Ijsrp Published Research Paper November 2020

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

International Journal of Scientific and Research Publications, Volume 10, Issue 11, November 2020 510

ISSN 2250-3153

A Systematic Literature Review: Blockchain Based


Solutions for IoT’s
SHOAIB UL HASSAN, JINGXIA CHEN, MUHAMMAD AFRASAYAB
ALI AKBAR, MUHAMMAD AHSAN, TARIQ MAHMOOD

Department of Electronic Information and Artificial Intelligence


, Shaanxi University of Science and Technology
Xi’an, China
Department of Computer Science,
Govt. College University
Faisalabad, Pakistan
Department of Computer Science and IT,
University of Sargodha
Bhakkar, Pakistan

DOI: 10.29322/IJSRP.10.11.2020.p10765
http://dx.doi.org/10.29322/IJSRP.10.11.2020.p10765

Abstract--In the modern era, Internet of things brought by the help of sensors which are installed in it. Internet of
revolution in the everyday life activities by automation in Things (IoT) permits both communicating and non-
everyday functions, modifying the approach of people to communicating devices to communicate and to engage with
collaborate with one another or with the devices. Actually, the each other [5]. The purpose of IoT is to establish an improved
main feature of IoTs is direct device to device interrelationship.
Their benefits range from little domestic devices to heavy
surrounding for the whole humanity which will automatically
industrial systems. Despite of numerous advantages of IoTs, figure out the needs of people and perform accordingly[6].
their execution contains different issues mostly due to the severe From the private user’s point of view, the most apparent
substance of the functions by implement and because of their effect of the introduction of IoT will be seen in both working
narrow computing abilities. Blockchain is the forthcoming and domestic fields. IoT connects several technologies from
annoying technology field that has achieved the attention of IoT different fields together to build its network. The summation
sectors to tackle the problems by becoming encountered by of Internet based and context aware services along with these
themselves. In the article, the relevant issues in IoT field are different technologies, provide a dynamic platform for IoT.
pointed by us and then examined by the method how these issues Since the last 15 years, IoT has acquired major interest from
can be resolved with the help of Blockchain features.
Furthermore, we have also identified issues that appear while
the industry as well as educational field due to the abilities
allocation of blockchain (BC) in Internet of things (IoTs). that can be proposed by IoT. IoT assures to develop the world
where all the things around us will be linked to the Internet
Keywords--Internet of Things(IoT); Blockchain and information will be shared with one another with
minimum human interference.
Internet-of-Things (IoT) is mainly a mesh of intelligent
1. INTRODUCTION
equipment including actuators, sensors and inherent chips
which gather data about their equipment, ambience and

I n modern world technologies have great impact on the life


convey it to global network. People and other devices use this
data, to get exciting details and attain quicker solution[2]. IoT
provides the main benefits of the automating the daily
standard of humans. This revolution is for advancement in
intercommunication and invention of semi-conductor activities and real time supervision of equipment and
materials that allow gadgets to affiliate through a network and functions. IoTs has ability to reform all field-of-life. As IoT
change the path of communication among electronic devices has its application worldwide, complexity is increasing with
and human beings[8]. This phenomenon is commonly termed the increase in IoT usage. This complexity brings IoT to
as Internet of Things (IoT). K. Ashton was the first person vulnerability for the cyber-threats. The actual equipment in
who invented the term IoT in 1999. In IoT, things around us IoT is located in insecure places which might be unprotected
are connected to the network. These things communicate and from hackers, therefore providing themselves the chance to
share their information with human and also with each other modify the data that move through the mesh. Thus,
equipment, permissions and data root should be main issues

This publication is licensed under Creative Commons Attribution CC BY.


