|
Ref | Publication type | Year | Finding | Types of security applications |
|
[150] | J | 2016 | Proof of the pseudonymous concept protocol for secure communications among the IoT devices using Bitcoin in blockchain technology | IoT |
[151] | J | 2016 | A broad review of the advantages of blockchain-based IoT devices. For example, instead of distributing firmware patches from the middle, IoT devices from one vendor are connected to the same blockchain firmware and spread peer to peer. It is acknowledged that a token is needed. Alternative solutions are presented. | IoT |
[152] | J | 2018 | Deprived of relying on an essential service like Notary, a blockchain-based system for ensuring the authenticity of Docker images has been developed (offers to defend against denial of service). The importance of a robust blockchain has been recognized. | Internet of Things & Docker |
[153] | C | 2017 | Blockchain is used to build a multilevel network of IoT computers. Rather than entirely autonomous nodes and miners, the blockchain’s security is managed by coordination between layers. | IoT |
[154] | C | 2017 | A concept for low-power IoT devices can connect with a proper gateway to allow Ethereum blockchain node communication. | IoT |
[155] | C | 2018 | Introducing “ControlChain,” a blockchain-based access power system for IoT devices. Using the same concepts as the Bitcoin blockchain, multiples are proposed. In blockchains, IoT control could be used to handle different aspects. | IoT |
[156] | C | 2018 | IoT data privacy, access, and trading are the main topics of discussion, suggesting a blockchain solution for each to provide anonymity. The Ethereum platform is being used. | IoT |
[157] | J | 2017 | Discussion on blockchain strengths and security, mainly with IoT. Highlighting IoT supply chain from manufacturer to end-user security benefits | IoT |
[158] | J | 2021 | Authentication methods for fog cloud IoT architecture | IoT |
[159] | J | 2021 | Provides a data mining technique based on Fischer linear discrimination and quadratic discrimination analysis | Big data and IoT |
[160] | J | 2018 | A thorough examination of IoT protection. What role could blockchain play in addressing the challenges of reducing current security threats to such devices? Mentioning Ethereum as a possible medium for developing smart contracts in an alternative manner | IoT |
[161] | C | 2018 | Suggestion to create “IoT Chain,” a blockchain-based system that allows the authentication to IoT devices and secure access. The Ethereum platform was used to assess the viability of their plan. Authentication servers, key servers, and clients are the three full nodes used by the researchers. The latter serves as the transaction miner, storing data on the blockchain through proof-of-stake and proof-of-work consent mechanisms. The researchers create their Proof-of-Possession system for IoT Chain. | IoT |
[162] | C | 2019 | Blockchain technology based on various technology in smart grid is discussed in this paper, i.e., cost reduction, communication between provider and consumer, machine-to-machine interaction, and security. | IoT |
[163] | J | 2019 | User-friendliness and energy optimization in terms of electronics devices controlling and monitoring. This study focused on the interdisciplinary domain that will be helpful for new researchers. | IoT |
[164] | J | 2020 | Build a green IoT ecosystem based on blockchain technology and discussed the crucial factors and future research direction for a sustainable green IoT ecosystem. | IoT |
[165] | J | 2020 | Blockchain-based IoT architecture for HANs and NANs in SG system | IoT |
[166] | J | 2021 | Blockchain-based access control protocol in IoT-enabled SG system | IoT |
[167] | J | 2021 | IoT-based energy conversion process and inquire on future energy demand on SG system | IoT |
|