33

Security Issues in Blockchained IoT

or checksum. One very common approach for preserving data integrity is one-way

hash measurement for such data collection, which should move in parallel with the

initial post prior to transmission; If the computed hash does not match the data at

the recipient's end, end-to-end IoT protection is maintained as the data is converted

over the network.

3.2.3  Availability (A)

This guarantees that all the tools and data are rendered accessible to all the IoT

applications that require them. This includes maintaining the hardware used in IoT

systems, patching applications and optimizing the network to do this. However,

performance is resolved by natural disasters and crises for preserving redundant

processes. The failure resistance, cluster availability and mechanisms involving a

redundant array of independent disks can help to retain availability.

Several existing research papers published during the window period of 2015–

2019 have been reviewed and analyzed based on their effect on security principles,

trust and privacy. A reviewed research contribution on Blockchain-based privacy

mechanisms for IoT is presented in Table 3.2.

Several abbreviations are used in Table 3.2 and Table 3.3, which are defined in

Table 3.1.

3.3  SECURITY CHALLENGES IN IOT

A few security challenges and attacks have been identified in IoT and Blockchained

IoT models. Some of the major challenges are discussed in Table 3.3, which out­

lines the comparative study of specific security risks, their consequences, extent of

attack, design paradigm events, breached security principles and their counteract­

ing actions.

3.3.1  Challenges to Blockchain IoT

Scalability and Storage: Scalability can be seen as an essential feature of

the process of integration of IoT and Blockchain. As the size of the IoT net­

work increases, the centralized repository of Blockchain may also increase,

TABLE 3.1

Abbreviations

P

Perception Layer

NT

Network and Transmission Layer

AM

Application and Middleware Layer

C

Confidentiality

I

Integrity

A

Availability