smart home layer, shared storage layer, and cloud layer for distant storage.
Regardless of the architecture described above, the BIoT design should take into account the limits and problems mentioned above. The BC-based theoretical architecture should consider delivering services and connecting heterogeneous IoT devices. This approach is based on a service discovery system that is built using multilayered hierarchical BC. Accordingly, the BC process should be converted to a more competent layer, such as the fog layer [,,,], edge and cloud layers [,,], cloud layer [], or SDN layer [,]. Li et al. [] proposed a multilayered IoT design that aimed to reduce the complexity of BC deployment by establishing multiple layers in the IoT ecosystem and employing one BC at each level. Samaniego et al. [] provided another solution to the challenge of hosting a BC on typical IoT hardware that is resource-restricted. It looked at how FC and cloud computing architectures may be used in BIoT applications. The FC systems beat cloud-based systems in terms of latency reaction time under heavy transmission loads, according to the system’s empirical performance evaluation. Another edge-based computing architecture was proposed by [], in which the IEC 61,499 standard was used to create distributed and hierarchical platforms. To govern the fog nodes, the authors of [] recommended using SDN for BIoT applications. Cloud computing is used to conduct computationally heavy activities, and FC is used to give low-latency data access. According to the findings, the suggested design improves throughput, reduces delays, and identifies numerous real-time IoT network threats. In the fog layer, the authors of [] developed a lightweight system on the basis of an SDN network. They developed a pBC network among the devices to solve the security problems in the centralized design of SDN.

3.7.2. Blockchain Platform

As discussed in Section 2.2 and Table 2, many features of BC platforms differ, such as the level of security, privacy, and scalability. For example, Bitcoin and Ethereum are not designed to achieve the demands of a high user number, since they can only guarantee a low maximum number of transactions [,]. Both Bitcoin and Ethereum are connected to a 51% attack level, whereas HLF and Multichain are tied to a 33% attack level. The first stage in recommending a BC-based solution for a project is to assess if a BC-based solution is feasible given the project’s needs. Several elements are used to assess if a BC use case is valid [] including the necessity for data to be exchanged among several parties without the need of a centralized middleman, the immutability of information, access permissions, the visibility and availability of shared history ledger-data to the participants, good transparency or audit trail for each participant, if the project involves a long-running, repetitive process that may be mechanized and coordinated using BC, and if the project’s requirements are not met by the centralized ledger.
Moreover, the IoT’s heterogeneity and limits should also be considered in smart contracts. Smart contracts should be used in conjunction with filtering and grouping techniques to enable apps to handle the IoT. A discovery technique might allow for device addition on the fly, enhancing the power of these apps. Lastly, smart contract-based actuation methods would allow for speedier IoT responses []. Accordingly, different varieties of BCs will need to be adjusted for different purposes. Furthermore, when customers wish to combine IoT devices and BC, the first step is to determine which BC best meets their needs. As a result, a technique for testing different BCs is required.

3.7.3. Learned Lessons

The BIoT architecture and BC platforms used, according to this article, characterize the BIoT design-related challenges. BC is a distributed design that adds new data using a distributed consensus mechanism. Since IoT devices produce huge levels of traffic, merely employing public BCs in IoT applications is not a feasible option. Other authors suggested using FC and SDN to process BC including utilizing FC and SDN. Other suggestions included utilizing various BC platforms based on BIoT applications. As a result, different BC kinds were not altered for various applications. In addition, the first step in BIoT integration will be to figure out which BC is suitable for them. Hence, a method for evaluating various BCs is needed.

5. Discussion and Limitations

This paper reviewed the available literature to give readers a thorough grasp of the issues surrounding BIoT integration. We did this by responding to three study questions: What difficulties does BIoT integration now face? (RQ1) What suggestions have been made in the literature to address these issues? (RQ2) What are the following issues and research directions for integrating the BIoT? (RQ3). This paper contributes by offering a thorough analysis and synthesis of all BIoT problems found in the literature, as stated in Section 2.4. This paper offers a comprehensive assessment of all potential issues from all known BIoT applications, in contrast to earlier survey studies that only revealed select BIoT challenges based on specific BIoT applications. There were seven categories of challenges totaling 28 challenges. the current best practices were also outlined. Future issues of BIoT integration were also identified and discussed.
Big data analysis, AI, quantum computing, double-chained IoT security scheme, interoperability of IoT and BC, and integration of IoT, BC, and edge computing were the seven future problems mentioned in this article. Future issues will take on a new dimension as a result of these tendencies. For instance, even though many authors mentioned integrating the IoT with other layers such as edge or fog computing, these technologies also have their own issues that should be taken into account when implementing the IoT, such as scalability, interoperability, and the absence of industry standards among different providers. Quantum computing will also pose a serious threat to all already employed security solutions, including BC technology. Therefore, while adapting these countermeasures to the IoT age, future research and industry ideas should take this into account.
According to an examination of related literature, it was determined that BIoT integration may take many different shapes and designs, depending on the desired goal, application, and difficulties. In addition, the studies that were examined offered a range of approaches to address some of these issues. Others focused on minimizing specific problems, while others focused on the overall architectural perspective necessary for the integration. As a result, there is a growing requirement for an efficient design that considers the integration process’s obstacles, such as IoT device limitations, privacy, security, and big data analytics. In addition, the best approach for facilitating proper smart contract implementation should be studied. In addition, several other academics have used the integration as a platform for deploying specific applications. Many issues, however, still require additional investigation and answers. Since BC technology is recent and still evolving, data are scarce (e.g., out of date or unavailable due to the rapid and continuous development process), and IoT implementations are still in the early stages. As a result, the data and knowledge we were able to collect from online accessible databases for each platform limited our comprehensive comparison. We concentrated on the most common platforms. Lastly, we did not conduct any real-world tests to ensure that the reported transaction speed was comparable to that stated in the reported studies.

6. Conclusions

As the age of information technology draws to an end, the emerging BC technology and knowledge automation are expected to dominate smart technology in the future. The technological properties of BCs, as well as their development potential, have long been recognized for their far-reaching influence on the actual world. Since Bitcoin’s rise to prominence, the BC has quickly progressed, which will change the IoT environment and help other technologies and sectors. The state of the art of BIoT-related problems was evaluated in this article. We went through the history of BC, as well as its characteristics, structure, and platforms. Following that, we presented existing BioT integration difficulties, as well as suggested solutions.
Despite ongoing efforts to develop a successful BIoT integration, several challenges restrict appropriate implementation, as well as the integrated system’s application range to ensure its optimal use. Security, privacy preservation, technological concerns, scalability, computational processing, regulations, and BIoT design are the seven categories of challenges we found. Future BIoT problems and research directions were also discussed. Lastly, future BIoT integration trends and developments were explored. By providing more information on the present and potential future barriers that should be taken into account in BIoT integration, the findings of this study may be helpful to practitioners and researchers in the field of BIoT.

