50
Blockchain Technology
has tried to cover all the attacks that an IoT network can face. All the attacks are dis
cussed with respect to the layered model of IoT framework and the important aspects
of security, i.e., Confidentiality, Integrity and Availability. The amalgamation of
Blockchain technology with IoT-enabled devices has achieved new dimensions to the
security frameworks, but there is still scope for improvement in this segment of tech
nology. In the coming 10 years, this technology will be booming and integrated into
smart homes, smart cities, smart offices and smart devices as a security framework.
REFERENCES
Ahmed, F., & Ko, Y.-B. (2016). Mitigation of black hole attacks in routing protocol for low
power and lossy networks. Security and Communication Networks, 9(18), 5143–5154.
Ahram, T., Sargolzaei, A., Sargolzaei, S., Daniels, J., & Amaba, B. (2017). Blockchain tech
nology innovations. In 2017 IEEE Technology & Engineering Management Conference
(TEMSCON). Santa Clara, USA (pp. 137–141).
Aitzhan, N.Z., & Svetinovic, D. (2016). Security and privacy in decentralized energy trad
ing through multi-signatures, Blockchain and anonymous messaging streams. IEEE
Transactions on Dependable and Secure Computing, 15(5), 840–852.
Ali, M.S., Dolui, K., & Antonelli, F. (2017). IoT data privacy via Blockchains and IPFS. In
Proceedings of the Seventh International Conference on the Internet of Things - Linz
Austria (pp. 1–7).
Alphand, O., Amoretti, M., Claeys, T., Dall’Asta, S., Duda, A., Ferrari, G., Rousseau, F.,
Tourancheau, B., Veltri, L., & Zanichelli, F. (2018). IoTChain: A Blockchain security
architecture for the Internet of Things. In 2018 IEEE Wireless Communications and
Networking Conference (WCNC) – Barcelona Spain (pp. 1–6).
Alvisi, L., Clement, A., Epasto, A., Lattanzi, S., & Panconesi, A. (2013). Sok: The evolution
of sybil defense via social networks. In 2013 IEEE Symposium on Security and Privacy
(pp. 382–396).
Axon, L.M., & Goldsmith, M. (2016). PB-PKI: A privacy-aware Blockchain-based PKI.
Oxford
Bahga, A., & Madisetti, V.K. (2016). Blockchain platform for industrial internet of things.
Journal of Software Engineering and Applications, 9(10), 533–546.
Bhattasali, T., & Chaki, R. (2011). A survey of recent intrusion detection systems for wireless
sensor network. In International Conference on Network Security and Applications
(pp. 268–280).
Biswas, K., & Muthukkumarasamy, V. (2016). Securing smart cities using Blockchain tech
nology. In 2016 IEEE 18th International Conference on High Performance Computing
and Communications; IEEE 14th International Conference on Smart City; IEEE
2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
Sydney, Australia (pp. 1392–1393).
Boudguiga, A., Bouzerna, N., Granboulan, L., Olivereau, A., Quesnel, F., Roger, A., & Sirdey,
R. (2017). Towards better availability and accountability for iot updates by means of a
Blockchain. In 2017 IEEE European Symposium on Security and Privacy Workshops
(EuroS&PW) (pp. 50–58).
Brachmann, M., Garcia-Mochon, O., Keoh, S.-L., & Kumar, S.S. (2012a). Security consider
ations around end-to-end security in the IP-based Internet of things. In Workshop on
Smart Object Security, in Conjunction with IETF83, Paris, France, March 23, 2012.
Brachmann, M., Keoh, S.L., Morchon, O.G., & Kumar, S.S. (2012b). End-to-end transport
security in the IP-based internet of things. In 2012 21st International Conference on
Computer Communications and Networks (ICCCN) Munich, Germany (pp. 1–5).