36
Blockchain Technology
TABLE 3.2 (CONTINUED)
Reviewed Research Contributions on Blockchain-based Privacy Mechanisms for IoT
Authors
Description
Security
Principle Affected
Trust
Privacy
C
I
A
R12:
(Axon & Goldsmith, 2016)
To control IoT apps, this leverages a Blockchain-based Public-Key
Infrastructure (PKI). They used smart contracts-based Blockchain addresses,
which provided commands to the IoT devices. Such commands vary from
modifying operating practices to storing data on energy usage on the
Blockchain.
√
√
√
√
×
R13:
(Biswas &
Muthukkumarasamy, 2016)
The research presents a model of a smart city based on a Blockchain
technology for maintaining the discretion and concealment of scrambled
information by the fundamental immutableness of the Blockchain. The
suggested approach uses the Blockchain based on Ethereum with smart
contracts for the determination of functionality.
√
√
√
√
×
R14:
(Yang et al., 2017)
A scaffold platform for the vehicle based on IoT technology and focused on
reliability assessment. The suggested approach consists of a legitimacy
network built on Blockchain, which determines the authenticity of the sent
messages depending on the sender’s identity.
√
√
√
√
×
R15:
(Lee & Lee, 2017)
This entails creating and managing Blockchain identities as a service via
Blockchain-based identity and authentication management framework for
smartphone applications and IoT nodes without any concern for connections
or contact.
√
√
√
√
×
R16:
(Steger et al., 2018)
Evidence for safe dissemination of application upgrades in vehicles based on
smart technologies, utilizing a layered Blockchain scalability design.
√
√
√
√
√
(Continued)