skip to main content
survey

A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling

Published:06 February 2020Publication History
Skip Abstract Section

Abstract

Blockchain technology can be extensively applied in diverse services, including online micro-payments, supply chain tracking, digital forensics, health-care record sharing, and insurance payments. Extending the technology to the Internet of things (IoT), we can obtain a verifiable and traceable IoT network. Emerging research in IoT applications exploits blockchain technology to record transaction data, optimize current system performance, or construct next-generation systems, which can provide additional security, automatic transaction management, decentralized platforms, offline-to-online data verification, and so on. In this article, we conduct a systematic survey of the key components of IoT blockchain and examine a number of popular blockchain applications.

In particular, we first give an architecture overview of popular IoT-blockchain systems by analyzing their network structures and protocols. Then, we discuss variant consensus protocols for IoT blockchains, and make comparisons among different consensus algorithms. Finally, we analyze the traffic model for P2P and blockchain systems and provide several metrics. We also provide a suitable traffic model for IoT-blockchain systems to illustrate network traffic distribution.

References

  1. Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, and Moussa Ayyash. 2015. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surveys Tutor. 17, 4 (2015), 2347--2376.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Fadi Al-Turjman. 2018. Information-centric framework for the Internet of Things (IoT): Traffic modeling and optimization. Future Gen. Comput. Syst. 80 (2018), 63--75.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Fadi Al-Turjman, Enver Ever, and Hadi Zahmatkesh. 2017. Green femtocells in the IoT Era: Traffic modeling and challenges--an overview. IEEE Netw. 31, 6 (2017), 48--55.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Olivier Alphand, Michele Amoretti, Timothy Claeys, Simone Dall’Asta, Andrzej Duda, Gianluigi Ferrari, Franck Rousseau, Bernard Tourancheau, Luca Veltri, and Francesco Zanichelli. 2018. IoTChain: A blockchain security architecture for the Internet of Things. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC’18). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  5. Ambrosus 2019. Ambrosus—Enabling Sensors to Talk to Blockchain. Retrieved from https://ambrosus.com/.Google ScholarGoogle Scholar
  6. Jeffrey G. Andrews, Stefano Buzzi, Wan Choi, Stephen V. Hanly, Angel Lozano, Anthony C. K. Soong, and Jianzhong Charlie Zhang. 2014. What will 5G be? IEEE J. Select. Areas Commun. 32, 6 (2014), 1065--1082.Google ScholarGoogle ScholarCross RefCross Ref
  7. Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, et al. 2018. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the 13th EuroSys Conference. ACM, New York, NY, 30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Andreas M Antonopoulos. 2014. Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O’Reilly Media, Inc., CA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Giuseppe Ateniese, Michael T. Chiaramonte, David Treat, Bernardo Magri, and Daniele Venturi. 2018. Hybrid Blockchain. U.S. Patent 9,959,065.Google ScholarGoogle Scholar
  10. Hany F. Atlam, Ahmed Alenezi, Madini O. Alassafi, and Gary Wills. 2018. Blockchain with internet of things: Benefits, challenges, and future directions. Int. J. Intell. Syst. Appl. 10, 6 (2018), 40--48.Google ScholarGoogle Scholar
  11. Atonomi 2019. Atonomi—Bringing Trust and Security to IoT. Retrieved from https://atonomi.io/.Google ScholarGoogle Scholar
  12. Attores 2019. Attores—Smart Contracts as a Service | Blockchain Singapore. Retrieved from https://attores.com/.Google ScholarGoogle Scholar
  13. Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2010. The internet of things: A survey. Comput. Netw. 54, 15 (2010), 2787--2805.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Arshdeep Bahga and Vijay K. Madisetti. 2016. Blockchain platform for industrial internet of things. J. Softw. Eng. Appl. 9, 10 (2016), 533.Google ScholarGoogle ScholarCross RefCross Ref
