skip to main content
survey

Applications of Distributed Ledger Technologies to the Internet of Things: A Survey

Published:14 November 2019Publication History
Skip Abstract Section

Abstract

Distributed Ledger Technologies (DLTs) and blockchain systems have received enormous academic, government, and commercial interest in recent years. This article surveys the integration of DLTs within another life-changing technology, the Internet of Things (IoT). IoT-based applications, such as smart home, smart transport, supply chain, smart healthcare, and smart energy, promise to boost the efficiency of existing infrastructures and change every facet of our daily life. This article looks into the challenges faced by such applications and reviews a comprehensive selection of existing DLT solutions to those challenges. We also identify issues for future research, including DLT security and scalability, multi-DLT applications, and survival of DLT in the post-quantum world.

References

  1. ITU Internet Reports 2005: The Internet of Things. Retrieved from http://www.itu.int/pub/S-POL-IR.IT-2005/e.Google ScholarGoogle Scholar
  2. M. Hung. Leading the IoT, Reports. Retrieved from https://www.gartner.com/imagesrv/books/iot/iotEbook_digital.pdf.Google ScholarGoogle Scholar
  3. Internet of Things (IoT) Market: Global Demand, Growth Analysis 8 Opportunity Outlook 2023, Research Reports. Retrieved from https://www.researchnester.com/reports/internet-of-things-iot-market-global-demand-growth-analysis-opportunity-outlook-2023/216.Google ScholarGoogle Scholar
  4. L. Atzori, A. Iera, and G. Morabito. 2010. The internet of things: A survey. Comput. Netw. 54, 15 (2010), 2787--2805.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Al-Fuqaha, M. Guizani, M. Mohammadi, et al. 2015. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17, 4 (2015), 2347--2376.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. L. Xu, W. He, and S. Li. 2014. Internet of things in industries: A survey. IEEE Trans. Industr. Inf. 10, 4 (2014), 2233--2243.Google ScholarGoogle ScholarCross RefCross Ref
  7. K. Christidis and M. Devetsikiotis. 2016. Blockchains and smart contracts for the internet of things. IEEE Access 4 (2016), 2292--2303.Google ScholarGoogle ScholarCross RefCross Ref
  8. F. Tschorsch and B. Scheuermann. 2016. Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18, 3 (2016), 2084--2123.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Conti, S. Kumar, C. Lal, et al. 2018. A survey on security and privacy issues of bitcoin. IEEE Commun. Surv. Tutor. 20, 4 (2018), 3416--3452.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. C. K. Khalilov and A. Levi. 2018. A survey on anonymity and privacy in bitcoin-like digital cash systems. IEEE Commun. Surv. Tutor. 20, 3 (2018), 2543--2585.Google ScholarGoogle ScholarCross RefCross Ref
  11. T. Salman, M. Zolanvari, A. Erbad, et al. 2018. Security services using blockchains: A state of the art survey. IEEE Commun. Surv. Tutor. 21, 1 (2018), 858--880.Google ScholarGoogle ScholarCross RefCross Ref
  12. M. Conoscenti, A. Vetro, and J. C. De Martin. 2016. Blockchain for the Internet of Things: A systematic literature review. In Proceedings of the 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA’16). IEEE, 1--6.Google ScholarGoogle Scholar
  13. M. A. Khan and K. Salah. 2018. IoT security: Review, blockchain solutions, and open challenges. Fut. Gener. Comput. Syst. 82 (2018), 395--411.Google ScholarGoogle ScholarCross RefCross Ref
  14. K. Yeow, A. Gani, R. W. Ahmad, et al. 2018. Decentralized consensus for edge-centric Internet of Things: A review, taxonomy, and research issues. IEEE Access 6 (2018), 1513--1524.Google ScholarGoogle ScholarCross RefCross Ref
  15. E. F. Jesus, V. R. L. Chicarino, C. V. N. de Albuquerque, et al. 2018. A survey of how to use blockchain to secure internet of things and the stalker attack. Security and Communication Networks Article 9675050 (2018), 27 pages.Google ScholarGoogle Scholar
  16. T. M. Fernández-Caramés and P. Fraga-Lamas. 2018. A review on the use of blockchain for the Internet of Things. IEEE Access 6 (2018), 32979--33001.Google ScholarGoogle ScholarCross RefCross Ref
  17. A. Reyna, C. Martín, J. Chen, et al. 2018. On blockchain and its integration with IoT. Challenges and opportunities. Fut. Gener. Comput. Syst. 88 (2018), 173--190.Google ScholarGoogle ScholarCross RefCross Ref
  18. A. Panarello, N. Tapas, G. Merlino, et al. 2018. Blockchain and iot integration: A systematic survey. Sensors 18, 8 (2018), 2575.Google ScholarGoogle ScholarCross RefCross Ref
  19. T. M. Fernández-Caramés and P. Fraga-Lamas. 2019. A review on the application of blockchain to the next generation of cybersecure industry 4.0 smart factories. IEEE Access 7 (2019), 45201--45218.Google ScholarGoogle ScholarCross RefCross Ref
  20. M. Walport. 2016. Distributed ledger technology: Beyond blockchain. UK Government Office for Science[R]. Technical Report 2016.Google ScholarGoogle Scholar
