<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>B.B. Pannyagol);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Systematic Review of Blockchain integrated Internet of Things: Architecture, Benefits, Security and Privacy concerns</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Bharati B Pannyagol</string-name>
          <email>bharati.p@vtu.ac.in</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dr. Santosh Deshpande</string-name>
          <email>sldeshpande@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dr. Rohit Kaliwal</string-name>
          <email>rohit.kaliwal@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Research Scholar</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Professor</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Assistant Professor</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>ComSIA'24: Computing &amp; Communication Systems for Industrial Applications</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Computer Science and Engineering , Visvesvaraya Technological University</institution>
          ,
          <addr-line>Belagavi, Karnataka</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The proliferation of smart devices and related technologies has made the Internet of Things(IoT) the most rapidly emerging technology of the past ten years, both in terms of industrial applications and research opportunities. Security problems are being caused by the IoT by use of unstable fixed and mobile devices. One potential solution to the security issues with IoT is to use Blockchain technology. This paper delves into safety hazards and problems that affect the IoT and cause system performance degradation. It presents a layered architecture of IoT with Blockchain. In addtional the paper also outlines the solutions provided by the Blockchain ,recent trends and different hazards in using Blockchain with IoT that will helpful for future reseach.</p>
      </abstract>
      <kwd-group>
        <kwd>Internet of Things</kwd>
        <kwd>Blockchain</kwd>
        <kwd>Security</kwd>
        <kwd>Hazards</kwd>
        <kwd>Privacy</kwd>
        <kwd>1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>1.1.
demanding human to human or human to computer interaction are labeled as IoT [3]. It
expands the dependency of the human allowing them to interrelate, contribute, and
collaborate in constructing a framework that is simple, secure, and time-saving [4]. It refers
to node, device or sensors that measure the physical quantity and convert it into the digital
or understanding quantity [5], [6]. The fundamental concept behind the IoT is to enable the
independent sharing of valuable data amongst various discretely embedded, individually
identifiable real-world devices in our surroundings [1]. There has been an exponential
growth in the IoT-based services in the world, especially in Tele health, Manufacturing and
in urban areas to form Smart cities [7].</p>
      <p>The IoTs has significantly changed the communication industry, a relatively new
technological development. Its implementation in a variety of industries [8], including
weather monitoring [9], agriculture [10], [11], and healthcare [12] etc. The general
impression of IoT environments and applicable [13], [14] scenarios layer wise are
represented in Figure 1.</p>
      <sec id="sec-1-1">
        <title>1.2. IoT Enabling Technologies</title>
        <p>IoT enabling technologies provide the foundation for edifice and deploying IoT solutions.
These technologies encompass various H/W and S/W components that enable connectivity,
data processing, and interaction between IoT devices and applications. Figure 2 explains
some key IoT enabling technologies.</p>
      </sec>
      <sec id="sec-1-2">
        <title>1.3. Basics of BC Technology</title>
        <p>The BC is now regarded as the second-most important invention after the Internet. The BC
technology is based on the suitability of the tertiary platform [18]. It is a form of database
loading that is non-centralized, reliable, and grim to use for fraudulent purposes [19]. The
main advantage of BC, it is unbearable to initiate an attack in the network because it must
compromise 51% of its systems to the target network. The major characteristics of BC are
audibility, persistency, anonymity, and decentralization, thereby efficiency is increased and
the cost is saved [20]. BC is a point-to-point distributed ledger based on steganography and
a network-sharing system characterized by its disintermediation, transparency, and
openness [21]. The BC technology and distributed ledgers are attracting massive attention
and trigger multiple projects in different industries. However, the financial industry is seen
as a primary user of the BC concept [22]. It is recognized as a key enabling technology that
brings/connects all distributed sensors and smart devices together, to gather and switch
the information within smart city infrastructure using an open channel [23].