http://dx.doi.org/10.29322/IJSRP.10.11.2020.p10765 www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 10, Issue 11, November 2020 511
ISSN 2250-3153
[8][2]. Furthermore, IoT develops responsive personal 2. FEATURES OF BLOCKCHAIN
information over their proprietors and this information is
handled by central companies that bring critical issues about A. Decentralization
integrity and confidentiality of data. Decentralization can be reviewed as a security framework
In recent days, Blockchain has appeared as the innovation against hackers[2]. Blockchain is a de-centralized normal
that has ability to manage the issues which are experienced open logbook where all hubs are related with each other in a
by IoT equipment. In the Blockchain inception, it has drawn cross-linked meshwork, where all the information and
the attention of scholars from the whole world, as the decisions-making is set and split among different hubs. All
advantages of Blockchain are far reaching. parties can see every transaction on Blockchain. It permits to
In 2008 Satoshi Nakamoto first gives the concept of stay away from the congregation of power that could let an
blockchain when he issued “Bitcoin: A P2P Electronic Cash individual to take control on entire arrangement. It provides
framework”. Suggested framework was established on an intermediate free setup[4]. A decentralized Blockchain
encrypting proof rather than precision, authorizing any two mechanism helps to tackle the issues of validation of the
participants to perform operation without the needs of a client, dependability of outsider and reliability of
reliable middle man[3]. Blockchain has proved a useful tool transactions.
in many industries, as well as the Internet of Things.
Blockchain mechanism mentioned as an open record and all B. Immutability
performed operation are registered in a record of blocks[4]. Digital ledger gives a temper proof atmosphere where upon
Proof-of-stake / proof-of-work are used to create and every information has been saved in block, it cannot be
maintain blocks. Each block includes the hash address of modified or eliminated[3]. The immutability idea of
recent block that preserves the transactional information in Blockchain is the same as the idea of “Heihachi Mishima” in
network. the film named “Tekken”[2]. Both ideas are set up on
This information is permanent and can be watched entire immortality which implies neither alterable in any manner. In
duration of the mesh which finally brings to achieve the that event there is some instability by exterior hubs, the hash
interest of human in the mesh[2]. This interest urges the key worth’s could be modified that these keys are encrypted
human to build cash transactions, which provides a new globe connected with both preceding and previous blocks and
of economical division in the domain of IoT. To secure the corrections in records will trespass the constancy of keys. It
data of user, algorithms implemented in blockchain are implies that the Hash-function in Blockchain has capability
named as public key encryption and shared concord to save the recent value or address which is self-generated by
algorithms. the framework over entire transaction client gives.
The main features of blockchain technology are usually Immutability works totally relies upon 51 percent assent
audit ability, persistency, decentralization and anonymity. having proof of work.
The large and encouraging field of blockchain mechanism
gives higher support in the academia to the learners and C. Traceability
institutions. Considering every area of life, the blockchain The traceability Blockchain enables the clients to decide and
mechanism is not restricted to over discussed application. follow the cause of any transaction with the assistance of a
The applications are raised in fields such as IoT, business, digital signature. Traceability is additional element beyond
governance, medical and education etc. Furthermore, the the achievement of the Blockchain. Each transaction in the
blockchain mechanism eliminates the middle man by blockchain associated with each other which make a chain[2].
spreading of influence apart from the middle man in health, By viewing the chain, information can be followed from
transmission, education, law and politics. inbound to outbound. E.g., a client has to distinguish where
A systematic literature review is conducted in our paper to and how a nourishment thing was made. Traceability will
highlight the issues that occurs in the field of IoT and also give specific data on that precise nourishment thing producer,
described features of blockchain technology that will help to its creation, provided crude material information’s, shipping
solve these issues. The remaining part of the article is request spot, and goal. This suggests clients may follow the
organized as follow. In segment 2, Blockchain and its state of good as it experiences the periods of the production
enclosed properties are examined. Segment 3 provides a network[4]. This should be profitable for the client to be
summary of our review strategy & motivation behind leading delighted with the manufactures and product to view at peaks
this literature review. Segment 4 is distributed into three and valleys in the order.
parts, Part 1 emphasizes issues in the IoT field; Part 2
analyzes how BC (Blockchain) can be utilized to solve these D. Trustless Network
issues; Part 3 emphasizes issues in IoT that should be The idea of a mediator or third party has expelled by the help
resolved. Part 4 discusses Blockchain implementation issues of blockchain technology, when two participants want to get
in IoT's. At last, segment 5 covers the conclusion & future confirmed and a while later the transaction method will
Work. happen[24]. On Blockchain any customer can verify Proof-
of-work (POW) of some different element, in this manner
client validation from an outsider is not mandatory[25]. This

This publication is licensed under Creative Commons Attribution CC BY.


http://dx.doi.org/10.29322/IJSRP.10.11.2020.p10765 www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 10, Issue 11, November 2020 512
ISSN 2250-3153
gives a quicker, dependable and secure method for paper on the present issues of the IoT field and how to fathom
transactions. Another backbone of Blockchain called “Self- these types of issues utilizing Blockchain mythology.
execution” wherein the owner will compose an contract of Furthermore, it will offer help for scholars to figure out either
their items and at one time it fixes any determination buyers, the integration of IoT and Blockchain is efficient or not?
it will be executed though customer input. As the contacting
equipment on the Blockchain mesh are quite a semi or A. Motivation and Research Questions
completely computerized, a superior opinion can be built in In the present condition, IoT equipments have discovered
fewer time forestalling the component of human defects. their path in about entirely each area of human life beginning
from institution, small companies and indeed they have
E. Consensus mechanism entered in depth in the life of ordinary person. In addition to
Accord system implies the regular confirmation of the the huge interest provided by these equipment, they
considerable number of hubs identified with the blockchain additionally have plenty of issues. In our article, we have
network[3,26]. In this way, it doesn't rely upon third-party. A pointed out some issues relevant to the IoT field and
couple of strategies for consensus mechanism are Proof-of- simultaneously gave the solution of these issues by using the
work (POW), Proof-of-stake (POS), and delegated proof-of- blockchain features. In addition, we also pointed out those
stake (DPOS). issues in this article, that occur after utilizing the blockchain
in IoT see Table 1
F. Smart contract
A computerized PC program running on a blockchain share TABLE I. RESEARCH QUESTIONS

network is known as a smart contract[4]. It is a strategy of


dispersal of computerized assets among minimum two Sr. Research Question Motivation
participants naturally expressed by the equation decided No
based on information that is inspected at the period of 1 What are the issues Goal is to highlight
surrounding up the contract[28]. A smart contract is a PC relating to IoT? the security issues
program that forced its accomplishments on blockchain faced by IoT devices
enrolled by the accord protocol. The consensus expresses that 2 Which Blockchain The purpose is to
the authentication will be completed if all hubs on network features are used to search out features of
sustain the transaction.
solve identified Blockchain that will
issues? assist in settling
G. Security
The influence or the association of outsider or third party is issues of the IoT.
wiped out in block chain technology as this technology is 3 What are the IoT The goal is to list down
totally established on P2P network[27]. The consensus issues that are those issues that are
mechanism is utilized for transactions and the hashes of needed to be not addressed by
previous block and time-stamp is contained in block that is resolved? using blockchain
used for the validation of transaction[4]. Transaction,
4 What are the The goal is to figure
synchronization of transactions with hubs on the network is
Blockchain out the issues that
ceaseless and the historical backdrop of transaction remains
noticeable. This P2P and accord based nature of BCT deployment issues emerge during the
provides the security to data of transactions. in IoT’s? deployment of
Blockchain in IoT.
Comparison of secondary studies
B. Search Strategy
Since Blockchain innovation is slightly recent in the area of Related to our keyword IoT and Blockchain we browsed
the science, so a most part of research is in progress. While research papers in Springer, IEEE, science direct, and ACM
finding for secondary studies, we have identified two papers and figure out various results. Afterwards, we pointed out
that work on systematic literature review [1][2] of IoT and some research papers that were similar with our concern and
highlighted the main issues of IoT solved with blockchain. arrange these papers in systematic form. On Google Scholar
On other hand in our research, we have highlighted the we furthermore identified various papers by forward and in
security issues of IoT and their solution with blockchain reverse searching.
features. Moreover, we have also highlighted some IoT C. Insertion& elimination criteria
security issues that are needed to be addressed. Furthermore, related to our search keyword we selected 150
unique research papers. We studied these papers. After
3. SEARCH METHODLOGY examination of conclusion & abstract, we eliminated some
research papers that were unrelated and we found around 34
This area includes the techniques, methodologies, and research papers that were entirely similar to our concern.
reasons to compose an SLR (systematic literature review) D. Data abstraction

