Blockchain as a mean to secure Internet of Things ecosystems - a systematic literature review

被引:16
|
作者
El-Masri, Mazen [1 ]
Hussain, Eiman Mutwali Abdelmageed [1 ]
机构
[1] Qatar Univ, Accounting & Informat Syst, Doha, Qatar
关键词
Blockchain; Internet of things; Security; Systematic literature review; PRIVACY; ARCHITECTURE; REQUIREMENTS; TECHNOLOGIES; CHALLENGES; THREATS; ISSUES;
D O I
10.1108/JEIM-12-2020-0533
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose Blockchain is evolving to become a platform for securing Internet of things (IoT) ecosystems. Still, challenges remain. The purpose of this literature review is to highlight the applicability of blockchain as a medium to secure IoT ecosystems. A two-dimensional framework anchored on (1) IoT layers and (2) security goals is used to organize the existent IoT security threats and their corresponding countermeasures identified in the reviewed literature. The framework helped in mapping the IoT security threats with the inherent features of blockchain and accentuate their prominence to IoT security. Design/methodology/approach An approach integrating computerized natural language processing (NLP) with a systematic literature review methodology was adopted. A large corpus of 2,303 titles and abstracts of blockchain articles was programmatically analyzed in order to identify the relevant literature. The identified literature was subjected to a systematic review guided by a well-established method in IS research. Findings The literature evidently highlights the prominence of blockchain as a mean to IoT security due to the distinctive features it encompasses. The authors' investigation revealed that numerous existent threats are better addressed with blockchain than conventional mechanisms. Nevertheless, blockchain consumes resources such as electricity, time, bandwidth and disk space at a rate that is not yet easily accessible to common IoT ecosystems. Research limitations/implications Results suggest that a configurational approach that aligns IoT security requirements with the resource requirements of different blockchain features is necessary in order to realize the proper balance between security, efficiency and feasibility. Practical implications Practitioners can make use of the classified lists of convention security mechanisms and the IoT threats they address. The framework can help underline the countermeasures that best achieve their security goals. Practitioners can also use the framework to identify the most important features to seek for in a blockchain technology that can help them achieve their security goals. Originality/value This study proposes a novel framework that can help classify IoT threats based on the IoT layer impacted and the security goal at risk. Moreover, it applies a combined man-machine approach to systematically analyze the literature.
引用
收藏
页码:1371 / 1405
页数:35
相关论文
共 50 条
  • [21] Systematic Literature Review on Data Provenance in Internet of Things
    Gultekin, Emrullah
    Aktas, Mehmet S.
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2022 WORKSHOPS, PART IV, 2022, 13380 : 31 - 46
  • [22] Serverless computing for Internet of Things: A systematic literature review
    Setti Cassel, Gustavo Andre
    Rodrigues, Vinicius Facco
    Righi, Rodrigo da Rosa
    Bez, Marta Rosecler
    Nepomuceno, Andressa Cruz
    da Costa, Cristiano Andre
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 128 : 299 - 316
  • [23] Industrial Internet of Things: A Systematic Literature Review and Insights
    Liao, Yongxin
    Rocha Loures, Eduardo de Freitas
    Deschamps, Fernando
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06): : 4515 - 4525
  • [24] Web service and internet of things: a systematic literature review
    Braganca, Henderson Acosta
    Da Silva, Paulo Caetano
    Gomes, Nacles Bernardino Piraja
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2023, 73 (02) : 140 - 147
  • [25] BlockLoc: Secure Localization in the Internet of Things using Blockchain
    Cheikhrouhou, Omar
    Koubaa, Anis
    [J]. 2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 629 - 634
  • [26] BSI: Blockchain to secure routing protocol in Internet of Things
    Jerbi, Wassim
    Cheikhrouhou, Omar
    Guermazi, Abderrahmen
    Baz, Mohamed
    Trabelsi, Hafedh
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (10):
  • [27] Integrating blockchain and Internet of Things systems: A systematic review on objectives and designs
    Nguyen Khoi Tran
    Babar, M. Ali
    Boan, Jonathan
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 173
  • [28] Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research
    Aldhaheri, Sahar
    Alghazzawi, Daniyal
    Cheng, Li
    Barnawi, Ahmed
    Alzahrani, Bandar A.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 157
  • [29] Review on Blockchain Application for Internet of Things
    Zhou, Qin
    Yang, Yaming
    Chen, Jinlian
    Liu, Mingzhe
    [J]. CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 724 - 733
  • [30] A Review of Blockchain in Internet of Things and AI
    Atlam, Hany F.
    Azad, Muhammad Ajmal
    Alzahrani, Ahmed G.
    Wills, Gary
    [J]. BIG DATA AND COGNITIVE COMPUTING, 2020, 4 (04) : 1 - 27