Skip to main content
Erschienen in: Cluster Computing 3/2022

30.03.2021

Privacy challenges of IoT-based blockchain: a systematic review

verfasst von: Wenbing Liang, Nan Ji

Erschienen in: Cluster Computing | Ausgabe 3/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) has infiltrated extensively into our lifestyles. Nevertheless, IoT privacy remains a significant obstacle, primarily because of the large size and distributed existence of IoT networks. Also, numerous safety, authentication, and maintenance problems of IoT systems have been overcome by the decentralized existence of blockchain. To obviate these privacy difficulties, the privacy challenges of IoT-based blockchain are examined systematically. Totally, 61 papers have been gained by electronic databases and based on different filters, 20 related articles were obtained and analyzed. The findings showed that the blockchain could dominate the IoT restrictions, such as data protection and privacy. It can also supply distributed storage, transparency, trust, and secure distributed IoT networks and supply a beneficial guarantee for the privacy and security of IoT users. Simultaneously, it has low scalability, high computing complexity, IoT-unsuitable latency, and high overhead bandwidth.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sengupta, J., Ruj, S., Bit, S.D.: A Comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J. Netw. Comput. Appl. 149, 102481 (2020)CrossRef Sengupta, J., Ruj, S., Bit, S.D.: A Comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J. Netw. Comput. Appl. 149, 102481 (2020)CrossRef
2.
Zurück zum Zitat Jahantigh, M.N., Rahmani, A.M., Navimirour, N.J., Rezaee, A.J.I.C.: Integration of Internet of Things and cloud computing: a systematic survey. IET Commun. 14(2), 165–176 (2019)CrossRef Jahantigh, M.N., Rahmani, A.M., Navimirour, N.J., Rezaee, A.J.I.C.: Integration of Internet of Things and cloud computing: a systematic survey. IET Commun. 14(2), 165–176 (2019)CrossRef
3.
Zurück zum Zitat Alfandi, O., Khanji, S., Ahmad, L., Khattak, A.: A survey on boosting IoT security and privacy through blockchain. Clust. Comput. 25, 1–19 (2020) Alfandi, O., Khanji, S., Ahmad, L., Khattak, A.: A survey on boosting IoT security and privacy through blockchain. Clust. Comput. 25, 1–19 (2020)
4.
Zurück zum Zitat Sadrishojaei, M., Navimipour, N.J., Reshadi, M., Hosseinzadeh, M.: A new preventive routing method based on clustering and location prediction in the mobile internet of things. IEEE Internet Things J. 41, 1–1 (2021) Sadrishojaei, M., Navimipour, N.J., Reshadi, M., Hosseinzadeh, M.: A new preventive routing method based on clustering and location prediction in the mobile internet of things. IEEE Internet Things J. 41, 1–1 (2021)
5.
Zurück zum Zitat S. Datta, A. K. Das, A. Kumar, and D. Sinha.: Authentication and privacy preservation in IoT based forest fire detection by using blockchain: a review. In: International Conference on Internet of Things and Connected Technologies, 2019, pp. 133–143: Springer. S. Datta, A. K. Das, A. Kumar, and D. Sinha.: Authentication and privacy preservation in IoT based forest fire detection by using blockchain: a review. In: International Conference on Internet of Things and Connected Technologies, 2019, pp. 133–143: Springer.
6.
Zurück zum Zitat Pourghebleh, B., Wakil, K., Navimipour, N.J.: A comprehensive study on the trust management techniques in the Internet of Things. IEEE Internet Things J. 6(6), 9326–9337 (2019)CrossRef Pourghebleh, B., Wakil, K., Navimipour, N.J.: A comprehensive study on the trust management techniques in the Internet of Things. IEEE Internet Things J. 6(6), 9326–9337 (2019)CrossRef
7.
Zurück zum Zitat Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: Vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)CrossRef Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: Vision, applications and research challenges. Ad Hoc Netw. 10(7), 1497–1516 (2012)CrossRef
8.
Zurück zum Zitat A. Ouaddah.: A blockchain based access control framework for the security and privacy of IoT with strong anonymity unlinkability and intractability guarantees. In: Advances in Computers, 115: Elsevier, 2019, pp. 211–258. A. Ouaddah.: A blockchain based access control framework for the security and privacy of IoT with strong anonymity unlinkability and intractability guarantees. In: Advances in Computers, 115: Elsevier, 2019, pp. 211–258.
9.
Zurück zum Zitat Borgia, E.: The Internet of Things vision: key features, applications and open issues. Comput. Commun. 54, 1–31 (2014)CrossRef Borgia, E.: The Internet of Things vision: key features, applications and open issues. Comput. Commun. 54, 1–31 (2014)CrossRef
10.
Zurück zum Zitat Ghanbari, Z., Navimipour, N.J., Hosseinzadeh, M., Darwesh, A.: Resource allocation mechanisms and approaches on the Internet of Things. Clust. Comput. 22(4), 1253–1282 (2019)CrossRef Ghanbari, Z., Navimipour, N.J., Hosseinzadeh, M., Darwesh, A.: Resource allocation mechanisms and approaches on the Internet of Things. Clust. Comput. 22(4), 1253–1282 (2019)CrossRef
11.
Zurück zum Zitat S. Fan, L. Song, and C. Sang.: Research on privacy protection in IoT system based on blockchain. In: International Conference on Smart Blockchain, 2019, pp. 1–10: Springer. S. Fan, L. Song, and C. Sang.: Research on privacy protection in IoT system based on blockchain. In: International Conference on Smart Blockchain, 2019, pp. 1–10: Springer.
12.
