37
Security Issues in Blockchained IoT
TABLE 3.2 (CONTINUED)
Reviewed Research Contributions on Blockchain-based Privacy Mechanisms for IoT
Authors
Description
Security
Principle Affected
Trust
Privacy
C
I
A
R17:
(Alphand et al., 2018)
Solution developed for protection and monitoring using IoT technologies and
Blockchain to carry out the authorization policies and maintain the interaction
logs. This tool also ensures the authentication paradigm of Object Security
Architecture for IoT by utilizing a group key scheme.
√
√
√
√
×
R18:
(Chakraborty et al., 2018)
A multi-layered Blockchain approach for addressing resource-limited IoT
application protection issues. The communication of lower-layer devices
happens using the higher-layer nodes. These inherent properties ensure the
viability of the provided solution.
√
√
√
√
×
R19:
(Dwivedi et al., 2019)
The execution of a novel amalgam elucidation blends the benefits of private key
technique, public key technique, Blockchain and several other cryptographic
primitives.
√
√
√
√
√
R20:
(Dorri et al, 2019)
The researchers have implemented an approach that was based on distributed
trust mechanism and decreases the Online Black-Markets’ (OBM) processing
time for validating new blocks. The technique is also based on an IoT-friendly
consensus algorithm, which circumvents the requirement to As an added
bonus, the technique is built on an Internet of Things-friendly consensus
process that eliminates the need to unravel any delinquent blocks until a block
is appended to the Blockchain until a block is appended to the BC.
√
√
√
√
√