Page 25 - IJEEE-2023-Vol19-ISSUE-1
P. 25
Received: 13 July 2022 Revised: 15 August 2022 Accepted: 15 August 2022
DOI: 10.37917/ijeee.19.1.3
Vol. 19| Issue 1| June 2023
Ð Open Access
Iraqi Journal for Electrical and Electronic Engineering
Review Article
A Review of Blockchain-based Internet of Things
Samaher Ahmed Yousiff *, Raad Abd-Al Hassan Muhajjir
Department of Computer Science, College of CSIT, University of Basrah, Basrah, Iraq
Correspondence
* Samaher Ahmed Yousiff
Department of Computer Science, College of CSIT,
University of Basrah, Basrah, Iraq
Email: samaheraltumma@gmail.com
Abstract
The use of smart network applications based on the Internet of Things is increasing, which increases the attractiveness of
malicious activities, leading to the need to increase the adequate security of these networks. In this paper, the latest recent
breakthroughs in blockchain for the Internet of Things are examined in the context of electronic health (e-health), smart cities,
smart transportation, and other applications in this article. Research gaps and possible solutions are discussed, such as
security, connection, transparency, privacy, and the IoT's blockchain regulatory challenges. In addition, the most important
consensus algorithms used in the blockchain have been discussed, including Proof of Work, Proof of Stake, and Proof of
Authority, each of which operates within certain rules.
KEYWORDS: Internet of Thing, blockchain technology, consensus algorithm, research gaps.
I. INTRODUCTION the Internet with the physical world in order to bring about a
quantum shift toward a smart, digitally controlled world. As
Radio Frequency Identification (RFID), Wireless Sensor a result of the adoption of IoT technologies, the manner in
Networks (WSN) (RFID), and other innovations in other
devices that sense, communicate, and act utilizing existing which people interact with one another, their surroundings,
network infrastructure, enhanced by IoT, is used in IoT and the environment has been enhanced and transformed [1].
devices. The Internet of Things (IoT) enables a digitally
connected real world in which connected devices can share Many of the difficulties connected with the centralized cloud
data, communicate with one another, and control goods technique might be alleviated by a decentralized alternative
remotely over the Internet, potentially without human based on tamper-proof data sharing on a digital ledger. Every
contact [1]. transaction on the chain may be signed, secured, and verified.
Editing or removing data blocks kept on the ledger is quite
The development of computer networks, wireless difficult , this technology is called blockchain. Although
communication, and microelectronic mechanical systems there are many different blockchain topologies available,
has made WSNs one of the technologies with the quickest they all follow the same core principles [3]:
growth rates[2]. •Transactions between the parties are signed using
cryptography.
The "Internet of Things" is a term used to describe a network • Transactions are recorded using a decentralized approach
of connected devices which includes printers, and other on a peer-to-peer network on a distributed ledger.
internet-connected devices, was one of the attack's • Agreeing a decentralized strategy.
beginnings. Mirai virus was used to attack these devices,
resulting in Distributed Denial of Service (DDoS ) attacks. In II. COMPONANT OF INTERNET OF THING
2018, the number of assaults on IoT devices grew, with 32.7
million incidents documented. The key flaw in this situation Before knowing the components of the Internet of Things, it
was their dependence on a centralized cloud architecture as is important to know what the Internet of Things is and what
well as the lack of security protocols [3]. Addressing IoT its methodology is. Often known as the Internet of
security and privacy issues necessitates investigating and Everything, the Internet of Things is a technological and
grasping the multiple components of the Internet of Things potentially revolutionary paradigm that explains many
architecture, identifying vulnerability areas in each section, technologies, including RFID, short-range wireless
and finding the proper solutions to detect any vulnerabilities. communications, and search domains, that can connect
In October 2016, Dyn Inc., a DNS service, was targeted by a actual physical objects from the real world to the Internet. In
DDoS attack that Tens of millions of IP addresses were addition, the methodology of this technology must be known,
affected. The Internet of Things is defined as the meeting of where data is sent from sensors or devices to the cloud server,
This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and
reproduction in any medium, provided the original work is properly cited.
© 2022 The Authors. Published by Iraqi Journal for Electrical and Electronic Engineering by College of Engineering, University of Basrah.
https://doi.org/10.37917/ijeee.19.1.3 https://www.ijeee.edu.iq 21