Zurück zum Zitat D. P. Augustine and P. Raj.: Blockchain and IoT security. In: Blockchain Technology and Applications: Auerbach Publications, 2020, pp. 51–64. D. P. Augustine and P. Raj.: Blockchain and IoT security. In: Blockchain Technology and Applications: Auerbach Publications, 2020, pp. 51–64.
13.
Zurück zum Zitat C. Ge, Z. Liu, and L. Fang. A blockchain based decentralized data security mechanism for the Internet of Things. J. Parall. and Distributed Computing, 2020. C. Ge, Z. Liu, and L. Fang. A blockchain based decentralized data security mechanism for the Internet of Things. J. Parall. and Distributed Computing, 2020.
14.
Zurück zum Zitat Vardhana, M., Arunkumar, N., Abdulhay, E., Vishnuprasad, P.: Iot based real time trafic control using cloud computing. Clust. Comput. 22(1), 2495–2504 (2019)CrossRef Vardhana, M., Arunkumar, N., Abdulhay, E., Vishnuprasad, P.: Iot based real time trafic control using cloud computing. Clust. Comput. 22(1), 2495–2504 (2019)CrossRef
15.
Zurück zum Zitat Kim, H.-Y., Kim, J.-M.: A load balancing scheme based on deep-learning in IoT. Clust. Comput. 20(1), 873–878 (2017)CrossRef Kim, H.-Y., Kim, J.-M.: A load balancing scheme based on deep-learning in IoT. Clust. Comput. 20(1), 873–878 (2017)CrossRef
16.
Zurück zum Zitat A. Lamba, S. Singh, S. Balvinder, N. Dutta, and S. Rela.: Mitigating IoT security and privacy challenges using distributed ledger based blockchain (Dl-BC) technology. Int. J. Technol. Res. Eng., 4(8), 2017. A. Lamba, S. Singh, S. Balvinder, N. Dutta, and S. Rela.: Mitigating IoT security and privacy challenges using distributed ledger based blockchain (Dl-BC) technology. Int. J. Technol. Res. Eng., 4(8), 2017.
17.
Zurück zum Zitat Elhabob, R., Zhao, Y., Eltayieb, N., Abdelgader, A.M., Xiong, H.: Identity-based encryption with authorized equivalence test for cloud-assisted IoT. Clust. Comput. 23(2), 1085–1101 (2020)CrossRef Elhabob, R., Zhao, Y., Eltayieb, N., Abdelgader, A.M., Xiong, H.: Identity-based encryption with authorized equivalence test for cloud-assisted IoT. Clust. Comput. 23(2), 1085–1101 (2020)CrossRef
18.
Zurück zum Zitat Azad, P., Navimipour, N.J., Rahmani, A.M., Sharifi, A.: The role of structured and unstructured data managing mechanisms in the Internet of things. Clust. Comput. 10, 1–14 (2019) Azad, P., Navimipour, N.J., Rahmani, A.M., Sharifi, A.: The role of structured and unstructured data managing mechanisms in the Internet of things. Clust. Comput. 10, 1–14 (2019)
20.
Zurück zum Zitat Hassan, M.U., Rehmani, M.H., Chen, J.: Privacy preservation in blockchain based IoT systems: integration issues, prospects, challenges, and future research directions. Futur. Gener. Comput. Syst. 97, 512–529 (2019)CrossRef Hassan, M.U., Rehmani, M.H., Chen, J.: Privacy preservation in blockchain based IoT systems: integration issues, prospects, challenges, and future research directions. Futur. Gener. Comput. Syst. 97, 512–529 (2019)CrossRef
21.
Zurück zum Zitat A. Pouraghily, M. N. Islam, S. Kundu, and T. Wolf.: Privacy in blockchain-enabled iot devices. In: 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI), 2018, pp. 292–293: IEEE. A. Pouraghily, M. N. Islam, S. Kundu, and T. Wolf.: Privacy in blockchain-enabled iot devices. In: 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI), 2018, pp. 292–293: IEEE.
22.
Zurück zum Zitat Verma, V.K.: Blockchain technology: systematic review of security and privacy problems and its scope with Internet of Things (IoT). J. Netw. Secur. 7(1), 24–28 (2019) Verma, V.K.: Blockchain technology: systematic review of security and privacy problems and its scope with Internet of Things (IoT). J. Netw. Secur. 7(1), 24–28 (2019)
23.
Zurück zum Zitat Alotaibi, B.: Utilizing blockchain to overcome cyber security concerns in the internet of things: a review. IEEE Sens. J. 19(23), 10953–10971 (2019)CrossRef Alotaibi, B.: Utilizing blockchain to overcome cyber security concerns in the internet of things: a review. IEEE Sens. J. 19(23), 10953–10971 (2019)CrossRef
24.
Zurück zum Zitat Ferrag, M.A., Shu, L., Yang, X., Derhab, A., Maglaras, L.: Security and privacy for green IoT-based agriculture: review, blockchain solutions, and challenges. IEEE Access 8, 32031–32053 (2020)CrossRef Ferrag, M.A., Shu, L., Yang, X., Derhab, A., Maglaras, L.: Security and privacy for green IoT-based agriculture: review, blockchain solutions, and challenges. IEEE Access 8, 32031–32053 (2020)CrossRef
25.
Zurück zum Zitat Mistry, I., Tanwar, S., Tyagi, S., Kumar, N.: Blockchain for 5G-enabled IoT for industrial automation: a systematic review, solutions, and challenges. Mech. Syst. Signal Process. 135, 106382 (2020)CrossRef Mistry, I., Tanwar, S., Tyagi, S., Kumar, N.: Blockchain for 5G-enabled IoT for industrial automation: a systematic review, solutions, and challenges. Mech. Syst. Signal Process. 135, 106382 (2020)CrossRef
26.