  21. S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Retrieved from https://bitcoin.org/bitcoin.pdf.Google ScholarGoogle Scholar
  22. S. Popov. The Tangle. Retrieved from https://assets.ctfassets.net/r1dr6vzfxhev/2t4uxvsIqk0EUau6g2sw0g/45eae33637ca92f85dd9f4a3a218e1ec/iota1_4_3.pdf.Google ScholarGoogle Scholar
  23. A. Churyumov. Byteball: A Decentralized System for Storage and Transfer of Value. Retrieved from https://byteball.org/Byteball.pdf.Google ScholarGoogle Scholar
  24. F. M. Benčić and I. P. Žarko 2018. Distributed ledger technology: Blockchain compared to directed acyclic graph. In Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS’18). 1569--1570.Google ScholarGoogle ScholarCross RefCross Ref
  25. R. Schollmeier. 2001. A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In Proceedings of 1st IEEE International Conference on Peer-to-Peer Computing. 101--102.Google ScholarGoogle Scholar
  26. A. M. Antonopoulos. 2014. Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O’Reilly Media, Inc. (2014).Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. S. King and S. Nadal. 2012. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. Self-published paper, August 2012, 19.Google ScholarGoogle Scholar
  28. G. T. Nguyen and K. Kim. 2018. A survey about consensus algorithms used in blockchain. J. Inf. Process. Syst. 14, 1 (2018), 101--128.Google ScholarGoogle Scholar
  29. Bitcoin Energy Consumption Index. Retrieved from https://digiconomist.net/bitcoin-energy-consumption.Google ScholarGoogle Scholar
  30. V. Buterin. On Stake. Retrieved from https://blog.ethereum.org/2014/07/05/stake/.Google ScholarGoogle Scholar
  31. Nxt Whitepaper. Retrieved from https://bravenewcoin.com/assets/Whitepapers/NxtWhitepaper-v122-rev4.pdf.Google ScholarGoogle Scholar
  32. M. Ghosh, M. Richardson, B. Ford, et al. 2014. A TorPath to TorCoin: Proof-of-bandwidth altcoins for compensating relays. In Proceedings of the 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs’14).Google ScholarGoogle Scholar
  33. M. Castro and B. Liskov. 1999. Practical Byzantine fault tolerance. In Proceedings of the 3rd Symposium on Operating Systems Design and Implementation. 173--186.Google ScholarGoogle Scholar
  34. Hyperledger. Retrieved from https://www.hyperledger.org/.Google ScholarGoogle Scholar
  35. D. Schwartz, N. Youngs, and A. Britto. The Ripple protocol consensus algorithm. Ripple Labs Inc White Paper. Retrieved from http://ripple.com/files/ripple_consensus_whitepaper.pdf.Google ScholarGoogle Scholar
  36. R3. Retrieved from https://www.r3.com/.Google ScholarGoogle Scholar
  37. Stellar. Retrieved from https://www.stellar.org/.Google ScholarGoogle Scholar
  38. BigChainDB. Retrieved from https://www.bigchaindb.com/.Google ScholarGoogle Scholar
  39. Hashgraph. Retrieved from https://www.hederahashgraph.com/.Google ScholarGoogle Scholar
  40. Dagcoin. Retrieved from https://dogecoin.com/.Google ScholarGoogle Scholar
  41. V. Buterin, V. Griffith. Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437.Google ScholarGoogle Scholar
  42. The Mixin Network. Retrieved from https://mixin.one/.Google ScholarGoogle Scholar
  43. N. Szabo. 1997. Formalizing and securing relationships on public networks. First Monday 2, 9 (1997).Google ScholarGoogle Scholar
  44. V. Buterin. A next-generation smart contract and decentralized application platform. Retrieved from https://cryptorating.eu/whitepapers/Ethereum/Ethereum_white_paper.pdf.Google ScholarGoogle Scholar
  45. Deloitte, Blockchain Technology—A game-changer in accounting? Research Reports. Retrieved from https://www2.deloitte.com/content/dam/Deloitte/de/Documents/Innovation/Blockchain_A%20game-changer%20in%20accounting.pdf.Google ScholarGoogle Scholar
  46. Y. Yang, L. Wu, G. Yin, et al. 2017. A survey on security and privacy issues in internet-of-things. IEEE IoT J. 4, 5 (2017), 1250--1258.Google ScholarGoogle Scholar
  47. S. Sicari, A. Rizzardi, L. A. Grieco, et al. 2015. Security, privacy and trust in Internet of Things: The road ahead. Comput. Netw. 76 (2015), 146--164.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. A. Yakubov, W. Shbair, A. Wallbom, et al. 2018. A blockchain-based PKI management framework. In Proceedings of the 1st IEEE/IFIP International Workshop on Managing and Managed by Blockchain (Man2Block’18) Colocated with IEEE/IFIP NOMS 2018.Google ScholarGoogle ScholarCross RefCross Ref
  49. H. Orman. 2018. Blockchain: The emperors new PKI? IEEE Internet Comput. 22, 2 (2018), 23--28.Google ScholarGoogle ScholarCross RefCross Ref
  50. G. Pinto, J. P. Dias, and H. S. Ferreira. 2018. Blockchain-based PKI for crowdsourced IoT sensor information. In Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition (SoCPaR’18). 248--257.Google ScholarGoogle Scholar
  51. B. Liu, X. L. Yu, S. Chen, et al. 2017. Blockchain based data integrity service framework for IoT data. In Proceedings of the IEEE International Conference on Web Services (ICWS’17). 468--475.Google ScholarGoogle ScholarCross RefCross Ref
