Skip to main content
Log in

Blockchain technology in IoT systems: current trends, methodology, problems, applications, and future directions

  • Original Article
  • Published:
Journal of Reliable Intelligent Environments Aims and scope Submit manuscript

Abstract

The growth of Internet of Things (IoT) took center stage universally due their capability to advance the course of human lives. Consequent upon this, several challenges were thrown up such as security of huge data stored and transmitted through network communication channels. IoT insecurity is partly due to centralization architecture, low computational strength, resource-constrained devices, variation in standards and protocols of communication. From this Systematic Literature Review (SLR), the 85 articles reviewed showed that privacy and security solutions are still being proposed or at conceptual levels, though a number of researchers favored the integration of Blockchain technology, cryptographic and hashing schemes into IoT. The Blockchain technology in IoT systems remains an open area of interest for top researchers especially in evolving frameworks to fit into the centralized architecture, functionality, and scalability demands of conventional IoT systems. In this article, we investigate security and privacy concerns of IoT from the lens of current trends, pertinent challenges, security methodologies, applications, and gaps for future research directions. Most specifically, there is prospect of utilizing cryptographic and hashing schemes offered by Blockchain technology in IoT. Then, high performance and scalable cryptographic schemes (that is, those in the class of lightweight appraoch) are suggested to deal with privacy and security of data in Blockchain-based IoT system. More importantly, this study provides basis for evolving secure and decentralized applications and systems in several domains such as smart farming.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

Not applicable.

Code availability

Not applicable.

References

  1. Jayaraman PP, Yang X, Yavari A, Georgakopoulos D, Yi X (2017) Privacy preserving Internet of Things: from privacy techniques to a blueprint architecture and efficient implementation. Future Gener Comput Syst 76:540–549. https://doi.org/10.1016/j.future.2017.03.001

    Article  Google Scholar 

  2. Malavade VN, Akulwar PK (2017) Role of IoT in Agriculture. IOSR Journal of Computer Engineering 2016:56–57

    Google Scholar 

  3. Berrehili FZ, Belmekki A (2016) Privacy preservation in the Internet of Things. Intl Symposium Ubiquitous Netw 2:163–175

    Google Scholar 

  4. Brandão A, Mamede HS, Gonçalves R (2018) Systematic review of the literature, research on Blockchain technology as support to the trust model proposed applied to smart places. Adv Intell Syst Comput 745:1163–1174. https://doi.org/10.1007/978-3-319-77703-0_113

    Article  Google Scholar 

  5. Atlam HF, Wills GB (2019) Technical aspects of Blockchain and IoT. In role of Blockchain technology in IoT Applications, 1st edn, vol. 115. Elsevier, pp 1–39, https://doi.org/https://doi.org/10.1016/bs.adcom.2018.10.006

  6. Singh S, Sharma PK, Moon SY, Park JH (2017) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-017-0494-4

    Article  Google Scholar 

  7. Patil AS, Tama BA, Park RKH (2018) A framework for Blockchain based secure smart green house farming. Lecture Notes Elect Eng 474:1162–1167. https://doi.org/10.1007/978-981-10-7605-3_185

    Article  Google Scholar 

  8. Islam M, Tonmoy SS, Quayum S, Sarker AR, Hani SU, Mannan MA (2019) Smart poultry farm incorporating GSM and IoT. In: 2019 International Conference on Robotics, Electrical and Signal Processing Techniques, pp 277–280

  9. Shehzad K, Afrasayab M, Khan M, Mushtaq MA, Ahmed RL, Saleemi MM (2019) Use of Blockchain in Internet of Things : 2019 cybersecurity and cyberforensics conference, pp 165–171. https://doi.org/https://doi.org/10.1109/CCC.2019.00012

  10. Mosenia A, Jha NK (2017) A comprehensive study of security of internet-of-things. IEEE Trans EmergTop Comput 5(4):586–602. https://doi.org/10.1109/TETC.2016.2606384

    Article  Google Scholar 

  11. Li J, Greenwood D, Kassem M (2019) Automation in Construction Blockchain in the built environment and construction industry: a systematic review, conceptual models and practical use cases. Autom Construct 102:288–307. https://doi.org/10.1016/j.autcon.2019.02.005

    Article  Google Scholar 

  12. Zhang P, Schmidt DC, White J, Dubey A (2019) Consensus mechanisms and information security technologies. Role Blockchain Technol IoT Appl 115:181. https://doi.org/10.1016/bs.adcom.2019.05.001