  15. Arati Baliga. 2017. Understanding blockchain consensus models. In Persistent. Persistent Systems Ltd., India.Google ScholarGoogle Scholar
  16. Juan Beccuti, Christian Jaag et al. 2017. The Bitcoin Mining Game: On the Optimality of Honesty in Proof-of-work Consensus Mechanism. Technical Report. Swiss Economics.Google ScholarGoogle Scholar
  17. Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, and Madars Virza. 2013. SNARKs for C: Verifying program executions succinctly and in zero knowledge. In Proceedings of the Annual Cryptology Conference. Springer, Berlin, 90--108.Google ScholarGoogle ScholarCross RefCross Ref
  18. Federico Matteo Benčić and Ivana Podnar Žarko. 2018. Distributed ledger technology: Blockchain compared to directed acyclic graph. In Proceedings of the IEEE 38th International Conference on Distributed Computing Systems (ICDCS’18). IEEE, 1569--1570.Google ScholarGoogle ScholarCross RefCross Ref
  19. Dan Bieler. 2018. Blockchain and the Internet of Things: The IoT Blockchain Opportunity and Challenge. Retrieved from https://www.i-scoop.eu/blockchain-distributed-ledger-technology/blockchain-iot/.Google ScholarGoogle Scholar
  20. Carsten Bormann, Mehmet Ersue, and Ari Keranen. 2014. Terminology for constrained-node networks. Internet Engineering Task Force (IETF), Fremont. 2070–1721.Google ScholarGoogle Scholar
  21. Rory Bowden, Holger Paul Keeler, Anthony E. Krzesinski, and Peter G. Taylor. 2018. Block arrivals in the Bitcoin blockchain. arXiv preprint arXiv:1801.07447 (2018).Google ScholarGoogle Scholar
  22. Richard Gendal Brown, James Carlyle, Ian Grigg, and Mike Hearn. 2016. Corda: An introduction. R3 CEV 1 (Aug. 2016), 15.Google ScholarGoogle Scholar
  23. René Brunner and E. Biersack. 2006. A performance evaluation of the Kad-protocol. Master’s thesis, Institut Eurecom, France.Google ScholarGoogle Scholar
  24. Vitalik Buterin et al. 2014. A next-generation smart contract and decentralized application platform. White Paper 3 (2014), 37.Google ScholarGoogle Scholar
  25. Christian Cachin. 2016. Architecture of the hyperledger blockchain fabric. In Proceedings of the Workshop on Distributed Cryptocurrencies and Consensus Ledgers, Vol. 310. IBM Research, Zurich.Google ScholarGoogle Scholar
  26. Xing Shi Cai and Luc Devroye. 2013. A probabilistic analysis of Kademlia networks. In Proceedings of the International Symposium on Algorithms and Computation. Springer, Berlin, 711--721.Google ScholarGoogle ScholarCross RefCross Ref
  27. Miguel Castro, Barbara Liskov, et al. 1999. Practical Byzantine fault tolerance. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI’99). ACM, 173--186.Google ScholarGoogle Scholar
  28. Nutthakorn Chalaemwongwan and Werasak Kurutach. 2018. State of the art and challenges facing consensus protocols on blockchain. In Proceedings of the International Conference on Information Networking (ICOIN’18). IEEE, 957--962.Google ScholarGoogle Scholar
  29. Moumena A. Chaqfeh and Nader Mohamed. 2012. Challenges in middleware solutions for the internet of things. In Proceedings of the International Conference on Collaboration Technologies and Systems (CTS’12). IEEE, 21--26.Google ScholarGoogle Scholar
  30. Cello Chen. 2018. AlipayHK and GCash Launch Cross-Border Remittance Service Powered by Alipay’s Blockchain Technology. Retrieved from https://www.businesswire.com/news/home/20180625005561/en/AlipayHK-GCash-Launch-Cross-Border-Remittance-Service-Powered.Google ScholarGoogle Scholar
  31. Deyan Chen and Hong Zhao. 2012. Data security and privacy protection issues in cloud computing. In Proceedings of the International Conference on Computer Science and Electronics Engineering, Vol. 1. IEEE, 647--651.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Konstantinos Christidis and Michael Devetsikiotis. 2016. Blockchains and smart contracts for the internet of things. IEEE Access 4 (2016), 2292--2303.Google ScholarGoogle ScholarCross RefCross Ref
  33. Anton Churyumov. 2016. Byteball: A Decentralized System for Storage and Transfer of Value. Retrieved from https://byteball.org/Byteball.pdf.Google ScholarGoogle Scholar
  34. Cisco IoT 2019. Internet of Things Cisco IoT is the Bridge to Business Outcomes. Retrieved from https://www.cisco.com/c/en/us/solutions/internet-of-things/overview.html.Google ScholarGoogle Scholar