  52. A. Ouaddah, H. Mousannif, A. A. Elkalam, et al. 2017. Access control in the Internet of things: Big challenges and new opportunities. Comput. Netw. 112 (2017), 237--262.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. D. D. F. Maesa, P. Mori, and L. Ricci. 2017. Blockchain based access control. In Proceedings of the IFIP International Conference on Distributed Applications and Interoperable Systems. Springer, Cham, 206--220.Google ScholarGoogle Scholar
  54. H. Es-Samaali, A. Outchakoucht, and J. P. Leroy. 2017. A blockchain-based access control for big data. Int. J. Comput. Netw. Commun. Secur. 5, 7 (2017), 137.Google ScholarGoogle Scholar
  55. A. Ouaddah, A. A. Elkalam, and A. A. Ouahman. 2017. Towards a novel privacy-preserving access control model based on blockchain technology. In IoT[M]//Europe and MENA Cooperation: Advances in Information and Communication Technologies. Springer, Cham, 523--533.Google ScholarGoogle Scholar
  56. A. Ouaddah, A. Abou Elkalam, and A. Ait Ouahman. 2016. FairAccess: A new Blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 9, 18 (2016), 5943--5964.Google ScholarGoogle ScholarCross RefCross Ref
  57. A. Ouaddah, A. A. Elkalam, and A. Ouahman. 2017. Harnessing the power of blockchain technology to solve IoT security 8 privacy issues. In Proceedings of the 2nd International Conference on the Internet of Things and Data Cloud Computing (ICC’17). ACM, 2017.Google ScholarGoogle Scholar
  58. Y. Zhang, S. Kasahara, Y. Shen, et al. 2019. Smart contract-based access control for the Internet of Things. IEEE IoT J. 6, 2 (2019), 1594--1605.Google ScholarGoogle Scholar
  59. N. Rifi, E. Rachkidi, N. Agoulmine, et al. 2017. Towards using blockchain technology for IoT data access protection. In Proceedings of the IEEE 17th International Conference on Ubiquitous Wireless Broadband (ICUWB’17). IEEE, 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  60. G. G. Dagher, J. Mohler, M. Milojkovic, et al. 2018. Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sust. Cit. Soc. 39 (2018), 283--297.Google ScholarGoogle ScholarCross RefCross Ref
  61. O. Novo. 2018. Blockchain meets IoT: An architecture for scalable access management in IoT. IEEE IoT J. 5, 2 (2018), 1184--1195.Google ScholarGoogle Scholar
  62. O. J. A. Pinno, A. R. A. Gregio, and L. C. E. De Bona. 2017. ControlChain: Blockchain as a central enabler for access control authorizations in the IoT. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’17). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  63. A. Dorri, S. S. Kanhere, R. Jurdak, et al. 2017. LSB: A lightweight scalable blockchain for IoT security and privacy. arXiv preprint arXiv:1712.02969 (2017).Google ScholarGoogle Scholar
  64. G. Zyskind, O. Nathan, and A. Pentland. 2015. Enigma: Decentralized computation platform with guaranteed privacy. arXiv preprint arXiv:1506.03471 (2015).Google ScholarGoogle Scholar
  65. T. Hardjono and N. Smith. 2016. Cloud-based commissioning of constrained devices using permissioned blockchains. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security. ACM, 29--36.Google ScholarGoogle Scholar
  66. A. Moinet, B. Darties, and J. L. Baril. 2017. Blockchain based trust 8 authentication for decentralized sensor networks. arXiv preprint arXiv:1706.01730 (2017).Google ScholarGoogle Scholar
  67. R. D. Pietro, X. Salleras, M. Signorini, et al. 2018. A blockchain-based distributed Trust System for the Internet of Things[c]. In Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies (SACMAT’18). 77--83.Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. N. Alexopoulos, S. M. Habib, M. Mühlhäuser. 2018. Towards secure distributed trust management on a global scale: An analytical approach for applying Distributed Ledgers for authorization in the IoT. In Proceedings of the 2018 Workshop on IoT Security and Privacy. ACM, 49--54.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. J. Lin, Z. Shen, and C. Miao. 2017. Using blockchain technology to build trust in sharing LoRaWAN IoT. In Proceedings of the 2nd International Conference on Crowd Science and Engineering. ACM, 38--43.Google ScholarGoogle Scholar
  70. M. T. Hammi, B. Hammi, P. Bellot, et al. 2018. Bubbles of trust: A decentralized blockchain-based authentication system for IoT. Comput. Secur. 78 (2018), 126--142.Google ScholarGoogle ScholarCross RefCross Ref
  71. J. Groopman and J. Owyang. The Internet of Trusted Things: Blockchain as the Foundation for Autonomous Products 8 Ecosystem Services. Retrieved from http://www.kaleidoinsights.com/.Google ScholarGoogle Scholar
  72. A. Bochem, B. Leiding, and D. Hogrefe. 2018. Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad hoc Networks. In Proceedings of the Conference on Security and Privacy in Communication Networks (SecureComm’18).Google ScholarGoogle Scholar
  73. D. W. Kravitz and J. Cooper. 2017. Securing user identity and transactions symbiotically: IoT meets blockchain. In Proceedings of the Global Internet of Things Summit (GIoTS’17). IEEE, 1--6.Google ScholarGoogle Scholar