This publication is licensed under Creative Commons Attribution CC BY.


http://dx.doi.org/10.29322/IJSRP.10.11.2020.p10765 www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 10, Issue 11, November 2020 513
ISSN 2250-3153
At last, a distant review of the chosen research papers, various size will decrease, the computational power and input will be
issues are expressed through making a figure utilizing the X- decrease, on the other hand, some of the hardwares will be
mind software of every issue. Figures are also made to greater in size automatically consume much energy[30].
describe the issues that have been tackled through the Therefore tiny sensors and large hardware consumption
Blockchain. power and also computational capability are indirectly
proportion to each other. This will cause a problem in
4. REVIEWING RESULTS calculation of results. On the other hand, portable devices will
cause an issue like in movement of any devices in different
This segment shows the real findings derived from obtained geographical area so to change the distance and connectivity
review of composed research papers. We segmented it into mechanism of devices one by one will prove hectic for
four parts. In the 1st Part, issues in the IoT domain are pointed administrator.
out as well as their concise introduction. In the 2ndpart, the c) Data Integrity: It is the training of being sincere and
assessment is made on the judgment of these issues using demonstrating a reliable and inflexible compliance to ethical
Blockchain. Additionally we also introduced a solution for standards and persistent moral and values in morals. Integrity
certain issues that are examined in various relevant essential is considered as the authenticity and honesty or precision of
studies and are not be resolved by utilizing blockchain till one's actions. In a central client server model, the offender
now. Part 3rd emphasized issues in IoT that should be may acquire prohibited access to the mesh and change the
resolved. Part 4th Blockchain Implementation issues in IoT's? first information or original data and forward it[7,8]. For
instance, Bob sends information to Watson. Alice the center
person may get information first and forward the information
A. RQ1: What are the issues regarding to the domain? after alteration.
a) Single point of failure:Nowadays single point of d) Data Authentication: Authentication is essential for
failure is a big problem while creating IoT devices network building a link between two equipments and the swap of some
for data storing. When a centralized network is established by private and public keys through the hub to avoid information
connecting different IoT devices than security and stealing[10,11]. Any escape clause in security at the network
availability of data is on risk[18]. In this network all device layer or huge overhead ensure transmission may reveal the
are connected with a centralized party and data is kept by mesh to an enormous number of vulnerabilities.
third party at one place and it’s very easy for any hacker to
e) Denial of Services:Attackers may approach to the
access that point. After overcoming the centralized system
smart home mesh and send bulk SMS to smart equipments,
hacker will able to access the data[29]. This causes
especially, Request to Send (RTS)/Clear to Send (CTS)[9].
unauthorized data manipulation. Another thing is single point
They can furthermore attack to specific equipment by
of failure which means that if centralized system stops
utilizing harsh codes so as to perform DOS attack on different
working or crashed due to any reason the whole network will
equipments that are linked in a smart home. Subsequently,
be crashed and cause a lot of issues for all devices as well as
smart equipmentscan't perform appropriate functionalities
for relating users.
through venting resources because of such attacks. For
b) Different Computational Power of IoT prevention from this attack, it is essential to apply
Devices:The rising emission of tiny programmable built-in authentication to block and identify unauthorized access.
equipments that are simply linked with network through
f) Trespass:In case the smart door lock is accessible
broadcast technologies had risen the quantity of participants
by an unauthorized party or it is affected by pernicious codes,
eligible to take part in IoT mesh that can share data. From this
the attacker can violate on the smart home without splendid
point of view, the formation of tiny interconnected
the doorway. The outcome of this impact could be a death toll
equipments is helpful for not just sharing of data additionally
or property. IoT in smart Home the IoT Smart Home facilities
give an edge in IoT equipments sharing that can interrupt, in
are increasing step by step, digital equipments can efficiently
a bad and decent both ways, with the adjacent
communicate with one another by using Internet Protocol (IP)
atmosphere[17]. If we implement this scheme to a geographic
addresses. In smart home Environment, each smart home
field, for example, a city or a state, we can envision a full
equipment is attached to the internet. The possibility of
ambit of the ground made by movable equipments that gather
malevolent attacks is increasing by the no of equipments
information and send them back to a focal bunch endpoint.
increase in the smart home environment[9]. In Case the smart
The information assortment system works by joining the
home equipments worked separately.The odds of pernicious
estimations obtained by the cell phones with the approval
attacks also decrease. At present smart home equipments can
procedure made with particular mining software that handles
be on-access by using the internet at any place whenever. In
the information. In this mesh mobile equipments can perform
this way, it rises the odds of pernicious attack on these
a significant role.
equipments.
If this network’s data is stored at a central point, a lot of issues
g) End-to-End security:Security at the end-points
will occur. While creating a network board, different types of
Internet hosts and IoT equipmentsare similarly significant.
hardware are used. This board has a lot of tiny sensors
Using cryptographic schemas for encryption and verification
deployed on it that will use a low voltage of energy. As the
codes to packets isn't enough for asset obliged IoT. For