The BC may be developed as a sequential data structure composed of interconnected blocks,
each of which encapsulates an assortment of systematically arranged transactions. Figure 3
shows the how the BC process the transaction. The Merkle tree is a binary tree structure
that employs hash codes. Every block on the BC has a Merkle root hash along with many bits
of information, comprising the block versions, timestamp, nonce, hash of the previous block,
and difficulty level at that moment. Merkle trees, the practice of cryptography and methods
for consensus are essential components that underpin distributed ledger technology. The
entire tree network may be utilized when root hashing is applied. Every block comprises a
comprehensive record of several transactions that have occurred subsequent to the
previous transaction. When these transactions are recorded, the root hashing reflects the
current state of the BC.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Blockchain –IoT Layered Architecture</title>
      <p>Incorporation of BC technology into the IoT architecture [24],[25] to improve overall
security and IoT system functionality is explained in this segment. To connecting to the BC
network, IoT devices use gateways. The IoT devices can undergo basic authentication and
security checks through these gateways before being allowed to connect to the network.
Figure 4 illustrate the layered architecture of BC integrated IoT.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Security and Privacy concerns in IoT</title>
      <p>The IoT presents a myriad of privacy and security concerns stemming from the
interconnectedness of devices and the vast quantities of data they collect, process, and
transmit. Inadequate data encryption exacerbates these risks, leaving transmitted data
vulnerable to interception and manipulation. Moreover, weak authentication mechanisms
and default passwords in many IoT devices facilitate unauthorized access, potentially
allowing malicious actors to take control of devices or access sensitive data. Ongoing
security monitoring and updates are crucial to adapt to evolving threats and ensure the
security and confidentiality of IoT ecosystems. Table 1 shows the comparative evaluation
of BC use and IoT security requirements.
3.1. Blockchain Solution to IoT</p>
      <p>To address the above security and privacy concerns requires a multifaceted approach,
encompassing robust encryption techniques; secure smart contract development practices,
scalable BC architectures, and compliance with regulatory requirements. Table 2
summarize BC feature and its solution to IoT.
The decentralized ledger improves security by guaranteeing data integrity and
preventing unauthorized tampering with IoT data.</p>
      <p>IoT devices can practice smart contracts, which automatically enforce predefined rules
and conditions, to securely exchange data with external systems or with each other.</p>
      <p>Each IoT device can have a distinct digital identity stored on the BC. This improves
privacy by blocking unauthorized devices from connecting to the link and enabling
secure authentication and access control.</p>
      <p>Using cryptographic techniques, BC can enable end-to-end encryption of IoT data.</p>
      <p>BC transparent and auditable nature enables real-time monitoring and auditing of IoT
transactions and data exchanges.</p>
      <p>BC consensus mechanisms guarantee all transactions are approved and verified by
network users.</p>
      <p>The decentralized architecture of BC removes potential points of failure and lowers the
likelihood of cyber-attacks or data breaches.</p>
      <p>Smart contracts automate and uphold agreements between IoT devices, guaranteeing
that data exchanges and transactions take place safely and in accordance with
predetermined guidelines.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Recent Trends in BC Enabled IoT</title>
      <p>The BC technology has engrossed extensive attention because to its safe method of
conducting transactions between several organizations without relying on a trusted
intermediary, additionally to its ability to confirm the accuracy of information. BC
technology is becoming prevalent throughout many professional sectors, including retail,
healthcare, and scientific domains. Following are the recent trends of BC in IoT.
✓ Tokenization of IoT Assets: Bringing the physical objects to the digital tokens
stored in BC or programmable money. Today's most significant platform for token
generation is the Ethereum BC. Tokens serve as a digital representation of a physical
object, enabling algorithms and Smart Contracts to access objects and rendering the
actual realm "tangible" for the digital world.
✓ NFTs in IoT: Non-Fungible Tokens are distinct, non-transferable tokens that permit
the tracking of tangible or intangible assets (like collectible artwork or notaries
instruments). With in the framework of IoTs, the ability to access resources or
services is an example of a non-physical possession.
✓ Cross-Chain Integration: Creating tools that make it easier for various BC
networks to exchange information and data, allowing an IoT ecosystem that is more
interconnected and compatible.
✓ BC as a Service (BaaS): Using BaaS platforms to accomplish it easier for enterprises
without an abundance of BC experience to develop and implement BC-enabled IoTs
applications.
✓ Consortium BC Adoption: Creation of sector-specific consortia that use BC
technology to solve shared problems in manufacturing, logistics, and healthcare,
encouraging cooperation between various stakeholders.
