Review Article
Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey
Table 8
Theoretical solutions offered by deploying blockchain in the IoT framework to prevent cyberattacks.
| Challenges in IoT | Specifications | Theoretical blockchain solution |
| Defects in architecture | A point of failure exists in IoT devices that affect the device and the network. | Validation can be done using blockchain. The data is also verified through cryptography to ensure that a legitimate sender has sent it [245]. | Manipulation of data | The data extracted from IoT devices is manipulated and is used inappropriately. | Using blockchain, the IoT devices are interlocked due to which the system rejects any kind of change in data through IoT devices [246, 247]. | Service inefficiency due to heavy load on the cloud server | Cloud services malfunctions due to cyberattack, power failures, or bugs in software. | Data records are uploaded on different nodes on the network. Due to the same data in different nodes, there is no single point of failure [248, 249]. | Traffic and cost management | The handling of the exponential growth in IoT devices is a tedious task. | The IoT devices can be connected and communicated through peers bypassing the central servers through the decentralization feature [250, 251]. | Privacy issues in IoT devices | The user data present in IoT devices are more vulnerable due to cyberattacks. | The permissioned blockchain can eradicate this problem [252ā254]. |
|
|