Zurück zum Zitat Tseng, L., Yao, X., Otoum, S., Aloqaily, M., Jararweh, Y.: Blockchain-based database in an IoT environment: challenges, opportunities, and analysis. Clust. Comput. 23(3), 2151–2165 (2020)CrossRef Tseng, L., Yao, X., Otoum, S., Aloqaily, M., Jararweh, Y.: Blockchain-based database in an IoT environment: challenges, opportunities, and analysis. Clust. Comput. 23(3), 2151–2165 (2020)CrossRef
27.
Zurück zum Zitat Nguyen, K.T., Laurent, M., Oualha, N.: Survey on secure communication protocols for the Internet of Things. Ad Hoc Netw. 32, 17–31 (2015)CrossRef Nguyen, K.T., Laurent, M., Oualha, N.: Survey on secure communication protocols for the Internet of Things. Ad Hoc Netw. 32, 17–31 (2015)CrossRef
28.
Zurück zum Zitat H. Li, L. Pei, D. Liao, X. Wang, D. Xu, and J. Sun.: BDDT: use blockchain to facilitate IoT data transactions. Clust. Comput. J. Netw. Softw. Tools Appl. (2020) H. Li, L. Pei, D. Liao, X. Wang, D. Xu, and J. Sun.: BDDT: use blockchain to facilitate IoT data transactions. Clust. Comput. J. Netw. Softw. Tools Appl. (2020)
29.
Zurück zum Zitat Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of Things security: a survey. J. Netw. Comput. Appl. 88, 10–28 (2017)CrossRef Alaba, F.A., Othman, M., Hashem, I.A.T., Alotaibi, F.: Internet of Things security: a survey. J. Netw. Comput. Appl. 88, 10–28 (2017)CrossRef
30.
Zurück zum Zitat Pavithran, D., Shaalan, K., Al-Karaki, J.N., Gawanmeh, A.: Towards building a blockchain framework for IoT. Clust. Comput. 5, 1–15 (2020) Pavithran, D., Shaalan, K., Al-Karaki, J.N., Gawanmeh, A.: Towards building a blockchain framework for IoT. Clust. Comput. 5, 1–15 (2020)
31.
Zurück zum Zitat Ammar, M., Russello, G., Crispo, B.: Internet of Things: a survey on the security of IoT frameworks. J. Inform. Secur. Appl. 38, 8–27 (2018) Ammar, M., Russello, G., Crispo, B.: Internet of Things: a survey on the security of IoT frameworks. J. Inform. Secur. Appl. 38, 8–27 (2018)
32.
Zurück zum Zitat Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17(3), 1294–1312 (2015)CrossRef Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17(3), 1294–1312 (2015)CrossRef
33.
Zurück zum Zitat Altaf, A., Abbas, H., Iqbal, F., Derhab, A.: Trust models of internet of smart things: a survey, open issues, and future directions. J. Netw. Comput. Appl. 137, 93–111 (2019)CrossRef Altaf, A., Abbas, H., Iqbal, F., Derhab, A.: Trust models of internet of smart things: a survey, open issues, and future directions. J. Netw. Comput. Appl. 137, 93–111 (2019)CrossRef
34.
Zurück zum Zitat Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)CrossRef Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018)CrossRef
35.
Zurück zum Zitat Khalid, U., Asim, M., Baker, T., Hung, P.C., Tariq, M.A., Rafferty, L.: A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Clust. Comput. 73, 1–21 (2020) Khalid, U., Asim, M., Baker, T., Hung, P.C., Tariq, M.A., Rafferty, L.: A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Clust. Comput. 73, 1–21 (2020)
36.
Zurück zum Zitat I. A. Ridhawi, M. Aloqaily, and Y. Jararweh.: an incentive-based mechanism for volunteer computing using blockchain. arXiv preprint arXiv:2009.11901, (2020) I. A. Ridhawi, M. Aloqaily, and Y. Jararweh.: an incentive-based mechanism for volunteer computing using blockchain. arXiv preprint arXiv:2009.11901, (2020)
37.
Zurück zum Zitat I. Al Ridhawi, M. Aloqaily, A. Boukerche, and Y. Jaraweh.: A Blockchain-based decentralized composition solution for IoT services. In: ICC 2020–2020 IEEE International Conference on Communications (ICC), 2020, pp. 1–6: IEEE I. Al Ridhawi, M. Aloqaily, A. Boukerche, and Y. Jaraweh.: A Blockchain-based decentralized composition solution for IoT services. In: ICC 2020–2020 IEEE International Conference on Communications (ICC), 2020, pp. 1–6: IEEE
38.
Zurück zum Zitat H. F. Atlam and G. B. Wills.: IoT security, privacy, safety and ethics. In: Digital Twin Technologies and Smart Cities: Springer, 2020, pp. 123–149. H. F. Atlam and G. B. Wills.: IoT security, privacy, safety and ethics. In: Digital Twin Technologies and Smart Cities: Springer, 2020, pp. 123–149.
39.
Zurück zum Zitat Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019)CrossRef Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019)CrossRef
40.
Zurück zum Zitat F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain.: Machine learning in IoT security: current solutions and future challenges. IEEE Communications Surveys & Tutorials, (2020) F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain.: Machine learning in IoT security: current solutions and future challenges. IEEE Communications Surveys & Tutorials, (2020)
41.
Zurück zum Zitat Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. Tutor. 21(3), 2671–2701 (2019)CrossRef Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. Tutor. 21(3), 2671–2701 (2019)CrossRef
42.
