CFP last date
20 January 2025
Reseach Article

Challenges of Blockchain Technology in Context Internet of Things: A Survey

by Mohammad Qatawneh, Wesam Almobaideen, Orieb AbuAlghanam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 16
Year of Publication: 2020
Authors: Mohammad Qatawneh, Wesam Almobaideen, Orieb AbuAlghanam
10.5120/ijca2020920660

Mohammad Qatawneh, Wesam Almobaideen, Orieb AbuAlghanam . Challenges of Blockchain Technology in Context Internet of Things: A Survey. International Journal of Computer Applications. 175, 16 ( Sep 2020), 13-20. DOI=10.5120/ijca2020920660

@article{ 10.5120/ijca2020920660,
author = { Mohammad Qatawneh, Wesam Almobaideen, Orieb AbuAlghanam },
title = { Challenges of Blockchain Technology in Context Internet of Things: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2020 },
volume = { 175 },
number = { 16 },
month = { Sep },
year = { 2020 },
issn = { 0975-8887 },
pages = { 13-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number16/31535-2020920660/ },
doi = { 10.5120/ijca2020920660 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:25:11.573652+05:30
%A Mohammad Qatawneh
%A Wesam Almobaideen
%A Orieb AbuAlghanam
%T Challenges of Blockchain Technology in Context Internet of Things: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 16
%P 13-20
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Internet of Things (IoT) is a combination of communication, information, and embedded technology that truly make up an IoT ecosystem. The designing of the IoT ecosystem that includes different technologies often be complex. This complexity introduces challenges to keeping the IoT secure, protecting the IoT from disclosure to unauthorized parties, ensuring information integrity and so on. This paper presents a comprehensive survey of the challenges and security consideration of the integration of both IoT architectures and blockchain technology which is basically a secure distributed database over a peer to peer architecture. It starts by discussing the characteristics of the IoT, its architectures, their limitations and the role of cloud and fog computing to overcome these limitations. Then it provides an overview of a blockchain technology, its applications, how does it work, and finally the contribution of an integrated blockchain as a solution to security and privacy challenges in IoT.