Author Contributions

Conceptualization, Y.I.A. and A.A.-A.; methodology, Y.I.A. and H.K.; validation, A.J., A.A.-A. and H.K.; formal analysis, Y.I.A.; writing—original draft preparation, Y.I.A.; writing—review and editing, A.J., A.A.-A. and H.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable, the study does not report any data.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Elbasi, E.; Topcu, A.E.; Mathew, S. Prediction of COVID-19 risk in public areas using IoT and machine learning. Electronics 2021, 10, 1677. [Google Scholar] [CrossRef]
  2. Thakur, N.; Han, C.Y. Indoor localization for personalized ambient assisted living of multiple users in multi-floor smart environments. Big Data Cogn. Comput. 2021, 5, 42. [Google Scholar] [CrossRef]
  3. Alzoubi, Y.I.; Osmanaj, V.H.; Jaradat, A.; Al-Ahmad, A. Fog computing security and privacy for the internet of thing applications: State-of-the-art. Secur. Priv. 2021, 4, e145. [Google Scholar] [CrossRef]
  4. Fernández-Caramés, T.M.; Fraga-Lamas, P. A review on the use of blockchain for the internet of things. IEEE Access 2018, 6, 32979–33001. [Google Scholar] [CrossRef]
  5. Ismail, S.; Almayouf, R.; Chehab, S.; Alghamdi, S.; Almutairi, A.; Alasmari, B.; Altherwy, R. Edge IoT-cloud framework based on blockchain. In Proceedings of the 2020 2nd International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia, 13–15 October 2020; pp. 1–7. [Google Scholar]
  6. Powell, W.; Foth, M.; Cao, S.; Natanelov, V. Garbage in garbage out: The precarious link between IoT and blockchain in food supply chains. J. Ind. Inf. Integr. 2022, 25, 100261. [Google Scholar] [CrossRef]
  7. Al-Ahmad, A.S.; Kahtan, H. Cloud computing review: Features and issues. In Proceedings of the 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE), Shah Alam, Malaysia, 11–12 July 2018; pp. 1–5. [Google Scholar]
  8. Abdelmaboud, A.; Ahmed, A.I.A.; Abaker, M.; Eisa, T.A.E.; Albasheer, H.; Ghorashi, S.A.; Karim, F.K. Blockchain for IoT Applications: Taxonomy, Platforms, Recent Advances, Challenges and Future Research Directions. Electronics 2022, 11, 630. [Google Scholar] [CrossRef]
  9. Bala, K.; Kaur, P.D. Changing trends of blockchain in IoT: Benefits and challenges. In Proceedings of the 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 27–28 January 2022; pp. 324–329. [Google Scholar]
  10. Brotsis, S.; Limniotis, K.; Bendiab, G.; Kolokotronis, N.; Shiaeles, S. On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance. Comput. Netw. 2021, 191, 108005. [Google Scholar] [CrossRef]
  11. Al Sadawi, A.; Hassan, M.S.; Ndiaye, M. A survey on the integration of blockchain with IoT to enhance performance and eliminate challenges. IEEE Access 2021, 9, 54478–54497. [Google Scholar] [CrossRef]
  12. Hu, S.; Huang, S.; Huang, J.; Su, J. Blockchain and edge computing technology enabling organic agricultural supply chain: A framework solution to trust crisis. Comput. Ind. Eng. 2021, 153, 107079. [Google Scholar] [CrossRef]
  13. Bhushan, B.; Khamparia, A.; Sagayam, K.M.; Sharma, S.K.; Ahad, M.A.; Debnath, N.C. Blockchain for smart cities: A review of architectures, integration trends and future research directions. Sustain. Cities Soc. 2020, 61, 102360. [Google Scholar] [CrossRef]
  14. Nakamoto, S.; Bitcoin, A. A peer-to-peer electronic cash system. Bitcoin 2008, 4, 2. [Google Scholar]
  15. Li, X.; Lu, W.; Xue, F.; Wu, L.; Zhao, R.; Lou, J.; Xu, J. Blockchain-Enabled IoT-BIM Platform for Supply Chain Management in Modular Construction. J. Constr. Eng. Manag. 2022, 148, 04021195. [Google Scholar] [CrossRef]
  16. Rayes, A.; Salam, S. The Blockchain in IoT. In Internet of Things from Hype to Reality; Springer: Berlin/Heidelberg, Germany, 2022; pp. 277–303. [Google Scholar]
  17. Alzoubi, Y.I.; Al-Ahmad, A.; Jaradat, A. Fog computing security and privacy issues, open challenges, and blockchain solution: An overview. Int. J. Electr. Comput. Eng. 2021, 11, 5081–5088. [Google Scholar] [CrossRef]
  18. Khan, N.S.; Chishti, M.A. Security challenges in fog and IoT, blockchain technology and cell tree solutions: A review. Scalable Comput. 2020, 21, 515–542. [Google Scholar] [CrossRef]
  19. Aloqaily, M.; Bouachir, O.; Boukerche, A.; Al Ridhawi, I. Design guidelines for blockchain-assisted 5g-uav networks. IEEE Netw. 2021, 35, 64–71. [Google Scholar] [CrossRef]
  20. Alzoubi, Y.I.; Al-Ahmad, A.; Jaradat, A.; Osmanaj, V.H. Fog computing architecture, benefits, security, and privacy, for the internet of thing applications: An overview. J. Theor. Appl. Inf. Technol. 2021, 99, 436–451. [Google Scholar]
  21. Qatawneh, M.; Almobaideen, W.; AbuAlghanam, O. Challenges of blockchain technology in context internet of things: A survey. Int. J. Comput. Appl. 2020, 175, 14–20. [Google Scholar] [CrossRef]
  22. Baouya, A.; Chehida, S.; Bensalem, S.; Bozga, M. Fog computing and blockchain for massive IoT deployment. In Proceedings of the 9th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro, 8–11 June 2020; pp. 1–4. [Google Scholar]
  23. Srivastava, A.; Dashora, K. Application of blockchain technology for agrifood supply chain management: A systematic literature review on benefits and challenges. Benchmarking Int. J. 2022. [Google Scholar] [CrossRef]
  24. Arslan, S.S.; Jurdak, R.; Jelitto, J.; Krishnamachari, B. Advancements in distributed ledger technology for internet of things. Internet Things 2020, 9, 100114. [Google Scholar] [CrossRef]
  25. Ali, M.S.; Vecchio, M.; Pincheira, M.; Dolui, K.; Antonelli, F.; Rehmani, M.H. Applications of blockchains in the internet of things: A comprehensive survey. IEEE Commun. Surv. Tutor. 2018, 21, 1676–1717. [Google Scholar] [CrossRef]