    Article  Google Scholar 

  13. Ji Y, Zhang J, Ma J, Yang C, Yao X (2018) BMPLS: Blockchain-based multi-level privacy-preserving location sharing scheme for telecare medical information systems. J Med Syst 42(8):147. https://doi.org/10.1007/s10916-018-0998-2

    Article  Google Scholar 

  14. Zhu L, Zheng B, Shen M, Yu S, Gao F, Li H, Shi K, Gai K (2018) Research on the security of Blockchain data: a survey. arXiv perprint. https://arxiv.org/abs/1812.02009

  15. Hassan MU, Rehmani MH, Chen J (2019) Privacy preservation in Blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions. Future Gener Comput Syst 97:512–529. https://doi.org/10.1016/j.future.2019.02.060

    Article  Google Scholar 

  16. Ferrag MA, Derdour M, Mukherjee M, Derhab A, Maglaras L, Janicke H (2018) Blockchain technologies for the Internet of Things: research issues and challenges. IEEE Internet Things J 6(2):2188–2204. https://doi.org/10.1109/JIOT.2018.2882794

    Article  Google Scholar 

  17. Huh S, Cho S, Kim S (2017) Managing IoT devices using Blockchain platform. Int Conf Adv Commun Technol. https://doi.org/https://doi.org/10.23919/ICACT.2017.7890132

  18. Ejaz W, Anpalagan A (2018) Blockchain technology for security and privacy in Internet of Things. Internet Things Smart Cities. https://doi.org/10.1007/978-3-319-95037-2_5

    Article  Google Scholar 

  19. Ensor A, Schefer-Wenzl S, Miladinovic I (2019) Blockchains for IoT payments: a survey. IEEE Globecom Workshops 2018:1–6. https://doi.org/10.1109/GLOCOMW.2018.8644522

    Article  Google Scholar 

  20. Sultan A, Mushtaq MA, Abubakar M (2019) IOT security issues via Blockchain : a review paper. ACM ICBCT-2019 60-65. https://doi.org/https://doi.org/10.1145/3320154.3320163

  21. Dinh TTA, Liu R, Zhang M, Chen G, Ooi BC, Wang J (2018) Untangling Blockchain: a data processing view of Blockchain systems. IEEE Trans Knowl Data Eng 30(7):1366–1385. https://doi.org/10.1109/TKDE.2017.2781227

    Article  Google Scholar 

  22. Yang Y, Yang Y, Chen J, Liu M (2018) Application of Blockchain in Internet of Things. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11067:73–82. https://doi.org/10.1007/978-3-030-00018-9_7

    Article  Google Scholar 

  23. Lo SK, Liu Y, Chia SY, Xu X, Lu Q, Zhu L, Ning H (2019) Analysis of Blockchain solutions for IoT: a systematic literature review. IEEE Access 7:58822–58835. https://doi.org/10.1109/ACCESS.2019.2914675

    Article  Google Scholar 

  24. Viriyasitavat W, Anuphaptrirong T, Hoonsopon D (2019) When Blockchain meets Internet of Things: characteristics, challenges, and business opportunities. J Indust Inf Integr. https://doi.org/10.1016/j.jii.2019.05.002

    Article  Google Scholar 

  25. Iqbal M, Matulevicius R (2019) Blockchain-based application security risks: a systematic literature review. Intern Conf Adv Inf Syst Eng 349:176–188. https://doi.org/10.1007/978-3-030-20948-3

    Article  Google Scholar 

  26. Maroufi M, Abdolee R, Tazekand BM (2019) On the convergence of Blockchain and Internet of Things (IoT) technologies. https://doi.org/https://doi.org/10.33423/jsis.v14i1.990

  27. Aly M, Khomh F, Haoues M, Quintero A, Yacout S (2019) Enforcing security in Internet of Things frameworks: a systematic literature review. Internet Things. https://doi.org/10.1016/j.iot.2019.100050

    Article  Google Scholar 

  28. Casino F, Dasaklis TK, Patsakis C (2019) A systematic literature review of Blockchain-based applications: current status, classification and open issues. Telematics Inform 36:55–81. https://doi.org/10.1016/j.tele.2018.11.006

    Article  Google Scholar 

  29. Conti M, Sandeep KE, Lal C, Ruj S (2018) A survey on security and privacy issues of bitcoin. IEEE Commun Surv Tut 20(4):3416–3452. https://doi.org/10.1109/COMST.2018.2842460