✓ Integration with AI and Machine Learning: Exploring how BC, IoT and AI/ML can
work together to enable more intelligent automation and decision-making in IoT
system.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Hazards in using BC with IoT</title>
      <p>Together, BC and IoT technology have the potential to address a no. of issues, including
storing and monitoring data, providing services, and determining the location of devices.
But in the process of implementing an integrated plan, some of the following things could
go wrong. A few of the difficulties encountered in implementing the BC-IoT architecture
were itemized in Table 3.</p>
      <p>Description of each Hazard
Because there are so many devices in the IoT that are connected, scaling
authentication and security using BC is difficult.</p>
      <p>BC technology offers openness and immutability, yet privacy concerns arise. IoT
device data on a BC may reveal critical information to all network participants.</p>
      <p>Privacy and secrecy of IoT data while using BC technology is difficult.</p>
      <p>BC networks are very young and need security improvements. Sybil attacks, when
attackers create numerous phony identities to take control of BC networks, are one
example.</p>
      <p>IoT devices might not be capable to run computationally intensive BC due to
resource limits
Compatibility
Interoperability</p>
      <p>&amp;</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusion</title>
      <p>Limited resource IoT devices might not be able to use BC for network security due
to its energy requirements.</p>
      <p>Integration of IoT devices and BC systems may be problematic. A BC-based
authentication and different protocols or operating systems may cause an IoT
device's security system to malfunction.</p>
      <p>BC in IoT security may raise legal and regulatory concerns.</p>
      <p>BC technology aims to decentralize and spread security; however, IoT security
systems may still employ authentication servers or smart contracts.</p>
      <p>BC technology is sophisticated, which may hinder end-user usability.</p>
      <p>Unstandardized frameworks and protocols for BC and in IoT security can hinder
implementation.</p>
      <p>Subsequently there are more IoT devices than ever before, security has grown to be a
critical concern. This paper presents a comprehensive analysis of security and privacy
threads in IoT. Further this review focuses on discussing the integration of Blockchain with
IoT. From this review, BC technology is one of the most promising fields with a lot of
potential for improving the security and privacy of IoT data which helpful for future
research. This review also identifies the some of the difficulties faced while integrating BC
with IoT.</p>
    </sec>
    <sec id="sec-7">
      <title>References</title>
      <p>M. U. Farooq, M. Waseem, S. Mazhar, A. Khairi, and T. Kamal, “A Review on Internet of Things
(IoT).”
“A Study on the Basics of IoT and its Essential Needs to Develop Real World Applications,”
2019. [Online]. Available: https://www.researchgate.net/publication/353886847
S. R. Jino Ramson, S. Vishnu, and M. Shanmugam, “Applications of Internet of Things
(IoT)An Overview,” in ICDCS 2020 - 2020 5th International Conference on Devices, Circuits and
Systems, Institute of Electrical and Electronics Engineers Inc., Mar. 2020, pp. 92–95. doi:
10.1109/ICDCS48716.2020.243556.</p>
      <p>S. S. Chouhan, U. P. Singh, and S. Jain, “Automated Plant Leaf Disease Detection and
Classification Using Fuzzy Based Function Network,” Wirel Pers Commun, vol. 121, no. 3,
pp. 1757–1779, Dec. 2021, doi: 10.1007/s11277-021-08734-3.</p>
      <p>I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a
survey.” [Online]. Available: www.elsevier.com/locate/comnet
Institute of Electrical and Electronics Engineers. Kerala Section and Institute of Electrical
and Electronics Engineers, 2020 International Conference on Innovative Trends in
Information Technology (ICITIIT).</p>
      <p>I. Makhdoom, I. Zhou, M. Abolhasan, J. Lipman, and W. Ni, “PrivySharing: A Blockchain-Based
Framework for Integrity and Privacy-Preserving Data Sharing in Smart Cities.” [Online].
Available: https://orcid.org/0000-0002-7154-4561
K. Witkowski, “Internet of Things, Big Data, Industry 4.0 - Innovative Solutions in Logistics
and Supply Chains Management,” in Procedia Engineering, Elsevier Ltd, 2017, pp. 763–769.
doi: 10.1016/j.proeng.2017.03.197.
