|
References | Area of study | Research contribution |
|
Ding et al. [116], Ali et al. [117] | Access control | Researchers employed a blockchain-permissioned delegation approach to help control the access of data from IoT devices. This was to help protect the vital information from IoT devices. |
Mohanta et al. [118], Huh et al. [119], Xie et al. [120], Maw et al. [121] | Trust assurance | Many IoT applications run on centralized systems where the integrity of the data is provided by third parties. The authors in these papers proposed better trust management processes to help main the integrity of data in BIoT implementations. |
Li et al. [22], Biswas et al. [56], Dorri et al. [122] | Scalability | Scalability issues in BIoT applications were tackled by these authors who provided frameworks on how to make them more scalable. |
Shen et al. [114], Lv et al. [123], Hassan et al. [124], Sagirlar et al. [125], Xu et al. [2] | Data privacy preservation | The authors in these papers provide blockchain-based encryption techniques to help preserve the privacy of the users and nodes on the blockchain. |
Liu and Seo [126], Mohanta et al. [127], Hammi et al. [128], Mohsin et al. [129], Lin et al. [130], Gope et al. [131], Zhang et al. [132], Conti et al. [133] | Authentication | Device authentication is one of the important factors considered in these papers. The authors used different approaches to tackle the authentication issue from RFID-based authentication schemes, delegated authentication schemes, PSO-AES, mutual authentication, and distributed authentication for IoT implementations. |
Si et al. [134], Li et al. [135], Roy et al. [136], Danzi et al. [137], Pan et al. [138], Zhou et al. [139], Yang et al. [140], Li et al. [141] | Information exchange | The authors in these papers discussed and proposed blockchain-based information exchange as part of IoT application implementations. |
|