Skip to main content
Log in

Privacy challenges of IoT-based blockchain: a systematic review

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) has infiltrated extensively into our lifestyles. Nevertheless, IoT privacy remains a significant obstacle, primarily because of the large size and distributed existence of IoT networks. Also, numerous safety, authentication, and maintenance problems of IoT systems have been overcome by the decentralized existence of blockchain. To obviate these privacy difficulties, the privacy challenges of IoT-based blockchain are examined systematically. Totally, 61 papers have been gained by electronic databases and based on different filters, 20 related articles were obtained and analyzed. The findings showed that the blockchain could dominate the IoT restrictions, such as data protection and privacy. It can also supply distributed storage, transparency, trust, and secure distributed IoT networks and supply a beneficial guarantee for the privacy and security of IoT users. Simultaneously, it has low scalability, high computing complexity, IoT-unsuitable latency, and high overhead bandwidth.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig.4

Similar content being viewed by others

References

  1. Sengupta, J., Ruj, S., Bit, S.D.: A Comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J. Netw. Comput. Appl. 149, 102481 (2020)

    Article  Google Scholar 

  2. Jahantigh, M.N., Rahmani, A.M., Navimirour, N.J., Rezaee, A.J.I.C.: Integration of Internet of Things and cloud computing: a systematic survey. IET Commun. 14(2), 165–176 (2019)

    Article  Google Scholar 

  3. Alfandi, O., Khanji, S., Ahmad, L., Khattak, A.: A survey on boosting IoT security and privacy through blockchain. Clust. Comput. 25, 1–19 (2020)

    Google Scholar 

  4. Sadrishojaei, M., Navimipour, N.J., Reshadi, M., Hosseinzadeh, M.: A new preventive routing method based on clustering and location prediction in the mobile internet of things. IEEE Internet Things J. 41, 1–1 (2021)

    Google Scholar 

  5. S. Datta, A. K. Das, A. Kumar, and D. Sinha.: Authentication and privacy preservation in IoT based forest fire detection by using blockchain: a review. In: International Conference on Internet of Things and Connected Technologies, 2019, pp. 133–143: Springer.

  6. Pourghebleh, B., Wakil, K., Navimipour, N.J.: A comprehensive study on the trust management techniques in the Internet of Things. IEEE Internet Things J. 6(6), 9326–9337 (2019)

    Article  Google Scholar 

  7. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: Vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)

    Article  Google Scholar 

  8. A. Ouaddah.: A blockchain based access control framework for the security and privacy of IoT with strong anonymity unlinkability and intractability guarantees. In: Advances in Computers, 115: Elsevier, 2019, pp. 211–258.

  9. Borgia, E.: The Internet of Things vision: key features, applications and open issues. Comput. Commun. 54, 1–31 (2014)

    Article  Google Scholar 

  10. Ghanbari, Z., Navimipour, N.J., Hosseinzadeh, M., Darwesh, A.: Resource allocation mechanisms and approaches on the Internet of Things. Clust. Comput. 22(4), 1253–1282 (2019)

    Article  Google Scholar 

  11. S. Fan, L. Song, and C. Sang.: Research on privacy protection in IoT system based on blockchain. In: International Conference on Smart Blockchain, 2019, pp. 1–10: Springer.

  12. D. P. Augustine and P. Raj.: Blockchain and IoT security. In: Blockchain Technology and Applications: Auerbach Publications, 2020, pp. 51–64.

  13. C. Ge, Z. Liu, and L. Fang. A blockchain based decentralized data security mechanism for the Internet of Things. J. Parall. and Distributed Computing, 2020.