  26. Xie, J.; Tang, H.; Huang, T.; Yu, F.R.; Xie, R.; Liu, J.; Liu, Y. A survey of blockchain technology applied to smart cities: Research issues and challenges. IEEE Commun. Surv. Tutor. 2019, 21, 2794–2830. [Google Scholar] [CrossRef]
  27. Zafar, S.; Bhatti, K.; Shabbir, M.; Hashmat, F.; Akbar, A. Integration of blockchain and Internet of Things: Challenges and solutions. Ann. Telecommun. 2022, 77, 13–32. [Google Scholar] [CrossRef]
  28. Tsang, Y.; Wu, C.; Ip, W.; Shiau, W.-L. Exploring the intellectual cores of the blockchain–Internet of Things (BIoT). J. Enterp. Inf. Manag. 2021, 34, 1287–1317. [Google Scholar] [CrossRef]
  29. Huang, J.; Kong, L.; Chen, G.; Wu, M.-Y.; Liu, X.; Zeng, P. Towards secure industrial IoT: Blockchain system with credit-based consensus mechanism. IEEE Trans. Ind. Inform. 2019, 15, 3680–3689. [Google Scholar] [CrossRef]
  30. Sharma, P.K.; Park, J.H. Blockchain based hybrid network architecture for the smart city. Future Gener. Comput. Syst. 2018, 86, 650–655. [Google Scholar] [CrossRef]
  31. Ouaddah, A.; Abou Elkalam, A.; Ouahman, A.A. Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In Europe and MENA Cooperation Advances in Information and Communication Technologies; Springer: Cham, Switzerland, 2017; Volume 520, pp. 523–533. [Google Scholar]
  32. Alzubi, J.A. Blockchain-based Lamport Merkle Digital Signature: Authentication tool in IoT healthcare. Comput. Commun. 2021, 170, 200–208. [Google Scholar] [CrossRef]
  33. Rahulamathavan, Y.; Phan, R.C.-W.; Rajarajan, M.; Misra, S.; Kondoz, A. Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Bhubaneswar, India, 17–20 December 2017; pp. 1–6. [Google Scholar]
  34. Lu, Y. Blockchain and the related issues: A review of current research topics. J. Manag. Anal. 2018, 5, 231–255. [Google Scholar] [CrossRef]
  35. Jo, B.W.; Khan, R.M.A.; Lee, Y.-S. Hybrid blockchain and internet-of-things network for underground structure health monitoring. Sensors 2018, 18, 4268. [Google Scholar] [CrossRef] [Green Version]
  36. Yang, R.; Yu, F.R.; Si, P.; Yang, Z.; Zhang, Y. Integrated blockchain and edge computing systems: A survey, some research issues and challenges. IEEE Commun. Surv. Tutor. 2019, 21, 1508–1532. [Google Scholar] [CrossRef]
  37. Abdellatif, A.A.; Samara, L.; Mohamed, A.; Erbad, A.; Chiasserini, C.F.; Guizani, M.; O’Connor, M.D.; Laughton, J. MEdge-Chain: Leveraging edge computing and blockchain for efficient medical data exchange. IEEE Internet Things J. 2021, 8, 15762–15775. [Google Scholar] [CrossRef]
  38. Berdik, D.; Otoum, S.; Schmidt, N.; Porter, D.; Jararweh, Y. A survey on blockchain for information systems management and security. Inf. Process. Manag. 2021, 58, 102397. [Google Scholar] [CrossRef]
  39. Chang, Z.; Guo, W.; Guo, X.; Chen, T.; Min, G.; Abualnaja, K.M.; Mumtaz, S. Blockchain-Empowered drone networks: Architecture, features, and future. IEEE Netw. 2021, 35, 86–93. [Google Scholar] [CrossRef]
  40. Yuan, P.; Zheng, K.; Xiong, X.; Zhang, K.; Lei, L. Performance modeling and analysis of a hyperledger-based system using GSPN. Comput. Commun. 2020, 153, 117–124. [Google Scholar] [CrossRef] [Green Version]
  41. Yang, H.-K.; Cha, H.-J.; Song, Y.-J. Secure identifier management based on blockchain technology in NDN environment. IEEE Access 2018, 7, 6262–6268. [Google Scholar] [CrossRef]
  42. Rizzardi, A.; Sicari, S.; Miorandi, D.; Coen-Porisini, A. Securing the access control policies to the Internet of Things resources through permissioned blockchain. Concurr. Comput. Pract. Exp. 2022, 34, e6934. [Google Scholar] [CrossRef]
  43. Kuo, T.-T.; Zavaleta Rojas, H.; Ohno-Machado, L. Comparison of blockchain platforms: A systematic review and healthcare examples. J. Am. Med. Inform. Assoc. 2019, 26, 462–478. [Google Scholar] [CrossRef]
  44. Paulavičius, R.; Grigaitis, S.; Igumenov, A.; Filatovas, E. A decade of blockchain: Review of the current status, challenges, and future directions. Informatica 2019, 30, 729–748. [Google Scholar] [CrossRef]
  45. Lone, A.H.; Naaz, R. Applicability of Blockchain smart contracts in securing Internet and IoT: A systematic literature review. Comput. Sci. Rev. 2021, 39, 100360. [Google Scholar] [CrossRef]
  46. Reyna, A.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On blockchain and its integration with IoT. Challenges and opportunities. Future Gener. Comput. Syst. 2018, 88, 173–190. [Google Scholar] [CrossRef]
  47. Wang, S.; Ouyang, L.; Yuan, Y.; Ni, X.; Han, X.; Wang, F.-Y. Blockchain-enabled smart contracts: Architecture, applications, and future trends. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 2266–2277. [Google Scholar] [CrossRef]
  48. Griggs, K.N.; Ossipova, O.; Kohlios, C.P.; Baccarini, A.N.; Howson, E.A.; Hayajneh, T. Healthcare blockchain system using smart contracts for secure automated remote patient monitoring. J. Med. Syst. 2018, 42, 130. [Google Scholar] [CrossRef] [PubMed]
  49. Ghandour, A.G.; Elhoseny, M.; Hassanien, A.E. Blockchains for smart cities: A survey. In Security in Smart Cities: Models, Applications, and Challenges; Hassanien, A.E., Elhoseny, M., Ahmed, S., Singh, A., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 193–210. [Google Scholar]
  50. Wang, X.; Zha, X.; Ni, W.; Liu, R.P.; Guo, Y.J.; Niu, X.; Zheng, K. Survey on blockchain for internet of things. Comput. Commun. 2019, 136, 10–29. [Google Scholar] [CrossRef]
  51. Fotiou, N.; Siris, V.A.; Polyzos, G.C. Interacting with the Internet of Things Using Smart Contracts and Blockchain Technologies. In Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2018; Wang, G., Chen, J., Yang, L., Eds.; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2018. [Google Scholar] [CrossRef] [Green Version]
  52. Mercan, S.; Kurt, A.; Akkaya, K.; Erdin, E. Cryptocurrency solutions to enable micropayments in consumer IoT. IEEE Consum. Electron. Mag. 2021, 11, 97–103. [Google Scholar] [CrossRef]