This publication is licensed under Creative Commons Attribution CC BY.


http://dx.doi.org/10.29322/IJSRP.10.11.2020.p10765 www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 10, Issue 11, November 2020 514
ISSN 2250-3153
complete end to end security, the verification of specific are IoT equipments, customized to be associated with the
personality on the both ends, protocols for actively negotiate blockchain and ready to send messages.
session keys, (for example, IPsec and TLS), and algorithms While using Ethereum platform a smart contract will be
(for instance Hash and AES algorithms) must be safely defined for all IoT devices according to need. By using smart
implemented[10]. In IoT with end to end security, the both contract these issues can be resolved[17]. In a city sense,
ends can ordinarily depend on the reality that their Blockchain author has suggested a wonderful blockchain
transmission isn't apparent to any other individual, and based solution to sort out this kind of issues. For example
nobody else can alter data in carriage. Proper and whole end smart contract will be defined for low computational power
to end security is needed, without which numerous devices according to their supporting power. On other hand
applications would not be feasible. smart contract will automatically handle the energy need of
h) Trusted accountability:Another attack called all devices while making this network, user will write a code
history revision attack, is brought up in [34]. The authors in the form of Smart contract that any change occurred in
express that, for the situation, an attacker possesses a system according to need, will change the whole network
computational intensity numerous of the computational according to requirements. Another thing that is discussed in
intensity of legit hubs in IoT private network for association this issue, is movement of portable devices, smart contract
(for example, two times higher), it is capable to generate a will able to change the location geographically and
branch of the blockchain which could pass the current one in connectivity of a particular device according to predefined
conditions of challenges of the POW, thus could be description. Using smart contract methodology all the
acknowledged by different equipments, therefore modifying networks will be settled one time and thenwill update
the historical of the mesh[1]. At the point when scam miners themself automatically according to required scenario.
will conquer the mesh and would attempt to change the past c) Data integrity:Blockchain is a P2P uniform network
history, this will cause a major issue for the mesh. wherein all hubs have a similar duplicate of records[8]. At the
i) Interoperability and Standardization:Equipments point when a transaction is started, the initiator hub signs the
made by different vendors vary in services and technologies, transaction with its private key and sends it to different hubs
therefore making them inconsistent[2]. As all the items would for approval. All other excavator hubs participate in repeal
be linked through the means of Internet, consequently the task process and attempt to discover nonce. The hub which finds
of consistency should be changed to give interoperability the nonce initially has the privilege to approve and get the
among the different objects and sensor hubs inside the remote benefit. In addition, it will communicate to every other hub
sensor networks. of the whole network. When the record is stacked in the
blockchain it can't be altered Rollback or deleted.
B. RQ2: The features of Blockchain used to settle the d) Data Authentication:Authentication’s Issues can be
specified issues. settled by establishing up a trustless network, that is the key
a) Single point of failure:Blockchain is a element of blockchain. By scheme, information transmitted
decentralized P2P network in which all the connecting hubs by IoT equipments associated with the blockchain network
can share information[18]. In blockchain network all the will consistently be cryptographically proofed and marked by
nodes sync their storing information and compare it with one the real sender that holds GUID and a special public key, and
another. All the participant hubs in blockchain mesh share the in this manner securing integrity and authentication of
same information and there is no single point for storing. In transmitted information. Also, all transactions made by an
blockchain all the nodes have the capability to store same IoT equipment are noted on the blockchain distributed ledger
type of data, so in blockchain based network, if any irrelevant and can be monitored safely. Before sending them to different
node (Hacker) wants to access the data by fake, it is much equipments the message will be digitally signed by the
difficult task for that node. If that irrelevant node succeeds Sender. The recipient equipments then receive the public key
in accessing the data and wants to make some changes will from the record and use it to confirm the computerized
be able to change the data of only one node for a short time signature of the obtained message[12][13]. We have
because when data will be updated, all the nodes will sync explained the computerized signature work in the following
their information with one another and in case of any way: 1st, the sender evaluates hash of a message that is then
vulnerability in data, they will update themselves according encoded with its private key. The computerized signature as
to the linked information and the fake user will be terminated well as the message is transferred. The recipient at that point
from the network. In second scenario if any of the point get decodes the computerized signature utilizing the public key
crashed, then that node will be connected to the network.This of the sender retained in the record to get the hash value as
can update their whole data according to all other nodes. So evaluated by the sender. The message is authentic just if the
in this way single point of failure in blockchain network will evaluated hash and the protective hash of the message are
not disturb the whole network. similar. The trust on acquired messages are enhanced if the
b) Different Computational Power of IoT computerized signature of every message is saved into the
Devices:Ethereum platform is to record assessments coming ledger.
from the IoT mesh of sensors. In our frame of work, sensors e) Denial of Services:In a blockchain network, two
stages are significant to verify the network from DOS. The 1st

This publication is licensed under Creative Commons Attribution CC BY.


