44

Blockchain Technology

which further increases transaction numbers. With the scalable architec­

ture and increasing number of transactions of the Blockchain ledger, the

need for more storage comes into the picture, which can be met using cloud

storage solutions in the next phase, where various backups and replications

needed will make the whole system more complex.

Processing Power and Time: There are several encryption algorithms

used in integrating Blockchain with IoT technology. The ecosystem of the

IoT provides a different paradigm for the computing capabilities and secu­

rity algorithms contained in it, requiring more and more processing power.

Shortage of Experienced and Skilled Developers: One of the most prom­

inent issues in integrated technology is the shortage of skilled employees.

The two technologies are poles apart, and the integration requires personnel

with the skills to develop and handle this.

Policy Management, Legal Guidance and Compliance: The policy man­

agement and legal compliance are again an important concern in the case

of the Blockchained IoT ecosystem. The policies related to privacy of the

data may vary from place to place, so the algorithms used in the integration

should have common derivatives.

Complexities of Hybrid and Integrated Structure: As discussed, both

the fields are emerging and complex in nature, so the amalgamation of both

technologies will give rise to more complex systems. The current IoT eco­

systems bank on the centralized system and client server communication

models, whereas Blockchain is a decentralized technology. The resource

constraints and infrastructural requirements will make the system difficult

to implement and handle.

Security Issues: Current IoT systems do not offer multi-factor authentica­

tion. The market for Blockchain as a service is very new, and the processing

power needs can be an issue in physical systems, so the whole system is

dependent on the cloud. So, vendor-level risks are associated with the tech­

nology, which needs to be addressed. The IoT components must be durably

connected to the block network to participate in the process generated by

Blockchain to ensure reliability.

Besides these basic challenges, some of the major attacks on the Blockchain described

here with their analysis in various reviewed studies of Blockchained IoT, mentioned

in Table 3.2, are described in brief in Table 3.4.

Denial of Service (DoS) Attack

The invader attempts to prevent the authentic user from accessing the

service in the network during such an attack. In these cases, the adversary

may start fraudulent transactions and may increase network traffic. Random

users cannot access the network in our program, however, without evidence

of authority. Nevertheless, assume that an adversary invades the network

and begins to send fake transactions to the network. For such a scenario,

the cluster head will search the public address, and if it is not available or