[9] M. Sreerama Murthy, R. P. Ram Kumar, B. Saikiran, I. Nagaraj, and T. Annavarapu, “Real Time
Weather Monitoring System using IoT,” in E3S Web of Conferences, EDP Sciences, Jun. 2023.
doi: 10.1051/e3sconf/202339101142.
[10] B. Bhandari, R. Patel, A. Tiwari, N. Sharma, and S. Thawait, “Role of IoT in Agriculture in India
in Water Irrigation,” Int J Res Appl Sci Eng Technol, vol. 11, no. 5, pp. 6520–6524, May 2023,
doi: 10.22214/ijraset.2023.53257.
[11] D. V. Gowda, S. M. Prabhu, M. Ramesha, J. M. Kudari, and A. Samal, “Smart Agriculture and
Smart Farming using IoT Technology,” in Journal of Physics: Conference Series, IOP
Publishing Ltd, Nov. 2021. doi: 10.1088/1742-6596/2089/1/012038.
[12] Poorva Sanjay Sabnis and Snehal Shewale, “The use of IoT in Health Care System: A
Perspective,” COMPUTING TRENDZ, vol. 11, no. 1,2, pp. 30–36, Aug. 2023, doi:
10.21844/cttjetit.v11i1-2.1.13004.
[13] K. Naik and S. Patel, “An open source smart home management system based on IOT,”
Wireless Networks, vol. 29, no. 3, pp. 989–995, Apr. 2023, doi:
10.1007/s11276-018-1884z.
[14] G. Wang, A. El Saddik, X. Lai, G. Martinez Perez, and K.-K. R. Choo, Eds., Smart City and
Informatization, vol. 1122. in Communications in Computer and Information Science, vol.
1122. Singapore: Springer Singapore, 2019. doi: 10.1007/978-981-15-1301-5.
[15] V. Potdar, A. Sharif, and E. Chang, “Wireless sensor networks: A survey,” in Proceedings
International Conference on Advanced Information Networking and Applications, AINA,
2009, pp. 636–641. doi: 10.1109/WAINA.2009.192.
[16] S. P. Sasirekha, A. Priya, T. Anita, and P. Sherubha, “Data Processing and Management in IoT
and Wireless Sensor Network,” in Journal of Physics: Conference Series, IOP Publishing Ltd,
Dec. 2020. doi: 10.1088/1742-6596/1712/1/012002.
[17] S. Saxena, B. Bhushan, and M. A. Ahad, “Blockchain based solutions to secure IoT:
Background, integration trends and a way forward,” Journal of Network and Computer
Applications, vol. 181. Academic Press, May 01, 2021. doi: 10.1016/j.jnca.2021.103050.
[18] D. Efanov and P. Roschin, “The all-pervasiveness of the blockchain technology,” in Procedia</p>
      <p>Computer Science, Elsevier B.V., 2018, pp. 116–121. doi: 10.1016/j.procs.2018.01.019.
[19] P. Tasatanattakool and C. Techapanupreeda, “Blockchain: Challenges and applications,” in
International Conference on Information Networking, IEEE Computer Society, Apr. 2018,
pp. 473–475. doi: 10.1109/ICOIN.2018.8343163.
[20] Vivekanadam B, “Analysis of Recent Trend and Applications in Block Chain Technology,”</p>
      <p>Journal of ISMAC, vol. 2, no. 4, pp. 200–206, Oct. 2020, doi: 10.36548/jismac.2020.4.003.
[21] W. Liang, L. Xiao, K. Zhang, M. Tang, D. He, and K. C. Li, “Data Fusion Approach for
Collaborative Anomaly Intrusion Detection in Blockchain-Based Systems,” IEEE Internet
Things J, vol. 9, no. 16, pp. 14741–14751, Aug. 2022, doi: 10.1109/JIOT.2021.3053842.
[22] M. Nofer, P. Gomber, O. Hinz, and D. Schiereck, “Blockchain,” Business and Information
Systems Engineering, vol. 59, no. 3, pp. 183–187, Jun. 2017, doi:
10.1007/s12599-0170467-3.
[23] P. Kumar et al., “PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based
Machine-Learning for IoT-Driven Smart Cities,” IEEE Trans Netw Sci Eng, vol. 8, no. 3, pp.
