67

Blockchain for IoT Security

TABLE 4.2 (CONTINUED)

Proposed Blockchain Applications for IoT

Application Name

Brief Introduction

Solution Offered

Challenges

VANETS (Leiding et al. 2016)

Decentralized and

self-managed VANET

(Vehicular Ad hoc

Network)

The paper proposes a decentralized and self-

managing VANET that is Ethereum blockchain

based. VANETS typically are centralized with

challenges such as single point failure and data

privacy. The solution uses smart contracts to

perform the operations guided by rules. The

solution also ensures that the nodes self-fund the

network infrastructure with Ethers.

The solution does not discuss latency from

blockchain and secure communication

between vehicles (V2V). Vehicles are

expected to make decisions based on

near real-time data, and latency in such

cases may lead to failure of the system.

Transparency of SCM (“Intel

Jumps into Blockchain

Technology Storm With

‘Sawtooth Lake’ Distributed

Ledger – Blockchain News,

Opinion, TV and Jobs” n.d.)

Object tracking and

recordkeeping of ownership

The solution aims to address the challenges of

supply chain management (SCM) using

blockchain. It maintains a formal registry to track

the supply chain from origin to the

transformations. The IoT sensors record various

aspects of the supply chain, such as locations,

storage conditions, temperature, etc., and

maintain a ledger.

The solutions do not address trust model

issues. The model assumes the reporting

nodes to be trusted and provides no

means to verify the reported data.

However, if the nodes are trusted, then

the need for using a blockchain does not

arise. Without the implicit trust, none of

the nodes can be trusted, and malicious

nodes may compromise the entire

system.

Enigma (Zyskind et al. 2015b)

Privacy-preserving data

computation

The “Enigma” solution aims to address data

privacy challenges. The solution provides a secret

share of data for the nodes, and no node has

access to the other nodes’ data. This solution

prevents leakage of data among the nodes.

The solution faces challenges from the

overheads for communications and

computation. The solution also may face

challenges from wireless communication

regulations.

(Continued)