References
  1. B. Omoniwa, R. Hussain, M.A. Javed, S. H. Bouk, and S. A. Malik, “Fog/Edge Computing-based IoT(FECIoT): Architecture, applications, and Research issues,” IEEE Internet of Things Journal, Vol. x, No. x, Oct. 2018.Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  2. J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications,” IEEE Internet of Things, vol. 4, no. 5, pp. 1125-1142, Oct. 2017.Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  3. L. Atzori, A. Iera, G. Morabito, and M. Nitti, “The Social Internet of Things (SIoT)- When social networks meet the Internet of Things: Concept, architecture and network characterization,” Computer Networks, vol. 56, no. 16, pp. 3594-3608, Nov. 2012.
  4. R. Mahmoud, T. Yousuf, F. Aloul and I. Zualkernan, “Internet of things (IoT) security: Current status, challenges and prospective measures,” 10th IEEE International Conference for Internet Technology and Secured Transactions (ICITST), London, 2015, pp. 336-341.
  5. N. Reijers, K. J. Lin, Y. C. Wang, C. S. Shih, and J. Y. Hsu, “Design of an intelligent middleware for flexible sensor configuration in M2M systems”, Proc. Second Int. Conf. on Sensor Networks (SENSORNETS), February 2013, pp. 1-6.
  6. M. A. Razzaque, M. Milojevic-Jevric, A. Palade and S. Clarke, “Middleware for Internet of Things: A Survey,” IEEE Internet of Things Journal, vol. 3, no. 1, pp. 70-95, Feb. 2016.
  7. Amathul Hadi Shakara, Md. Traeqhasan, “Solutions of common challenges in IoT”, IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 19, no. 5, Ver. V, pp. 57-65, 2017.
  8. Feng Wang, Liang Hu, Jin Zhou, and Kuo Zhao, “A Data Processing Middleware Based on SOA for the Internet of Things”, Journal of Sensors, January, 2015.
  9. A. Botta, W. Donato, V. Persico, and A. Pescape, “Integration of Cloud Computing and Internet of Things: A Survey”, Future generation Computer Systems, September 2015.
  10. Zhang, Q., Cheng, L., Boutaba, R., “Cloud computing: state-of-the-art and research challenges”, Journal of internet services and applications 1 (1), 7–18, 2010.
  11. Mell, P., Grance, T., “The NIST definition of cloud computing”, National Institute of Standards and Technology 53 (6), 50, 2009.
  12. J. Pan and J. McElhannon, “Future Edge Cloud and Edge Computing for Internet of Things Applications,” IEEE Internet of Things Journal, vol. 5, no. 1, pp. 439-449, Feb. 2018.
  13. Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are. White Paper. 2016. Available online: http://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview. pdf (accessed on 8 April 2018).
  14. Liu, Y.; Fieldsend, J.E.; Min, G.A Framework of Fog Computing: Architecture, Challenges and Optimization. IEEE Access 2017, 4, 1–10. [CrossRef].
  15. Peralta, G.; Iglesias-Urkia, M.; Barcelo, M.; Gomez, R.; Moran, A.; Bilbao, J. Fog computing based efficient IoT scheme for the Industry 4.0. In Proceedings of the 2017 IEEE International Workshop of Electronics, Control, Measurement, Signals and their application to Mechatronics, San Sebastian, Spain, 24–26 May 2017; pp. 1–6.
  16. Bonomi, F.; Milito, R.; Natarajan, P.; Zhu, J. Fog Computing: A Platform for Internet of Things and Analytics. In Big Data and Internet of Things: A Roadmap for Smart Environments; Studies in Computational Intelligence; Springer: Cham, Switzerland, 2014; Volume 546, pp. 169–186.
  17. Rukhsana T., Ysera F. K., and Shafqat M., “Fog Approach in Internet of Things: a Reviews”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology © 2018 IJSRCSEIT | Volume 4 | Issue 1.
  18. A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts, “in Security and Privacy(SP),2016IEEESymposium on. IEEE, 2016, pp. 839–858.
  19. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008.
  20. M. Vukoli´c, “The quest for scalable blockchain fabric: Proof-of work vs. bit replication,” in International Workshop on Open Problems in Network Security. Springer, 2015, pp. 112–125.
  21. X. Yue, H. Wang, D. Jin, M. Li, and W. Jiang, “Healthcare data gateways: Found healthcare intelligence on blockchain with novel privacy risk control,” Journal of medical systems, vol. 40, no. 10, p. 218, 2016.
  22. McKinsey_FACI_Blockchain_in_Insurance.pdf L. Bahack, “Theoretical Bitcoin attacks with less than half of the computational power,” Dec. 2013, arXiv:1312.7013v1. [Online]. Available: https://arxiv.org/pdf/1312.7013.pdf.
  23. Ai, Y.; Peng, M.; Zhang, K. Edge cloud computing technologies for internet of things: A primer. Digit. Commun. Netw. 2017, in press. [CrossRef].
  24. Hany F. A, Robert J. W., and Gary B. W., Fog Computing and the Internet of things: A Review. Big Data Cogn. Comput. 2018, 2, 10.
  25. Wen, Z.; Yang, R.; Garraghan, P.; Lin, T.; Xu, J.; Rovatsos, M. Fog orchestration for internet of things services. IEEE Internet Comput. 2017, 21, 16–24. [CrossRef].
  26. Rashid D., Ravindran D., A comprehensive study on cloud computing paradigm. International journal of advanced research in science and engineering. 2018, Vol. 7,4.
  27. Yashpalsinha J., Kirit M. Cloud Computing-Concepts, Architecture and Challenges. 2012 International Conference on Computing, Electronics and Electrical Technologies [ICCEET].
  28. Azhra G., A literature review on cloud computing security issues. International Journal of Information, Security and systems management, 2017, Vol. 6, No.1, pp. 637-640.
  29. Mais Haj Qasem, Mohammad Qatawneh. Parallel Hill Cipher Encryption Algorithm. International Journal of Computer Applications. Vol. 179, No.19, pp. 16-26, 2018.
