A Review on the Use of Blockchain for the Internet of Things
Top Cited Papers
Open Access
- 31 May 2018
- journal article
- review article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Access
- Vol. 6, 32979-33001
- https://doi.org/10.1109/access.2018.2842685
Abstract
The paradigm of Internet of Things (IoT) is paving the way for a world where many of our daily objects will be interconnected and will interact with their environment in order to collect information and automate certain tasks. Such a vision requires, among other things, seamless authentication, data privacy, security, robustness against attacks, easy deployment and self-maintenance. Such features can be brought by blockchain, a technology born with a cryptocurrency called Bitcoin. In this paper it is presented a thorough review on how to adapt blockchain to the specific needs of IoT in order to develop Blockchain-based IoT (BIoT) applications. After describing the basics of blockchain, the most relevant BIoT applications are described with the objective of emphasizing how blockchain can impact traditional cloudcentered IoT applications. Then, the current challenges and possible optimizations are detailed regarding many aspects that affect the design, development and deployment of a BIoT application. Finally, some recommendations are enumerated with the aim of guiding future BIoT researchers and developers on some of the issues that will have to be tackled before deploying the next generation of BIoT applications.Keywords
Funding Information
- Xunta de Galicia (ED431C 2016-045, ED341D R2016/012, ED431G/01)
- Agencia Estatal de Investigación of Spain (TEC2015-69648-REDC, TEC2016-75067-C4-1-R)
- ERDF funds of EU, UE (AEI/FEDER)
- BBVA
- BritishSpanish Society Grant
This publication has 113 references indexed in Scilit:
- The Benefits of Self-Awareness and Attention in Fog and Mist ComputingComputer, 2015
- Unleashing the Potential of LTE for Next Generation Railway CommunicationsLecture Notes in Computer Science, 2015
- Mixcoin: Anonymity for Bitcoin with Accountable MixesLecture Notes in Computer Science, 2014
- Energy Consumption Analysis of the Cryptographic Key Generation Process of RSA and ECC Algorithms in Embedded SystemsIEEE Latin America Transactions, 2014
- Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA RevelationsIEEE Security & Privacy, 2014
- Real-time personal protective equipment monitoring systemComputer Communications, 2012
- Attack against a batch zero-knowledge proof systemIET Information Security, 2012
- Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision ResistanceLecture Notes in Computer Science, 2004
- The Sybil AttackLecture Notes in Computer Science, 2002
- How to time-stamp a digital documentJournal of Cryptology, 1991