Review Article

Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey

Table 4

Current research studies in blockchain for edge-enabled IoT services with AI.

ReferenceProblem addressedTechnique used

[68]Access control, authentication managementBlockchain
[69]Authentication managementBlockchain, HTTPS protocol, and HMAC technology
[70]Confidentiality and reliability of IoT dataECC asymmetric encryption, DH key exchange, RAF consensus protocol, blockchain
[71]Integrality and confidentiality of IoT dataCrowdsourcing, blockchain, DBSCAN
[72]IoT data sharingBlockchain, edge computing
[73]IoT data sharingSmart contact
[74]Collection and share of IIoT dataBlockchain, deep reinforcement learning
[75]Knowledge sharingP2P networks, smart contact, consortium blockchain
[76]The balance between cache capacity and computing abilityBlockchain
[77]IoT cache offloading and computingCooperative computing, blockchain
[78]Multihop computing offloadingGame theory, blockchain
[79]Edge computing offloadingBlockchain ledger, NSGA-III