Review Article

Systematic Analysis of Risk Associated with Supply Chain Operations Using Blockchain Technology

Table 5

List of challenges reported in the literature.

S. noChallengesDescriptionReferences

1.SecurityThis study investigates the privacy, security, and policy challenges raised by this hybrid architecture to grasp the convergence and comprehend the integration of IoT and blockchain technologies.[7, 18, 45, 59, 65, 82, 94, 111]
2.ConfidentialityThis study examines blockchain-based solutions for a variety of security services. Services include confidentiality, access control, privacy, authentication, integrity assurance, and data and source provenance.[11]
3.Access controlThe paper analyzes the information security problem from data protection and access control to implementation with the emerging blockchain technology.[43]
4.Spam attacksIn this paper, a “spam attack” approach for parties with enough bitcoin holdings to delay a statistically significant share of transactions made to the Ethereum network.[103]
5.ScalabilityThe paper outlines the critical technological difficulties that must be addressed before it can reach its full potential, such as performance, cross-chain interoperability, and scalability.[69]
6.IntegratingThe article discusses the real-time challenge of integrating blockchain in the diamond industry.[112]
7.Recommender systemsThis article explains a comprehensive outline of blockchain-based recommender systems, including problems, unresolved concerns, and solutions.[57]
8.ApplicationsThis paper delivers and describes the implementation of the blockchain in the business sectors to secure the business activity.[45]
9.RoboticsThe study begins by delving into the major criteria and technological obstacles that robots face in general. Following that, it gives a full understanding of blockchain technology in an instructional format.[9]
10.SafetyThe study covers the combination of blockchain technology with Internet of vehicles system and to provide an efficient and safe two-way authentication method.[13, 101]
11.AlgorithmsThe paper analyzes the consensus algorithms, which are critical components for blockchain decentralization. Researchers identify three major consensus algorithms, including PoP, Paxos, and PoAH, that are better suited for establishing consensus on such a massive scale blockchain-enabled Internet architecture.[74, 113]
12.AdoptionResearchers recognize and discuss significant research challenges impeding blockchain adoption in the healthcare industry.[95]
13.IoT systemThe study discusses the many problems that an IoT system faces and summarizes the benefits of incorporating blockchain into IoT infrastructure. The study also explains the specially interest in demonstrating blockchain applications in IoT with better capabilities and security.[102]
14.AcceptanceThe paper gives a more in-depth look at the key features of the blockchain, as well as the prospects for application in the management of big data in healthcare and the barriers to its acceptance in the healthcare perspective.[96]
15.IntegrationThis article attempts to map the requirements and features of both systems and point out the critical coexistence difficulties and technology options for more seamless combination of IoT and blockchain.[4]
16.ThreatsThe paper discusses the architecture, features, and security threats of space-air-ground- (SAP-) IoT systems and focus on the capable blockchain-based solutions for SAG-IoT security.[68]
17.ImplementationsIn the article, the core challenge is to implement issues such as public vs. private key access, distributed ledger size restrictions, speed, complexity, and security risks.[13, 107]