  14. Vardhana, M., Arunkumar, N., Abdulhay, E., Vishnuprasad, P.: Iot based real time trafic control using cloud computing. Clust. Comput. 22(1), 2495–2504 (2019)

    Article  Google Scholar 

  15. Kim, H.-Y., Kim, J.-M.: A load balancing scheme based on deep-learning in IoT. Clust. Comput. 20(1), 873–878 (2017)

    Article  Google Scholar 

  16. A. Lamba, S. Singh, S. Balvinder, N. Dutta, and S. Rela.: Mitigating IoT security and privacy challenges using distributed ledger based blockchain (Dl-BC) technology. Int. J. Technol. Res. Eng., 4(8), 2017.

  17. Elhabob, R., Zhao, Y., Eltayieb, N., Abdelgader, A.M., Xiong, H.: Identity-based encryption with authorized equivalence test for cloud-assisted IoT. Clust. Comput. 23(2), 1085–1101 (2020)

    Article  Google Scholar 

  18. Azad, P., Navimipour, N.J., Rahmani, A.M., Sharifi, A.: The role of structured and unstructured data managing mechanisms in the Internet of things. Clust. Comput. 10, 1–14 (2019)

    Google Scholar 

  19. S. Nakamoto and A. Bitcoin.: A peer-to-peer electronic cash system. Bitcoin. URL: https://bitcoin.org/bitcoin.pdf, vol. 4, 2008.

  20. Hassan, M.U., Rehmani, M.H., Chen, J.: Privacy preservation in blockchain based IoT systems: integration issues, prospects, challenges, and future research directions. Futur. Gener. Comput. Syst. 97, 512–529 (2019)

    Article  Google Scholar 

  21. A. Pouraghily, M. N. Islam, S. Kundu, and T. Wolf.: Privacy in blockchain-enabled iot devices. In: 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI), 2018, pp. 292–293: IEEE.

  22. Verma, V.K.: Blockchain technology: systematic review of security and privacy problems and its scope with Internet of Things (IoT). J. Netw. Secur. 7(1), 24–28 (2019)

    Google Scholar 

  23. Alotaibi, B.: Utilizing blockchain to overcome cyber security concerns in the internet of things: a review. IEEE Sens. J. 19(23), 10953–10971 (2019)

    Article  Google Scholar 

  24. Ferrag, M.A., Shu, L., Yang, X., Derhab, A., Maglaras, L.: Security and privacy for green IoT-based agriculture: review, blockchain solutions, and challenges. IEEE Access 8, 32031–32053 (2020)

    Article  Google Scholar 

  25. Mistry, I., Tanwar, S., Tyagi, S., Kumar, N.: Blockchain for 5G-enabled IoT for industrial automation: a systematic review, solutions, and challenges. Mech. Syst. Signal Process. 135, 106382 (2020)

    Article  Google Scholar 

  26. Tseng, L., Yao, X., Otoum, S., Aloqaily, M., Jararweh, Y.: Blockchain-based database in an IoT environment: challenges, opportunities, and analysis. Clust. Comput. 23(3), 2151–2165 (2020)

    Article  Google Scholar 

  27. Nguyen, K.T., Laurent, M., Oualha, N.: Survey on secure communication protocols for the Internet of Things. Ad Hoc Netw. 32, 17–31 (2015)

    Article  Google Scholar 

  28. H. Li, L. Pei, D. Liao, X. Wang, D. Xu, and J. Sun.: BDDT: use blockchain to facilitate IoT data transactions. Clust. Comput. J. Netw. Softw. Tools Appl. (2020)

  29. Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of Things security: a survey. J. Netw. Comput. Appl. 88, 10–28 (2017)

    Article  Google Scholar 

  30. Pavithran, D., Shaalan, K., Al-Karaki, J.N., Gawanmeh, A.: Towards building a blockchain framework for IoT. Clust. Comput. 5, 1–15 (2020)

    Google Scholar 

  31. Ammar, M., Russello, G., Crispo, B.: Internet of Things: a survey on the security of IoT frameworks. J. Inform. Secur. Appl. 38, 8–27 (2018)

    Google Scholar 

  32. Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17(3), 1294–1312 (2015)

