35

Security Issues in Blockchained IoT

TABLE 3.2 (CONTINUED)

Reviewed Research Contributions on Blockchain-based Privacy Mechanisms for IoT

Authors

Description

Security

Principle Affected

Trust

Privacy

C

I

A

R6:

(Shafagh et al., 2017)

Data related to the Blockchain Data Access Management System held in

Decentralized Hash Tables (DHT) off-chain. Blockchain reserves

authorization rights for diverse users on any data contained in the DHT with

tokenized off-chain control rights.

R7:

(Hardjono & Smith, 2016)

Provides privacy protection when procuring IoT devices across the cloud

utilizing certified Blockchains. Also, grants provenance of a resource-

restricted IoT system without declaration of its origin.

×

R8:

(Ali et al., 2017)

This approach utilizes Inter Planetary File System (IPFS) as a decentralized IoT

data storage platform and utilizes multi-layered Blockchain design focused on

smart contract-driven access management principles as well as peer-to-peer

encryption.

R9:

(Liu et al., 2017)

Using the Blockchain-based transparent data integrity authentication platform

by utilizing smart contracts helps various applications to check the rationality

of the data stockpiled at the platforms supporting cloud applications.

×

R10:

(Bahga & Madisetti, 2016)

There are some tasks in the network that need to be accomplished upon the IoT

devices or nodes as sovereign solicitations to comprehend the upright

authentications. This objective can be achieved by coupling the Blockchain

technology with industrial IoT.

×

R11:

(Boudguiga et al., 2017)

In a distributed framework, for sending the updates, the Blockchain is used to

monitor software update transactions that are sent to devices for avoiding

fraudulent security updates on nodes. In this situation, there is no need for a

trustworthy broker to provide updates, because notifications that are

propagated to the users via the Blockchain maintain transparency.

×

(Continued)