Zurück zum Zitat Sha, K., Yang, T.A., Wei, W., Davari, S.: A survey of edge computing-based designs for iot security. Digit. Commun. Netw. 6(2), 195–202 (2020)CrossRef Sha, K., Yang, T.A., Wei, W., Davari, S.: A survey of edge computing-based designs for iot security. Digit. Commun. Netw. 6(2), 195–202 (2020)CrossRef
43.
Zurück zum Zitat Hassan, W.H.: Current research on Internet of Things (IoT) security: a survey. Comput. Netw. 148, 283–294 (2019)CrossRef Hassan, W.H.: Current research on Internet of Things (IoT) security: a survey. Comput. Netw. 148, 283–294 (2019)CrossRef
44.
Zurück zum Zitat O. Alfandi, S. Otoum, and Y. Jararweh.: Blockchain solution for IoT-based critical infrastructures: byzantine fault tolerance. In: NOMS 2020–2020 IEEE/IFIP network operations and management symposium, 2020, pp. 1–4: IEEE. O. Alfandi, S. Otoum, and Y. Jararweh.: Blockchain solution for IoT-based critical infrastructures: byzantine fault tolerance. In: NOMS 2020–2020 IEEE/IFIP network operations and management symposium, 2020, pp. 1–4: IEEE.
45.
Zurück zum Zitat Opara, E.U., Soluade, O.A.: Straddling the next cyber frontier: The empirical analysis on network security, exploits, and vulnerabilities. Int. J. Electron. Inform. Eng. 3(1), 10–18 (2015) Opara, E.U., Soluade, O.A.: Straddling the next cyber frontier: The empirical analysis on network security, exploits, and vulnerabilities. Int. J. Electron. Inform. Eng. 3(1), 10–18 (2015)
46.
Zurück zum Zitat Chen, Q., Srivastava, G., Parizi, R.M., Aloqaily, M., Al Ridhawi, I.: An incentive-aware blockchain-based solution for internet of fake media things. Inform. Process. Manag. 57(6), 102370 (2020)CrossRef Chen, Q., Srivastava, G., Parizi, R.M., Aloqaily, M., Al Ridhawi, I.: An incentive-aware blockchain-based solution for internet of fake media things. Inform. Process. Manag. 57(6), 102370 (2020)CrossRef
47.
Zurück zum Zitat Dehghani, M., et al.: Blockchain-based securing of data exchange in a power transmission system considering congestion management and social welfare. Sustainability 13(1), 90 (2021)CrossRef Dehghani, M., et al.: Blockchain-based securing of data exchange in a power transmission system considering congestion management and social welfare. Sustainability 13(1), 90 (2021)CrossRef
48.
Zurück zum Zitat Dehghani, M., et al.: Blockchain-based securing of data exchange in a power transmission system considering congestion management and social welfare. Sustainability 13(1), 1–1 (2020)CrossRef Dehghani, M., et al.: Blockchain-based securing of data exchange in a power transmission system considering congestion management and social welfare. Sustainability 13(1), 1–1 (2020)CrossRef
49.
Zurück zum Zitat O. Bouachir, M. Aloqaily, L. Tesng, and A. Boukerche.: Blockchain and fog computing for cyber-physical systems: case of smart industry. arXiv preprint arXiv:2005.12834, (2020) O. Bouachir, M. Aloqaily, L. Tesng, and A. Boukerche.: Blockchain and fog computing for cyber-physical systems: case of smart industry. arXiv preprint arXiv:2005.12834, (2020)
50.
Zurück zum Zitat Banerjee, M., Lee, J., Choo, K.-K.R.: A blockchain future for internet of things security: a position paper. Digital Commun. Netw. 4(3), 149–160 (2018)CrossRef Banerjee, M., Lee, J., Choo, K.-K.R.: A blockchain future for internet of things security: a position paper. Digital Commun. Netw. 4(3), 149–160 (2018)CrossRef
51.
Zurück zum Zitat B. K. Mohanta, U. Satapathy, S. S. Panda, and D. Jena.: A novel approach to solve security and privacy issues for IoT applications using blockchain. In: 2019 International Conference on Information Technology (ICIT), 2019, pp. 394–399: IEEE B. K. Mohanta, U. Satapathy, S. S. Panda, and D. Jena.: A novel approach to solve security and privacy issues for IoT applications using blockchain. In: 2019 International Conference on Information Technology (ICIT), 2019, pp. 394–399: IEEE
52.
Zurück zum Zitat Deng, L., Li, D., Yao, X., Cox, D., Wang, H.: Mobile network intrusion detection for IoT system based on transfer learning algorithm. Clust. Comput. 22(4), 9889–9904 (2019)CrossRef Deng, L., Li, D., Yao, X., Cox, D., Wang, H.: Mobile network intrusion detection for IoT system based on transfer learning algorithm. Clust. Comput. 22(4), 9889–9904 (2019)CrossRef
53.
Zurück zum Zitat A. Dorri, C. Roulin, R. Jurdak, and S. S. Kanhere.: On the activity privacy of blockchain for IoT. In: 2019 IEEE 44th Conference on Local Computer Networks (LCN), 2019, pp. 258–261: IEEE A. Dorri, C. Roulin, R. Jurdak, and S. S. Kanhere.: On the activity privacy of blockchain for IoT. In: 2019 IEEE 44th Conference on Local Computer Networks (LCN), 2019, pp. 258–261: IEEE
54.
Zurück zum Zitat Ma, M., Shi, G., Li, F.: Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario. IEEE Access 7, 34045–34059 (2019)CrossRef Ma, M., Shi, G., Li, F.: Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario. IEEE Access 7, 34045–34059 (2019)CrossRef
55.