    Article  Google Scholar 

  30. Yang W, Garg S, Raza A, Herbert D, Kang B (2018) Blockchain: trends and future. Pacific Rim Know Acquisit Workshop. https://doi.org/10.1007/978-3-319-97289-3_15

    Article  Google Scholar 

  31. Li X, Jiang P, Chen T, Luo X, Wen Q (2018) A survey on the security of Blockchain systems. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2017.08.020

    Article  Google Scholar 

  32. Zhang Y, Wen J (2017) The IoT electric business model: using Blockchain technology for the Internet of Things. Peer-to-Peer Netw Appl 10(4):983–994. https://doi.org/10.1007/s12083-016-0456-1

    Article  Google Scholar 

  33. Pan L, Xu M, Xi L, Hao Y (2017) Research of livestock farming IoT system based on RESTful web services. In: 2016 5th International Conference on Computer Science and Network Technology, IEEE 113–116. https://doi.org/https://doi.org/10.1109/ICCSNT.2016.8070130

  34. Li Y, Cheng X, Cao Y, Wang D, Yang L (2018) Smart choice for the smart grid: narrowband Internet of Things (NB-IoT). IEEE Internet Things J 5(3):1505–1515. https://doi.org/10.1109/JIOT.2017.2781251

    Article  Google Scholar 

  35. Kouicem DE, Bouabdallah A, Lakhlef H (2018) Internet of Things security: a top-down survey. Comput Netw 141(2018):199–221. https://doi.org/10.1016/j.comnet.2018.03.012

    Article  Google Scholar 

  36. Moher D, Liberati A, Tetzlaff J, Altman DG (2009) Preferred reporting items for systematic reviews and meta-analyses. Ann Intern Med 151(4):264–269

    Article  Google Scholar 

  37. Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering. Software Engineering Group, Keele

    Google Scholar 

  38. Chatterjee R, Chatterjee R (2017) An overview of the emerging technology: Blockchain. In: Proceedings - 2017 International Conference on Computational Intelligence and Networks, pp 126–127. https://doi.org/https://doi.org/10.1109/CINE.2017.33

  39. Wolfert S, Ge L, Verdouw C, Bogaardt MJ (2017) Big data in smart farming—a review. Agric Syst 153:69–80. https://doi.org/10.1016/j.agsy.2017.01.023

    Article  Google Scholar 

  40. Gupta Y, Shorey R, Kulkarni D, Tew J (2018) The applicability of Blockchain in the Internet of Things. In: 2018 10th International Conference on Communication Systems and Networks, pp 561–564. https://doi.org/https://doi.org/10.1109/COMSNETS.2018.8328273

  41. Zyskind G, Nathan O, Pentland AS (2015) Decentralizing privacy: using Blockchain to protect personal data. IEEE Secur Privacy Workshops 2015:180–184. https://doi.org/10.1109/SPW.2015.27

    Article  Google Scholar 

  42. Dorri A, Roulin C, Jurdak R, Kanhere S (2018) On the activity privacy of Blockchain for IoT. arXiv preprint. https://arxiv.org/abs/1812.08970

  43. Konstantinidis I, Siaminos G, Timplalexis C, Zervas P, Peristeras V, Decker S (2018) Blockchain for business applications: a systematic literature review. Int Conf Bus Inf Syst. https://doi.org/10.1007/978-3-319-93931-5_28

    Article  Google Scholar 

  44. Morkunas VJ, Paschen J, Boon E (2019) How Blockchain technologies impact your business model. Bus Horiz 62(3):295–306. https://doi.org/10.1016/j.bushor.2019.01.009

    Article  Google Scholar 

  45. Banerjee M, Lee J, Choo KKR (2018) A Blockchain future for Internet of Things security: a position paper. Digital Commun Netw 4(3):149–160. https://doi.org/10.1016/j.dcan.2017.10.006

    Article  Google Scholar 

  46. Ben AA, Belhajji MA (2018) The Blockchain technology. Int J Hyperconnect Internet Things 1(2):1–11. https://doi.org/10.4018/ijhiot.2017070101

    Article  Google Scholar 

  47. Bhardwaj S, Kaushik M (2018) Blockchain—technology to drive the future. Smart Innov Syst Technol. https://doi.org/10.1007/978-981-10-5547-8_28