  35. Marco Conoscenti, Antonio Vetro, and Juan Carlos De Martin. 2016. Blockchain for the Internet of Things: A systematic literature review. In Proceedings of the IEEE/ACS 13th International Conference on Computer Systems and Applications (AICCSA’16). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  36. Hyperchain Corp. 2019. hyperchain White Paper. Retrieved from https://hyperchain.readthedocs.io/zhCN/latest/consensus.html.Google ScholarGoogle Scholar
  37. James Cowling, Daniel Myers, Barbara Liskov, Rodrigo Rodrigues, and Liuba Shrira. 2006. HQ replication: A hybrid quorum protocol for Byzantine fault tolerance. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation. USENIX Association, Berkeley, CA, 177--190.Google ScholarGoogle Scholar
  38. Michael Crosby, Pradan Pattanayak, Sanjeev Verma, Vignesh Kalyanaraman, et al. 2016. Blockchain technology: Beyond bitcoin. Appl. Innov. 2, 6-10 (2016), 71.Google ScholarGoogle Scholar
  39. Li Da Xu, Wu He, and Shancang Li. 2014. Internet of things in industries: A survey. IEEE Trans. Industr. Inform. 10, 4 (2014), 2233--2243.Google ScholarGoogle ScholarCross RefCross Ref
  40. Whitepaper Database. 2018. ITC white paper complete version. Retrieved from https://whitepaperdatabase.com/iot-chain-itc-whitepaper/.Google ScholarGoogle Scholar
  41. Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Proceedings of the IEEE 13th International Conference on Peer-to-Peer Computing (P2P’13). IEEE, 1--10.Google ScholarGoogle ScholarCross RefCross Ref
  42. DokChain 2019. DokChain | PokitDok. Retrieved from https://pokitdok.com/dokchain/.Google ScholarGoogle Scholar
  43. Ali Dorri, Salil S. Kanhere, and Raja Jurdak. 2016. Blockchain in internet of things: Challenges and solutions. arXiv preprint arXiv:1608.05187 (2016).Google ScholarGoogle Scholar
  44. Ali Dorri, Salil S. Kanhere, Raja Jurdak, and Praveen Gauravaram. 2017a. Blockchain for IoT security and privacy: The case study of a smart home. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom’17). IEEE, 618--623.Google ScholarGoogle ScholarCross RefCross Ref
  45. Ali Dorri, Salil S. Kanhere, Raja Jurdak, and Praveen Gauravaram. 2017b. LSB: A lightweight scalable blockchain for IoT security and privacy. arXiv preprint arXiv:1712.02969 (2017).Google ScholarGoogle Scholar
  46. Kevin Driscoll, Brendan Hall, Håkan Sivencrona, and Phil Zumsteg. 2003. Byzantine fault tolerance, from theory to reality. In Proceeding sof the International Conference on Computer Safety, Reliability, and Security. Springer, Berlin, 235--248.Google ScholarGoogle Scholar
  47. Cynthia Dwork and Moni Naor. 1992. Pricing via processing or combatting junk mail. In Proceedings of the Annual International Cryptology Conference. Springer, Berlin, 139--147.Google ScholarGoogle Scholar
  48. Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Pietrzak. 2015. Proofs of space. In Proceedings of the Conference on Advances in Cryptology (CRYPTO’15). Springer, Berlin, 585--605.Google ScholarGoogle ScholarCross RefCross Ref
  49. Ariel Ekblaw, Asaph Azaria, John D. Halamka, and Andrew Lippman. 2016. A case study for blockchain in healthcare: “MedRec” prototype for electronic health records and medical research data. In Proceedings of the IEEE Open and Big Data Conference, Vol. 13. IEEE, 13.Google ScholarGoogle Scholar
  50. ElectriCChain 2018. ElectriCChain The Solar Energy Blockchain Project for Climate Change and Beyond. Retrieved from https://www.electricchain.org/.Google ScholarGoogle Scholar
  51. Patrick T. Eugster, Rachid Guerraoui, A.-M. Kermarrec, and Laurent Massoulié. 2004. Epidemic information dissemination in distributed systems. Computer 37, 5 (2004), 60--67.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Factom 2019. Factom | A Blockchain Innovations Company. Retrieved from https://www.factom.com/.Google ScholarGoogle Scholar
  53. Filament. 2018. Filament’s Industrial Internet of Things Blockchain Solution Wins 2018 IoT Innovator Award. Retrieved from https://globenewswire.com/news-release/2018/09/26/1576581/0/en/Filament-s-Industrial-Internet-of-Things-Blockchain-Solution-Wins-2018-IoT-Innovator-Award.html.Google ScholarGoogle Scholar
  54. Pierre Fraigniaud and George Giakkoupis. 2010. On the bit communication complexity of randomized rumor spreading. In Proceedings of the 22nd Annual ACM Symposium on Parallelism in Algorithms and Architectures. ACM, New York, NY, 134--143.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Jake Frankenfield. 2018. Proof of Burn. Retrieved from https://www.investopedia.com/terms/p/proof-burn-cryptocurrency.Google ScholarGoogle Scholar
