50

Blockchain Technology

has tried to cover all the attacks that an IoT network can face. All the attacks are dis­

cussed with respect to the layered model of IoT framework and the important aspects

of security, i.e., Confidentiality, Integrity and Availability. The amalgamation of

Blockchain technology with IoT-enabled devices has achieved new dimensions to the

security frameworks, but there is still scope for improvement in this segment of tech­

nology. In the coming 10 years, this technology will be booming and integrated into

smart homes, smart cities, smart offices and smart devices as a security framework.

REFERENCES

Ahmed, F., & Ko, Y.-B. (2016). Mitigation of black hole attacks in routing protocol for low

power and lossy networks. Security and Communication Networks, 9(18), 5143–5154.

Ahram, T., Sargolzaei, A., Sargolzaei, S., Daniels, J., & Amaba, B. (2017). Blockchain tech­

nology innovations. In 2017 IEEE Technology & Engineering Management Conference

(TEMSCON). Santa Clara, USA (pp. 137–141).

Aitzhan, N.Z., & Svetinovic, D. (2016). Security and privacy in decentralized energy trad­

ing through multi-signatures, Blockchain and anonymous messaging streams. IEEE

Transactions on Dependable and Secure Computing, 15(5), 840–852.

Ali, M.S., Dolui, K., & Antonelli, F. (2017). IoT data privacy via Blockchains and IPFS. In

Proceedings of the Seventh International Conference on the Internet of Things - Linz

Austria (pp. 1–7).

Alphand, O., Amoretti, M., Claeys, T., Dall’Asta, S., Duda, A., Ferrari, G., Rousseau, F.,

Tourancheau, B., Veltri, L., & Zanichelli, F. (2018). IoTChain: A Blockchain security

architecture for the Internet of Things. In 2018 IEEE Wireless Communications and

Networking Conference (WCNC) – Barcelona Spain (pp. 1–6).

Alvisi, L., Clement, A., Epasto, A., Lattanzi, S., & Panconesi, A. (2013). Sok: The evolution

of sybil defense via social networks. In 2013 IEEE Symposium on Security and Privacy

(pp. 382–396).

Axon, L.M., & Goldsmith, M. (2016). PB-PKI: A privacy-aware Blockchain-based PKI.

Oxford

Bahga, A., & Madisetti, V.K. (2016). Blockchain platform for industrial internet of things.

Journal of Software Engineering and Applications, 9(10), 533–546.

Bhattasali, T., & Chaki, R. (2011). A survey of recent intrusion detection systems for wireless

sensor network. In International Conference on Network Security and Applications

(pp. 268–280).

Biswas, K., & Muthukkumarasamy, V. (2016). Securing smart cities using Blockchain tech­

nology. In 2016 IEEE 18th International Conference on High Performance Computing

and Communications; IEEE 14th International Conference on Smart City; IEEE

2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)

Sydney, Australia (pp. 1392–1393).

Boudguiga, A., Bouzerna, N., Granboulan, L., Olivereau, A., Quesnel, F., Roger, A., & Sirdey,

R. (2017). Towards better availability and accountability for iot updates by means of a

Blockchain. In 2017 IEEE European Symposium on Security and Privacy Workshops

(EuroS&PW) (pp. 50–58).

Brachmann, M., Garcia-Mochon, O., Keoh, S.-L., & Kumar, S.S. (2012a). Security consider­

ations around end-to-end security in the IP-based Internet of things. In Workshop on

Smart Object Security, in Conjunction with IETF83, Paris, France, March 23, 2012.

Brachmann, M., Keoh, S.L., Morchon, O.G., & Kumar, S.S. (2012b). End-to-end transport

security in the IP-based internet of things. In 2012 21st International Conference on

Computer Communications and Networks (ICCCN) Munich, Germany (pp. 1–5).