Zurück zum Zitat G. Srivastava, R. M. Parizi, A. Dehghantanha, and K.-K. R. Choo.: Data sharing and privacy for patient IoT devices using blockchain. In: International Conference on Smart City and Informatization, 2019, pp. 334–348: Springer. G. Srivastava, R. M. Parizi, A. Dehghantanha, and K.-K. R. Choo.: Data sharing and privacy for patient IoT devices using blockchain. In: International Conference on Smart City and Informatization, 2019, pp. 334–348: Springer.
56.
Zurück zum Zitat Y. Charband and N. J. Navimipour.: Knowledge sharing mechanisms in the education: a systematic review of the state of the art literature and recommendations for future research. Kybernetes, 2018. Y. Charband and N. J. Navimipour.: Knowledge sharing mechanisms in the education: a systematic review of the state of the art literature and recommendations for future research. Kybernetes, 2018.
57.
Zurück zum Zitat Hajiali, M.: Big data and sentiment analysis: a comprehensive and systematic literature review. Concurr. Comput. Pract. Exper. 32(14), e5671 (2020)CrossRef Hajiali, M.: Big data and sentiment analysis: a comprehensive and systematic literature review. Concurr. Comput. Pract. Exper. 32(14), e5671 (2020)CrossRef
58.
Zurück zum Zitat Aromataris, E., Pearson, A.: The systematic review: an overview. AJN Am. J. Nurs. 114(3), 53–58 (2014)CrossRef Aromataris, E., Pearson, A.: The systematic review: an overview. AJN Am. J. Nurs. 114(3), 53–58 (2014)CrossRef
59.
Zurück zum Zitat Masnoon, N., Shakib, S., Kalisch-Ellett, L., Caughey, G.E.: What is polypharmacy? A systematic review of definitions. BMC Geriatr. 17(1), 230 (2017)CrossRef Masnoon, N., Shakib, S., Kalisch-Ellett, L., Caughey, G.E.: What is polypharmacy? A systematic review of definitions. BMC Geriatr. 17(1), 230 (2017)CrossRef
60.
Zurück zum Zitat Heidari, A., Jabraeil Jamali, M.A., Jafari Navimipour, N., Akbarpour, S.J.I.J.O.C.S.: "Internet of things offloading: ongoing issues, opportunities, and future challenges. J. Commun. Syst, 33(14), 4474 (2020)CrossRef Heidari, A., Jabraeil Jamali, M.A., Jafari Navimipour, N., Akbarpour, S.J.I.J.O.C.S.: "Internet of things offloading: ongoing issues, opportunities, and future challenges. J. Commun. Syst, 33(14), 4474 (2020)CrossRef
61.
Zurück zum Zitat Munn, Z., Porritt, K., Lockwood, C., Aromataris, E., Pearson, A.: Establishing confidence in the output of qualitative research synthesis: the ConQual approach. BMC Med. Res. Methodol. 14(1), 1–7 (2014)CrossRef Munn, Z., Porritt, K., Lockwood, C., Aromataris, E., Pearson, A.: Establishing confidence in the output of qualitative research synthesis: the ConQual approach. BMC Med. Res. Methodol. 14(1), 1–7 (2014)CrossRef
62.
Zurück zum Zitat Munn, Z., Peters, M.D., Stern, C., Tufanaru, C., McArthur, A., Aromataris, E.: Systematic review or scoping review? Guidance for authors when choosing between a systematic or scoping review approach. BMC Med. Res. Methodol. 18(1), 143 (2018)CrossRef Munn, Z., Peters, M.D., Stern, C., Tufanaru, C., McArthur, A., Aromataris, E.: Systematic review or scoping review? Guidance for authors when choosing between a systematic or scoping review approach. BMC Med. Res. Methodol. 18(1), 143 (2018)CrossRef
63.
Zurück zum Zitat Lin, I.-C., Liao, T.-C.: A survey of blockchain security issues and challenges. IJ Netw. Secur. 19(5), 653–659 (2017) Lin, I.-C., Liao, T.-C.: A survey of blockchain security issues and challenges. IJ Netw. Secur. 19(5), 653–659 (2017)
64.
Zurück zum Zitat B. K. Mohanta, D. Jena, S. Ramasubbareddy, M. Daneshmand, and A. H. Gandomi.: Addressing security and privacy issues of IoT using blockchain technology. IEEE Internet Things J. (2020). B. K. Mohanta, D. Jena, S. Ramasubbareddy, M. Daneshmand, and A. H. Gandomi.: Addressing security and privacy issues of IoT using blockchain technology. IEEE Internet Things J. (2020).
65.
Zurück zum Zitat Y. Rahulamathavan, R. C.-W. Phan, M. Rajarajan, S. Misra, and A. Kondoz.: Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In: 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 2017, pp. 1–6: IEEE. Y. Rahulamathavan, R. C.-W. Phan, M. Rajarajan, S. Misra, and A. Kondoz.: Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In: 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 2017, pp. 1–6: IEEE.
66.
Zurück zum Zitat A. Erdem, S. Ö. Yildirim, and P. Angin.: Blockchain for ensuring security, privacy, and trust in IoT environments: the state of the art. In: Security, privacy and trust in the IoT environment: Springer, 2019, pp. 97–122. A. Erdem, S. Ö. Yildirim, and P. Angin.: Blockchain for ensuring security, privacy, and trust in IoT environments: the state of the art. In: Security, privacy and trust in the IoT environment: Springer, 2019, pp. 97–122.
67.
