Page 29 - IJEEE-2023-Vol19-ISSUE-1
P. 29

Yousiff & Muhajjir                                                                                                                   | 25

and act on crucial sensor data activities without the need for     blockchain are built to hold data that can't be changed (or is
human interaction [31]. Machine learning and artificial            extremely expensive to do so) after it's been saved. However,
intelligence technology are widely used to create an               it should be noted that there have been times in the past when
autonomous agent that can comprehend data pouring from             this principle has been disregarded. In 2014, for example, the
sensors or online sources and make decisions on its own            money exchange network MintPal informed its users that a
[34].                                                              hacker had stolen roughly 8 million Vericoins, or roughly
                                                                   30% of the platform's total coins, in an unresolved incident.
   Luo et al. [35] introduced a decentralized electricity          The Vericoin team elected to hard fork the blockchain to
market system based on blockchain and governed by several          avoid investor money being lost and an actor controlling
participants. This system is made up of two layers: a top          30% of the coin's proof-of-stake network capacity, reversing
layer that uses multi-agents to negotiate electricity trading      the harm (a hard fork is a permanent divergence from the
contracts, as well as a bottom layer that settles contracts via a  previous version of the blockchain). As a result, while many
blockchain network. To address the scalability issue in            websites claim that blockchains provide permanent storage
blockchain-based designs, Qayumi et al.[36] called for             for data that can't be modified, this is only true in the most
multi-agent architectures, although they did not explain how       severe cases. In IoT applications, data integrity is equally
this could be accomplished. Smart contracts were proposed          crucial, and it's often provided by third parties. To reduce the
by Norta et al.[37] for cross-organization collaboration           need for third-party trust, [16] presents a blockchain-based
They talked about how non-repudiating features can be              data integrity service platform for cloud-based IoT
achieved via a blockchain smart contract. These activities,        applications.
on the other hand, are still in development and will be
improved in the future. Bilal et al.[38] for the home                 The third aspect of security is availability, which is the
management system, this study built a novel optimization           easiest to achieve with blockchains because they are built to
technique as well as a cloud device architecture. This             be distributed systems, allowing them to function even while
research proposes a two-level communication strategy               particular nodes are under attack. However, numerous types
between microgrids in the event of a failure in cloud-level        of attacks can risk availability [16]. A 51-percent assault
communication. The authors of [39] suggested software              (also known as a majority attack) is the most dangerous type
defined networking SDN, fog computing, and a distributed           of attack, in which a single miner can take control of the
blockchain-based cloud architecture model. At the network's        entire blockchain and make any transaction they choose.
edge and in the distributed cloud, the approach sought to          Although data is available in this situation, the attacker who
manage raw IoT data streams effectively. Three layers make         controls the blockchain may be able to prevent transactions
up the model: distributed cloud based on blockchain, SDN           from taking place. This type of assault also compromises
controller network for fog nodes based on blockchain, and          data security [16]. Several techniques to ensure security for
IoT devices.                                                       BIoT applications have been proposed. Some have used
                                                                   machine learning techniques, while others have used more
  A. Security                                                      traditional methods [40].

   An information system must traditionally meet three               B. To address the issue of connection
conditions to be secure:
                                                                      On a peer-to-peer blockchain network, all nodes stay
   • Confidentiality is one of the most important aspects of       connected to the network and use standard protocols to
any business. Unauthorized access to the most sensitive data       operate independently.
should be avoided.
                                                                      IoT devices are theoretically more prone to security
   • Integrity and reliability It ensures that unauthorized        breaches because of the nature of blockchain networks [32,
parties cannot change or delete data. It's also common to          41]. In the settings of Ref. [42]. Smart Agent, which employs
include the requirement that if an authorized person corrupts      many security mechanisms to protect IoT devices from
the data, the modifications should be reversible.                  hackers, connects IoT devices to the blockchain. By focusing
                                                                   on Gateway services, The structure of a centralized IoT
   • Availability. When necessary, data can be accessed.           network increases the likelihood of many security
                                                                   vulnerabilities, including data fabrication, manipulation, and
   In terms of confidentiality, the section dealing with           illegal access to devices [43]. Gateway services are
transaction data is linked to their privacy, which was             frequently used to connect IoT equipment in smart homes to
previously discussed. In terms of the architecture that            the internet and users. As a result, the smart home Gateway
supports the stored data, current IoT applications tend to         should include centralized systems that are both efficient and
centralize communications in a server, a farm of servers, or       dependable. Uddin et al. [42] aided in the creation of a
the cloud. Such an approach is viable as long as the               blockchain-based system for securely tracking smart homes
administrators of the centralized infrastructure can be trusted    and cities. Fig. 6 [32] depicts the article's smart agent and
and the system stays secure against external and internal          blockchain components. contained a network management
threats [16].                                                      module that used sign encryption to protect user data and
                                                                   ensure user privacy.
   Blockchain technologies, on the other hand, for example,
are decentralized, which implies that even if one node fails,
the system as a whole should continue to function. In terms
of integrity, it's worth noting that the foundations of a
   24   25   26   27   28   29   30   31   32   33   34