  74. C. Lin, D. He, X. Huang, et al. 2018. A new transitively closed undirected graph authentication scheme for blockchain-based identity management systems. IEEE Access 6 (2018), 28203--28212.Google ScholarGoogle ScholarCross RefCross Ref
  75. R. Li, T. Song, B. Mei, et al. 2018. Blockchain for large-scale internet of things data storage and protection. IEEE Trans. Serv. Comput. 12, 5 (2018), 762--771.Google ScholarGoogle ScholarCross RefCross Ref
  76. M. M. Aung and Y. S. Chang. 2014. Traceability in a food supply chain: Safety and quality perspectives. Food Contr. 39 (2014), 172--184.Google ScholarGoogle ScholarCross RefCross Ref
  77. P. Lin, M. Li, X. Kong, et al. 2018. Synchronisation for smart factory-towards IoT-enabled mechanisms. Int. J. Comput. Integr. Manufact. 31, 7 (2018), 624--635.Google ScholarGoogle ScholarCross RefCross Ref
  78. R. K. Lomotey, J. Pry, and S. Sriramoju. 2017. Wearable IoT data stream traceability in a distributed health information system. Perv. Mobile Comput. 40 (2017), 692--707.Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. H. Shafagh, L. Burkhalter, A. Hithnawi, et al. 2017. Towards blockchain-based auditable storage and sharing of iot data. In Proceedings of the 2017 on Cloud Computing Security Workshop. ACM, 45--50.Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. S. Suzuki and J. Murai. 2017. Blockchain as an audit-able communication channel. In Proceedings of the IEEE 41st Annual Computer Software and Applications Conference (COMPSAC’17). 516--522.Google ScholarGoogle Scholar
  81. A. Boudguiga, N. Bouzerna, L. Granboulan, et al. 2017. Towards better availability and accountability for iot updates by means of a blockchain. In Proceedings of the IEEE European Symposium on Security and Privacy Workshops (EuroS8PW’17). IEEE, 50--58.Google ScholarGoogle ScholarCross RefCross Ref
  82. S. Huckle, R. Bhattacharya, M. White, et al. 2016. Internet of things, blockchain and shared economy applications. Proc. Comput. Sci. 98 (2016), 461--466.Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Y. Zhang and J. Wen. 2017. The IoT electric business model: Using blockchain technology for the internet of things. Peer-to-Peer Netw. Appl. 10, 4 (2017), 983--994.Google ScholarGoogle ScholarCross RefCross Ref
  84. T. Lundqvist, A. de Blanche, and H. R. H. Andersson. 2017. Thing-to-thing electricity micro payments using blockchain technology. In Proceedings of the Global Internet of Things Summit (GIoTS’17). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  85. N. Komninos, E. Philippou, and A. Pitsillides. 2014. Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Commun. Surv. Tutor. 16, 4 (2014), 1933--1954.Google ScholarGoogle ScholarCross RefCross Ref
  86. A. Dorri, S. S. Kanhere, and R. Jurdak. 2016. Blockchain in internet of things: Challenges and solutions. arXiv preprint arXiv:1608.05187 (2016).Google ScholarGoogle Scholar
  87. A. Dorri, S. S. Kanhere, R. Jurdak, et al. 2017. Blockchain for IoT security and privacy: The case study of a smart home. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops’17). 618--623.Google ScholarGoogle ScholarCross RefCross Ref
  88. A. Dorri, S. S. Kanhere, and R. Jurdak. 2017. Towards an optimized blockchain for IoT. In Proceedings of the 2nd International Conference on Internet-of-Things Design and Implementation. ACM, 173--178.Google ScholarGoogle Scholar
  89. Y. N. Aung and T. Tantidham. 2017. Review of Ethereum: Smart home case study. In Proceedings of the IEEE 2nd International Conference on Information Technology (INCIT’17). 1--4.Google ScholarGoogle Scholar
  90. C. Qu, M. Tao, and R. Yuan. 2018. A hypergraph-based blockchain model and application in Internet of Things-enabled smart homes. Sensors 18, 9 (2018), 2784.Google ScholarGoogle ScholarCross RefCross Ref
  91. A. Dorri, M. Steger, S. S. Kanhere, et al. 2017. Blockchain: A distributed solution to automotive security and privacy. IEEE Commun. Mag. 55, 12 (2017), 119--125.Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. A. Lei, H. Cruickshank, Y. Cao, et al. 2017. Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE IoT. J. 4, 6 (2017), 1832--1843.Google ScholarGoogle Scholar
  93. R. A. Michelin, A. Dorri, R. C. Lunardi, et al. 2018. SpeedyChain: A framework for decoupling data from blockchain for smart cities. arXiv preprint arXiv:1807.01980 (2018).Google ScholarGoogle Scholar
  94. L. Li, J. Liu, L. Cheng, et al. 2018. CreditCoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Trans. Intell. Transport. Syst. 19, 7 (2018), 2204--2220.Google ScholarGoogle ScholarCross RefCross Ref
  95. V. Ortega, F. Bouchmal, J. F. Monserrat. 2018. Trusted 5G vehicular networks: Blockchains and content-centric networking. IEEE Vehic. Technol. Mag. 13, 2 (2018), 121--127.Google ScholarGoogle ScholarCross RefCross Ref