  56. S. Gao, Z. Li, Z. Peng, and B. Xiao. 2019. Power adjusting and bribery racing: Novel mining attacks in the bitcoin system. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’19). ACM, New York, NY, 833--850.Google ScholarGoogle Scholar
  57. Arthur Gervais, Ghassan O. Karame, Vedran Capkun, and Srdjan Capkun. 2014. Is bitcoin a decentralized currency? IEEE Secur. Priv. 12, 3 (2014), 54--60.Google ScholarGoogle ScholarCross RefCross Ref
  58. Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gen. Comput. Syst. 29, 7 (2013), 1645--1660.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Krishna P. Gummadi, Richard J. Dunn, Stefan Saroiu, Steven D. Gribble, Henry M. Levy, and John Zahorjan. 2003. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. ACM SIGOPS Operat. Syst. Rev. 37, 5 (2003), 314--329.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Amir Haleem, Andrew Allen, Andrew Thompson, Marc Nijdam, and Rahul Garg. 2018. A Decentralized Machine Network. Technical Report.Google ScholarGoogle Scholar
  61. Mohamed Hefeeda and Osama Saleh. 2008. Traffic modeling and proportional partial caching for peer-to-peer systems. IEEE/ACM Trans. Netw. 16, 6 (2008), 1447--1460.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Y. Huang, J. Zhang, J. Duan, B. Xiao, F. Ye, and Y. Yang. 2019. Resource allocation and consensus on edge blockchain in pervasive edge computing environments. In Proceedings of the IEEE 39Th International Conference on Distributed Computing Systems. IEEE.Google ScholarGoogle Scholar
  63. HUAWEI IOT 2019. Enterprise IoT Leading IoT, Driving Industry Digital Transformation. Retrieved from https://e.huawei.com/en/solutions/technical/iot.Google ScholarGoogle Scholar
  64. Steve Huckle, Rituparna Bhattacharya, Martin White, and Natalia Beloff. 2016. Internet of things, blockchain, and shared economy applications. Procedia Comput. Sci. 98 (2016), 461--466.Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Seyoung Huh, Sangrae Cho, and Soohyung Kim. 2017. Managing IoT devices using blockchain platform. In Proceedings of the 19th International Conference on Advanced Communication Technology (ICACT’17). IEEE, 464--467.Google ScholarGoogle ScholarCross RefCross Ref
  66. IOTA 2019. The Next Generation of Distributed Ledger Technology | IOTA. Retrieved from https://www.iota.org/.Google ScholarGoogle Scholar
  67. IPFS 2019. IPFS Powers the Distributed Web. Retrieved from https://ipfs.io/.Google ScholarGoogle Scholar
  68. Reuben Jackson. 2018. Why IoT needs the blockchain, and blockchain needs IoT. Retrieved March 12, 2019 from https://hackernoon.com/why-iot-needs-the-blockchain-and-blockchain-needs-iot-896725b349c4.Google ScholarGoogle Scholar
  69. JD. 2018. The JD. Retrieved from http://ledger.jd.com/.Google ScholarGoogle Scholar
  70. JDChain 2019. JD Enterprise Blockchain Service. Retrieved from http://blockchain.jd.com/blockchain_store/pc/index.html#/BlockChainTrace.Google ScholarGoogle Scholar
  71. Joefox. 2018. Whitepaper:Nxt. Technical Report.Google ScholarGoogle Scholar
  72. Kate Jenkins, Ken Hopkinson, and Ken Birman. 2001. A gossip protocol for subgroup multicast. In Proceedings of the International Conference on Distributed Computing Systems Workshop. IEEE, 25--30.Google ScholarGoogle ScholarCross RefCross Ref
  73. Jiaojiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, and Wanlei Zhou. 2016. Identifying propagation sources in networks: State-of-the-art and comparative studies. IEEE Commun. Surveys Tutor. 19, 1 (2016), 465--481.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Zura Kakushadze and Ronald P Russo Jr. 2018. Blockchain: Data malls, coin economies and keyless payments. The Journal of Alternative Investments 21, 1 (2018), 8--16.Google ScholarGoogle ScholarCross RefCross Ref
  75. Jiawen Kang, Rong Yu, Xumin Huang, Sabita Maharjan, Yan Zhang, and Ekram Hossain. 2017. Enabling localized peer-to-peer electricity trading among plug-in hybrid electric vehicles using consortium blockchains. IEEE Trans. Industr. Info. 13, 6 (2017), 3154--3164.Google ScholarGoogle ScholarCross RefCross Ref
