Digital Object Identifier 10.1109/ACCESS.2017.DOI I. INTRODUCTION The Internet of Things (IoT) is a revolutionary technology that has enhanced the way in how smart devices and sensors are coherently interconnected to exchange data in an uninterrupted mechanism [1], [2]. This technology has been applied in smart living and transport sectors (e.g, smart cities and healthcare) to create a seamless and efficient flow of data for intelligent decision-making and automation [3], [4]. However, the proliferation of IoT devices has raised concerns in terms of trust and security. Here, traditional IoT architectures are designed with a centralized scheme such that devices that are connected to the IoT architecture can be vulnerable to threats and, in consequence, the data integrity, privacy and trustworthiness are compromised. This is particularly worrying when sensitive data are collected and exchanged in centralized IoT devices. Key security requirements have been established in IoT environments to ensure the confidentiality, integrity, and privacy of sensitive data. These requirements include authentication, authorization and access control, data integrity, interoperability, privacy, and identity management [5]. Here, the most severe threats in IoT are attributed to the lack of compliance of the aforementioned requirements [6], [7]. In addition, the absence of standardized protocols hinders the efficient communication, interoperability and data exchange between devices. This can lead to a fragmented and inefficient IoT environment [8].Scalability plays an important role in the success of IoT systems by scaling up the network capacity, infrastructure, and computational resources. However, as the IoT environment grows in size, it can produce significant delays, scalability issues, and increased costs [9]. Furthermore, several issues can be observed due to the centralized nature of traditional IoT architectures such as: i) single point failures, ii) network congestions, iii) increased latency, and iv) malicious attacks from hackers or unauthorized actors [10], [11].Blockchain-technology has gained interest in the IoT framework due to its immutability and transparency capabilities in a decentralized architecture. One of the fundamental aspects of IoT is to enable the sharing of resources from