  53. Pennino, D.; Pizzonia, M.; Vitaletti, A.; Zecchini, M. Blockchain as IoT Economy enabler: A review of architectural aspects. J. Sens. Actuator Netw. 2022, 11, 20. [Google Scholar] [CrossRef]
  54. Klein, M.; Stummer, C. Feeless micropayments as drivers for new business models: Two exemplary application cases. Front. Blockchain 2021, 4, 641508. [Google Scholar] [CrossRef]
  55. Pajooh, H.H.; Rashid, M.; Alam, F.; Demidenko, S. Hyperledger fabric blockchain for securing the edge internet of things. Sensors 2021, 21, 359. [Google Scholar] [CrossRef]
  56. Pincheira, M.; Antonini, M.; Vecchio, M. Integrating the IoT and Blockchain Technology for the Next Generation of Mining Inspection Systems. Sensors 2022, 22, 899. [Google Scholar] [CrossRef]
  57. Majeed, U.; Khan, L.U.; Yaqoob, I.; Kazmi, S.A.; Salah, K.; Hong, C.S. Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges. J. Netw. Comput. Appl. 2021, 181, 103007. [Google Scholar] [CrossRef]
  58. Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasubramanian, V. A survey on the adoption of blockchain in IoT: Challenges and solutions. Blockchain Res. Appl. 2021, 2, 100006. [Google Scholar] [CrossRef]
  59. Lashkari, B.; Musilek, P. A comprehensive review of blockchain consensus mechanisms. IEEE Access 2021, 9, 43620–43652. [Google Scholar] [CrossRef]
  60. Turk, Ž.; Klinc, R. Potentials of blockchain technology for construction management. Procedia Eng. 2017, 196, 638–645. [Google Scholar] [CrossRef]
  61. Kumar, N.M.; Mallick, P.K. Blockchain technology for security issues and challenges in IoT. Procedia Comput. Sci. 2018, 132, 1815–1823. [Google Scholar] [CrossRef]
  62. Pahl, C.; El Ioini, N.; Helmer, S. A decision framework for blockchain platforms for IoT and edge computing. In Proceedings of the IoTBDS 2018, Madeira, Purtogal, 19–21 March 2018. [Google Scholar] [CrossRef]
  63. Ferrag, M.A.; Derdour, M.; Mukherjee, M.; Derhab, A.; Maglaras, L.; Janicke, H. Blockchain technologies for the internet of things: Research issues and challenges. IEEE Internet Things J. 2018, 6, 2188–2204. [Google Scholar] [CrossRef] [Green Version]
  64. Alladi, T.; Chamola, V.; Parizi, R.M.; Choo, K.-K.R. Blockchain applications for industry 4.0 and industrial IoT: A review. IEEE Access 2019, 7, 176935–176951. [Google Scholar] [CrossRef]
  65. Lee, J.; Azamfar, M.; Singh, J. A blockchain enabled cyber-physical system architecture for industry 4.0 manufacturing systems. Manuf. Lett. 2019, 20, 34–39. [Google Scholar] [CrossRef]
  66. Wei, L.; Wu, J.; Long, C.; Lin, Y.-B. The convergence of ioe and blockchain: Security challenges. IT Prof. 2019, 21, 26–32. [Google Scholar] [CrossRef]
  67. Ahmed, S.; Shah, M.A.; Wakil, K. Blockchain as a trust builder in the smart city domain: A systematic literature review. IEEE Access 2020, 8, 92977–92985. [Google Scholar] [CrossRef]
  68. Ferrag, M.A.; Shu, L.; Yang, X.; Derhab, A.; Maglaras, L. Security and privacy for green IoT-based agriculture: Review, blockchain solutions, and challenges. IEEE Access 2020, 8, 32031–32053. [Google Scholar] [CrossRef]
  69. Rao, A.R.; Clarke, D. Perspectives on emerging directions in using IoT devices in blockchain applications. Internet Things 2020, 10, 100079. [Google Scholar] [CrossRef]
  70. Wang, Q.; Zhu, X.; Ni, Y.; Gu, L.; Zhu, H. Blockchain for the IoT and industrial IoT: A review. Internet Things 2020, 10, 100081. [Google Scholar] [CrossRef]
  71. Tseng, L.; Yao, X.; Otoum, S.; Aloqaily, M.; Jararweh, Y. Blockchain-based database in an IoT environment: Challenges, opportunities, and analysis. Clust. Comput. 2020, 23, 2151–2165. [Google Scholar] [CrossRef]
  72. Garay, J.; Kiayias, A.; Leonardos, N. The bitcoin backbone protocol: Analysis and applications. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, 26–30 April 2015; pp. 281–310. [Google Scholar]
  73. Bhushan, B.; Sahoo, C.; Sinha, P.; Khamparia, A. Unification of blockchain and internet of things (BIoT): Requirements, working model, challenges and future directions. Wirel. Netw. 2021, 27, 55–90. [Google Scholar] [CrossRef]
  74. Farahani, B.; Firouzi, F.; Luecking, M. The convergence of IoT and distributed ledger technologies (DLT): Opportunities, challenges, and solutions. J. Netw. Comput. Appl. 2021, 177, 102936. [Google Scholar] [CrossRef]
  75. Singh, S.; Hosen, A.S.; Yoon, B. Blockchain security attacks, challenges, and solutions for the future distributed IoT network. IEEE Access 2021, 9, 13938–13959. [Google Scholar] [CrossRef]
  76. Da Xu, L.; Lu, Y.; Li, L. Embedding blockchain technology into IoT for security: A survey. IEEE Internet Things J. 2021, 8, 10452–10473. [Google Scholar]
  77. Yaqoob, I.; Salah, K.; Jayaraman, R.; Al-Hammadi, Y. Blockchain for healthcare data management: Opportunities, challenges, and future recommendations. Neural Comput. Appl. 2022, 34, 11475–11490. [Google Scholar] [CrossRef]
  78. Kumar, R.L.; Khan, F.; Kadry, S.; Rho, S. A Survey on blockchain for industrial Internet of Things. Alex. Eng. J. 2022, 61, 6001–6022. [Google Scholar] [CrossRef]
  79. Yu, Z.; Song, L.; Jiang, L.; Sharafi, O.K. Systematic literature review on the security challenges of blockchain in IoT-based smart cities. Kybernetes 2021, 51. [Google Scholar] [CrossRef]
  80. Alkhateeb, A.; Catal, C.; Kar, G.; Mishra, A. Hybrid blockchain platforms for the internet of things (IoT): A systematic literature review. Sensors 2022, 22, 1304. [Google Scholar] [CrossRef]
  81. Holst, A. Number of IoT Connected Devices Worldwide 2019–2030. Statistica 2022. Available online: https://www.statista.com/statistics/1183463/iot-connected-devices-worldwide-by-technology/ (accessed on 29 June 2022).