    Article  Google Scholar 

  48. Ahmed N, De D, Hussain I (2018) Internet of Things (IoT) for smart precision agriculture and farming in rural areas. IEEE Internet Things J 5(6):4890–4899. https://doi.org/10.1109/JIOT.2018.2879579

    Article  Google Scholar 

  49. Atlam HF, Wills GB (2018) Technical aspects of Blockchain and IoT. Adv Comput 115:1–39. https://doi.org/10.1016/bs.adcom.2018.10.006

    Article  Google Scholar 

  50. Mukkamala RR, Vatrapu R, Ray PK, Sengupta G, Halder S (2018) Blockchain for social business: principles and applications. IEEE Eng Manage Rev 46(4):94–99. https://doi.org/10.1109/EMR.2018.2881149

    Article  Google Scholar 

  51. Wang X, Zha X, Ni W, Ping R, Guo YJ, Niu X (2019) Survey on Blockchain for Internet of Things. Comput Commun 136:10–29. https://doi.org/10.1016/j.comcom.2019.01.006

    Article  Google Scholar 

  52. Ellervee A, Matulevicius R, Mayer N (2017) A comprehensive reference model for Blockchain-based distributed ledger technology. ER Forum/Demos 306–319

  53. Feng Q, He D, Zeadally S, Khan MK, Kumar N (2019) A survey on privacy protection in Blockchain system. J Netw Comput Appl 126:45–58. https://doi.org/10.1016/j.jnca.2018.10.020

    Article  Google Scholar 

  54. Hackius N, Petersen M (2017) Blockchain in logistics and supply chain: trick or treat? In digital supply chain management and logistics: smart and digital solutions for an industry 4.0 environment. In: Proceedings of the Hamburg International Conference of Logistics, vol. 23, pp 3–18. https://doi.org/https://doi.org/10.15480/882.1444

  55. Wahab J (2018) Privacy in Blockchain systems. arXiv preprint. https://arxiv.org/abs/1809.10642

  56. Salman T, Member S, Zolanvari M, Member S, Erbad A, Jain R, Samaka M (2019) Security services using Blockchains: a state of the art survey. IEEE Commun Surv Tut 21(1):858–880. https://doi.org/10.1109/COMST.2018.2863956

    Article  Google Scholar 

  57. Fabiano, N. (2018). The Internet of Things ecosystem: the Blockchain and privacy issues. In: The challenge for a global standard. International Conference on Internet of Things for the Global Community, pp 1–7. https://doi.org/https://doi.org/10.25046/aj030201

  58. Meng W, Tischhauser EW, Wang Q, Wang Y, Han J (2018) When intrusion detection meets Blockchain technology: a review. IEEE Access 6:10179–10188. https://doi.org/10.1109/ACCESS.2018.2799854

    Article  Google Scholar 

  59. Ahmad M, Salah K (2018) IoT security: review, Blockchain solutions, and open challenges. Future Gener Comput Syst 82:395–411. https://doi.org/10.1016/j.future.2017.11.022

    Article  Google Scholar 

  60. Lu Y (2019) The Blockchain: state-of-the-art and research challenges. J Indust Inf Integr 15:80–90. https://doi.org/10.1016/j.jii.2019.04.002

    Article  Google Scholar 

  61. Wang L, Shen X, Li J, Shao J, Yang Y (2019) Applications cryptographic primitives in Blockchains. J Netw Comput Appl 127:43–58. https://doi.org/10.1016/j.jnca.2018.11.003

    Article  Google Scholar 

  62. Wang S, Ouyang L, Yuan Y, Ni X, Han X, Wang FY (2019) Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans Syst Man Cybernet 49(11):2266–2277. https://doi.org/10.1109/TSMC.2019.2895123

    Article  Google Scholar 

  63. Wang J, Wang S, Guo J, Du Y, Cheng S, Li X (2019) A summary of research on Blockchain in the filed of intellectual property. Procedia Comput Sci 147:191–197. https://doi.org/10.1016/j.procs.2019.01.220

    Article  Google Scholar 

  64. Westerkamp M, Victor F, Küpper A (2019) Tracing manufacturing processes using Blockchain-based token compositions. Digital Commun Netw 6(2):167–176. https://doi.org/10.1016/j.dcan.2019.01.007

