|
Reference | Problem addressed | Technique used |
|
[68] | Access control, authentication management | Blockchain |
[69] | Authentication management | Blockchain, HTTPS protocol, and HMAC technology |
[70] | Confidentiality and reliability of IoT data | ECC asymmetric encryption, DH key exchange, RAF consensus protocol, blockchain |
[71] | Integrality and confidentiality of IoT data | Crowdsourcing, blockchain, DBSCAN |
[72] | IoT data sharing | Blockchain, edge computing |
[73] | IoT data sharing | Smart contact |
[74] | Collection and share of IIoT data | Blockchain, deep reinforcement learning |
[75] | Knowledge sharing | P2P networks, smart contact, consortium blockchain |
[76] | The balance between cache capacity and computing ability | Blockchain |
[77] | IoT cache offloading and computing | Cooperative computing, blockchain |
[78] | Multihop computing offloading | Game theory, blockchain |
[79] | Edge computing offloading | Blockchain ledger, NSGA-III |
|