Review Article

Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey

Table 8

Theoretical solutions offered by deploying blockchain in the IoT framework to prevent cyberattacks.

Challenges in IoTSpecificationsTheoretical blockchain solution

Defects in architectureA point of failure exists in IoT devices that affect the device and the network.Validation can be done using blockchain. The data is also verified through cryptography to ensure that a legitimate sender has sent it [245].
Manipulation of dataThe data extracted from IoT devices is manipulated and is used inappropriately.Using blockchain, the IoT devices are interlocked due to which the system rejects any kind of change in data through IoT devices [246, 247].
Service inefficiency due to heavy load on the cloud serverCloud services malfunctions due to cyberattack, power failures, or bugs in software.Data records are uploaded on different nodes on the network. Due to the same data in different nodes, there is no single point of failure [248, 249].
Traffic and cost managementThe handling of the exponential growth in IoT devices is a tedious task.The IoT devices can be connected and communicated through peers bypassing the central servers through the decentralization feature [250, 251].
Privacy issues in IoT devicesThe user data present in IoT devices are more vulnerable due to cyberattacks.The permissioned blockchain can eradicate this problem [252ā€“254].