Zurück zum Zitat Lu, Y., Huang, X., Dai, Y., Maharjan, S., Zhang, Y.: Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans. Industr. Inf. 16(6), 4177–4186 (2019)CrossRef Lu, Y., Huang, X., Dai, Y., Maharjan, S., Zhang, Y.: Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans. Industr. Inf. 16(6), 4177–4186 (2019)CrossRef
68.
Zurück zum Zitat Zhao, Q., Chen, S., Liu, Z., Baker, T., Zhang, Y.: Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Inf. Process. Manage. 57(6), 102355 (2020)CrossRef Zhao, Q., Chen, S., Liu, Z., Baker, T., Zhang, Y.: Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Inf. Process. Manage. 57(6), 102355 (2020)CrossRef
69.
Zurück zum Zitat Shen, M., Tang, X., Zhu, L., Du, X., Guizani, M.: Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things J. 6(5), 7702–7712 (2019)CrossRef Shen, M., Tang, X., Zhu, L., Du, X., Guizani, M.: Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things J. 6(5), 7702–7712 (2019)CrossRef
70.
Zurück zum Zitat B. Krebs.: Hacked cameras, DVRs powered today’s massive internet outage. Krebs on Security, 2016. B. Krebs.: Hacked cameras, DVRs powered today’s massive internet outage. Krebs on Security, 2016.
71.
Zurück zum Zitat O. J. A. Pinno, A. R. A. Gregio, and L. C. De Bona.: Controlchain: blockchain as a central enabler for access control authorizations in the IoT. In: Globecom 2017–2017 IEEE Global Communications Conference, 2017, pp. 1–6: IEEE O. J. A. Pinno, A. R. A. Gregio, and L. C. De Bona.: Controlchain: blockchain as a central enabler for access control authorizations in the IoT. In: Globecom 2017–2017 IEEE Global Communications Conference, 2017, pp. 1–6: IEEE
72.
Zurück zum Zitat Ouaddah, A., Mousannif, H., AbouElkalam, A., Ouahman, A.A.: Access control in the Internet of Things: Big challenges and new opportunities. Comput. Netw. 112, 237–262 (2017)CrossRef Ouaddah, A., Mousannif, H., AbouElkalam, A., Ouahman, A.A.: Access control in the Internet of Things: Big challenges and new opportunities. Comput. Netw. 112, 237–262 (2017)CrossRef
73.
Zurück zum Zitat A. Ouaddah, A. AbouElkalam, and A. A. Ouahman.: Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Europe and MENA Cooperation Advances in Information and Communication Technologies: Springer, 2017, pp. 523–533. A. Ouaddah, A. AbouElkalam, and A. A. Ouahman.: Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Europe and MENA Cooperation Advances in Information and Communication Technologies: Springer, 2017, pp. 523–533.
74.
Zurück zum Zitat T. D. Nguyen, H.-A. Pham, and M. T. Thai.: Leveraging blockchain to enhance data privacy in iot-based applications. In: International Conference on Computational Social Networks, 2018, pp. 211–221: Springer T. D. Nguyen, H.-A. Pham, and M. T. Thai.: Leveraging blockchain to enhance data privacy in iot-based applications. In: International Conference on Computational Social Networks, 2018, pp. 211–221: Springer
75.
Zurück zum Zitat F. Loukil, C. Ghedira-Guegan, K. Boukadi, and A. N. Benharkat.: Towards an end-to-end IoT data privacy-preserving framework using blockchain technology. In: International Conference on Web Information Systems Engineering, 2018, pp. 68–78: Springer F. Loukil, C. Ghedira-Guegan, K. Boukadi, and A. N. Benharkat.: Towards an end-to-end IoT data privacy-preserving framework using blockchain technology. In: International Conference on Web Information Systems Engineering, 2018, pp. 68–78: Springer
76.
Zurück zum Zitat M. Aloqaily, O. Bouachir, A. Boukerche, and I. A. Ridhawi.: Design guidelines for blockchain-assisted 5G-UAV networks. arXiv preprint arXiv:2007.15286, (2020) M. Aloqaily, O. Bouachir, A. Boukerche, and I. A. Ridhawi.: Design guidelines for blockchain-assisted 5G-UAV networks. arXiv preprint arXiv:2007.15286, (2020)
77.
Zurück zum Zitat Y. Zhao et al. (2020) Privacy-preserving blockchain-based federated learning for IoT devices. IEEE Internet Things J. Y. Zhao et al. (2020) Privacy-preserving blockchain-based federated learning for IoT devices. IEEE Internet Things J.
78.
Zurück zum Zitat Stojkoska, B.L.R., Trivodaliev, K.V.: A review of Internet of Things for smart home: challenges and solutions. J. Clean. Prod. 140, 1454–1464 (2017)CrossRef Stojkoska, B.L.R., Trivodaliev, K.V.: A review of Internet of Things for smart home: challenges and solutions. J. Clean. Prod. 140, 1454–1464 (2017)CrossRef
79.
Zurück zum Zitat V. Sivaraman, D. Chan, D. Earl, and R. Boreli.: Smart-phones attacking smart-homes. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016, pp. 195–200. V. Sivaraman, D. Chan, D. Earl, and R. Boreli.: Smart-phones attacking smart-homes. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016, pp. 195–200.
80.
Zurück zum Zitat A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram.: Blockchain for IoT security and privacy: The case study of a smart home. In 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops), 2017, pp. 618–623: IEEE A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram.: Blockchain for IoT security and privacy: The case study of a smart home. In 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops), 2017, pp. 618–623: IEEE
81.