    Article  Google Scholar 

  33. Altaf, A., Abbas, H., Iqbal, F., Derhab, A.: Trust models of internet of smart things: a survey, open issues, and future directions. J. Netw. Comput. Appl. 137, 93–111 (2019)

    Article  Google Scholar 

  34. Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)

    Article  Google Scholar 

  35. Khalid, U., Asim, M., Baker, T., Hung, P.C., Tariq, M.A., Rafferty, L.: A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Clust. Comput. 73, 1–21 (2020)

    Google Scholar 

  36. I. A. Ridhawi, M. Aloqaily, and Y. Jararweh.: an incentive-based mechanism for volunteer computing using blockchain. arXiv preprint arXiv:2009.11901, (2020)

  37. I. Al Ridhawi, M. Aloqaily, A. Boukerche, and Y. Jaraweh.: A Blockchain-based decentralized composition solution for IoT services. In: ICC 2020–2020 IEEE International Conference on Communications (ICC), 2020, pp. 1–6: IEEE

  38. H. F. Atlam and G. B. Wills.: IoT security, privacy, safety and ethics. In: Digital Twin Technologies and Smart Cities: Springer, 2020, pp. 123–149.

  39. Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019)

    Article  Google Scholar 

  40. F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain.: Machine learning in IoT security: current solutions and future challenges. IEEE Communications Surveys & Tutorials, (2020)

  41. Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. Tutor. 21(3), 2671–2701 (2019)

    Article  Google Scholar 

  42. Sha, K., Yang, T.A., Wei, W., Davari, S.: A survey of edge computing-based designs for iot security. Digit. Commun. Netw. 6(2), 195–202 (2020)

    Article  Google Scholar 

  43. Hassan, W.H.: Current research on Internet of Things (IoT) security: a survey. Comput. Netw. 148, 283–294 (2019)

    Article  Google Scholar 

  44. O. Alfandi, S. Otoum, and Y. Jararweh.: Blockchain solution for IoT-based critical infrastructures: byzantine fault tolerance. In: NOMS 2020–2020 IEEE/IFIP network operations and management symposium, 2020, pp. 1–4: IEEE.

  45. Opara, E.U., Soluade, O.A.: Straddling the next cyber frontier: The empirical analysis on network security, exploits, and vulnerabilities. Int. J. Electron. Inform. Eng. 3(1), 10–18 (2015)

    Google Scholar 

  46. Chen, Q., Srivastava, G., Parizi, R.M., Aloqaily, M., Al Ridhawi, I.: An incentive-aware blockchain-based solution for internet of fake media things. Inform. Process. Manag. 57(6), 102370 (2020)

    Article  Google Scholar 

  47. Dehghani, M., et al.: Blockchain-based securing of data exchange in a power transmission system considering congestion management and social welfare. Sustainability 13(1), 90 (2021)

    Article  Google Scholar 

  48. Dehghani, M., et al.: Blockchain-based securing of data exchange in a power transmission system considering congestion management and social welfare. Sustainability 13(1), 1–1 (2020)

    Article  Google Scholar 

  49. O. Bouachir, M. Aloqaily, L. Tesng, and A. Boukerche.: Blockchain and fog computing for cyber-physical systems: case of smart industry. arXiv preprint arXiv:2005.12834, (2020)

  50. Banerjee, M., Lee, J., Choo, K.-K.R.: A blockchain future for internet of things security: a position paper. Digital Commun. Netw. 4(3), 149–160 (2018)

    Article  Google Scholar 

  51. B. K. Mohanta, U. Satapathy, S. S. Panda, and D. Jena.: A novel approach to solve security and privacy issues for IoT applications using blockchain. In: 2019 International Conference on Information Technology (ICIT), 2019, pp. 394–399: IEEE

  52. Deng, L., Li, D., Yao, X., Cox, D., Wang, H.: Mobile network intrusion detection for IoT system based on transfer learning algorithm. Clust. Comput. 22(4), 9889–9904 (2019)