    Article  Google Scholar 

  65. Mohsin AH, Zaidan AA, Zaidan BB, Albahri OS, Albahri AS, Alsalem MA, Mohammed KI (2019) Computer Standards & Interfaces Blockchain authentication of network applications: Taxonomy, classi fi cation, capabilities, open challenges, motivations, recommendations and future directions. Comput Stand Interfaces 64:41–60. https://doi.org/10.1016/j.csi.2018.12.002

    Article  Google Scholar 

  66. Pustišek M, Kos A (2018) Approaches to front-end IoT application development for the approaches to front-end IoT application development for the ethereum Blockchain ethereum Blockchain. Procedia Comput Sci 129:410–419. https://doi.org/10.1016/j.procs.2018.03.017

    Article  Google Scholar 

  67. Taylor PJ, Dargahi T, Dehghantanha A, Parizi RM, Choo KR (2019) A systematic literature review of Blockchain cyber security. Digital Commun Netw 6(2):147–156. https://doi.org/10.1016/j.dcan.2019.01.005

    Article  Google Scholar 

  68. Shrestha R, Bajracharya R, Shrestha AP, Yeob S (2019) A new type of Blockchain for secure message exchange in VANET. Digital Commun Netw. https://doi.org/10.1016/j.dcan.2019.04.003

    Article  Google Scholar 

  69. Ali MS, Vecchio M, Pincheira M, Dolui K, Antonelli F, Rehmani MH, Member S (2019) Applications of Blockchains in the Internet of Things: a comprehensive survey. IEEE Commun Surv Tut 21(2):1676–1717. https://doi.org/10.1109/COMST.2018.2886932

    Article  Google Scholar 

  70. Wang W, Hoang DT (2019) A survey on consensus mechanisms and mining strategy management in Blockchain networks. IEEE Access 7:22328–22370. https://doi.org/10.1109/ACCESS.2019.2896108

    Article  Google Scholar 

  71. Al-jaroodi J (2019) Blockchain in industries: a survey. IEEE Access 7:36500–36515. https://doi.org/10.1109/ACCESS.2019.2903554

    Article  Google Scholar 

  72. Liu Z, Luong NC, Wang W, Niyato D, Wang P, Member S (2019) A survey on Blockchain: a game theoretical perspective. IEEE Access 7:47615–47643. https://doi.org/10.1109/ACCESS.2019.2909924

    Article  Google Scholar 

  73. Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the Internet of Things. IEEE Access 4:2292–2303. https://doi.org/10.1109/ACCESS.2016.2566339

    Article  Google Scholar 

  74. Mondal A, Rehena Z (2018) IoT based intelligent agriculture field monitoring system. In: 2018 8th International Conference on Cloud Computing, Data Science and Engineering Confluence, pp 625–629

  75. Sedrati A, Abdelraheem MA, Raza S (2018) Blockchain and IoT: Mind the Gap. Interoper Safe Secur IoT. https://doi.org/10.1007/978-3-319-93797-7

    Article  Google Scholar 

  76. Svetinovic D (2016) Blockchain engineering for the Internet of Things: systems security perspective. In: Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust and Security 1–1

  77. Palade A, Cabrera C, Li F, White G, Razzaque MA, Clarke S (2018) Middleware for Internet of Things: an evaluation in a small-scale IoT environment. J Reliable Intell 4:3–23. https://doi.org/10.1007/s40860-018-00055-4

    Article  Google Scholar 

  78. Staudemeyer RC, Pohls HC, Wojcik M (2019) What it takes to boost Intenet of Things privacy beyound encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net. J Reliable Intell 5:41–46. https://doi.org/10.1007/s40860-019-00075-0

    Article  Google Scholar 

  79. Sharma G, Kalra SA (2017) Asecure remote user authentication scheme for smart cities e-governance applications. J Reliable Intell Environ 3:177–188. https://doi.org/10.1007/s40860-017-0046-x

    Article  Google Scholar 

  80. Maigida AM, Abdulhahid SM, Olalere M, Alhassan JK, Chiroma H, Dada EM (2019) Systematic literature review and metadata analysis of ransomware attacks and detection mechanisms. J Reliable Intell 5(2):67–89. https://doi.org/10.1007/s40860-019-00080-3

    Article  Google Scholar 

  81. Crabtree A, Lodge T, Colley J, Greenhalgh C, Glover K, Haddadi H, Amar Y, Mortier R, Li Q, Moore J, Wang L, Yadav P, Zhao J, Brown A, Urquhart L, McAuley D (2018) Building accountability into the Internt of Things: the IoT Databox model. J Reliable Intell Environ 4:39–55. https://doi.org/10.1007/s40860-017-0046-x