Zurück zum Zitat Mohanty, S.N., et al.: An efficient lightweight integrated blockchain (ELIB) model for IoT security and privacy. Futur. Gener. Comput. Syst. 102, 1027–1037 (2020)CrossRef Mohanty, S.N., et al.: An efficient lightweight integrated blockchain (ELIB) model for IoT security and privacy. Futur. Gener. Comput. Syst. 102, 1027–1037 (2020)CrossRef
82.
Zurück zum Zitat M. N. Islam and S. Kundu.: IoT security, privacy and trust in home-sharing economy via blockchain. In Blockchain Cybersecurity, Trust and Privacy: Springer, 2020, pp. 33–50 M. N. Islam and S. Kundu.: IoT security, privacy and trust in home-sharing economy via blockchain. In Blockchain Cybersecurity, Trust and Privacy: Springer, 2020, pp. 33–50
83.
Zurück zum Zitat G. Tripathi, M. A. Ahad, and S. Paiva.: S2HS-A blockchain based approach for smart healthcare system. In: Healthcare, 2020, 8(1), 100391: Elsevier G. Tripathi, M. A. Ahad, and S. Paiva.: S2HS-A blockchain based approach for smart healthcare system. In: Healthcare, 2020, 8(1), 100391: Elsevier
84.
Zurück zum Zitat S. Chakraborty, S. Aich, and H.-C. Kim.: A secure healthcare system design framework using blockchain technology. In: 2019 21st International Conference on Advanced Communication Technology (ICACT), 2019, pp. 260–264: IEEE S. Chakraborty, S. Aich, and H.-C. Kim.: A secure healthcare system design framework using blockchain technology. In: 2019 21st International Conference on Advanced Communication Technology (ICACT), 2019, pp. 260–264: IEEE
85.
Zurück zum Zitat J. Qiu, X. Liang, S. Shetty, and D. Bowden.: Towards secure and smart healthcare in smart cities using blockchain. In: 2018 IEEE International Smart Cities Conference (ISC2), 2018, pp. 1–4: IEEE J. Qiu, X. Liang, S. Shetty, and D. Bowden.: Towards secure and smart healthcare in smart cities using blockchain. In: 2018 IEEE International Smart Cities Conference (ISC2), 2018, pp. 1–4: IEEE
86.
Zurück zum Zitat N. Bhalaji, P. Abilashkumar, and S. Aboorva.: A Blockchain based approach for privacy preservation in healthcare IoT. In: International Conference on Intelligent Computing and Communication Technologies, 2019, pp. 465–473: Springer. N. Bhalaji, P. Abilashkumar, and S. Aboorva.: A Blockchain based approach for privacy preservation in healthcare IoT. In: International Conference on Intelligent Computing and Communication Technologies, 2019, pp. 465–473: Springer.
87.
Zurück zum Zitat K. Azbeg, O. Ouchetto, S. J. Andaloussi, L. Fetjah, and A. Sekkaki.: Blockchain and IoT for security and privacy: a platform for diabetes self-management. In: 2018 4th International Conference on Cloud Computing Technologies and Applications (Cloudtech), 2018, pp. 1–5: IEEE K. Azbeg, O. Ouchetto, S. J. Andaloussi, L. Fetjah, and A. Sekkaki.: Blockchain and IoT for security and privacy: a platform for diabetes self-management. In: 2018 4th International Conference on Cloud Computing Technologies and Applications (Cloudtech), 2018, pp. 1–5: IEEE
88.
Zurück zum Zitat D.-P. Le, H. Meng, L. Su, S. L. Yeo, and V. Thing.: Biff: A blockchain-based IoT forensics framework with identity privacy. In TENCON 2018–2018 IEEE Region 10 Conference, 2018, pp. 2372–2377: IEEE D.-P. Le, H. Meng, L. Su, S. L. Yeo, and V. Thing.: Biff: A blockchain-based IoT forensics framework with identity privacy. In TENCON 2018–2018 IEEE Region 10 Conference, 2018, pp. 2372–2377: IEEE
89.
Zurück zum Zitat Shen, M., Deng, Y., Zhu, L., Du, X., Guizani, N.: Privacy-preserving image retrieval for medical IoT systems: a blockchain-based approach. IEEE Netw. 33(5), 27–33 (2019)CrossRef Shen, M., Deng, Y., Zhu, L., Du, X., Guizani, N.: Privacy-preserving image retrieval for medical IoT systems: a blockchain-based approach. IEEE Netw. 33(5), 27–33 (2019)CrossRef
90.
Zurück zum Zitat B. Alamri, I. T. Javed, and T. Margaria.: Preserving patients’ privacy in medical IoT using blockchain. In: International Conference on Edge Computing, 2020, pp. 103–110: Springer B. Alamri, I. T. Javed, and T. Margaria.: Preserving patients’ privacy in medical IoT using blockchain. In: International Conference on Edge Computing, 2020, pp. 103–110: Springer
91.
Zurück zum Zitat S. Juyal, S. Sharma, A. Harbola, and A. S. Shukla.: Privacy and security of IoT based skin monitoring system using blockchain approach. In: 2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), 2020, pp. 1–5: IEEE S. Juyal, S. Sharma, A. Harbola, and A. S. Shukla.: Privacy and security of IoT based skin monitoring system using blockchain approach. In: 2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), 2020, pp. 1–5: IEEE
92.
Zurück zum Zitat C. Patel.: IoT privacy preservation using blockchain. (2019) C. Patel.: IoT privacy preservation using blockchain. (2019)
93.
Zurück zum Zitat Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)CrossRef Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)CrossRef
94.