    Article  Google Scholar 

  53. A. Dorri, C. Roulin, R. Jurdak, and S. S. Kanhere.: On the activity privacy of blockchain for IoT. In: 2019 IEEE 44th Conference on Local Computer Networks (LCN), 2019, pp. 258–261: IEEE

  54. Ma, M., Shi, G., Li, F.: Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario. IEEE Access 7, 34045–34059 (2019)

    Article  Google Scholar 

  55. G. Srivastava, R. M. Parizi, A. Dehghantanha, and K.-K. R. Choo.: Data sharing and privacy for patient IoT devices using blockchain. In: International Conference on Smart City and Informatization, 2019, pp. 334–348: Springer.

  56. Y. Charband and N. J. Navimipour.: Knowledge sharing mechanisms in the education: a systematic review of the state of the art literature and recommendations for future research. Kybernetes, 2018.

  57. Hajiali, M.: Big data and sentiment analysis: a comprehensive and systematic literature review. Concurr. Comput. Pract. Exper. 32(14), e5671 (2020)

    Article  Google Scholar 

  58. Aromataris, E., Pearson, A.: The systematic review: an overview. AJN Am. J. Nurs. 114(3), 53–58 (2014)

    Article  Google Scholar 

  59. Masnoon, N., Shakib, S., Kalisch-Ellett, L., Caughey, G.E.: What is polypharmacy? A systematic review of definitions. BMC Geriatr. 17(1), 230 (2017)

    Article  Google Scholar 

  60. Heidari, A., Jabraeil Jamali, M.A., Jafari Navimipour, N., Akbarpour, S.J.I.J.O.C.S.: "Internet of things offloading: ongoing issues, opportunities, and future challenges. J. Commun. Syst, 33(14), 4474 (2020)

    Article  Google Scholar 

  61. Munn, Z., Porritt, K., Lockwood, C., Aromataris, E., Pearson, A.: Establishing confidence in the output of qualitative research synthesis: the ConQual approach. BMC Med. Res. Methodol. 14(1), 1–7 (2014)

    Article  Google Scholar 

  62. Munn, Z., Peters, M.D., Stern, C., Tufanaru, C., McArthur, A., Aromataris, E.: Systematic review or scoping review? Guidance for authors when choosing between a systematic or scoping review approach. BMC Med. Res. Methodol. 18(1), 143 (2018)

    Article  Google Scholar 

  63. Lin, I.-C., Liao, T.-C.: A survey of blockchain security issues and challenges. IJ Netw. Secur. 19(5), 653–659 (2017)

    Google Scholar 

  64. B. K. Mohanta, D. Jena, S. Ramasubbareddy, M. Daneshmand, and A. H. Gandomi.: Addressing security and privacy issues of IoT using blockchain technology. IEEE Internet Things J. (2020).

  65. Y. Rahulamathavan, R. C.-W. Phan, M. Rajarajan, S. Misra, and A. Kondoz.: Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In: 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 2017, pp. 1–6: IEEE.

  66. A. Erdem, S. Ö. Yildirim, and P. Angin.: Blockchain for ensuring security, privacy, and trust in IoT environments: the state of the art. In: Security, privacy and trust in the IoT environment: Springer, 2019, pp. 97–122.

  67. Lu, Y., Huang, X., Dai, Y., Maharjan, S., Zhang, Y.: Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans. Industr. Inf. 16(6), 4177–4186 (2019)

    Article  Google Scholar 

  68. Zhao, Q., Chen, S., Liu, Z., Baker, T., Zhang, Y.: Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Inf. Process. Manage. 57(6), 102355 (2020)

    Article  Google Scholar 

  69. Shen, M., Tang, X., Zhu, L., Du, X., Guizani, M.: Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things J. 6(5), 7702–7712 (2019)

