2022
DOI: 10.1109/access.2022.3224222
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Literature Review of Lightweight Blockchain for IoT

Abstract: The Internet of Things (IoT) has become an essential part of our society. IoT devices are used in our houses, hospitals, cars, industry, etc., making our lives easier. Nonetheless, there are a number of serious concerns about security, privacy and performance issues in IoT. It has been proven that the aforementioned issues are strictly related to the high degree of centralisation of current IoT architecture. Thus, there is an increasing interest in adopting blockchain in IoT. However, blockchain adoption is no… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 135 publications
0
10
0
Order By: Relevance
“…Only a few solutions applied metrics to the transport/network layer (IV-B3)(IV-B3)(IV-B3) [39], [47]. Most solutions focused on the other two layers, perception and application [2], [20], [22], [24], [27], [41], [42], [48], [49], [50].…”
Section: Rq: Which Attack Types Can the Metric Detect?mentioning
confidence: 99%
See 1 more Smart Citation
“…Only a few solutions applied metrics to the transport/network layer (IV-B3)(IV-B3)(IV-B3) [39], [47]. Most solutions focused on the other two layers, perception and application [2], [20], [22], [24], [27], [41], [42], [48], [49], [50].…”
Section: Rq: Which Attack Types Can the Metric Detect?mentioning
confidence: 99%
“…Because most solutions use metrics working at the IoT device and application layers, the attack types that the above metrics can detect are common, including DoS/DDoS, botnet, man-in-the-middle (MITM), replay, masquerade, home invasions, trespass, unintentional damage or loss, disasters and outages, failures or malfunctions, unsecured wireless network problems, side-channel, identity theft, physical, advanced persistent threats (APT), weak passwords, and software-level attacks including code injection, function creep, and buffer overflow 8 [2], [4], [19], [20], [27], [39], [40], [42], [47], [48], [51]. Only a few studies aim to detect particular types, such as brute-force, TCP and UDP port scans [22], and RPL attacks [49].…”
Section: Rq: Which Attack Types Can the Metric Detect?mentioning
confidence: 99%
“…An experiment demonstrated, for instance, that a lightweight blockchainbased network could accommodate up to 1.34 million authentication and verification processes per second, which is sufficient for use in IoT networks with limited resources, especially in the healthcare industry [34]. To better understand the research opportunities and restrictions, the characteristics of current research and the limitations of blockchain for IoT on lightweight blockchain for IoT proposals must be rigorously studied [35].…”
Section: Lightweight Blockchainmentioning
confidence: 99%
“…To deal with unauthorized access and threats, additional security measures must be added to the hashing process. 3 However, as more devices are added, monitoring collaboration among them becomes easier, but scalability issues remain unaddressed. 4 Therefore, before integrating them into the working environment, it is imperative to carefully analyze various existing protocols and select an appropriate one.…”
Section: Introductionmentioning
confidence: 99%
“…To successfully advance the growth, it is also crucial to monitor air traffic factors when working with equipment like drones. To deal with unauthorized access and threats, additional security measures must be added to the hashing process 3 . However, as more devices are added, monitoring collaboration among them becomes easier, but scalability issues remain unaddressed 4 .…”
Section: Introductionmentioning
confidence: 99%