  76. Minhaj Ahmad Khan and Khaled Salah. 2018. IoT security: Review, blockchain solutions, and open challenges. Future Gen. Comput. Syst. 82 (2018), 395--411.Google ScholarGoogle ScholarCross RefCross Ref
  77. Rafiullah Khan, Sarmad Ullah Khan, Rifaqat Zaheer, and Shahid Khan. 2012. Future internet: The internet of things architecture, possible applications and key challenges. In Proceedings of the 10th International Conference on Frontiers of Information Technology (FIT’12). IEEE, 257--260.Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Proceedings of the Annual International Cryptology Conference. Springer, Cham, 357--388.Google ScholarGoogle ScholarCross RefCross Ref
  79. Sunny King and Scott Nadal. 2012. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. Self-published paper, August 19 (2012).Google ScholarGoogle Scholar
  80. Ramakrishna Kotla, Lorenzo Alvisi, Mike Dahlin, Allen Clement, and Edmund Wong. 2007. Zyzzyva: Speculative byzantine fault tolerance. ACM SIGOPS Operat. Syst. Rev. 41, 6 (2007), 45--58.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Tim Kozak. 2018. Consensus Protocols That Meet Different Business Demands. Retrieved from https://blockchain.intellectsoft.net/blog/consensus-protocols-that-meet-different-business-demands/.Google ScholarGoogle Scholar
  82. Nir Kshetri. 2017. Can blockchain strengthen the internet of things? IT Profess. 19, 4 (2017), 68--72.Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Leslie Lamport, Robert Shostak, and Marshall Pease. 1982. The Byzantine generals problem. ACM Trans. Program. Lang. Syst. 4, 3 (1982), 382--401.Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Daniel Larimer. 2014. Delegated proof-of-stake (dpos). Technical Report.Google ScholarGoogle Scholar
  85. In Lee and Kyoochun Lee. 2015. The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Bus. Horizons 58, 4 (2015), 431--440.Google ScholarGoogle ScholarCross RefCross Ref
  86. LeewayHertz 2019. Blockchain Development for Startups and Enterprises | USA | UAE. Retrieved from https://www.leewayhertz.com/.Google ScholarGoogle Scholar
  87. Sergio Demian Lerner. 2015. DagCoin: A Cryptocurrency Without Blocks. Retrieved from https://bitslog.files.wordpress.com/2015/09/dagcoin-v41.pdf.Google ScholarGoogle Scholar
  88. Xu Li, Rongxing Lu, Xiaohui Liang, Xuemin Shen, Jiming Chen, and Xiaodong Lin. 2011a. Smart community: An internet of things application. IEEE Commun. Mag. 49, 11 (2011).Google ScholarGoogle ScholarCross RefCross Ref
  89. Xiaoyong Li, Feng Zhou, and Xudong Yang. 2011b. A multi-dimensional trust evaluation model for large-scale P2P computing. J. Parallel Distrib. Comput. 71, 6 (2011), 837--847.Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. Zhetao Li, Jiawen Kang, Rong Yu, Dongdong Ye, Qingyong Deng, and Yan Zhang. 2017. Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans. Industr. Info. 14, 8 (2017), 3690--3700.Google ScholarGoogle Scholar
  91. Iuon-Chang Lin and Tzu-Chun Liao. 2017. A survey of Blockchain security issues and challenges. IJ Netw. Secur. 19, 5 (2017), 653--659.Google ScholarGoogle Scholar
  92. Erik Linask. 2018. Blockchain momentum continues, will reach $12 Billion in 2020. In The Blockchain Domain. Retrieved March 12, 2019 from https://www.theblockchaindomain.info/topics/apps-and-use-cases/articles/438960-blockcha-momentum-continues-will-reach-12-billion-2020.html.Google ScholarGoogle Scholar
  93. Bin Liu, Xiao Liang Yu, Shiping Chen, Xiwei Xu, and Liming Zhu. 2017. Blockchain-based data integrity service framework for IoT data. In Proceedings of the IEEE International Conference on Web Services (ICWS’17). IEEE, 468--475.Google ScholarGoogle ScholarCross RefCross Ref
  94. Liu Liu, Olivier De Vel, Qing-Long Han, Jun Zhang, and Yang Xiang. 2018. Detecting and preventing cyber insider threats: A survey. IEEE Commun. Surveys Tutor. 20, 2 (2018), 1397--1417.Google ScholarGoogle ScholarCross RefCross Ref
  95. LO3 2018. LO3 Energy The Future of Energy. Retrieved from https://lo3energy.com/.Google ScholarGoogle Scholar
  96. Pavel Masek, Jan Masek, Petr Frantik, Radek Fujdiak, Aleksandr Ometov, Jiri Hosek, Sergey Andreev, Petr Mlynek, and Jiri Misurec. 2016. A harmonized perspective on transportation management in smart cities: The novel IoT-driven environment for road traffic modeling. Sensors 16, 11 (2016), 1872.Google ScholarGoogle ScholarCross RefCross Ref