    Article  Google Scholar 

  70. B. Krebs.: Hacked cameras, DVRs powered today’s massive internet outage. Krebs on Security, 2016.

  71. O. J. A. Pinno, A. R. A. Gregio, and L. C. De Bona.: Controlchain: blockchain as a central enabler for access control authorizations in the IoT. In: Globecom 2017–2017 IEEE Global Communications Conference, 2017, pp. 1–6: IEEE

  72. Ouaddah, A., Mousannif, H., AbouElkalam, A., Ouahman, A.A.: Access control in the Internet of Things: Big challenges and new opportunities. Comput. Netw. 112, 237–262 (2017)

    Article  Google Scholar 

  73. A. Ouaddah, A. AbouElkalam, and A. A. Ouahman.: Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Europe and MENA Cooperation Advances in Information and Communication Technologies: Springer, 2017, pp. 523–533.

  74. T. D. Nguyen, H.-A. Pham, and M. T. Thai.: Leveraging blockchain to enhance data privacy in iot-based applications. In: International Conference on Computational Social Networks, 2018, pp. 211–221: Springer

  75. F. Loukil, C. Ghedira-Guegan, K. Boukadi, and A. N. Benharkat.: Towards an end-to-end IoT data privacy-preserving framework using blockchain technology. In: International Conference on Web Information Systems Engineering, 2018, pp. 68–78: Springer

  76. M. Aloqaily, O. Bouachir, A. Boukerche, and I. A. Ridhawi.: Design guidelines for blockchain-assisted 5G-UAV networks. arXiv preprint arXiv:2007.15286, (2020)

  77. Y. Zhao et al. (2020) Privacy-preserving blockchain-based federated learning for IoT devices. IEEE Internet Things J.

  78. Stojkoska, B.L.R., Trivodaliev, K.V.: A review of Internet of Things for smart home: challenges and solutions. J. Clean. Prod. 140, 1454–1464 (2017)

    Article  Google Scholar 

  79. V. Sivaraman, D. Chan, D. Earl, and R. Boreli.: Smart-phones attacking smart-homes. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016, pp. 195–200.

  80. A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram.: Blockchain for IoT security and privacy: The case study of a smart home. In 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops), 2017, pp. 618–623: IEEE

  81. Mohanty, S.N., et al.: An efficient lightweight integrated blockchain (ELIB) model for IoT security and privacy. Futur. Gener. Comput. Syst. 102, 1027–1037 (2020)

    Article  Google Scholar 

  82. M. N. Islam and S. Kundu.: IoT security, privacy and trust in home-sharing economy via blockchain. In Blockchain Cybersecurity, Trust and Privacy: Springer, 2020, pp. 33–50

  83. G. Tripathi, M. A. Ahad, and S. Paiva.: S2HS-A blockchain based approach for smart healthcare system. In: Healthcare, 2020, 8(1), 100391: Elsevier

  84. S. Chakraborty, S. Aich, and H.-C. Kim.: A secure healthcare system design framework using blockchain technology. In: 2019 21st International Conference on Advanced Communication Technology (ICACT), 2019, pp. 260–264: IEEE

  85. J. Qiu, X. Liang, S. Shetty, and D. Bowden.: Towards secure and smart healthcare in smart cities using blockchain. In: 2018 IEEE International Smart Cities Conference (ISC2), 2018, pp. 1–4: IEEE

  86. N. Bhalaji, P. Abilashkumar, and S. Aboorva.: A Blockchain based approach for privacy preservation in healthcare IoT. In: International Conference on Intelligent Computing and Communication Technologies, 2019, pp. 465–473: Springer.