  96. M. Singh and S. Kim. 2018. Branch based blockchain technology in intelligent vehicle. Comput. Netw. 145 (2018), 219--231.Google ScholarGoogle ScholarCross RefCross Ref
  97. Z. Lu, Q. Wang, G. Qu, et al. 2018. Bars: A blockchain-based anonymous reputation system for trust management in vanets. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE’18). IEEE, 98--103.Google ScholarGoogle Scholar
  98. Z. Lu, W. Liu, Q. Wang, et al. 2018. A privacy-preserving trust model based on blockchain for VANETs. IEEE Access 6 (2018), 45655--45664.Google ScholarGoogle ScholarCross RefCross Ref
  99. Z. Yang, K. Zheng, K. Yang, et al. 2017. A blockchain-based reputation system for data credibility assessment in vehicular networks. In Proceedings of the IEEE 28th Annual International Symposium, Personal, Indoor, and Mobile Radio Communications (PIMRC’17). 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  100. Z. Su, Y. Wang, Q. Xu, et al. 2018. A secure charging scheme for electric vehicles with smart communities in energy blockchain. IEEE IoT J. 6, 3 (2018), 4601--4613.Google ScholarGoogle Scholar
  101. C. Liu, K. K. Chai, X. Zhang, et al. 2018. Adaptive blockchain-based electric vehicle participation scheme in smart grid platform. IEEE Access 6 (2018), 25656--25665.Google ScholarGoogle Scholar
  102. X. Huang, C. Xu, P. Wang, et al. 2018. Lnsc: A security model for electric vehicle and charging pile management based on blockchain ecosystem. IEEE Access 99 (2018), 1--1.Google ScholarGoogle Scholar
  103. J. Kang, R. Yu, X. Huang, et al. 2017. Enabling localized peer-to-peer electricity trading among plug-in hybrid electric vehicles using consortium blockchains. IEEE Trans. Industr. Inf. 13, 6 (2017), 3154--3164.Google ScholarGoogle ScholarCross RefCross Ref
  104. H. Liu, Y. Zhang, and T. Yang. 2018. Blockchain-enabled security in electric vehicles cloud and edge computing. IEEE Netw. 32, 3 (2018), 78--83.Google ScholarGoogle ScholarCross RefCross Ref
  105. F. Knirsch, A. Unterweger, and D. Engel. 2018. Privacy-preserving blockchain-based electric vehicle charging with dynamic tariff decisions. Comput. Sci. Res. Dev. 33, 1--2 (2018), 71--79.Google ScholarGoogle ScholarCross RefCross Ref
  106. F. Lamberti, V. Gatteschi, C. Demartini, et al. Blockchain or not blockchain, that is the question of the insurance and other sectors. IT Pro. (Early Access). DOI: 10.1109/MITP.2017.265110355Google ScholarGoogle Scholar
  107. F. Lamberti, V. Gatteschi, C. Demartini, et al. 2018. Blockchains can work for car insurance: Using smart contracts and sensors to provide on-demand coverage. IEEE Cons. Electr. Mag. 7, 4 (2018), 72--81.Google ScholarGoogle ScholarCross RefCross Ref
  108. C. Oham, S. S. Kanhere, R. Jurdak, et al. 2018. A blockchain based liability attribution framework for autonomous vehicles. arXiv preprint arXiv:1802.05050 (2018).Google ScholarGoogle Scholar
  109. C. Oham, R. Jurdak, S. S. Kanhere, et al. 2018. B-FICA: BlockChain based framework for auto-insurance claim and adjudication. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, (2018), 1171--1180.Google ScholarGoogle Scholar
  110. C. Konstantinos. 2016. Blockchains and smart contracts for the Internet of Things. IEEE Access 4, 5 (2016), 2292--303.Google ScholarGoogle ScholarCross RefCross Ref
  111. D. Miller. 2018. Blockchain and the Internet of Things in the industrial sector. IT Pro. 20, 3 (2018), 15--18.Google ScholarGoogle ScholarCross RefCross Ref
  112. Q. Lu and X. Xu. 2017. Adaptable blockchain-based systems: A case study for product traceability. IEEE Softw. 34, 6 (2017), 21--27.Google ScholarGoogle ScholarCross RefCross Ref
  113. Z. Gao, L. Xu, L. Chen, et al. 2018. Coc: A unified distributed ledger based supply chain management system. J. Comput. Sci. Technol. 33, 2 (2018), 237--248.Google ScholarGoogle ScholarCross RefCross Ref
  114. H. Wu, Z. Li, B. King, et al. 2017. A distributed ledger for supply chain physical distribution visibility. Information 8, 4 (2017), 137.Google ScholarGoogle ScholarCross RefCross Ref
  115. K. Leng, Y. Bi, L. Jing, et al. 2018. Research on agricultural supply chain system with double chain architecture based on blockchain technology. Fut. Gener. Comput. Syst. 86 (2018), 641--649.Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. J. F. Galvez, J. C. Mejuto, and J. Simal-Gandara. 2018. Future challenges on the use of blockchain for food traceability analysis. Trends in Analytical Chemistry 107 (2018), 222--232.Google ScholarGoogle ScholarCross RefCross Ref
  117. D. Mao, F. Wang, Z. Hao, et al. 2018. Credit evaluation system based on blockchain for multiple stakeholders in the food supply chain. Int. J. Environ. Res. Publ. Health 15, 8 (2018), 1627.Google ScholarGoogle ScholarCross RefCross Ref
  118. Skuchain Brackets—Blockchain Technology for Collaborative Commerce. Retrieved from https://www.skuchain.com/.Google ScholarGoogle Scholar
  119. M. Mettler. 2016. Blockchain technology in healthcare: The revolution starts here. In Proceedings of the IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom’16). 1--3.Google ScholarGoogle ScholarCross RefCross Ref