  97. Petar Maymounkov and David Mazieres. 2002. Kademlia: A peer-to-peer information system based on the xor metric. In Proceedings of the International Workshop on Peer-to-Peer Systems. Springer, Berlin, 53--65.Google ScholarGoogle ScholarCross RefCross Ref
  98. Dejan S. Milojicic, Vana Kalogeraki, Rajan Lukose, Kiran Nagaraja, Jim Pruyne, Bruno Richard, Sami Rollins, and Zhichen Xu. 2002. Peer-to-peer Computing. Technical Report.Google ScholarGoogle Scholar
  99. Zhongxing Ming, Shu Yang, Qi Li, Dan Wang, Mingwei Xu, Ke Xu, and Laizhong Cui. 2018. Blockcloud: A Blockchain-based service-centric network stack. Retrieved from https://www.block-cloud.io/blockcloudtechnicalwhitepaper.pdf.Google ScholarGoogle Scholar
  100. Daniele Miorandi, Sabrina Sicari, Francesco De Pellegrini, and Imrich Chlamtac. 2012. Internet of things: Vision, applications and research challenges. Ad hoc Netw. 10, 7 (2012), 1497--1516.Google ScholarGoogle Scholar
  101. M. Padma, N. KasiViswanath, and T. Swathi. 2019. Blockchain for IoT application: Challenges and issues. Int. J. Recent Technol. Eng. 7 (2019), 40--48.Google ScholarGoogle Scholar
  102. MuleSoft IoT 2019. Solutions for IoT Extend Connectivity from your Enterprise and the Cloud to Devices at the Edge of Your Network. Retrieved from https://www.mulesoft.com/integration-solutions/api/iot.Google ScholarGoogle Scholar
  103. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Technical Report.Google ScholarGoogle Scholar
  104. Alicia Naumoff. 2016. Why Blockchain Needs “Proof of Authority” Instead of “Proof of Stake.” Retrieved from https://cointelegraph.com/news/why-blockchain-needs-proof-of-authority-instead-of-proof-of-stake.Google ScholarGoogle Scholar
  105. NEM. 2018. NEM Whitepaper. Retrieved from https://nem.io/wp-content/themes/nem/files/NEM_techRef.pdf.Google ScholarGoogle Scholar
  106. Oracle IoT 2019. Accelerate Your Business with the Power of the Internet of Things. Retrieved from https://www.oracle.com/solutions/internet-of-things/.Google ScholarGoogle Scholar
  107. Zhonghong Ou, Erkki Harjula, Otso Kassinen, and Mika Ylianttila. 2010. Performance evaluation of a Kademlia-based communication-oriented P2P system under churn. Comput. Netw. 54, 5 (2010), 689--705.Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. Alfonso Panarello, Nachiket Tapas, Giovanni Merlino, Francesco Longo, and Antonio Puliafito. 2018. Blockchain and IoT integration: A systematic survey. Sensors 18 (2018), 2575.Google ScholarGoogle ScholarCross RefCross Ref
  109. Zhe Peng, Haotian Wu, Bin Xiao, and Songtao Guo. 2019. VQL: Providing query efficiency and data authenticity in blockchain systems. In Proceedings of the IEEE 35th International Conference on Data Engineering Workshops (ICDEW’19). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  110. Marc Pilkington. 2016. 11 blockchain technology: Principles and applications. Res. Handbook Dig. Transform. 225 (2016).Google ScholarGoogle Scholar
  111. Suporn Pongnumkul, Chaiyaphum Siripanpornchana, and Suttipong Thajchayapong. 2017. Performance analysis of private blockchain platforms in varying workloads. In Proceedings of the 26th International Conference on Computer Communication and Networks (ICCCN’17). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  112. Serguei Popov. 2016. The Tangle. Technical Report.Google ScholarGoogle Scholar
  113. Giulio Prisco. 2016. Slock. it to introduce smart locks linked to smart ethereum contracts, decentralize the sharing economy. Bitcoin Magazine. Retrieved from https://bitcoinmagazine.com/articles/slock-it-to-introduce-smart-locks-linked-to-smart-ethereum-contracts-decentralize-the-sharing-economy-1446746719.Google ScholarGoogle Scholar
  114. Dongyu Qiu and Rayadurgam Srikant. 2004. Modeling and performance analysis of BitTorrent-like peer-to-peer networks. ACM SIGCOMM 34, 4 (2004), 367--378.Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. Gowri Sankar Ramachandran and Bhaskar Krishnamachari. 2018. Blockchain for the IoT: Opportunities and challenges. arXiv preprint arXiv:1805.02818 (2018).Google ScholarGoogle Scholar
  116. Ana Reyna, Cristian Martín, Jaime Chen, Enrique Soler, and Manuel Díaz. 2018. On blockchain and its integration with IoT. Challenges and opportunities. Future Gen. Comput. Syst. 88 (2018), 173--190.Google ScholarGoogle ScholarCross RefCross Ref