Zurück zum Zitat Taylor, P.J., Dargahi, T., Dehghantanha, A., Parizi, R.M., Choo, K.-K.R.: A systematic literature review of blockchain cyber security. Digit Commun. Netw 6(2), 147–156 (2020)CrossRef Taylor, P.J., Dargahi, T., Dehghantanha, A., Parizi, R.M., Choo, K.-K.R.: A systematic literature review of blockchain cyber security. Digit Commun. Netw 6(2), 147–156 (2020)CrossRef
95.
Zurück zum Zitat N. Waheed, X. He, and M. Usman.: Security & privacy in IoT using machine learning & blockchain: Threats & Countermeasures. arXivpreprint arXiv:2002.03488, 2020. N. Waheed, X. He, and M. Usman.: Security & privacy in IoT using machine learning & blockchain: Threats & Countermeasures. arXivpreprint arXiv:2002.03488, 2020.
96.
Zurück zum Zitat Ali, M.S., Vecchio, M., Pincheira, M., Dolui, K., Antonelli, F., Rehmani, M.H.: Applications of blockchains in the Internet of Things: a comprehensive survey. IEEE Commun. Surv. Tutor. 21(2), 1676–1717 (2018)CrossRef Ali, M.S., Vecchio, M., Pincheira, M., Dolui, K., Antonelli, F., Rehmani, M.H.: Applications of blockchains in the Internet of Things: a comprehensive survey. IEEE Commun. Surv. Tutor. 21(2), 1676–1717 (2018)CrossRef
97.
Zurück zum Zitat C. S. Kouzinopoulos et al.: Using blockchains to strengthen the security of internet of things. In: International ISCIS Security Workshop, 2018, pp. 90–100: Springer, Cham C. S. Kouzinopoulos et al.: Using blockchains to strengthen the security of internet of things. In: International ISCIS Security Workshop, 2018, pp. 90–100: Springer, Cham
98.
Zurück zum Zitat Shahzad, A., Zhang, K., Gherbi, A.: Intuitive development to examine collaborative IoT supply chain system underlying privacy and security levels and perspective powering through proactive blockchain. Sensors 20(13), 3760 (2020)CrossRef Shahzad, A., Zhang, K., Gherbi, A.: Intuitive development to examine collaborative IoT supply chain system underlying privacy and security levels and perspective powering through proactive blockchain. Sensors 20(13), 3760 (2020)CrossRef
99.
Zurück zum Zitat C. Yu, Y. Leng, J. Li, and J. Yu.: Blockchain crowdfunding projects evaluation using GRA-TOPSIS. Kybernetes, 2020. C. Yu, Y. Leng, J. Li, and J. Yu.: Blockchain crowdfunding projects evaluation using GRA-TOPSIS. Kybernetes, 2020.
100.
Zurück zum Zitat O. Mounnan, A. El Mouatasim, O. Manad, T. Hidar, A. Abou El Kalam, and N. Idboufker.: Privacy-aware and authentication based on blockchain with fault tolerance for IoT enabled fog computing. In: 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), 2020, pp. 347–352: IEEE O. Mounnan, A. El Mouatasim, O. Manad, T. Hidar, A. Abou El Kalam, and N. Idboufker.: Privacy-aware and authentication based on blockchain with fault tolerance for IoT enabled fog computing. In: 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), 2020, pp. 347–352: IEEE
101.
Zurück zum Zitat A. H. Alkhazaali and A. Oğuz.: Lightweight fog based solution for privacy-preserving in IoT using blockchain. In: 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), 2020, pp. 1–10: IEEE A. H. Alkhazaali and A. Oğuz.: Lightweight fog based solution for privacy-preserving in IoT using blockchain. In: 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), 2020, pp. 1–10: IEEE
102.
Zurück zum Zitat Bagal, H.A., Soltanabad, Y.N., Dadjuo, M., Wakil, K., Ghadimi, N.: Risk-assessment of photovoltaic-wind-battery-grid based large industrial consumer using information gap decision theory. Sol. Energy 169, 343–352 (2018)CrossRef Bagal, H.A., Soltanabad, Y.N., Dadjuo, M., Wakil, K., Ghadimi, N.: Risk-assessment of photovoltaic-wind-battery-grid based large industrial consumer using information gap decision theory. Sol. Energy 169, 343–352 (2018)CrossRef
103.
Zurück zum Zitat Liu, J., Chen, C., Liu, Z., Jermsittiparsert, K., Ghadimi, N.: An IGDT-based risk-involved optimal bidding strategy for hydrogen storage-based intelligent parking lot of electric vehicles. J. Energy Storage 27, 101057 (2020)CrossRef Liu, J., Chen, C., Liu, Z., Jermsittiparsert, K., Ghadimi, N.: An IGDT-based risk-involved optimal bidding strategy for hydrogen storage-based intelligent parking lot of electric vehicles. J. Energy Storage 27, 101057 (2020)CrossRef
104.
Zurück zum Zitat A. Ouaddah, A. Abou El Kalam, and A. A. Ouahman.: Harnessing the power of blockchain technology to solve IoT security & privacy issues. In: ICC, 2017, pp. 7:1–7:10. A. Ouaddah, A. Abou El Kalam, and A. A. Ouahman.: Harnessing the power of blockchain technology to solve IoT security & privacy issues. In: ICC, 2017, pp. 7:1–7:10.
Metadaten
Titel
Privacy challenges of IoT-based blockchain: a systematic review
verfasst von
Wenbing Liang
Nan Ji
Publikationsdatum
30.03.2021
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 3/2022
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-021-03260-0

Weitere Artikel der Ausgabe 3/2022

Cluster Computing 3/2022 Zur Ausgabe

Premium Partner