37

Security Issues in Blockchained IoT

TABLE 3.2 (CONTINUED)

Reviewed Research Contributions on Blockchain-based Privacy Mechanisms for IoT

Authors

Description

Security

Principle Affected

Trust

Privacy

C

I

A

R17:

(Alphand et al., 2018)

Solution developed for protection and monitoring using IoT technologies and

Blockchain to carry out the authorization policies and maintain the interaction

logs. This tool also ensures the authentication paradigm of Object Security

Architecture for IoT by utilizing a group key scheme.

×

R18:

(Chakraborty et al., 2018)

A multi-layered Blockchain approach for addressing resource-limited IoT

application protection issues. The communication of lower-layer devices

happens using the higher-layer nodes. These inherent properties ensure the

viability of the provided solution.

×

R19:

(Dwivedi et al., 2019)

The execution of a novel amalgam elucidation blends the benefits of private key

technique, public key technique, Blockchain and several other cryptographic

primitives.

R20:

(Dorri et al, 2019)

The researchers have implemented an approach that was based on distributed

trust mechanism and decreases the Online Black-Markets’ (OBM) processing

time for validating new blocks. The technique is also based on an IoT-friendly

consensus algorithm, which circumvents the requirement to As an added

bonus, the technique is built on an Internet of Things-friendly consensus

process that eliminates the need to unravel any delinquent blocks until a block

is appended to the Blockchain until a block is appended to the BC.