  117. Robert W Robinson. 1977. Counting unlabeled acyclic digraphs. In Combinatorial Mathematics V. Springer, 28--43.Google ScholarGoogle Scholar
  118. Gokhan Sagirlar, Barbara Carminati, Elena Ferrari, John D. Sheehan, and Emanuele Ragnoli. 2018. Hybrid-IoT: Hybrid blockchain architecture for Internet of Things-PoW sub-blockchains. arXiv preprint arXiv:1804.03903 (2018).Google ScholarGoogle Scholar
  119. Omar Said and Mehedi Masud. 2013. Towards internet of things: Survey and future vision. Int. J. Comput. Netw. 5, 1 (2013), 1--17.Google ScholarGoogle Scholar
  120. Mehrdad Salimitari and Mainak Chatterjee. 2018. An overview of blockchain and consensus protocols for IoT networks. arXiv preprint arXiv:1809.05613 (2018).Google ScholarGoogle Scholar
  121. Mayra Samaniego and Ralph Deters. 2016. Blockchain as a service for IoT. In Proceedings of the IEEE International Conference on Internet of Things (iThings’16) and IEEE Green Computing and Communications (GreenCom’16) and IEEE Cyber, Physical and Social Computing (CPSCom’16) and IEEE Smart Data (SmartData’16). IEEE, 433--436.Google ScholarGoogle Scholar
  122. Rüdiger Schollmeier. 2001. A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In Proceedings of the 1st International Conference on Peer-to-Peer Computing. IEEE, 101--102.Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. Ludwig Seitz, Goeran Selander, Erik Wahlstroem, Samuel Erdtman, and Hannes Tschofenig. 2017. Authentication and authorization for constrained environments (ace). Technical Report.Google ScholarGoogle Scholar
  124. Pradip Kumar Sharma, Saurabh Singh, Young-Sik Jeong, and Jong Hyuk Park. 2017. Distblocknet: A distributed blockchains-based secure sdn architecture for iot networks. IEEE Commun. Mag. 55, 9 (2017), 78--85.Google ScholarGoogle ScholarDigital LibraryDigital Library
  125. Janusz J. Sikorski, Joy Haughton, and Markus Kraft. 2017. Blockchain technology in the chemical industry: Machine-to-machine electricity market. Appl. Energy 195 (2017), 234--246.Google ScholarGoogle ScholarCross RefCross Ref
  126. Rashmi Sharan Sinha, Yiqiao Wei, and Seung-Hoon Hwang. 2017. A survey on LPWA technology: LoRa and NB-IoT. Ict Expr. 3, 1 (2017), 14--21.Google ScholarGoogle ScholarCross RefCross Ref
  127. sloct.it 2018. slock.it A Blockchain Company. Retrieved from https://slock.it/.Google ScholarGoogle Scholar
  128. Biljana L. Risteska Stojkoska and Kire V. Trivodaliev. 2017. A review of Internet of Things for smart home: Challenges and solutions. J. Clean. Product. 140 (2017), 1454--1464.Google ScholarGoogle ScholarCross RefCross Ref
  129. Nan Sun, Jun Zhang, Paul Rimba, Shang Gao, Leo Yu Zhang, and Yang Xiang. 2018. Data-driven cybersecurity incident prediction: A survey. IEEE Commun. Surveys Tutor. 21, 2 (2018), 1744--1772.Google ScholarGoogle ScholarCross RefCross Ref
  130. Girish Suryanarayana and Richard N. Taylor. 2004. A survey of trust management and resource discovery technologies in peer-to-peer applications.Google ScholarGoogle Scholar
  131. Melanie Swan. 2015. Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc.Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. Lu Tan and Neng Wang. 2010. Future internet: The internet of things. In Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE’10), Vol. 5. IEEE, V5--376.Google ScholarGoogle Scholar
  133. Tangle IOTA 2018. Meet the Tangle. Retrieved from https://www.iota.org/research/meet-the-tangle.Google ScholarGoogle Scholar
  134. Teachracers 2019. Blockchain Development Company | Blockchain Services and Solutions. Retrieved from https://www.techracers.com/.Google ScholarGoogle Scholar
  135. TraceRx 2019. Tracerx: Global Blockchain Supply Chain for Drugs. Retrieved from https://www.leewayhertz.com/project/tracerx/.Google ScholarGoogle Scholar
  136. UniquID 2018. UniquID Incorporation Blockchain Identity Access Management. Retrieved from https://uniquid.com/.Google ScholarGoogle Scholar
  137. Mališa Vučinić, Bernard Tourancheau, Franck Rousseau, Andrzej Duda, Laurent Damon, and Roberto Guizzetti. 2015. OSCAR: Object security architecture for the Internet of Things. Ad Hoc Netw. 32 (2015), 3--16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  138. Marko Vukolić. 2015. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In Proceedings of the International Workshop on Open Problems in Network Security. Springer, Cham, 112--125.Google ScholarGoogle Scholar