  87. K. Azbeg, O. Ouchetto, S. J. Andaloussi, L. Fetjah, and A. Sekkaki.: Blockchain and IoT for security and privacy: a platform for diabetes self-management. In: 2018 4th International Conference on Cloud Computing Technologies and Applications (Cloudtech), 2018, pp. 1–5: IEEE

  88. D.-P. Le, H. Meng, L. Su, S. L. Yeo, and V. Thing.: Biff: A blockchain-based IoT forensics framework with identity privacy. In TENCON 2018–2018 IEEE Region 10 Conference, 2018, pp. 2372–2377: IEEE

  89. Shen, M., Deng, Y., Zhu, L., Du, X., Guizani, N.: Privacy-preserving image retrieval for medical IoT systems: a blockchain-based approach. IEEE Netw. 33(5), 27–33 (2019)

    Article  Google Scholar 

  90. B. Alamri, I. T. Javed, and T. Margaria.: Preserving patients’ privacy in medical IoT using blockchain. In: International Conference on Edge Computing, 2020, pp. 103–110: Springer

  91. S. Juyal, S. Sharma, A. Harbola, and A. S. Shukla.: Privacy and security of IoT based skin monitoring system using blockchain approach. In: 2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), 2020, pp. 1–5: IEEE

  92. C. Patel.: IoT privacy preservation using blockchain. (2019)

  93. Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)

    Article  Google Scholar 

  94. Taylor, P.J., Dargahi, T., Dehghantanha, A., Parizi, R.M., Choo, K.-K.R.: A systematic literature review of blockchain cyber security. Digit Commun. Netw 6(2), 147–156 (2020)

    Article  Google Scholar 

  95. N. Waheed, X. He, and M. Usman.: Security & privacy in IoT using machine learning & blockchain: Threats & Countermeasures. arXivpreprint arXiv:2002.03488, 2020.

  96. Ali, M.S., Vecchio, M., Pincheira, M., Dolui, K., Antonelli, F., Rehmani, M.H.: Applications of blockchains in the Internet of Things: a comprehensive survey. IEEE Commun. Surv. Tutor. 21(2), 1676–1717 (2018)

    Article  Google Scholar 

  97. C. S. Kouzinopoulos et al.: Using blockchains to strengthen the security of internet of things. In: International ISCIS Security Workshop, 2018, pp. 90–100: Springer, Cham

  98. Shahzad, A., Zhang, K., Gherbi, A.: Intuitive development to examine collaborative IoT supply chain system underlying privacy and security levels and perspective powering through proactive blockchain. Sensors 20(13), 3760 (2020)

    Article  Google Scholar 

  99. C. Yu, Y. Leng, J. Li, and J. Yu.: Blockchain crowdfunding projects evaluation using GRA-TOPSIS. Kybernetes, 2020.

  100. O. Mounnan, A. El Mouatasim, O. Manad, T. Hidar, A. Abou El Kalam, and N. Idboufker.: Privacy-aware and authentication based on blockchain with fault tolerance for IoT enabled fog computing. In: 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), 2020, pp. 347–352: IEEE

  101. A. H. Alkhazaali and A. Oğuz.: Lightweight fog based solution for privacy-preserving in IoT using blockchain. In: 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), 2020, pp. 1–10: IEEE

  102. Bagal, H.A., Soltanabad, Y.N., Dadjuo, M., Wakil, K., Ghadimi, N.: Risk-assessment of photovoltaic-wind-battery-grid based large industrial consumer using information gap decision theory. Sol. Energy 169, 343–352 (2018)

    Article  Google Scholar 

  103. Liu, J., Chen, C., Liu, Z., Jermsittiparsert, K., Ghadimi, N.: An IGDT-based risk-involved optimal bidding strategy for hydrogen storage-based intelligent parking lot of electric vehicles. J. Energy Storage 27, 101057 (2020)

    Article  Google Scholar 

  104. A. Ouaddah, A. Abou El Kalam, and A. A. Ouahman.: Harnessing the power of blockchain technology to solve IoT security & privacy issues. In: ICC, 2017, pp. 7:1–7:10.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenbing Liang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liang, W., Ji, N. Privacy challenges of IoT-based blockchain: a systematic review. Cluster Comput 25, 2203–2221 (2022). https://doi.org/10.1007/s10586-021-03260-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-021-03260-0

Keywords

Navigation