Utilizing Blockchain to Overcome Cyber Security Concerns in the Internet of Things: A Review

被引:56
作者
Alotaibi, Bandar [1 ]
机构
[1] Univ Tabuk, Dept Informat Technol, Tabuk 71491, Saudi Arabia
关键词
Internet of Things; blockchain; cyber security; end-to-end traceability; data privacy; anonymity; identity verification; data integrity; big data; cloud computing; BLUETOOTH LOW-ENERGY; OF-THE-ART; LOW-POWER; SMART CONTRACTS; CHALLENGES; FUTURE; PRIVACY; TECHNOLOGIES; INTEGRATION; ECONOMICS;
D O I
10.1109/JSEN.2019.2935035
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things (IoT) is a wide network consisting of Internet-connected objects using installed software, such as home appliances, vehicles, and other entities embedded with sensors, actuators, radio-frequency identification (RFID), and electronics to exchange data. In the last two decades, numerous IoT solutions have been developed by small, medium-sized, and large enterprises to make our lives easier. Furthermore, private and academic researchers have extensively investigated some practical IoT solutions. The rapid expansion of IoT solutions accompanies numerous security concerns because the underlying IoT protocols and communication technologies have not considered security. Recently, blockchain has emerged to become one of the promising technologies that might overcome some of the IoT limitations (security limitations, in particular). Blockchain technology is a database ledger that uses a peer-to-peer (P2P) network and stores transactions and asset registries. Blockchain can be described as a mounting list of records (i.e., blocks) with the following properties: distributed, decentralized, immutable, and shared. This paper surveyed recent security advances to overcome IoT limitations using blockchain. In this article, the blockchain attempts to overcome IoT limitations that are related to cyber security have been classified into four categories: end-to-end traceability; data privacy and anonymity; identity verification and authentication; and confidentiality, data integrity, and availability (CIA). Intended as a guideline for future research, this paper also explores systematic processes.
引用
收藏
页码:10953 / 10971
页数:19
相关论文
共 141 条
  • [1] Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks
    Ahmed, Firoz
    Ko, Young-Bae
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5143 - 5154
  • [2] Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams
    Aitzhan, Nurzhan Zhumabekuly
    Svetinovic, Davor
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) : 840 - 852
  • [3] An Indoor Location-Aware System for an IoT-Based Smart Museum
    Alletto, Stefano
    Cucchiara, Rita
    Del Fiore, Giuseppe
    Mainetti, Luca
    Mighali, Vincenzo
    Patrono, Luigi
    Serra, Giuseppe
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (02): : 244 - 253
  • [4] Almadhoun R, 2018, I C COMP SYST APPLIC
  • [5] Rogue Access Point Detection: Taxonomy, Challenges, and Future Directions
    Alotaibi, Bandar
    Elleithy, Khaled
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (03) : 1261 - 1290
  • [6] [Anonymous], 2012, RFC 6347
  • [7] [Anonymous], 2018, J BRIT BLOCKCHAIN AS
  • [8] [Anonymous], P 13 INT C NETW SERV
  • [9] [Anonymous], 2012, 2012 20 IEEE INT C N
  • [10] [Anonymous], 2013, IACR CRYPTOL EPRINT