Page 29 - IJEEE-2023-Vol19-ISSUE-1
P. 29
Yousiff & Muhajjir | 25
and act on crucial sensor data activities without the need for blockchain are built to hold data that can't be changed (or is
human interaction [31]. Machine learning and artificial extremely expensive to do so) after it's been saved. However,
intelligence technology are widely used to create an it should be noted that there have been times in the past when
autonomous agent that can comprehend data pouring from this principle has been disregarded. In 2014, for example, the
sensors or online sources and make decisions on its own money exchange network MintPal informed its users that a
[34]. hacker had stolen roughly 8 million Vericoins, or roughly
30% of the platform's total coins, in an unresolved incident.
Luo et al. [35] introduced a decentralized electricity The Vericoin team elected to hard fork the blockchain to
market system based on blockchain and governed by several avoid investor money being lost and an actor controlling
participants. This system is made up of two layers: a top 30% of the coin's proof-of-stake network capacity, reversing
layer that uses multi-agents to negotiate electricity trading the harm (a hard fork is a permanent divergence from the
contracts, as well as a bottom layer that settles contracts via a previous version of the blockchain). As a result, while many
blockchain network. To address the scalability issue in websites claim that blockchains provide permanent storage
blockchain-based designs, Qayumi et al.[36] called for for data that can't be modified, this is only true in the most
multi-agent architectures, although they did not explain how severe cases. In IoT applications, data integrity is equally
this could be accomplished. Smart contracts were proposed crucial, and it's often provided by third parties. To reduce the
by Norta et al.[37] for cross-organization collaboration need for third-party trust, [16] presents a blockchain-based
They talked about how non-repudiating features can be data integrity service platform for cloud-based IoT
achieved via a blockchain smart contract. These activities, applications.
on the other hand, are still in development and will be
improved in the future. Bilal et al.[38] for the home The third aspect of security is availability, which is the
management system, this study built a novel optimization easiest to achieve with blockchains because they are built to
technique as well as a cloud device architecture. This be distributed systems, allowing them to function even while
research proposes a two-level communication strategy particular nodes are under attack. However, numerous types
between microgrids in the event of a failure in cloud-level of attacks can risk availability [16]. A 51-percent assault
communication. The authors of [39] suggested software (also known as a majority attack) is the most dangerous type
defined networking SDN, fog computing, and a distributed of attack, in which a single miner can take control of the
blockchain-based cloud architecture model. At the network's entire blockchain and make any transaction they choose.
edge and in the distributed cloud, the approach sought to Although data is available in this situation, the attacker who
manage raw IoT data streams effectively. Three layers make controls the blockchain may be able to prevent transactions
up the model: distributed cloud based on blockchain, SDN from taking place. This type of assault also compromises
controller network for fog nodes based on blockchain, and data security [16]. Several techniques to ensure security for
IoT devices. BIoT applications have been proposed. Some have used
machine learning techniques, while others have used more
A. Security traditional methods [40].
An information system must traditionally meet three B. To address the issue of connection
conditions to be secure:
On a peer-to-peer blockchain network, all nodes stay
• Confidentiality is one of the most important aspects of connected to the network and use standard protocols to
any business. Unauthorized access to the most sensitive data operate independently.
should be avoided.
IoT devices are theoretically more prone to security
• Integrity and reliability It ensures that unauthorized breaches because of the nature of blockchain networks [32,
parties cannot change or delete data. It's also common to 41]. In the settings of Ref. [42]. Smart Agent, which employs
include the requirement that if an authorized person corrupts many security mechanisms to protect IoT devices from
the data, the modifications should be reversible. hackers, connects IoT devices to the blockchain. By focusing
on Gateway services, The structure of a centralized IoT
• Availability. When necessary, data can be accessed. network increases the likelihood of many security
vulnerabilities, including data fabrication, manipulation, and
In terms of confidentiality, the section dealing with illegal access to devices [43]. Gateway services are
transaction data is linked to their privacy, which was frequently used to connect IoT equipment in smart homes to
previously discussed. In terms of the architecture that the internet and users. As a result, the smart home Gateway
supports the stored data, current IoT applications tend to should include centralized systems that are both efficient and
centralize communications in a server, a farm of servers, or dependable. Uddin et al. [42] aided in the creation of a
the cloud. Such an approach is viable as long as the blockchain-based system for securely tracking smart homes
administrators of the centralized infrastructure can be trusted and cities. Fig. 6 [32] depicts the article's smart agent and
and the system stays secure against external and internal blockchain components. contained a network management
threats [16]. module that used sign encryption to protect user data and
ensure user privacy.
Blockchain technologies, on the other hand, for example,
are decentralized, which implies that even if one node fails,
the system as a whole should continue to function. In terms
of integrity, it's worth noting that the foundations of a