36

Blockchain Technology

TABLE 3.2 (CONTINUED)

Reviewed Research Contributions on Blockchain-based Privacy Mechanisms for IoT

Authors

Description

Security

Principle Affected

Trust

Privacy

C

I

A

R12:

(Axon & Goldsmith, 2016)

To control IoT apps, this leverages a Blockchain-based Public-Key

Infrastructure (PKI). They used smart contracts-based Blockchain addresses,

which provided commands to the IoT devices. Such commands vary from

modifying operating practices to storing data on energy usage on the

Blockchain.

×

R13:

(Biswas &

Muthukkumarasamy, 2016)

The research presents a model of a smart city based on a Blockchain

technology for maintaining the discretion and concealment of scrambled

information by the fundamental immutableness of the Blockchain. The

suggested approach uses the Blockchain based on Ethereum with smart

contracts for the determination of functionality.

×

R14:

(Yang et al., 2017)

A scaffold platform for the vehicle based on IoT technology and focused on

reliability assessment. The suggested approach consists of a legitimacy

network built on Blockchain, which determines the authenticity of the sent

messages depending on the sender’s identity.

×

R15:

(Lee & Lee, 2017)

This entails creating and managing Blockchain identities as a service via

Blockchain-based identity and authentication management framework for

smartphone applications and IoT nodes without any concern for connections

or contact.

×

R16:

(Steger et al., 2018)

Evidence for safe dissemination of application upgrades in vehicles based on

smart technologies, utilizing a layered Blockchain scalability design.

(Continued)