http://dx.doi.org/10.29322/IJSRP.10.11.2020.p10765 www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 10, Issue 11, November 2020 515
ISSN 2250-3153
stage of defense can be assigned to the reality that it would Firmware update schemas is suggested to manage with
be unfeasible for an attacker to instantly install malware on Firmware issues of IoT's. The design of this schema is
IoT equipments since these equipments are not directly included of 'Verification' & 'Normal' hubs in a Blockchain
accessed. Each transaction must be checked by the mining settled network. Ordinary hubs are IoT equipments which can
hubs[14]. moreover demand a Firmware relevant activity or react to
Let us for an instant expect that the attacker in some way quiet different IoT equipments application. Moreover, to these
control to infect the equipments. The second stage of defense hubs, there is a ‘retailer hub’ which maintains updated
originates from the fact that all cordial traffic must be authentication hub with most recent data[2,20]. Once an IoT
approved by the extractors by inspecting the scheme header. inquires a Firmware relevant update, in this (BC) Blockchain
The scheme header is utilized for authorizing equipments and network, it acquires a feedback from different hubs to decide
imposing the proprietor's control scheme over the network. if it has most recent Firmware or none. On the off chance that
Since they enquires that establish the DoS attack traffic an update is essential, at that point Verification hub gives data
would not be approved, they would be impeded from about the necessary update and position of its binary. On the
withdrawal of the network. The following two defense stages off chance that Firmware of equipments arejust latest then
are especially set up and overseen by the target of a DoS morality of exiting Firmware could be confirmed over the
attack that can be any client in the overlay. Blockchain network.
f) Trespass:Use of Blockchain based smart home
network prevents the interference of any middleware[8]. In C. RQ 3: what are the security issues of IoT that are
this network all the included devices have their own storage needed to be resolved?
capacity which contains similar records of all other devices a) Falsification:when the equipments are in the smart
also contain input transaction given by the user. When a new home, they carry out transmission with the requested host, the
user will try to interfere in network give any input, the related attacker might gather the packets by modifying the routing
device will verify the input transactions and previous history table in the portal. The secure-socket-layer (SSL) technique
in blockchain. If the IoT devices find the similar history in is implementing and an attacker can avoid the fake certificate.
previous data it will grant permission to the user otherwise In such a way, the attacker can misconstrue the substance of
rejected. In other scenario, if the middleware succeeds in information or may release the privacy of information. To
controlling the IoT device in smart home network, meanwhile protect the smart home network from this offense, the SSL
the device will match its details with other device. In case of technique with appropriate verification mechanism must be
miss match it will be updated automatically according to the applied. It is too essential to block prohibited equipments that
BC smart home history and hacker will be disconnected. may effort to access to smart home network. The IoT is an
Hence the Blockchain innovation makes the equipments idea that describes the prospective where the physical things
competent for performing tasks without the third party or associated with the internet transmission with one another
mediator, in this manner making it danger free from mediator. and recognize themselves for different equipments[9]. The
g) End to End Security:The session determined b/w IoT framework comprises of smart things, tablets, cell
two VoLTE UEs are finished by 3GPP IMS standard with no phones, and the intelligent equipments etc. Such frameworks
progressions as explained already, which brings outcomes in use RFID, QR (Quick Response) codes or remote technology
the protocol. One of the solutions to produce and disperse the to execute transmission between various equipments. The IoT
session keys is to utilize the Station to Station (STS) key supports to establish a connection from person to person,
agreement schemas. The primary benefit of this methodology person to physical things, and physical things to other
is the utilization of Diffie-Hellman (DH) as a key swap physical things. According to a valuation from IDC, there
(Perfect-Forward-mystery)[12,15]. The problem of public will be above 30 billion internet linked equipments by 2020.
keys sharing in DH is tackled by saving them into the This speedy development of internet data demands
Blockchain. The VoLTE UE A guest customer brings the furthermore useful and secure network.
community of the VoLTE UE B called from the Ethereum b) Ubiquity, omnipresence:The end-user is attracted to
and conversely. The UE A and UE B switch the DH IoT[21], gorged by it, there is no plainly out, an approach to
parameters across RTP Control-Protocol (RTCP). quit up utilizing the antiquities (which will not anymore be
h) Trusted accountability:Each activity history should feasible eventually, because of the producers which will
be transferred to the blockchain network[8,16]. This provides provide them with Internet linked equipments.
each activity identification and every activity is detectable. c) Miniaturization, invisibility:PCs, as they are these
At that point, when an irregular manner is distinguished, days, will vanish – the equipments will be tiny and tiny,
entity send to source for extra investigation. apparent, subsequently keeping away from any assessments,
i) Interoperability and Standardization:A distributed accounting procedures, audit and quality control[21].
arrangement of Firmware could be presented by utilizing d) Difficult identification:So as to be linked with the
Blockchain. Furthermore, the inflexible memory of the IoT, the objects are identification[31]. The accessibility to
Blockchain, Firmware morality could be reliable and the these “armies” of objects, the administration of these
accessibility of Firmware meanwhile proposed equipments
could be guaranteed[19]. A Blockchain settled reliable

This publication is licensed under Creative Commons Attribution CC BY.