  82. Gill, S.S. Quantum and blockchain based Serverless edge computing: A vision, model, new trends and future directions. Internet Technol. Lett. 2021, e275. [Google Scholar] [CrossRef]
  83. Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. Blockchain for IoT security and privacy: The case study of a smart home. In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom workshops), Kona, HI, USA, 13 March 2017; pp. 618–623. [Google Scholar]
  84. Esposito, C.; Ficco, M.; Gupta, B.B. Blockchain-based authentication and authorization for smart city applications. Inf. Process. Manag. 2021, 58, 102468. [Google Scholar] [CrossRef]
  85. Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar] [CrossRef]
  86. Zhang, W.; Wu, Z.; Han, G.; Feng, Y.; Shu, L. Ldc: A lightweight dada consensus algorithm based on the blockchain for the industrial internet of things for smart city applications. Future Gener. Comput. Syst. 2020, 108, 574–582. [Google Scholar] [CrossRef]
  87. Zhong, L.; Wu, Q.; Xie, J.; Guan, Z.; Qin, B. A secure large-scale instant payment system based on blockchain. Comput. Secur. 2019, 84, 349–364. [Google Scholar] [CrossRef]
  88. Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of blockchain systems. Future Gener. Comput. Syst. 2020, 107, 841–853. [Google Scholar] [CrossRef] [Green Version]
  89. Abdi, A.I.; Eassa, F.E.; Jambi, K.; Almarhabi, K.; Khemakhem, M.; Basuhail, A.; Yamin, M. Hierarchical Blockchain-Based Multi-Chaincode Access Control for Securing IoT Systems. Electronics 2022, 11, 711. [Google Scholar] [CrossRef]
  90. Alzahrani, N.; Bulusu, N. Towards true decentralization: A blockchain consensus protocol based on game theory and randomness. In Proceedings of the International Conference on Decision and Game Theory for Security, Cham, Switzerland, 29–31 October 2018; pp. 465–485. [Google Scholar]
  91. Liao, C.-F.; Bao, S.-W.; Cheng, C.-J.; Chen, K. On design issues and architectural styles for blockchain-driven IoT services. In Proceedings of the 2017 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), Taipei, Taiwan, 12–14 June 2017; pp. 351–352. [Google Scholar]
  92. Kim, H.; Park, J.; Bennis, M.; Kim, S.-L. Blockchained on-device federated learning. IEEE Commun. Lett. 2019, 24, 1279–1283. [Google Scholar] [CrossRef] [Green Version]
  93. Vivar, A.L.; Orozco, A.L.S.; Villalba, L.J.G. A security framework for ethereum smart contracts. Comput. Commun. 2021, 172, 119–129. [Google Scholar] [CrossRef]
  94. Abbasi, Y.; Benlahmer, H. BCSDN-IoT: Towards an IoT security architecture based on SDN and Blockchain. Int. J. Electr. Comput. Eng. Syst. 2022, 13, 155–163. [Google Scholar] [CrossRef]
  95. Latif, S.A.; Wen, F.B.X.; Iwendi, C.; Li-li, F.W.; Mohsin, S.M.; Han, Z.; Band, S.S. AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems. Comput. Commun. 2022, 181, 274–283. [Google Scholar] [CrossRef]
  96. Qiu, J.; Liang, X.; Shetty, S.; Bowden, D. Towards secure and smart healthcare in smart cities using blockchain. In Proceedings of the 2018 IEEE International Smart Cities Conference (ISC2), Kansas City, MO, USA, 16–19 September 2018; pp. 1–4. [Google Scholar]
  97. Lakhan, A.; Mohammed, M.A.; Kadry, S.; AlQahtani, S.A.; Maashi, M.S.; Abdulkareem, K.H. Federated Learning-Aware Multi-Objective Modeling and blockchain-enable system for IIoT applications. Comput. Electr. Eng. 2022, 100, 107839. [Google Scholar] [CrossRef]
  98. Hannah, S.; Deepa, A.; Chooralil, V.S.; BrillySangeetha, S.; Yuvaraj, N.; Arshath Raja, R.; Suresh, C.; Vignesh, R.; Srihari, K.; Alene, A. Blockchain-based deep learning to process IoT data acquisition in cognitive data. BioMed Res. Int. 2022, 2022, 5038851. [Google Scholar] [CrossRef] [PubMed]
  99. Khan, L.U.; Saad, W.; Han, Z.; Hossain, E.; Hong, C.S. Federated learning for internet of things: Recent advances, taxonomy, and open challenges. IEEE Commun. Surv. Tutor. 2021, 23, 1759–1799. [Google Scholar] [CrossRef]
  100. Ghazal, T.M.; Hasan, M.K.; Alshurideh, M.T.; Alzoubi, H.M.; Ahmad, M.; Akbar, S.S.; Al Kurdi, B.; Akour, I.A. IoT for smart cities: Machine learning approaches in smart healthcare—A review. Future Internet 2021, 13, 218. [Google Scholar] [CrossRef]
  101. Bouras, M.; Lu, Q.; Dhelim, S.; Ning, H. A Lightweight Blockchain-Based IoT Identity Management Approach. Future Internet 2021, 13, 24. [Google Scholar] [CrossRef]
  102. Du, Y.; Wang, Z.; Leung, V. Blockchain-Enabled edge intelligence for IoT: Background, emerging trends and open issues. Future Internet 2021, 13, 48. [Google Scholar] [CrossRef]
  103. Ang, K.L.M.; Seng, J.K.P.; Ngharamike, E. Towards crowdsourcing internet of things (crowd-iot): Architectures, security and applications. Future Internet 2022, 14, 49. [Google Scholar] [CrossRef]
  104. Tomer, V.; Sharma, S. Detecting IoT Attacks Using an Ensemble Machine Learning Model. Future Internet 2022, 14, 102. [Google Scholar] [CrossRef]
  105. Yazdinejad, A.; Parizi, R.M.; Dehghantanha, A.; Zhang, Q.; Choo, K.-K.R. An energy-efficient SDN controller architecture for IoT networks with blockchain-based security. IEEE Trans. Serv. Comput. 2020, 13, 625–638. [Google Scholar] [CrossRef]
  106. Li, C.; Zhang, L.-J. A blockchain based new secure multi-layer network model for internet of things. In Proceedings of the 2017 IEEE International Congress on Internet of Things (ICIOT), Honolulu, HI, USA, 25–30 June 2017; pp. 33–41. [Google Scholar]
  107. Hasankhani, A.; Hakimi, S.M.; Shafie-khah, M.; Asadolahi, H. Blockchain technology in the future smart grids: A comprehensive review and frameworks. Int. J. Electr. Power Energy Syst. 2021, 129, 106811. [Google Scholar] [CrossRef]