  139. WaltonChain. 2018. WaltonChain white paper V2.0. Technical Report.Google ScholarGoogle Scholar
  140. Sheng Wen, Mohammad Sayad Haghighi, Chao Chen, Yang Xiang, Wanlei Zhou, and Weijia Jia. 2014. A sword with two edges: Propagation studies on both positive and negative information in online social networks. IEEE Trans. Comput. 64, 3 (2014), 640--653.Google ScholarGoogle ScholarDigital LibraryDigital Library
  141. Andrew Whitmore, Anurag Agarwal, and Li Da Xu. 2015. The Internet of Things-A survey of topics and trends. Info. Syst. Front. 17, 2 (2015), 261--274.Google ScholarGoogle ScholarDigital LibraryDigital Library
  142. Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151 (2014), 1--32.Google ScholarGoogle Scholar
  143. Miao Wu, Ting-Jie Lu, Fei-Yang Ling, Jing Sun, and Hui-Ying Du. 2010. Research on the architecture of Internet of Things. In Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE’10), Vol. 5. IEEE, V5--484.Google ScholarGoogle Scholar
  144. Tingmin Wu, Sheng Wen, Yang Xiang, and Wanlei Zhou. 2018. Twitter spam detection: Survey of new approaches and comparative study. Comput. Secur. 76 (2018), 265--284.Google ScholarGoogle ScholarCross RefCross Ref
  145. Xage 2018. Home Page of Xage Security. Retrieved March 20, 2019 from https://xage.com/.Google ScholarGoogle Scholar
  146. Jinhong Xie and Steven M. Shugan. 2001. Electronic tickets, smart cards, and online prepayments: When and how to advance sell. Market. Sci. 20, 3 (2001), 219--243.Google ScholarGoogle ScholarDigital LibraryDigital Library
  147. Zhihong Yang, Yingzhao Yue, Yu Yang, Yufeng Peng, Xiaobo Wang, and Wenji Liu. 2011. Study and application on the architecture and key technologies for IOT. In Proceedings of the International Conference on Multimedia Technology (ICMT’11). IEEE, 747--751.Google ScholarGoogle Scholar
  148. Andrea Zanella, Nicola Bui, Angelo Castellani, Lorenzo Vangelista, and Michele Zorzi. 2014. Internet of things for smart cities. IEEE Internet Things J. 1, 1 (2014), 22--32.Google ScholarGoogle ScholarCross RefCross Ref
  149. Jun Zhang, Xiao Chen, Yang Xiang, Wanlei Zhou, and Jie Wu. 2015. Robust network traffic classification. IEEE/ACM Trans. Netw. 23, 4 (2015), 1257--1270.Google ScholarGoogle ScholarDigital LibraryDigital Library
  150. Jun Zhang, Yang Xiang, Yu Wang, Wanlei Zhou, Yong Xiang, and Yong Guan. 2012. Network traffic classification using correlation information. IEEE Trans. Parallel Distrib. Syst. 24, 1 (2012), 104--117.Google ScholarGoogle ScholarDigital LibraryDigital Library
  151. Jun Zhang, Yang Xiang, Yu Wang, Wanlei Zhou, Yong Xiang, and Yong Guan. 2013. Network traffic classification using correlation information. IEEE Trans. Parallel Distrib. Syst. 24, 1 (2013), 104--117.Google ScholarGoogle ScholarDigital LibraryDigital Library
  152. Yu Zhang and Jiangtao Wen. 2017. The IoT electric business model: Using blockchain technology for the internet of things. Peer-to-Peer Netw. Appl. 10, 4 (2017), 983--994.Google ScholarGoogle ScholarCross RefCross Ref
  153. Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang. 2017. An overview of blockchain technology: Architecture, consensus, and future trends. In Proceedings of the IEEE International Congress on Big Data (BigData’17). IEEE, 557--564.Google ScholarGoogle ScholarCross RefCross Ref
  154. Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Xiangping Chen, and Huaimin Wang. 2018. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 14, 4 (2018), 352--375.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic Modeling

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Computing Surveys
            ACM Computing Surveys  Volume 53, Issue 1
            January 2021
            781 pages
            ISSN:0360-0300
            EISSN:1557-7341
            DOI:10.1145/3382040
            Issue’s Table of Contents

            Copyright © 2020 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 6 February 2020
            • Revised: 1 November 2019
            • Accepted: 1 November 2019
            • Received: 1 March 2019
            Published in csur Volume 53, Issue 1

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • survey
            • Survey
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format