http://dx.doi.org/10.29322/IJSRP.10.11.2020.p10765 www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 10, Issue 11, November 2020 516
ISSN 2250-3153
identities may raise huge concern and cause difficult issues Problems in internet of things?
of security and control in a globalism. a) Energy Consumption:Energy consumption is
e) Autonomous and unpredictable behavior: The different in different traffic flows[14]. With the passage of
interrelated objects may interrupt voluntarily in individual time data increases, when Proof-of-Work is applied on data it
events, in surprising ways for the clients or the developer. The takes a lot of time for searching data and also consume more
individuals will be a part of the IoT environments combined energy. The miner for managing transactions is referred to
with equipments and artifacts, therefore making hybrid energy consumption. In the smart home, miner is the most
frameworks with surprising manner[21]. The gradual energy-consuming equipment. It performs lots of encryption
improvement of IoT will cause of rising manners without the and hashing and handles all other transactions. The EC
clients completely understanding the environment they are (Energy Consumption) of different types of equipments is
vulnerable. constrained to cryptography for their own transaction.
f) Incorporated intelligence: This produces the b) Scalability:A large quantity of information is
objects to be viewed alternative for the public activity – the produced by IoT's and it will be complicated and costly for
objects will be dynamic and intelligent, with a rising manner; the Blockchain to keep up and save this large amount of
there will be enlargements (not just outside) of the human information. Such inability is primarily because of IoT
body and mind[32]. Being denied of these equipments will equipments have restricted substance and there are
prompt issues – see the youngsters who regard themselves as requirements for similar stationing design where the main
psychologically or socially disabled without Google, social segment of information necessary for IoT transactions is kept
media or cell phone. by IoT equipments[1]. The 2nd Scalability issue is low output,
g) Mobile Security:Smart phones hubs in IoT because of the quandary of Proof-of-Work (PoW). Again for
repeatedly move from one bunch to another, in which restricted ability, IoT's, high challenge of Proof-of-work
encryption-based protocols are utilized to enable quick (PoW) is hard to compute. Bringing down the challenge of
recognition, confirmation, and security refuge. A specific Proof-of-Work will make security problems[2]. Actually, this
protocol is shown which is helpful when a smart phone hub issue is the interchange between security and the scalability.
joins another bunch. This protocol furthermore received a These scalability problems of the Blockchain should be
legitimate demands message and an answer verification tended in further study as these fabricate the Blockchain
message, which quickly implements authentication, privacy badly reasonable for IoTs.
protection and identification. It will be valuable to defend c) Anonymity:The blockchain becomes an open
opposing replay attacks, bugging, and location privacy network and the Anonymity is imperative to protect the secret
attacks. Conversely with other same protocols[22], for of clients[2]. Tragically, the blockchain just gives alias
example, essential hash protocols, it has less transmission implies even though clients do not have actual-life
above, progressively secure and gives more privacy identification. The client has a Public key that is utilized to
protection. Condensing, additionally if the security issues of execute transaction on this Open network. By Using this
cell phones (i.e., equipments authentication and Public ID a client could be tracked. Furthermore, when a
identification, key and exchange and legitimating storage) are client utilizes various Public keys it could be tracked by
under inquiry by scientific society, the accessible linked capabilities that these numerous addresses belonging
arrangements moderately address these requirements, in this with a similar client. Solution and analysis for the Anonymity
way requiring additional attempts in order to enable the of the clients are essential to be tended to in further work.
coordination with the other IoT technologies. d) Irreversible:Certainly, the blockchain has amazing
h) Robustness in Connectivity:In IoT, interconnect the properties like a shared block[4], for example, transparency,
humans and objects through sensors and guaranteeing efficiency, and irreversibility. Although, there are a few
ensured connectivity is a massive challenge[23]. drawbacks related to this characteristic of blockchain. Right
Furthermore, volatile internet availability represents a now, if information is entered inaccurately, at that point it
significant challenge to the IoT. Henceforth, there is a can't alter/delete, because blockchain is a P2P network have
squeezing need to effort on energy amassing equipments to not erasable or reversible. In this way, it is a vital issue of
improve the availability with the assistance of the energy blockchain innovation. While the present compromise
mechanism. frameworks permit the way toward reconciliation and
i) Big Data:While big data is relevant from the IoT voiding, envision the issues of "rollback" in the world of
point of view, we have to guarantee that only appropriate shackles.
information is being derived from the immense e) Approval first Network Node: Initially, some
databases[33]. The Information Technology industry is organization should be first network hub and that moment
looking ahead to governing the ability of big data and the IoT there will be no available hub to ensure it, security hazard can
can highly contribute to collecting more data that would be viewed as a feature[3]. In any case, we believe that with
demonstrate useful to the businesses. the enhance in numbers of hubs, such as security issues will
be reduced.
D. RQ 4: what are the Blockchain Implementation

This publication is licensed under Creative Commons Attribution CC BY.


