Review Article

On Blockchain and IoT Integration Platforms: Current Implementation Challenges and Future Perspectives

Table 5

Literature on different security approaches that have been considered for BIoT applications.

ReferencesArea of studyResearch contribution

Ding et al. [116], Ali et al. [117]Access controlResearchers employed a blockchain-permissioned delegation approach to help control the access of data from IoT devices. This was to help protect the vital information from IoT devices.
Mohanta et al. [118], Huh et al. [119], Xie et al. [120], Maw et al. [121]Trust assuranceMany IoT applications run on centralized systems where the integrity of the data is provided by third parties. The authors in these papers proposed better trust management processes to help main the integrity of data in BIoT implementations.
Li et al. [22], Biswas et al. [56], Dorri et al. [122]ScalabilityScalability issues in BIoT applications were tackled by these authors who provided frameworks on how to make them more scalable.
Shen et al. [114], Lv et al. [123], Hassan et al. [124], Sagirlar et al. [125], Xu et al. [2]Data privacy preservationThe authors in these papers provide blockchain-based encryption techniques to help preserve the privacy of the users and nodes on the blockchain.
Liu and Seo [126], Mohanta et al. [127], Hammi et al. [128], Mohsin et al. [129], Lin et al. [130], Gope et al. [131], Zhang et al. [132], Conti et al. [133]AuthenticationDevice authentication is one of the important factors considered in these papers. The authors used different approaches to tackle the authentication issue from RFID-based authentication schemes, delegated authentication schemes, PSO-AES, mutual authentication, and distributed authentication for IoT implementations.
Si et al. [134], Li et al. [135], Roy et al. [136], Danzi et al. [137], Pan et al. [138], Zhou et al. [139], Yang et al. [140], Li et al. [141]Information exchangeThe authors in these papers discussed and proposed blockchain-based information exchange as part of IoT application implementations.