  120. Q. Xia, E. B. Sifah, K. O. Asamoah, et al. 2017. MeDShare: Trust-less medical data sharing among cloud service providers via blockchain. IEEE Access 5 (2017), 14757--14767.Google ScholarGoogle ScholarCross RefCross Ref
  121. K. Fan, S. Wang, Y. Ren, et al. 2018. MedBlock: Efficient and secure medical data sharing via blockchain. J. Med. Syst. 42, 8 (2018), 136.Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. A. Zhang and X. Lin. 2018. Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. J. Med. Syst. 42, 8 (2018), 140.Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. C. Esposito, A. De Santis, G. Tortora, et al. 2018. Blockchain: A panacea for healthcare cloud-based data security and privacy? IEEE Cloud Comput. 5, 1 (2018), 31--37.Google ScholarGoogle ScholarCross RefCross Ref
  124. J. Zhang, N. Xue, and X. Huang. 2016. A secure system for pervasive social network-based healthcare. IEEE Access 4 (2016), 9239--9250.Google ScholarGoogle ScholarCross RefCross Ref
  125. K. N. Griggs, O. Ossipova, C. P. Kohlios, et al. 2018. Healthcare blockchain system using smart contracts for secure automated remote patient monitoring. J. Med. Syst. 42, 7 (2018), 130.Google ScholarGoogle ScholarDigital LibraryDigital Library
  126. X. Liang, J. Zhao, S. Shetty, et al. 2017. Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In Proceedings of the 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC’17). IEEE, 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  127. M. A. Uddin, A. Stranieri, I. Gondal, et al. 2018. Continuous patient monitoring with a patient centric agent: A block architecture. IEEE Access 6 (2018), 32700--32726.Google ScholarGoogle ScholarCross RefCross Ref
  128. H. T. Wu and C. W. Tsai. 2018. Toward blockchains for health-care systems: Applying the bilinear pairing technology to ensure privacy protection and accuracy in data sharing. IEEE Cons. Electr. Mag. 7, 4 (2018), 65--71.Google ScholarGoogle ScholarCross RefCross Ref
  129. R. Guo, H. Shi, Q. Zhao, et al. 2018. Secure attribute-based signature scheme with multiple authorities for Blockchain in electronic health records systems. IEEE Access 776, 99 (2018), 1--12.Google ScholarGoogle Scholar
  130. J. Gao, K. O. Asamoah, E. B. Sifah, et al. 2018. GridMonitoring: Secured sovereign blockchain based monitoring on smart grid. IEEE Access 6 (2018), 9917--9925.Google ScholarGoogle ScholarCross RefCross Ref
  131. Z. Guan, G. Si, X. Zhang, et al. 2018. Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun. Mag. 56, 7 (2018), 82--88.Google ScholarGoogle ScholarCross RefCross Ref
  132. C. Rottondi and G. Verticale. 2017. A privacy-friendly gaming framework in smart electricity and water grids. IEEE Access 5 (2017), 14221--14233.Google ScholarGoogle ScholarCross RefCross Ref
  133. N. Z. Aitzhan and D. Svetinovic. 2018. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans. Depend. Sec. Comput. 15, 5 (2018), 840--852.Google ScholarGoogle ScholarCross RefCross Ref
  134. Z. Li, J. Kang, R. Yu, et al. 2018. Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans. Industr. Inf. 14, 8 (2018), 3690--3700.Google ScholarGoogle Scholar
  135. K. Biswas and V. Muthukkumarasamy. 2016. Securing smart cities using blockchain technology. In Proceedings of the Conference on High Performance Computing and Communications, the IEEE 14th International Conference on Smart City, and the IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS’16). 1392--1393.Google ScholarGoogle Scholar
  136. S. Ibba, A. Pinna, M. Seu, et al. 2017. CitySense: Blockchain-oriented smart cities. In Proceedings of the XP2017 Scientific Workshops. ACM, 12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  137. P. K. Sharma, S. Rathore, and J. H. Park. 2018. DistArch-SCNet: Blockchain-based distributed architecture with Li-Fi communication for a scalable smart city network. IEEE Cons. Electr. Mag. 7, 4 (2018), 55--64.Google ScholarGoogle ScholarCross RefCross Ref
  138. N. Tapas, G. Merlino, and F. Longo. 2018. Blockchain-based IoT-cloud authorization and delegation. In Proceedings of the 2018 IEEE International Conference on Smart Computing (SMARTCOMP’18). IEEE, 411--416.Google ScholarGoogle Scholar
  139. F. Longo, D. Bruneo, S. Distefano, G. Merlino, and A. Puliafito. 2017. Stack4Things: A sensing-and-actuation-as-a-service framework for IoT and cloud integration. Ann. Telecommun. 72, 1--2 (2017), 53--70.Google ScholarGoogle ScholarCross RefCross Ref
  140. R. M. Parizi, A. Dehghantanha, K. K. R. Choo, et al. 2018. Empirical vulnerability analysis of automated smart contracts security testing on blockchains. arXiv preprint arXiv:1809.02702 (2018).Google ScholarGoogle Scholar
  141. F. M. Ablayev, D. A. Bulychkov, D. A. Sapaev, A. V. Vasiliev, and M. T. Ziatdinov. 2018. Quantum-assisted blockchain. Lobachev. J. Math. 39, 7 (Sep. 2018), 957--960.Google ScholarGoogle ScholarCross RefCross Ref