  108. Christidis, K.; Devetsikiotis, M. Blockchains and smart contracts for the internet of things. IEEE Access 2016, 4, 2292–2303. [Google Scholar] [CrossRef]
  109. Chen, J.; Duan, K.; Zhang, R.; Zeng, L.; Wang, W. An AI based super nodes selection algorithm in blockchain networks. arXiv 2018, arXiv:1808.00216. [Google Scholar]
  110. Chen, F.; Xiao, Z.; Cui, L.; Lin, Q.; Li, J.; Yu, S. Blockchain for internet of things applications: A review and open issues. J. Netw. Comput. Appl. 2020, 172, 102839. [Google Scholar] [CrossRef]
  111. Wang, J.; Liu, Y.; Niu, S.; Song, H. Lightweight blockchain assisted secure routing of swarm UAS networking. Comput. Commun. 2021, 165, 131–140. [Google Scholar] [CrossRef]
  112. Hakak, S.; Khan, W.Z.; Gilkar, G.A.; Imran, M.; Guizani, N. Securing smart cities through blockchain technology: Architecture, requirements, and challenges. IEEE Netw. 2020, 34, 8–14. [Google Scholar] [CrossRef]
  113. Suhail, S.; Hussain, R.; Jurdak, R.; Hong, C.S. Trustworthy digital twins in the industrial internet of things with blockchain. IEEE Internet Comput. 2021, 26, 58–67. [Google Scholar] [CrossRef]
  114. Sengupta, J.; Ruj, S.; Bit, S.D. A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J. Netw. Comput. Appl. 2020, 149, 102481. [Google Scholar] [CrossRef]
  115. Shen, M.; Tang, X.; Zhu, L.; Du, X.; Guizani, M. Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things J. 2019, 6, 7702–7712. [Google Scholar] [CrossRef]
  116. Singh, S.; Sharma, P.K.; Yoon, B.; Shojafar, M.; Cho, G.H.; Ra, I.-H. Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city. Sustain. Cities Soc. 2020, 63, 102364. [Google Scholar] [CrossRef]
  117. Tan, L.; Shi, N.; Yang, C.; Yu, K. A blockchain-based access control framework for cyber-physical-social system big data. IEEE Access 2020, 8, 77215–77226. [Google Scholar] [CrossRef]
  118. Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasubramanian, V. Blockchain leveraged decentralized iot ehealth framework. Internet Things 2020, 9, 100159. [Google Scholar] [CrossRef]
  119. Vivekanandan, M.; Sastry, V. BIDAPSCA5G: Blockchain based internet of things (IoT) device to device authentication protocol for smart city applications using 5G technology. Peer-to-Peer Netw. Appl. 2021, 14, 403–419. [Google Scholar] [CrossRef]
  120. Anitha, A.; Haritha, T. The Integration of Blockchain With IoT in Smart Appliances: A Systematic Review. In Blockchain Technologies for Sustainable Development in Smart Cities; IGI Global: Hershey, PA, USA, 2022; pp. 223–246. [Google Scholar]
  121. Arul, R.; Al-Otaibi, Y.D.; Alnumay, W.S.; Tariq, U.; Shoaib, U.; Piran, M.J. Multi-modal secure healthcare data dissemination framework using blockchain in IoMT. Pers. Ubiquitous Comput. 2021. [Google Scholar] [CrossRef]
  122. Awan, S.H.; Ahmed, S.; Nawaz, A.; Sulaiman, S.; Zaman, K.; Ali, M.; Najam, Z.; Imran, S. BlockChain with IoT, an emergent routing scheme for smart agriculture. Int. J. Adv. Comput. Sci. Appl. 2020, 11, 420–429. [Google Scholar] [CrossRef]
  123. Banerjee, S.; Bera, B.; Das, A.K.; Chattopadhyay, S.; Khan, M.K.; Rodrigues, J.J. Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT. Comput. Commun. 2021, 169, 99–113. [Google Scholar] [CrossRef]
  124. Bera, B.; Chattaraj, D.; Das, A.K. Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment. Comput. Commun. 2020, 153, 229–249. [Google Scholar] [CrossRef]
  125. Bhawiyuga, A.; Wardhana, A.; Amron, K.; Kirana, A.P. Platform for integrating internet of things based smart healthcare system and blockchain network. In Proceedings of the 6th NAFOSTED Conference on Information and Computer Science (NICS), Hanoi, Vietnam, 12–13 December 2019; pp. 55–60. [Google Scholar]
  126. Brandão, A.; São Mamede, H.; Gonçalves, R. Systematic review of the literature, research on blockchain technology as support to the trust model proposed applied to smart places. In Proceedings of the World Conference on Information Systems and Technologies, Budva, Montenegro, 27–29 March 2018; pp. 1163–1174. [Google Scholar]
  127. Dagher, G.G.; Mohler, J.; Milojkovic, M.; Marella, P.B. Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain. Cities Soc. 2018, 39, 283–297. [Google Scholar] [CrossRef]
  128. Devi, M.S.; Suguna, R.; Joshi, A.S.; Bagate, R.A. Design of IoT blockchain based smart agriculture for enlightening safety and security. In Proceedings of the International Conference on Emerging Technologies in Computer Engineering, Jaipur, India, 1–2 February 2019; pp. 7–19. [Google Scholar]
  129. Dwivedi, A.D.; Srivastava, G.; Dhar, S.; Singh, R. A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 2019, 19, 326. [Google Scholar] [CrossRef] [Green Version]
  130. El Kafhali, S.; Chahir, C.; Hanini, M.; Salah, K. Architecture to manage internet of things data using blockchain and fog computing. In Proceedings of the 4th International Conference on Big Data and Internet of Things, Rabat, Morocco, 23–24 October 2019; pp. 1–8. [Google Scholar]
  131. Farouk, A.; Alahmadi, A.; Ghose, S.; Mashatan, A. Blockchain platform for industrial healthcare: Vision and future opportunities. Comput. Commun. 2020, 154, 223–235. [Google Scholar] [CrossRef]
  132. Hewa, T.; Ylianttila, M.; Liyanage, M. Survey on blockchain based smart contracts: Applications, opportunities and challenges. J. Netw. Comput. Appl. 2020, 177, 102857. [Google Scholar] [CrossRef]
  133. Huang, J.-C.; Shu, M.-H.; Hsu, B.-M.; Hu, C.-M. Service architecture of IoT terminal connection based on blockchain identity authentication system. Comput. Commun. 2020, 160, 411–422. [Google Scholar] [CrossRef]
