Skip to main content

Use of Blockchain in IoT Devices Security: A Systematic Mapping Study

  • 101 Accesses

Part of the Lecture Notes in Networks and Systems book series (LNNS,volume 405)

Abstract

Information security in IoT devices is considered a great challenge within the field of computing, which has been growing based on the architecture and the resources that compose it. The implementation of Blockchain has provided improvements in security and reliability for handling data. However, there is no concrete information on techniques, advantages, or results of the use of Blockchain in IoT devices. To identify relevant information on the use of Blockchain in smart devices and present the results as a basis for future research, we promoted a systematic mapping study to classify the selected studies and summarize their content. A limited number of articles was evidenced according to the proposed search chain, only since 2017 an interest in the subject has been observed, the same interest that grows rapidly over time. In addition, disadvantages and shortcomings were identified when applying Blockchain in IoT. Therefore, there is a need to evaluate the performance of Blockchain in different environments and new investigations that provide better results as computer vulnerabilities and their possible effects on devices used in IoT increase.

Keywords

  • Blockchain
  • Internet of Things
  • Security
  • Technology
  • Techniques
  • Information security
  • Smart devices

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-96043-8_7
  • Chapter length: 16 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   189.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-96043-8
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   249.99
Price excludes VAT (USA)
Fig. 1.

Taken from Petersen et al. [8].

Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.

References

  1. Ahmad Khan, M., Salahb, K.: IoT security: review, blockchain solutions, and open challenges. Fut. Gener. Comput. Syst. 82, 395–411 (2018)

    CrossRef  Google Scholar 

  2. Rodríguez González, D.: Arquitectura y Gestión de la IoT. Telemática J. 12(3), 49–60 (2013). ISSN: 1729-3804

    Google Scholar 

  3. Reyes Delgado, D.: Aplicación de Blockchain para la Seguridad de los datos del Internet of Things (2018)

    Google Scholar 

  4. Fattori de Andrade, A.C.: Análisis del consumo de energía promedio en dispositivos IoT de baja potencia con Blockchain como solución de seguridad (2019)

    Google Scholar 

  5. Baca Urbina, G.: Introducción a la Seguridad Informática, México: Grupo Editorial Patria (2016)

    Google Scholar 

  6. Tudela Díaz, I.: Arquitectura Blockchain para la securización de Dispositivos IoT Mediante Smart Contracts (2019)

    Google Scholar 

  7. Samaniego, M., Jamsrandorj, U., Deters, R.: Blockchain as a service for IoT. In: IEEE/ACM International Conference on & International Conference on Cyber, Physical and Social Computing (CPSCom) Green Computing and Communications (GreenCom) (2016)

    Google Scholar 

  8. Petersen, K., Vakkalanka, S., Kuzniarz, L.: Guidelines for conducting systematic mapping studies in software engineering: an update. Inf. Softw. Technol. 64, 1–18 (2015)

    CrossRef  Google Scholar 

  9. Kitchenham, B.A., Budgen, D., Brereton, O.P.: Using mapping studies as the basis for further research – a participant-observer case study. Inf. Softw. Technol. 53(6), 638–651 (2011)

    CrossRef  Google Scholar 

  10. Fernandez, A., Insfran, E., Abrahão, S.: Usability evaluation methods for the web: a systematic mapping study. Inf. Softw. Technol. 53(8), 789–817 (2011)

    CrossRef  Google Scholar 

  11. Moinet, A., Darties, B., Baril, J.-L.: Blockchain based trust & authentication for decentralized sensor networks (2017)

    Google Scholar 

  12. Hammi, M.T., Bellot, P., Serhrouchni, A.: BCTrust: A decentralized authentication blockchain-based mechanism. In: IEEE Wireless Communications and Networking Conference (WCNC) (2018)

    Google Scholar 

  13. Li, F., Xiong, P.: Practical secure communication for integrating wireless sensor networks into the Internet of Things. IEEE Sensors J. 13, 3677–3684 (2013)

    CrossRef  Google Scholar 

  14. Ting, P.-Y., Tsai, J.-L., Wu, T.-S.: Signcryption method suitable for low-power IoT devices in a wireless sensor network. IEEE Syst. J. 12, 2385–2394 (2018)

    CrossRef  Google Scholar 

  15. Huh, S., Cho, S., Kim, S.: Managing IoT devices using blockchain platform. In: International Conference on Advanced Communication Technology (ICACT) (2017)

    Google Scholar 

  16. Javaid, U., Siang, A.K., Aman, M.N., Sikdar, B.: Mitigating loT device based DDoS attacks using blockchain. In: CryBlock 2018: Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, pp. 71–76 (2018)

    Google Scholar 

  17. Garg, N., Wazid, M., Das, A.K., Singh, D.P., Rodrigues, J.J.P.C., Park, Y.: BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment. IEEE Access 8, 95956–95977 (2020)

    CrossRef  Google Scholar 

  18. Xu, D., Xiao, L., Sun, L., Lei, M.: Game theoretic study on blockchain based secure edge networks. In: IEEE International Conference on Communications in China (ICCC) (2017)

    Google Scholar 

  19. Golam, M., Lee, J.-M., Kim, D.-S.: A UAV-assisted blockchain based secure device-to-device communication in Internet of military Things. In: International Conference on Information and Communication Technology Convergence (ICTC) (2020)

    Google Scholar 

  20. Kshetri, N.: Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommun. Policy 41, 1027–1038 (2017)

    CrossRef  Google Scholar 

  21. AlAbdullatif, A., AlAjaji, K., Al-Serhani, N.S. Zagrouba, R., AlDossary, M.: Improving an identity authentication management protocol in IIoT. In: Cyber Security and Digital Forensics (2019)

    Google Scholar 

  22. Mahmoud, C., Acuag, S.: Security for Internet of Things: a state of the art on existing protocols and open research issues. In: Proceedings of the 9th International Conference on Information Systems and Technologies, pp. 1–6 (2019)

    Google Scholar 

  23. Pawar, R., Kalbande, D.: Use of blockchain technology in wireless body area networks. In: International Conference on Intelligent Sustainable Systems (ICISS) (2020)

    Google Scholar 

  24. El Houda, Z.A., Hafid, A., Khou, L.: Co-IoT: a collaborative DDoS mitigation scheme in IoT environment based on blockchain using SDN. In: IEEE Conference and Exhibition on Global Telecommunications (GLOBECOM) (2019)

    Google Scholar 

  25. Sharma, S., Chaudhry, R., Bhardwaj, D.: Blockchain for secure Internet of Things. In: Nanda, A., Chaurasia, N. (eds.) High Performance Vision Intelligence. SCI, vol. 913, pp. 33–54. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-6844-2_3

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jhon Arcos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Arcos, J., Morejón, E., Martínez, D., Parra, C., Cruz, J. (2022). Use of Blockchain in IoT Devices Security: A Systematic Mapping Study. In: Botto-Tobar, M., Cruz, H., Díaz Cadena, A., Durakovic, B. (eds) Emerging Research in Intelligent Systems. CIT 2021. Lecture Notes in Networks and Systems, vol 405. Springer, Cham. https://doi.org/10.1007/978-3-030-96043-8_7

Download citation