57
4 Survey of Blockchain
Techniques for IoT
Device Security
Rahul Das and Ajay Prasad
4.1 INTRODUCTION
The Internet of Things (IoT) came into the limelight in September 2003 with the
launch of a management vision of a supply chain that can be automatically tracked
by Auto-ID (Uckelmann et al. 2011).
With the advancement of technology, smarter and smaller devices have been in
demand along with the requirement for automation to reduce human intervention.
(Mattern and Floerkemeier 2010) These requirements have accelerated the develop
ment of the IoT.
IoT leads to an interconnected world, where devices can be linked to the Internet
and controlled remotely. Such devices are referred to as smart devices. They can
interact with one another, among themselves, with other users or with other IoT
devices (Atzori, Iera, and Morabito 2010). IoT devices are mostly built to serve a
particular purpose and have limited resources, such as minimal communication and
CONTENTS
4.1
Introduction.....................................................................................................57
4.2
IPv6 and 5G – Accelerating IoT Growth.........................................................58
4.3
IoT Adoption and Applications........................................................................58
4.4
IoT Framework.................................................................................................58
4.5
IoT Security.....................................................................................................60
4.5.1 Lower-level Security Issues.................................................................60
4.5.2 Intermediate-level Security Issues.......................................................60
4.5.3 High-level Security Issues................................................................... 61
4.6
Blockchain....................................................................................................... 61
4.7
Blockchain and IoT.......................................................................................... 61
4.8
Data Security in IoT with Blockchain.............................................................62
4.9
Challenges in Implementing Blockchain with IoT..........................................64
4.10 Current Blockchain Applications for IoT........................................................65
4.11 Opportunities Ahead.......................................................................................65
4.12 Conclusion.......................................................................................................69
References.................................................................................................................69
DOI: 10.1201/9781003138082-4