71

Blockchain for IoT Security

Li, Shancang, Li Da Xu, & Shanshan Zhao. (n.d.). Internet of Things: A Survey. Information

Systems Frontiers Springer, 17(2), 243–259, April.

Li, Xiaoqi, Peng Jiang, Ting Chen, Xiapu Luo, & Qiaoyan Wen. (2018). A Survey on the

Security of Blockchain Systems. Future Generation Computer Systems, 107(February),

841–53. http://arxiv​.org​/abs​/1802​.06993.

Makhdoom, Imran, Mehran Abolhasan, Haider Abbas, & Wei Ni. (2019). Blockchain’s

Adoption in IoT: The Challenges, and a Way Forward. Journal of Network and Computer

Applications, 125(January), 251–79. https://doi​.org​/10​.1016​/j​.jnca​.2018​.10​.019.

Mattern, Friedemann, & Christian Floerkemeier. (2010). From the Internet of Computers to

the Internet of Things”. In Lecture Notes in Computer Science (Including Subseries

Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol.

6462 LNCS, pp. 242–259). Berlin, Heidelberg: Springer. https://doi​.org​/10​.1007​/978​-

3​-642​-17226​-7​_15.

Mohanty, Sachi Nandan, K.C. Ramya, S. Sheeba Rani, Deepak Gupta, K. Shankar, S.K.

Lakshmanaprabu, & Ashish Khanna. (2020). An Efficient Lightweight Integrated

Blockchain (ELIB) Model for IoT Security and Privacy. Future Generation Computer

Systems, 102(January), 1027–37. https://doi​.org​/10​.1016​/j​.future​.2019​.09​.050.

Otte, Pim, Martijn de Vos, & Johan Pouwelse. (2020). TrustChain: A Sybil-Resistant Scalable

Blockchain. Future Generation Computer Systems, 107(June), 770–80. https://doi​.org​/

10​.1016​/j​.future​.2017​.08​.048.

Telehash – Wikipedia. (n.d.). Accessed 9 January 2021. https://en​.wikipedia​.org​/wiki​/

Telehash.

Uckelmann, Dieter, Mark Harrison, & Florian Michahelles. 2011. An Architectural Approach

Towards the Future Internet of Things. In Architecting the Internet of Things (pp. 1–24)

Berlin Heidelberg: Springer. https://doi​.org​/10​.1007​/978​-3​-642​-19157​-2​_1.

Zyskind, G., Nathan, O., Pentland, A. 2015b. Decentralizing privacy: using blockchain to

protect personal data. In: Proceedings of the IEEE Security and Privacy Workshops,

pp. 180–184, https://doi​.org​/10​.1109​/SPW​.2015​.27

Zyskind, G., Nathan, O., Pentland, A. 2015b. Enigma: Decentralized computation platform

with guaranteed privacy, CoRR abs/1506.03471. http://arxiv​.org​/abs/ 1506.03471