2326–2341, Jul. 2021, doi: 10.1109/TNSE.2021.3089435.
[24] M. Kumar, Nidhi, S. Tiwari, and S. Kaur, “Blockchain-IoT Layered Architecture, Current
Trends, Challenges, and Applications,” in 7th International Conference on Trends in
Electronics and Informatics, ICOEI 2023 - Proceedings, Institute of Electrical and Electronics
Engineers Inc., 2023, pp. 688–694. doi: 10.1109/ICOEI56765.2023.10126036.
[25] B. B. Pannayagol and S. Deshpande, “Security in Internet of Things: An Overview,” in
Proceedings - IEEE International Conference on Device Intelligence, Computing and
Communication Technologies, DICCT 2023, Institute of Electrical and Electronics Engineers
Inc., 2023, pp. 243–248. doi: 10.1109/DICCT56244.2023.10110070.
[26] A. Dorri, S. S. Kanhere, and R. Jurdak, “Towards an optimized blockchain for IoT,” in
Proceedings - 2017 IEEE/ACM 2nd International Conference on Internet-of-Things Design
and Implementation, IoTDI 2017 (part of CPS Week), Association for Computing Machinery,
Inc, Apr. 2017, pp. 173–178. doi: 10.1145/3054977.3055003.
[27] A. G. Abbasi and Z. Khan, “Veidblock: Verifiable identity using blockchain and ledger in a
software defined network,” in UCC 2017 Companion - Companion Proceedings of the 10th
International Conference on Utility and Cloud Computing, Association for Computing
Machinery, Inc, Dec. 2017, pp. 173–179. doi: 10.1145/3147234.3148088.
[28] IEEE Communications Society. Internet of Things Emerging Technologies Initiatives, IEEE
Computational Intelligence Society, Institute of Electrical and Electronics Engineers, and S.
Internet of Things Week (2017 : Geneva, GIoTS2017 : Global Internet of Things Summit :
2017 proceedings papers : CICG, Geneva, June 6-9, 2017.
[29] B. Liu, X. L. Yu, S. Chen, X. Xu, and L. Zhu, “Blockchain Based Data Integrity Service
Framework for IoT Data,” in Proceedings - 2017 IEEE 24th International Conference on Web
Services, ICWS 2017, Institute of Electrical and Electronics Engineers Inc., Sep. 2017, pp.
468–475. doi: 10.1109/ICWS.2017.54.
[30] Institute of Electrical and Electronics Engineers, 2017 Principles, Systems and Applications
of IP Telecommunications (IPTComm) : 25-28 Sept. 2017.
[31] P. N. Astya, Galgotias University. School of Computing Science and Engineering, Institute of
Electrical and Electronics Engineers. Uttar Pradesh Section, and Institute of Electrical and
Electronics Engineers, IEEE International Conference on Computing, Communication and
Automation (ICCCA 2017) : proceeding : on 5th-6th May, 2017.
[32] H. Si, C. Sun, Y. Li, H. Qiao, and L. Shi, “IoT information sharing security mechanism based on
blockchain technology,” Future Generation Computer Systems, vol. 101, pp. 1028–1040,
Dec. 2019, doi: 10.1016/j.future.2019.07.036.
[33] S. Rathore, B. Wook Kwon, and J. H. Park, “BlockSecIoTNet: Blockchain-based decentralized
security architecture for IoT network,” Journal of Network and Computer Applications, vol.
143, pp. 167–177, Oct. 2019, doi: 10.1016/j.jnca.2019.06.019.
[34] Global IT Research Institute, IEEE Communications Society, and Institute of Electrical and
Electronics Engineers, The 21st International Conference on Advanced Communications
Technology: “ICT for 4th Industrial Revolution!” : ICACT 2019 : Phoenix Park, Pyeongchang,
Korea (South), Feb. 17 ~ 20, 2019 : proceeding &amp; journal.
[35] M. Li and Y. Qin, “Scaling the Blockchain-based Access Control Framework for IoT via
Sharding,” in IEEE International Conference on Communications, Institute of Electrical and
Electronics Engineers Inc., Jun. 2021. doi: 10.1109/ICC42927.2021.9500403.</p>
    </sec>
  </body>
  <back>
    <ref-list />
  </back>
</article>