  30. Sanad AbuRass, Mohammad Qatawneh. Performance Evaluation of AES algorithm on Supercomputer IMAN1. International Journal of Computer Applications. Vol. 179, No. 48, 2018.
  31. Emanuel Ferreira Jesus, Vanessa R. L. Chicarino, Célio V. N. de Albuquerque, and Antônio A. de A. Rocha. A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack. Security and Communication Networks Volume 2018.
  32. Maha Saadeh, et al., “Authentication Techniques for the Internet of Things: A Survey”, in Cybersecurity and Cyberforensics Conference (CCC), 2016, IEEE, 2016, pp. 28– 34.
  33. Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends, 2017 IEEE 6th International Congress on Big Data, pp. 557-564.
  34. Ouaddah, A.; Elkalam, A.A.; Ouahman, A.A. Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In Europe and MENA Cooperation Advances in Information and Communication Technologies; lvaro Rocha, Á., Serrhini, M., Felgueiras, C., Eds.; Springer: Cham, Germany, 2016; pp. 523–533
  35. Ola M Surakhi, Mohammad Qatawneh, A Hussein. A Parallel Genetic Algorithm for Maximum Flow Problem. International Journal of Advanced Computer Science and applications, 2017.
  36. Munsing, E.; Mather, J.; Moura, S. Blockchains for decentralized optimization of energy resources in microgrid networks. In Proceedings of the IEEE Conference on Control Technology and Applications (CCTA 2017), Kohala Coast, HI, USA, 27–30 August 2017; pp. 2164–2171
  37. Shafagh, H.; Hithnawi, A.; Duquennoy, S. Towards blockchain-based auditable storage and sharing of IoT data. In Proceedings of the 9th ACM Cloud Computing Security Workshop (CCSW 2017), Dallas, TX, USA, 3 November 2017; pp. 45–50
  38. Bahga, A.; Madisetti, V.K. Blockchain platform for industrial internet of things. J. Softw. Eng. Appl. 2016, 9, 533–546
  39. Lombardi, F.; Aniello, L.; De Angelis, S.; Margheri, A.; Sassone, V. A blockchain-based infrastructure for reliable and cost-effective IoT-aided smart grids. In Proceedings of the Living in the Internet of Things 2018: Cybersecurity of the IoT-A PETRAS, IoTUK & IET Event, London, UK, 28–29 March 2018.
  40. M. Conoscenti, A. Vetro, and J. C. De Martin, “Blockchain for the Internet of Things: A systematic literature review,” in Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, AICCSA 2016, IEEE, Agadir, Morocco, December 2016.
  41. T. M. Fernández-Caramés and P. Fraga-Lamas, “A review on the use of blockchain for the internet of things,” IEEE Access, pp. 1–23, May 2018.
  42. Mohammad Qatawneh; Wesam Almobaideen; Mohammed Alkhanafseh. DFIM: A New Digital Forensics Investigation Model for Internet of Things. Journal of Theoretical and Applied Information Technology. 2019, Vol.97. No.24.
  43. Mohammed Khanafseh, Mohammad Qatawneh, Wesam Almobaideen. A Survey of Various Frameworks and Solutions in all Branches of Digital Forensics with a Focus on Cloud Forensics. (IJACSA) International Journal of Advanced Computer Science and Applications, 2019.
  44. Guan, Z.; Si, G.; Zhang, X.; Wu, L.; Guizani, N.; Du, X.; Ma, Y. Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. arXiv 2018, arXiv:1806.01056.
  45. O. Abualghanam, M. Qatawneh andW. Almobaideen, “A Survey of Key Distribution in the Context of Internet of Things,” Journal of Theoretical and Applied Information Technology, vol. 97, no. 22, pp. 3217–3241, 2019.
  46. A. Gervais, G. O. Karame, K. Wüst, V. Glykantzis, H. Ritzdorf, and S. Čapkun, “On the security and performance of Proof of Work blockchains,” in Proceedings of the 23rd ACM Conference on Computer and Communications Security, CCS 2016, pp. 3–16, Austria, October 2016.
  47. Maha Saadeh, Huda Saadeh, Mohammad Qatawneh. Performance Evaluation of Parallel Sorting Algorithms on IMAN1 Supercomputer. International Journal of Advanced Science and Technology, 2016
  48. Almobaideen, W., Krayshan, R., Allan, M., and Saadeh, M. (2017). Internet of Things: Geographical Routing based on healthcare centers vicinity for mobile smart tourism destination. Technological Forecasting and Social Change, 123, 342–350. https://doi.org/10.1016/j.techfore.2017.04.016.
  49. Wesam Almobaideen, Mohammad Qatawneh, Orieb Abualghanam. Virtual Node Schedule for Supporting QoS in Wireless Sensor Network. 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)
  50. Saadeh, M., Sleit, A., Qatawneh, M., and Almobaideen, W. (2016). Authentication techniques for the internet of things: A survey. In Proceedings - 2016 Cybersecurity and Cyberforensics Conference, CCC 2016. https://doi.org/10.1109/CCC.2016.22.
  51. Reem Saadeh, Mohammad Qatawneh. PERFORMANCE EVALUATION OF PARALLEL BUBBLE SORT ALGORITHM ON SUPERCOMPUTER IMAN1. International Journal of Computer Science & Information Technology (IJCSIT). 2019.
  52. Ahmad Bany Doumi, Mohammad Qatawneh (2019). Performance Evaluation of Parallel International Data Encryption Algorithm On IMAN1 Super Computer. International Journal of Network & Its Applications (IJNSA), 11(1).
  53. Asassfeh Mahmoud Rajallah, Mohammad Qatawneh, Feras Mohamed AL-Azzeh (2018). Performance Evaluation of Blowfish Algorithm on supercomputer IMAN1. International Journal of Computer Networks & Communications (IJCNC) 10(2).
  54. Amaal Shorman, Mohammad Qatawneh (2018). Performance Improvement of Double Data Encryption Standard Algorithm using Parallel Computation. International Journal of Computer Applications, 179(25).
Index Terms

Computer Science
Information Sciences

Keywords

Blockchain Consensus Decentralization IoT Immutability