  134. Huh, S.; Cho, S.; Kim, S. Managing IoT devices using blockchain platform. In Proceedings of the 19th International Conference on Advanced Communication Technology (ICACT), PyeongChang, Korea, 19–22 February 2017; pp. 464–467. [Google Scholar]
  135. Khan, F.A.; Asif, M.; Ahmad, A.; Alharbi, M.; Aljuaid, H. Blockchain technology, improvement suggestions, security challenges on smart grid and its application in healthcare for sustainable development. Sustain. Cities Soc. 2020, 55, 102018. [Google Scholar] [CrossRef]
  136. Kumari, A.; Gupta, R.; Tanwar, S.; Kumar, N. A taxonomy of blockchain-enabled softwarization for secure UAV network. Comput. Commun. 2020, 161, 304–323. [Google Scholar] [CrossRef]
  137. McGhin, T.; Choo, K.-K.R.; Liu, C.Z.; He, D. Blockchain in healthcare applications: Research challenges and opportunities. J. Netw. Comput. Appl. 2019, 135, 62–75. [Google Scholar] [CrossRef]
  138. Mehta, P.; Gupta, R.; Tanwar, S. Blockchain envisioned UAV networks: Challenges, solutions, and comparisons. Comput. Commun. 2020, 151, 518–538. [Google Scholar] [CrossRef]
  139. Memon, R.A.; Li, J.P.; Nazeer, M.I.; Khan, A.N.; Ahmed, J. DualFog-IoT: Additional fog layer for solving blockchain integration problem in internet of things. IEEE Access 2019, 7, 169073–169093. [Google Scholar] [CrossRef]
  140. Miglani, A.; Kumar, N.; Chamola, V.; Zeadally, S. Blockchain for internet of energy management: Review, solutions, and challenges. Comput. Commun. 2020, 151, 395–418. [Google Scholar] [CrossRef]
  141. Minoli, D.; Occhiogrosso, B. Blockchain mechanisms for IoT security. Internet Things 2018, 1, 1–13. [Google Scholar] [CrossRef]
  142. Misra, S.; Deb, P.K.; Pathak, N.; Mukherjee, A. Blockchain-enabled SDN for securing fog-based resource-constrained IoT. In Proceedings of the INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 490–495. [Google Scholar]
  143. Moin, S.; Karim, A.; Safdar, Z.; Safdar, K.; Ahmed, E.; Imran, M. Securing IoTs in distributed blockchain: Analysis, requirements and open issues. Future Gener. Comput. Syst. 2019, 100, 325–343. [Google Scholar] [CrossRef]
  144. Naseer, O.; Ullah, S.; Anjum, L. Blockchain-based decentralized lightweight control access scheme for smart grids. Arab. J. Sci. Eng. 2021, 46, 8233–8243. [Google Scholar] [CrossRef]
  145. Panarello, A.; Tapas, N.; Merlino, G.; Longo, F.; Puliafito, A. Blockchain and iot integration: A systematic survey. Sensors 2018, 18, 2575. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  146. Pavithran, D.; Al-Karaki, J.N.; Shaalan, K. Edge-based blockchain architecture for event-driven IoT using hierarchical identity based encryption. Inf. Process. Manag. 2021, 58, 102528. [Google Scholar] [CrossRef]
  147. Qu, C.; Tao, M.; Yuan, R. A hypergraph-based blockchain model and application in internet of things-enabled smart homes. Sensors 2018, 18, 2784. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  148. Rahman, M.A.; Rashid, M.M.; Hossain, M.S.; Hassanain, E.; Alhamid, M.F.; Guizani, M. Blockchain and IoT-based cognitive edge framework for sharing economy services in a smart city. IEEE Access 2019, 7, 18611–18621. [Google Scholar] [CrossRef]
  149. Rasool, S.; Iqbal, M.; Dagiuklas, T.; Ul-Qayyum, Z.; Li, S. Reliable data analysis through blockchain based crowdsourcing in mobile ad-hoc cloud. Mob. Netw. Appl. 2020, 25, 153–163. [Google Scholar] [CrossRef] [Green Version]
  150. Rathore, S.; Kwon, B.W.; Park, J.H. BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network. J. Netw. Comput. Appl. 2019, 143, 167–177. [Google Scholar] [CrossRef]
  151. Rifi, N.; Rachkidi, E.; Agoulmine, N.; Taher, N.C. Towards using blockchain technology for IoT data access protection. In Proceedings of the 17th International Conference on Ubiquitous Wireless Broadband (ICUWB), Salamanca, Spain, 12–15 September 2017; pp. 1–5. [Google Scholar]
  152. AlAhmad, A.S.; Kahtan, H.; Alzoubi, Y.I.; Ali, O.; Jaradat, A. Mobile cloud computing models security issues: A systematic review. J. Netw. Comput. Appl. 2021, 190, 103152. [Google Scholar] [CrossRef]
  153. Ferreira, C.M.S.; Garrocho, C.T.B.; Oliveira, R.A.R.; Silva, J.S.; Cavalcanti, C.F.M. IoT registration and authentication in smart city applications with blockchain. Sensors 2021, 21, 1323. [Google Scholar] [CrossRef]
  154. Azaria, A.; Ekblaw, A.; Vieira, T.; Lippman, A. Medrec: Using blockchain for medical data access and permission management. In Proceedings of the 2nd International Conference on Open and Big Data (OBD), Vienna, Austria, 22–24 August 2016; pp. 25–30. [Google Scholar]
  155. Mettler, M. Blockchain technology in healthcare: The revolution starts here. In Proceedings of the 18th International Conference on E-health Networking, Applications and Services (Healthcom), Munich, Germany, 14–16 September 2016; pp. 1–3. [Google Scholar]
  156. Srivastava, G.; Parizi, R.M.; Dehghantanha, A. The Future of Blockchain Technology in Healthcare Internet of Things Security. In Blockchain Cybersecurity, Trust and Privacy; Choo, K.K., Dehghantanha, A., Parizi, R., Eds.; Advances in Information Security; Springer: Cham, Switzerland, 2020; Volume 79. [Google Scholar] [CrossRef]
  157. Gao, W.; Hatcher, W.G.; Yu, W. A survey of blockchain: Techniques, applications, and challenges. In Proceedings of the 27th International Conference On Computer Communication and Networks (ICCCN), Hangzhou, China, 30 July–2 August 2018; pp. 1–11. [Google Scholar]
