University of Bahrain
Scientific Journals

Securing the Internet of Things Through Blockchain Approach: Security Architectures, Consensus Algorithms, Enabling Technologies, Open Issues, and Research Directions

Show simple item record

dc.contributor.author Showkat, Sadia
dc.contributor.author Qureshi, Shaima
dc.date.accessioned 2023-01-29T06:58:52Z
dc.date.available 2023-01-29T06:58:52Z
dc.date.issued 2023-01-29
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/4728
dc.description.abstract The rapid expansion of the Internet of Things (IoT), particularly in critical infrastructures, necessitates strict security and privacy standards. Owing to data proliferation, Cyber-physical systems (CPS) rely on computing platforms for the provision of services and resources. The futuristic “Beyond 5G” (B5G) enabled critical IoT infrastructures cannot run on centralized systems due to their security vulnerabilities that compromise the basic Confidentiality-Integrity-Availability (CIA) triad. Blockchain technology (BCT) is emerging as a key enabler in addressing IoT’s security challenges, and it is compliant with the Fog-IoT architecture. The Ethereum platform has ushered an unprecedented development in BCT by facilitating application development. Blockchain (BC) connects the users’ chain identity to the transactions associated with their tokenized digital assets and confers the ability to audit the system. The history of canonical transactions is recorded in an immutable fashion facilitating data tracking and deterrence of data repudiation. A Consensus mechanism (CM) governs the state transitions and the node behavior in building trust relationships between various entities in the absence of a central authority. Through Smart Contracts(SCs), distributed and trustworthy access control can be achieved for IoT systems besides enhancing automation. We argue that BCT adoption is inevitable in securing futuristic B5G enabled IoT critical infrastructures for ensuring flexible and fine-grained access control, authentication, communication, and data security. Various challenges are associated with their adoption, such as the rising cost of Ethereum and constraints in the IoT environment. To facilitate BC solutions for IoT security, the functionality of BCT must be complemented with other technologies such as Machine Learning (ML), Edge Computing (EC), and InterPlanetary Filesystem(IPFS). en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.subject Blockchain, IoT, Edge Computing, Consensus, Security, Privacy, Smart contracts, IPFS B5G, Access control en_US
dc.title Securing the Internet of Things Through Blockchain Approach: Security Architectures, Consensus Algorithms, Enabling Technologies, Open Issues, and Research Directions en_US
dc.type Article en_US
dc.identifier.doi http://dx.doi.org/10.12785/ijcds/130109
dc.volume 13 en_US
dc.issue 1 en_US
dc.pagestart 97 en_US
dc.pageend 129 en_US
dc.contributor.authoraffiliation Department of Computer science and Engineering, National Institute of Technology Srinagar, J&K en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

This item appears in the following Issue(s)

Show simple item record

All Journals


Advanced Search

Browse

Administrator Account