  142. D. Aggarwal, G. Brennen, T. Lee, M. Santha, and M. Tomamichel. 2018. Quantum attacks on bitcoin, and how to protect against them. Ledger 3 (2018), 68--90.Google ScholarGoogle ScholarCross RefCross Ref
  143. U. Banerjee, A. Pathak, and A. P. Chandrakasan. 2019. An energy-efficient configurable lattice cryptography processor for the quantum-secure internet of things. In Proceedings of the IEEE International Solid- State Circuits Conference (ISSCC’19). 46--48.Google ScholarGoogle Scholar
  144. N. Fernando, S. W. Loke, and W. Rahayu. 2013. Mobile cloud computing: A survey. Fut. Gener. Comput. Syst. 29, 1 (Jan. 2013), 84--106.Google ScholarGoogle ScholarDigital LibraryDigital Library
  145. James Howe, Tobias Oder, Markus Krausz, and Tim Güneysu. 2018. Standard lattice-based key encapsulation on embedded devices. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018, 3 (Aug. 2018), 372--393.Google ScholarGoogle Scholar
  146. H. Nejatollahi, N. Dutt, S. Ray, F. Regazzoni, I. Banerjee, and R. Cammarota. 2019. Post-quantum lattice-based cryptography implementations: A survey. ACM Comput. Surv. 51, 6 (Jan. 2019), 129:1--129:41.Google ScholarGoogle ScholarDigital LibraryDigital Library
  147. I. Psaras. 2018. Decentralised edge-computing and iot through distributed trust. In Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys’18). ACM, New York, NY, 505--507.Google ScholarGoogle ScholarDigital LibraryDigital Library
  148. D. Rajan and M. Visser. 2019. Quantum blockchain using entanglement in time. Quant. Rep. 1, 1 (2019), 3--11.Google ScholarGoogle ScholarCross RefCross Ref
  149. P. Rizun. 2016. Subchains: A technique to scale bitcoin and improve the user experience. Ledger 1 (2016), 38--52.Google ScholarGoogle ScholarCross RefCross Ref
  150. Dapp statistics. Retrieved from https://www.stateofthedapps.com/stats.Google ScholarGoogle Scholar
  151. Hyperledger Fabric. Retrieved from https://www.hyperledger.org/projects/fabric.Google ScholarGoogle Scholar
  152. IBM Watson IoT Platform. Retrieved from https://www.ibm.com/internet-of-things/solutions/iot-platform/watson-iot-platform.Google ScholarGoogle Scholar
  153. Hyperledger Burrow. Retrieved from https://www.hyperledger.org/projects/hyperledger-burrow.Google ScholarGoogle Scholar
  154. Hyperledger Indy. Retrieved from https://www.hyperledger.org/projects/hyperledger-indy.Google ScholarGoogle Scholar
  155. Hyperledger Iroha. Retrieved from https://www.hyperledger.org/projects/iroha.Google ScholarGoogle Scholar
  156. Hyperledger Sawtooth. Retrieved from https://www.hyperledger.org/projects/sawtooth.Google ScholarGoogle Scholar
  157. Hyperledger Grid. Retrieved from https://www.hyperledger.org/projects/grid.Google ScholarGoogle Scholar
  158. Statistics of IOTA. Retrieved from https://thetangle.org/live.Google ScholarGoogle Scholar
  159. IoT Chain. Retrieved from https://iotchain.io/.Google ScholarGoogle Scholar
  160. IoTex. Retrieved from https://iotex.io/.Google ScholarGoogle Scholar
  161. Bitshares. Retrieved from https://bitshares.org/.Google ScholarGoogle Scholar
  162. S. Micali, M. Rabin, and S. Vadhan. 1999. Verifiable random functions. In Proceedings of the 40th Annual Symposium on Foundations of Computer Science. IEEE, 120--130.Google ScholarGoogle Scholar
  163. HDAC. Retrieved from https://www.hdactech.com/en/ index.do.Google ScholarGoogle Scholar
  164. Streamr. Retrieved from https://www.streamr.com/.Google ScholarGoogle Scholar
  165. Atonomi. Retrieved from https://atonomi.io/.Google ScholarGoogle Scholar
  166. Ambrosus. Retrieved from https://ambrosus.com/.Google ScholarGoogle Scholar
  167. OriginTrail. Retrieved from https://origintrail.io/.Google ScholarGoogle Scholar
  168. Grid+. Retrieved from https://gridplus.io/.Google ScholarGoogle Scholar
  169. Power Ledger. Retrieved from https://www.powerledger.io/.Google ScholarGoogle Scholar
  170. EcoChain. Retrieved from https://ecochain.com/.Google ScholarGoogle Scholar
  171. Doc.ai. Retrieved from https://doc.ai/.Google ScholarGoogle Scholar
  172. How Bumble Bee Uses Blockchain to Track and Trace Your Fish? Retrieved from https://www.forbes.com/sites/sap/2019/03/11/video-how-bumble-bee-uses-blockchain-to-track-and-trace-your-fish/#5c05ae7f3690.Google ScholarGoogle Scholar
  173. Veracity Protocol. Retrieved from https://veracityprotocol.org/.Google ScholarGoogle Scholar
  174. Pairing AI with Optical Scanning for Real-World Product Authentication. Retrieved from https://www.ibm.com/blogs/research/2018/05/ai-authentication-verifier/.Google ScholarGoogle Scholar
  175. Different Types of Blockchains in the Market and Why We Need Them? Retrieved from https://coinsutra.com/different-types-blockchains/.Google ScholarGoogle Scholar
  176. ISO/TC 307. Retrieved from https://www.iso.org/committee/6266604.html.Google ScholarGoogle Scholar
  177. IEEE Standrds. Retrieved from https://blockchain.ieee.org/standards.Google ScholarGoogle Scholar
  178. Blocknet. Retrieved from https://blocknet.co/.Google ScholarGoogle Scholar