  158. Machado, C.; Fröhlich, A.A.M. IoT data integrity verification for cyber-physical systems using blockchain. In Proceedings of the 21st International Symposium on Real-Time Distributed Computing (ISORC), Singapore, 29–31 May 2018; pp. 83–90. [Google Scholar]
  159. Mora, O.B.; Rivera, R.; Larios, V.M.; Beltrán-Ramírez, J.R.; Maciel, R.; Ochoa, A. A use case in cybersecurity based in blockchain to deal with the security and privacy of citizens and smart cities cyberinfrastructures. In Proceedings of the 2018 IEEE International Smart Cities Conference (ISC2), Kansas City, MO, USA, 16–19 September 2018; pp. 1–4. [Google Scholar]
  160. Kiayias, A.; Panagiotakos, G. On trees, chains and fast transactions in the blockchain. In Progress in Cryptology—LATINCRYPT 2017; LATINCRYPT 2017. Lecture Notes in Computer Science; Lange, T., Dunkelman, O., Eds.; Springer: Cham, Switzerland, 2017; Volume 11368, pp. 327–351. [Google Scholar]
  161. Natoli, C.; Gramoli, V. The balance attack against proof-of-work blockchains: The R3 testbed as an example. arXiv 2016, arXiv:1612.09426. [Google Scholar]
  162. Alzoubi, Y.I.; Al-Ahmad, A.; Kahtan, H. Blockchain technology as a Fog computing security and privacy solution: An overview. Comput. Commun. 2022, 182, 129–152. [Google Scholar] [CrossRef]
  163. Ma, M.; Shi, G.; Li, F. Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario. IEEE Access 2019, 7, 34045–34059. [Google Scholar] [CrossRef]
  164. Dang, T.L.N.; Nguyen, M.S. An approach to data privacy in smart home using blockchain technology. In Proceedings of the 2018 International Conference on Advanced Computing and Applications (ACOMP), Ho Chi Minh City, Vietnam, 27–29 November 2018; pp. 58–64. [Google Scholar]
  165. Lin, J.; Shen, Z.; Zhang, A.; Chai, Y. Blockchain and IoT based food traceability for smart agriculture. In Proceedings of the 3rd International Conference on Crowd Science and Engineering, Singapore, 28–31 July 2018; pp. 1–6. [Google Scholar]
  166. Dorri, A.; Kanhere, S.S.; Jurdak, R. Towards an optimized blockchain for IoT. In Proceedings of the 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI), Pittsburgh, PA, USA, 18–21 April 2017; pp. 173–178. [Google Scholar]
  167. Chaudhry, N.; Yousaf, M.M. Consensus algorithms in blockchain: Comparative analysis, challenges and opportunities. In Proceedings of the 12th International Conference on Open Source Systems and Technologies (ICOSST), Lahore, Pakistan, 19–21 December 2018; pp. 54–63. [Google Scholar]
  168. Bi, W.; Yang, H.; Zheng, M. An accelerated method for message propagation in blockchain networks. arXiv 2018, arXiv:1809.00455. [Google Scholar]
  169. Ghosh, B.; Bouri, E. Is Bitcoin’s carbon footprint persistent? Multifractal evidence and policy implications. Entropy 2022, 24, 647. [Google Scholar] [CrossRef]
  170. Singh, S.; Ra, I.-H.; Meng, W.; Kaur, M.; Cho, G.H. SH-BlockCC: A secure and efficient internet of things smart home architecture based on cloud computing and blockchain technology. Int. J. Distrib. Sens. Netw. 2019, 15, 1550147719844159. [Google Scholar] [CrossRef]
  171. Hazari, S.S.; Mahmoud, Q.H. A parallel proof of work to improve transaction speed and scalability in blockchain systems. In Proceedings of the 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 7–9 January 2019; pp. 0916–0921. [Google Scholar]
  172. Simić, M.; Sladić, G.; Milosavljević, B. A case study IoT and blockchain powered healthcare. In Proceedings of the 8th PSU-UNS International Conference on Engineering and Technology (ICET), Novi Sad, Serbia, 13 March 2017. [Google Scholar]
  173. Saghiri, A.M.; Vahdati, M.; Gholizadeh, K.; Meybodi, M.R.; Dehghan, M.; Rashidi, H. A framework for cognitive internet of things based on blockchain. In Proceedings of the 4th International Conference on Web Research (ICWR), Tehran, Iran, 11–12 May 2018; pp. 138–143. [Google Scholar]
  174. Samaniego, M.; Jamsrandorj, U.; Deters, R. Blockchain as a service for IoT. In Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Chengdu, China, 15–18 December 2016; pp. 433–436. [Google Scholar]
  175. Stanciu, A. Blockchain based distributed control system for edge computing. In Proceedings of the 21st International Conference on Control Systems and Computer Science (CSCS), Bucharest, Romania, 29–31 May 2017; pp. 667–671. [Google Scholar]
  176. Savazzi, S.; Nicoli, M.; Rampa, V. Federated learning with cooperating devices: A consensus approach for massive IoT networks. IEEE Internet Things J. 2020, 7, 4641–4654. [Google Scholar] [CrossRef] [Green Version]
  177. Qu, Y.; Gao, L.; Luan, T.H.; Xiang, Y.; Yu, S.; Li, B.; Zheng, G. Decentralized privacy using blockchain-enabled federated learning in fog computing. IEEE Internet Things J. 2020, 7, 5171–5183. [Google Scholar] [CrossRef]
  178. Outchakoucht, A.; Hamza, E.; Leroy, J.P. Dynamic access control policy based on blockchain and machine learning for the internet of things. Int. J. Adv. Comput. Sci. Appl. 2017, 8, 417–424. [Google Scholar] [CrossRef]
  179. Roldán, J.; Boubeta-Puig, J.; Martínez, J.L.; Ortiz, G. Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks. Expert Syst. Appl. 2020, 149, 113251. [Google Scholar] [CrossRef]
  180. Ren, Z.; Wu, H.; Ning, Q.; Hussain, I.; Chen, B. End-to-end malware detection for android IoT devices using deep learning. Ad Hoc Netw. 2020, 101, 102098. [Google Scholar] [CrossRef]
  181. Manogaran, G.; Rawal, B.S.; Saravanan, V.; Kumar, P.M.; Martínez, O.S.; Crespo, R.G.; Montenegro-Marin, C.E.; Krishnamoorthy, S. Blockchain based integrated security measure for reliable service delegation in 6G communication environment. Comput. Commun. 2020, 161, 248–256. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.