    Article  Google Scholar 

  82. Karame G (2016) On the security and scalability of Bitcoin’s Blockchain. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 1861–1862. https://doi.org/https://doi.org/10.1145/2976749.2976756

  83. Mat I, Kassim MRM, Harun AN, Yusoff IM (2019) Smart agriculture using Internet of Things. IEEE Conf Open Syst 2018:54–59. https://doi.org/10.1109/ICOS.2018.8632817

    Article  Google Scholar 

  84. Shrestha R, Kim S (2019) Integration of IoT with Blockchain and homomorphic encryption: challenging issues and opportunities. Role Blockchain Technol IoT Appl 115:293. https://doi.org/10.1016/bs.adcom.2019.06.002

    Article  Google Scholar 

  85. Rajkumar MN, Abinaya S, Kumar VV (2017) Intelligent irrigation system - An IOT based approach. IEEE Int Conf Innov Green Energy Healthcare Technol. https://doi.org/10.1109/IGEHT.2017.8094057

    Article  Google Scholar 

  86. Ibáñez, LD, Kieron O, Simperl E (2018). On Blockchains and the general data protection regulation. EU Blockchain Forum and Observatory 1–13.

  87. Gao W, Hatcher WG, Yu W (2018) A survey of Blockchain: techniques, applications, and challenges. In: 2018 IEEE 27th International Conference on Computer Communication and Networks, pp 1–11.

  88. Nyamtiga BW, Costa J, Sicato S, Rathore S, Sung Y, Park JH (2019) Blockchain-based secure storage management with edge computing for IoT. Electronics 8(8):828

    Article  Google Scholar 

  89. Aziz A, Singh K (2019) Lightweight Security Scheme for Internet of Things. Wirel Pers Commun 104(2):577–593. https://doi.org/10.1007/s11277-018-6035-4

    Article  Google Scholar 

  90. Park S, Kim H, Ryou J (2018) Utilizing a lightweight PKI mechanism to guarantee a secure service in a cloud environment. J Supercomput 74(12):6988–7002. https://doi.org/10.1007/s11227-018-2506-3

    Article  Google Scholar 

  91. Halabi J, Artail H (2019) A lightweight synchronous cryptographic hash chain solution to securing the vehicle CAN bus. IEEE Int Multidiscipl Conf Eng Technol 2018:1–6. https://doi.org/10.1109/IMCET.2018.8603057

    Article  Google Scholar 

  92. Mohammedi M, Omar M, Aitabdelmalek W, Mansouri A, Bouabdallah A (2018) Secure and lightweight biometric-based remote patient authentication scheme for home healthcare systems. In: 2018 13th International Symposium on Programming and Systems, pp 1–6. https://doi.org/https://doi.org/10.1109/ISPS.2018.8379017

  93. Noura H, Chehab A, Sleem L, Noura M, Couturier R, Mansour MM (2018) One round cipher algorithm for multimedia IoT devices. Multimedia Tools Appl 77(14):18383–18413. https://doi.org/10.1007/s11042-018-5660-y

    Article  Google Scholar 

  94. Omrani T, Sliman L, Becheikh R, Belghith S, Hedia BB (2018) Towards an ultra-lightweight cryptosystem for IoT. Adv Intell Syst Comput. https://doi.org/10.1007/978-3-319-60618-7_60

    Article  Google Scholar 

  95. Chowdhury AR, Mahmud J, Kamal ARM, Hamid MA (2018) MAES: Modified advanced encryption standard for resource constraint environments 1–6. In: 2018 IEEE Sensors Applications Symposium. https://doi.org/https://doi.org/10.1109/SAS.2018.8336747

  96. Eldosouky A, Saad W (2018) On the cybersecurity of m-Health IoT systems with LED bitslice implementation. IEEE Inte Conf Consum Electron 2018:1–6. https://doi.org/10.1109/ICCE.2018.8326298

    Article  Google Scholar 

  97. Hou X, Wang J, Jiang C, Guan S, Ren Y (2018) A sink node assisted lightweight intrusion detection mechanism for WBAN. IEEE Int Conf Commun 2018:1–6. https://doi.org/10.1109/ICC.2018.8422794