http://dx.doi.org/10.29322/IJSRP.10.11.2020.p10765 www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 10, Issue 11, November 2020 517
ISSN 2250-3153
5. CONCLUSION AND FUTURE WORK [10] Abomhara, Mohamed, and Geir M. Køien. "Security and privacy in the
Internet of Things: Current status and open issues." In 2014 international
We have described the systematic literature review (SLR) on conference on privacy and security in mobile systems (PRISMS), pp. 1-8.
Blockchain, Internet of Things and pointed out some issues IEEE, 2014.
relevant with an IoT field and also introduced the appropriate [11] P. N. Mahalle, B. Anggorojati, N. R. Prasad, and R. Prasad, “Identity
authentication and capability based access control (iacac) for the internet
solutions for these Issues with the help of Blockchain
of things,” Journal of Cyber Security and Mobility, vol. 1, no. 4, pp.
features. Such issues are mostly Data Integrity, Data
309–348, 2013.
Authentication, Denial of Services, Different computational [12] Khan, Minhaj Ahmad, and Khaled Salah. "IOT security: Review,
Power of IoT Devices, Trespass and security related. blockchain solutions, and open challenges." Future Generation Computer
Blockchain can support in maintaining security, privacy and Systems 82 (2018): 395-411.
supply of non-seller reliant Firmware be updated. Besides, [13] Singh, Madhusudan, Abhiraj Singh, and Shiho Kim. "Blockchain: A
inviolable history of records, Identity of equipments, game changer for securing IOT data." In 2018 IEEE 4th World Forum on
Integrity of IoT information and access administrating to IoT Internet of Things (WF-IOT), pp. 51-55. IEEE, 2018.
equipments can be well controlled using the improvement of [14] Dorri, Ali, Salil S. Kanhere, Raja Jurdak, and Praveen Gauravaram.
Blockchain. In addition to the advantages, we further "Blockchain for IOT security and privacy: The case study of a smart home."
considered some unaddressed execution issues like In 2017 IEEE international conference on pervasive computing and
communications workshops (PerCom workshops), pp. 618-623. IEEE, 2017.
Anonymity, Irreversible, Scalability, Energy Consumption
[15] Kfoury, Elie F., and David J. Khoury. "Secure end-to-end volte based
and Approval first Network Node of Blockchain in IoT's
on ethereum blockchain." In 2018 41st International Conference on
which give further guidance for analysts who are relevant in Telecommunications and Signal Processing (TSP), pp. 1-5. IEEE, 2018.
this field. Considering the writing, Blockchain is an engaging [16] Liang, Xueping, Juan Zhao, Sachin Shetty, and Danyi Li. "Towards data
replacement to deal with normal issues being addressed by assurance and resilience in IOT using blockchain." In MILCOM 2017-2017
IoT. Maintaining the ability synergies in see the blend of the IEEE Military Communications Conference (MILCOM), pp. 261-266.
two advances is required to alter each field of life. IEEE, 2017.
[17] Ibba, Simona, Andrea Pinna, Matteo Seu, and Filippo Eros Pani.
"CitySense: blockchain-oriented smart cities." In Proceedings of the XP2017
REFERENCES Scientific Workshops, pp. 1-5. 2017.
[18] Durand, Arnaud, Pascal Gremaud, and Jacques Pasquier. "Decentralized
[1] Conoscenti, Marco, Antonio Vetro, and Juan Carlos De Martin. web of trust and authentication for the internet of things." In Proceedings of
"Blockchain for the Internet of Things: A systematic literature review." the Seventh International Conference on the Internet of Things, pp. 1-2.
In 2016 IEEE/ACS 13th International Conference of Computer Systems and 2017.
Applications (AICCSA), pp. 1-6. IEEE, 2016. [19] Lee, Boohyung, and Jong-Hyouk Lee. "Blockchain-based secure
[2] Shehzad, Kamran, Muhammad Afrasayab, Murad Khan, Muhammad firmware update for embedded devices in an Internet of Things
Azhar Mushtaq, Rana Laique Ahmed, and M. Mohsin Saleemi. "Use of environment." The Journal of Supercomputing 73, no. 3 (2017): 1152-1167.
Blockchain in Internet of things: A Systematic Literature Review." In 2019 [20] Boudguiga, Aymen, Nabil Bouzerna, Louis Granboulan, Alexis
Cybersecurity and Cyberforensics Conference (CCC), pp. 165-171. IEEE, Olivereau, Flavien Quesnel, Anthony Roger, and Renaud Sirdey. "Towards
2019. better availability and accountability for IOT updates by means of a
[3] Yumna, Hafiza, Muhammad Murad Khan, Maria Ikram, and Sabahat blockchain." In 2017 IEEE European Symposium on Security and Privacy
Ilyas. "Use of Blockchain in Education: A Systematic Literature Review." Workshops (EuroS&PW), pp. 50-58. IEEE, 2017.
In Asian Conference on Intelligent Information and Database Systems, pp. [21] Popescul, Daniela, and Mircea Georgescu. "Internet of Things–some
191-202. Springer, Cham, 2019. ethical issues." The USV Annals of Economics and Public
[4] Razzaq, Asad, Muhammad Murad Khan, Ramzan Talib, Arslan Dawood Administration 13, no. 2 (18) (2014): 208-214.
Butt, Noman Hanif, Sultan Afzal, and Muhammad Razeen Raouf. "Use of [22] Balte, Ashvini, AsmitaKashid, and Balaji Patil. "Security issues in
Blockchain in Governance: A Systematic." Internet of things (IOT): A survey." International Journal of Advanced
[5] Yogitha, K., and V. Alamelumangai. "Recent Trends and Issues In Research in Computer Science and Software Engineering 5, no. 4 (2015).
IOT." International Journal of Advances in Engineering Research [23] Matharu, Gurpreet Singh, Priyanka Upadhyay, and Lalita Chaudhary.
(IJAER) 11, no. I (2016). "The internet of things: Challenges & security issues." In 2014 International
[6] Dhumane, Amol, Rajesh Prasad, and Jayashree Prasad. "Routing issues Conference on Emerging Technologies (ICET), pp. 54-59. IEEE, 2014.
in internet of things: a survey." In Proceedings of the international [24] K. Christidis and M. DevetsikIOTis, “Blockchains and SmartContracts
multiconference of engineers and computer scientists, vol. 1, pp. 16-18. for the Internet of Things,” IEEE Access, vol. 4, pp.2292–2303, (2016).
2016. [25]J. Sun, J. Yan, and K. Z. K. Zhang, “Blockchain-based sharing
[7] Ravindran, Rinju, JerrinYomas, and E. Jubin Sebastian. "IOT: A review services: What Blockchain technology can contribute to smartcities,”
on security issues and measures." International Journal of Engineering Financ. Innov., vol. 2, no. 1, p. 26, (2016).
Science and Technology 5, no. 6 (2015): 348-351. [26]Grech, Alexander, and Anthony F. Camilleri. "Blockchain in education."
[8] Sultan, Abid, Muhammad Sheraz Arshad Malik, and Azhar Mushtaq. (2017).
"Internet of Things Security Issues and their Solutions with Blockchain [27] Zyskind, Guy, and Oz Nathan. "Decentralizing privacy: Using
Technology Characteristics: A Systematic Literature Review." Am J Compt blockchain to protect personal data." In 2015 IEEE Security and Privacy
Sci Inform Technol 6, no. 3 (2018): 27. Workshops, pp. 180-184. IEEE, 2015.
[9] Razzaq, Mirza Abdur, Sajid Habib Gill, Muhammad Ali Qureshi, and [28]Ojo, Adegboyega, and Samuel Adebayo. "Blockchain as a next
Saleem Ullah. "Security issues in the Internet of Things (IOT): a generation government information infrastructure: a review of initiatives in
comprehensive study." International Journal of Advanced Computer Science D5 countries." In Government 3.0–Next Generation Government
and Applications (IJACSA) 8, no. 6 (2017): 383-388. Technology Infrastructure and Services, pp. 283-298. Springer, Cham, 2017.