Index Terms

  1. Applications of Distributed Ledger Technologies to the Internet of Things: A Survey

        Recommendations

        Reviews

        Christoph F. Strnadl

        If you have ever wondered how the Internet of Things (IoT)-the interconnection of physical and virtual things through existing and evolving communication technologies-might benefit from blockchain and other distributed ledger technologies (DLTs), this valuable survey gives a recent (but not totally up to date, and partly inaccurate) report. The introductory section on DLT features a nice five-layer architecture for structuring an explanation on how blockchains typically work. It also rightfully mentions the use of non-block-oriented architectures (like a directed acyclic graph in IOTA and others) in order to overcome scalability issues of classical blockchains. Unfortunately, the text contains some severe inaccuracies that render it unreliable for the unversed reader (for example, mining is not about finding a correct pre-hash; miners also get a block reward, not just transaction fees; Ethereum at large is still not using proof-of-stake; and others). The survey itself uses a bottom-up (technology-based) and a top-down (use case) approach to briefly introduce around 50 interesting applications of DLT. Security, privacy, identity management, machine-to-machine (M2M) transactions, traceability, and (data) provenance are the technology domains covered in more detail, while the smart city context with a focus on smart homes, smart transport, smart grids, healthcare, and supply chains is used to guide the top-down discussion regarding use cases. The booming area of decentralized finance (DeFi) is (deliberately) missing. Each section introduces the domain and explains how it operates today and what challenges are currently unsolved. The main part consists of vignettes (of widely varying detail) on how DLTs are solving some problems better than available technologies, typically citing several interesting but superficially explained example implementations. The authors include paragraph-long summaries for, and a superficial comparison of, 14 DLTs for IoT (including Bitcoin and Ethereum). Finally, they highlight open challenges such as the physical connection of the DLT to a device, the problem of scalability, and the quest for interoperability of the many multi-blockchain scenarios encountered previously. Disregarding several further inaccuracies-for example, a logically central application does not necessarily become a single point of failure; Hyperledger Indy is specialized for identity management; IOTA is not limited to M2M, but also provides identity management, marketplaces, and smart contracts-I really did like the breadth of the material, much of which is hard to obtain from other sources. For instance, I was easily able to identify the two prevalent architectural patterns employed in almost all applications, namely (i) the use of a blockchain gateway to enable resource-constrained IoT devices to access the ledger, and (ii) the deployment of several interconnected blockchains to solve some shortcomings of current DLTs (such as limited scalability). I recommend this survey to everyone interested in getting a comprehensive overview and initial understanding of how DLTs may benefit the IoT domain. While readers must not expect a good and exact introduction to blockchains, nor all the required (technical) details for every single use case, the nearly 180 references provide ample anchors to delve deeper into this exciting combination of two technology domains.

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Computing Surveys
          ACM Computing Surveys  Volume 52, Issue 6
          November 2020
          806 pages
          ISSN:0360-0300
          EISSN:1557-7341
          DOI:10.1145/3368196
          • Editor:
          • Sartaj Sahni
          Issue’s Table of Contents

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 November 2019
          • Revised: 1 August 2019
          • Accepted: 1 August 2019
          • Received: 1 May 2019
          Published in csur Volume 52, Issue 6

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • survey
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format