    Article  Google Scholar 

  98. Noura M, Noura H, Chehab A, Mansour MM, Sleem L, Couturier R (2018) A dynamic approach for a lightweight and secure cipher for medical images. Multimedia Tools Appl 77(23):31397–31426. https://doi.org/10.1007/s11042-018-6051-0

    Article  Google Scholar 

  99. Haque MS, Chowdhury MU (2018) A new cyber security framework towards secure data communication for unmanned aerial vehicle (UAV). Intl Conf Secur Privacy Comm Syst. https://doi.org/10.1007/978-3-319-78816-6_9

    Article  Google Scholar 

  100. Mustafa G, Ashraf R, Mirza MA, Jamil A (2018) A review of data security and cryptographic techniques in IoT based devices. In: Proceedings of the2nd International Conference on Future Networks and Distributed Systems 1–9. https://doi.org/https://doi.org/10.1145/3231053.3231100

  101. Al Sibahee MA, Lu S, Abduljabbar ZA, Ibrahim A, Hussien ZA, Mutlaq KAA, Hussain MA (2018) Efficient encrypted image retrieval in IoT-cloud with multi-user authentication. Intl J Distrib Sens Netw. https://doi.org/10.1177/1550147718761814

    Article  Google Scholar 

  102. Buchanan WJ, Li S, Asif R (2018) Lightweight cryptography methods. J Cyber Secur Technol 1(3–4):187–201. https://doi.org/10.1080/23742917.2017.1384917

    Article  Google Scholar 

  103. Xu P, He S, Wang W, Susilo W, Jin H (2018) Lightweight searchable public-key encryption for cloud-assisted wireless sensor networks. IEEE Trans Industr Inf 14(8):3712–3723. https://doi.org/10.1109/TII.2017.2784395

    Article  Google Scholar 

  104. Alabdulatif A, Kumarage H, Khalil I, Yi X (2017) Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption. J Comput Syst Sci 90:28–45. https://doi.org/10.1016/j.jcss.2017.03.001

    Article  MathSciNet  MATH  Google Scholar 

  105. Naru ER, Saini H, Sharma M (2017) A recent review on lightweight cryptography in IoT. Proc Intern Conf IoT Soc Mobile Anal Cloud. https://doi.org/10.1109/I-SMAC.2017.8058307

    Article  Google Scholar 

  106. Diro AA, Chilamkurti N, Nam Y (2018) Analysis of lightweight encryption scheme for fog-to-things communication. IEEE Access 6:26820–26830. https://doi.org/10.1109/ACCESS.2018.2822822

    Article  Google Scholar 

  107. Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302–3312. https://doi.org/10.1109/ACCESS.2017.2677520

    Article  Google Scholar 

  108. Al Salami S, Baek J, Salah K, Damiani E (2016) Lightweight encryption for smart home. In: 2016 11th International Conference on Availability, Reliability and Security 382–388. https://doi.org/https://doi.org/10.1109/ARES.2016.40

  109. Lee JY, Lin WC, Huang YH (2014) A lightweight authentication protocol for Internet of Things. Int Sympos Next-Gener Electron 2014:1–2. https://doi.org/10.1109/ISNE.2014.6839375

    Article  Google Scholar 

  110. Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the Internet of Things. Future Gener Comput Syst 49:104–112. https://doi.org/10.1016/j.future.2014.10.010

    Article  Google Scholar 

  111. Moin S, Karim A, Safdar Z, Safdar K, Ahmed E, Imran M (2019) Securing IoTs in distributed Blockchain: analysis, requirements and open issues. Future Gener Comput Syst 100:325–343. https://doi.org/10.1016/j.future.2019.05.023

    Article  Google Scholar 

  112. Atlam HF, Wills GB (2019) Intersections between IoT and distributed ledger. Role Blockchain Technol IoT Appl 115:73–113. https://doi.org/10.1016/bs.adcom.2018.12.001

    Article  Google Scholar 

Download references

Acknowledgements

We acknowledge the contributions and thoroughness of the peer reviewers for adding value to the work.

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

Not applicable.

Corresponding author

Correspondence to Abraham Ayegba Alfa.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alfa, A.A., Alhassan, J.K., Olaniyi, O.M. et al. Blockchain technology in IoT systems: current trends, methodology, problems, applications, and future directions. J Reliable Intell Environ 7, 115–143 (2021). https://doi.org/10.1007/s40860-020-00116-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40860-020-00116-z

Keywords

Navigation