This publication is licensed under Creative Commons Attribution CC BY.


http://dx.doi.org/10.29322/IJSRP.10.11.2020.p10765 www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 10, Issue 11, November 2020 518
ISSN 2250-3153
[29] Silva, Maria B., Peter S. Nielsen, Niels Bay, and P. A. F. Martins. Engineering, Northwestern Polytechnical University in China. Now she also
"Failure mechanisms in single-point incremental forming of metals." The works as an associate professor in Department of Electronic Information and
International Journal of Advanced Manufacturing Technology 56, no. 9-12 Artificial Intelligence, Shaanxi University of Science and Technology in
(2011): 893-903. China. Her research interest is focus on Machine learning and pattern
recognition, EEG signal processing and event detection, and deep learning.
[30]Samie, Farzad, Vasileios Tsoutsouras, Lars Bauer, Sotirios Xydis,
Email: [email protected]
DimitriosSoudris, and Jörg Henkel. "Computation offloading and resource
allocation for low-power IOT edge devices." In 2016 IEEE 3rd World Forum
Third Author Muhammad Afrasayab got his B.S. degree from
on Internet of Things (WF-IOT), pp. 7-12. IEEE, 2016. Department of Computer Science and Information Technology in University
[31] Yu, Dan, Lilong Zhang, Yongle Chen, Yao Ma, and Junjie Chen. of Sargodha, Sub Campus Bhakkar in Pakistan in 2016 and got his MS
"Large-Scale IOT Devices Firmware Identification Based on Weak degree from Department of Computer Science in Govt College University
Password." IEEE Access 8 (2020): 7981-7992. Faisalabad. His research interest is focused on Internet of Things, Blockchain
[32] Alonso, Ricardo S., Inés Sittón-Candanedo, Óscar García, Javier Prieto, and Cloud Computing.
and Sara Rodríguez-González. "An intelligent Edge-IOT platform for Email: [email protected]
monitoring livestock and crops in a dairy farming scenario." Ad Hoc
Networks 98 (2020): 102047. Fourth Author Ali Akbar got his B.S. degree from Department of
Computer Science and Information Technology in Iqra University in
[33] Amanullah, Mohamed Ahzam, Riyaz Ahamed Ariyaluran Habeeb,
Pakistan in 2016 and doing his MS degree from Department of Electronic
FarizaHanumNasaruddin, Abdullah Gani, Ejaz Ahmed, Abdul Salam
Information and Artificial Intelligence in Shaanxi University of Science and
Mohamed Nainar, Nazihah Md Akim, and Muhammad Imran. "Deep Technology in China. His research interest is focused on Internet of Things,
learning and big data technologies for IOT security." Computer Android Operating System and Cloud Computing.
Communications (2020). Email: [email protected]
[34]Barber, Simon, Xavier Boyen, Elaine Shi, and ErsinUzun. "Bitter to
better—how to make bitcoin a better currency." In International conference Fifth Author Muhammad Ahsan got his B.S. degree in Electrical
on financial cryptography and data security, pp. 399-414. Springer, Berlin, Engineering from University of Lahore Pakistan in 2015 and doing his MS
Heidelberg, 2012. degree from Department of Electronic Information and Artificial Intelligence
in Shaanxi University of Science and Technology in China. His research
interest is focused on Internet of Things and Artificial Intelligence.
Email:[email protected]
Authors.
Sixth Author Tariq Mahmood got his B.S degree from Department of
First Author Shoaib ul Hassan got his B.S. degree from Department of Computer Science and Information Technology in University of Sargodha,
Sub Campus Bhakkar in Pakistan in 2018 and doing his MS degree from
Computer Science and Information Technology in University of Sargodha,
Department of Computer Science in Qurtuba University of Science and
Sub Campus Bhakkar in Pakistan in 2018 and doing his MS degree from Technology in Pakistan. He works as a Visiting Lecturer in Department of
Department of Electronic Information and Artificial Intelligence in Shaanxi Computer Science and Information Technology, University of Sargodha, Sub
University of Science and Technology in China. His research interest is Campus Bhakkar in Pakistan. His research interest is focused on Internet of
focused on Internet of Things, Android Operating System, Blockchain and Things, Android Operating System and Cloud Computing.
Cloud Computing. Email: [email protected]
Email: [email protected], [email protected]

Second Author Jingxia Chen got the B.S. and M.S. degrees from
Department of electrical and information engineering in Shaanxi University
of Science and Technology in China in 2002 and 2005, respectively. During
2013-now, studied for Ph.D. degree in School of Computer Science and

TABLEII. ISSUES VS FEATURES

This publication is licensed under Creative Commons Attribution CC BY.


http://dx.doi.org/10.29322/IJSRP.10.11.2020.p10765 www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 10, Issue 11, November 2020 519
ISSN 2250-3153
Issues Blockchain
features

Decentralized/ P2P Immutability Traceability Trustless Network Consensus Smart Contract Security
Mechanism

Single Point of Failure [18] [2][4]

Different Computational [3][4]

Power of IoT Devices

Data Integrity [8] [2]

Data Authentication [12] [13][24][25]

Denial Of Services [14] [3]

Trespass [8][14]

End-to-End Security [4][12] [15][27]

Trusted Accountability [3][8]

Interoperability [2] [3][19]


&Standardization

This publication is licensed under Creative Commons Attribution CC BY.


http://dx.doi.org/10.29322/IJSRP.10.11.2020.p10765 www.ijsrp.org

You might also like