35
Security Issues in Blockchained IoT
TABLE 3.2 (CONTINUED)
Reviewed Research Contributions on Blockchain-based Privacy Mechanisms for IoT
Authors
Description
Security
Principle Affected
Trust
Privacy
C
I
A
R6:
(Shafagh et al., 2017)
Data related to the Blockchain Data Access Management System held in
Decentralized Hash Tables (DHT) off-chain. Blockchain reserves
authorization rights for diverse users on any data contained in the DHT with
tokenized off-chain control rights.
√
√
√
√
√
R7:
(Hardjono & Smith, 2016)
Provides privacy protection when procuring IoT devices across the cloud
utilizing certified Blockchains. Also, grants provenance of a resource-
restricted IoT system without declaration of its origin.
√
×
√
√
√
R8:
(Ali et al., 2017)
This approach utilizes Inter Planetary File System (IPFS) as a decentralized IoT
data storage platform and utilizes multi-layered Blockchain design focused on
smart contract-driven access management principles as well as peer-to-peer
encryption.
√
√
√
√
√
R9:
(Liu et al., 2017)
Using the Blockchain-based transparent data integrity authentication platform
by utilizing smart contracts helps various applications to check the rationality
of the data stockpiled at the platforms supporting cloud applications.
√
√
√
√
×
R10:
(Bahga & Madisetti, 2016)
There are some tasks in the network that need to be accomplished upon the IoT
devices or nodes as sovereign solicitations to comprehend the upright
authentications. This objective can be achieved by coupling the Blockchain
technology with industrial IoT.
√
√
√
√
×
R11:
(Boudguiga et al., 2017)
In a distributed framework, for sending the updates, the Blockchain is used to
monitor software update transactions that are sent to devices for avoiding
fraudulent security updates on nodes. In this situation, there is no need for a
trustworthy broker to provide updates, because notifications that are
propagated to the users via the Blockchain maintain transparency.
√
√
√
√
×
(Continued)