Research Article

Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive Survey

Table 5

Comparison table based on different parameters of the existing big data, cloud computing, and network security management technique.

S. no.ReferenceYearTechnology usedSummary of the workShortcoming of the workPossible solutionImplementation remarks

1.[73]2017(a) Smart contract, (b) cloud storageFramework for reliable data integrity verification for both the data owners and the data consumers, without relying on any third-party auditor (TPA)(a) Did not fully implement proposed protocols, (b) test environment is smallImplement all the protocols and test on a larger environmentImplementation of all proposed protocols has not been done

2.[74]2018(a) Smart contract, (b) edge computingCompared to centralized CAC, their scheme achieves the fine-grained access control and decentralized authorizationStorage-capacity constraint may be one of the problems in the proposed schemeFully distributed storage scheme is one of the possible solutionsDecentralized capability-based access control

3.[75]2018(a) Smart contract, (b) IoTStudied the use of smart contracts for addressing transparency, longevity, and trust by designing and evaluating framework for an automated gasoline-purchasing application(a) Low transaction throughput, (b) percentile transaction latency of the order of hours, (c) limited applicationsUse different consensus mechanism to reduce transaction timeHigh delay in transactions

4.[76]2019(a) Smart contract, (b) Ethereum, (c) homomorphic hash functionsFair nonrepudiation service provisioning scheme using blockchain as service publisher and evidence recorder to prevent service providers and clients from dishonestly denying service or usageIoT devices are not directly connected to blockchain network; instead they communicate through an arbitration nodeIPFS mechanism can be used for storing the IIoT dataDispute resolution in case of storing massive amounts of data on servers has not been considered

5.[77]2019(a) Smart contract, (b) distributed hash tableAddress security, trust, and island connection problems in decentralized manufacturing applications using on-chain and off-chain networksNot fully decentralizedUse fully decentralized architecture instead of selecting only a few nodes to maintain blockchain activitiesOn-chain network used for transaction, off-chain networks used for other tasks