A Comparative Analysis of IoT-Based Blockchain Frameworks for Secure and Scalable Applications
Keywords:
IoT-based blockchain, Secure applications, Scalable applications, Hyperledger Fabric, Ethereum and IOTAAbstract
The rapid emergence and evolution of blockchain technology have created new opportunities for implementing secure and scalable applications on the Internet of Things. Unfortunately, choosing the right blockchain framework for these applications can be challenging due to the vast number of available options. The paper explores the three main frameworks that are used in the development of IoT-based applications: IOTA, Hyperledger, and Ethereum. This paper aims to provide a comprehensive analysis of the various aspects of the three main blockchain frameworks used in the development of IoT applications. It will help decision-makers make informed decisions when it comes to implementing their applications. The paper's introduction highlights the importance of considering the various factors that affect the development and implementation of IoT-based applications. It also provides a comprehensive overview of the various blockchain frameworks that are used for this type of technology. In addition, it reviews the literature on the security challenges and scalability issues of these frameworks. This paper aims to provide a comprehensive analysis of the research that has been conducted on the secure and scalable implementation of these types of applications. This study presents the methodology for analyzing the various blockchain frameworks that are used for building IoT applications. The evaluation criteria are defined and the methods are described. The study also acknowledges the potential biases and limitations of these frameworks. The comparative analysis section of the paper takes a look at the different blockchain frameworks. It offers descriptions of IOTA, Ethereum, and Hyperledger Fabric and their features. It also delves into their security protocols and mechanisms, as well as their scalability solutions. The study explores the applications and use cases of these frameworks. The findings and discussion section compares and examines the security attributes of the different frameworks. It also explores their performance and scalability. In addition, it talks about the implications of such applications for their stable and scalable nature. The paper's comprehensive analysis of the three main blockchain frameworks used for developing IoT applications, namely IOTA, Ethereum and Hyperledger, provides valuable insight for decision-makers when it comes to choosing the ideal framework for their projects. The findings and recommendations that the paper presents contribute to the established body of knowledge about this type of technology and its applications.
Downloads
References
Industry, “Blockchain — Internet of Things Applications : Opportunities,” 2023.
G. Dittmann and J. Jelitto, “A blockchain proxy for lightweight iot devices,” Proc. - 2019 Crypto Val. Conf. Blockchain Technol. CVCBT 2019, pp. 82–85, 2019, doi: 10.1109/CVCBT.2019.00015.
S. Suhail, R. Hussain, A. Khan, and C. S. Hong, “Orchestrating product provenance story: When IOTA ecosystem meets electronics supply chain space,” Comput. Ind., vol. 123, p. 103334, 2020, doi: https://doi.org/10.1016/j.compind.2020.103334.
M. J. Peregrina-Pérez, J. Lagares-Galán, and J. Boubeta-Puig, “Chapter 16 - Hyperledger Fabric blockchain platform,” R. Pandey, S. Goundar, and S. B. T.-D. C. to B. Fatima, Eds. Academic Press, 2023, pp. 283–295.
J. Andrews, M. Ciampi, and V. Zikas, “Etherless Ethereum tokens: Simulating native tokens in Ethereum,” J. Comput. Syst. Sci., vol. 135, pp. 55–72, 2023, doi: 10.1016/j.jcss.2023.02.001.
A. R. Mahlous and A. Ara, “The Adoption of Blockchain Technology in IoT: An Insight View,” Proc. - 2020 6th Conf. Data Sci. Mach. Learn. Appl. CDMA 2020, pp. 100–105, 2020, doi: 10.1109/CDMA47397.2020.00023.
U. Narayanan, V. Paul, and S. Joseph, “Decentralized blockchain based authentication for secure data sharing in Cloud-IoT: DeBlock-Sec,” J. Ambient Intell. Humaniz. Comput., vol. 13, no. 2, pp. 769–787, 2022, doi: 10.1007/s12652-021-02929-z.
A. Monrat, O. Schelen, and K. Andersson, “Performance Evaluation of Permissioned Blockchain Platforms,” 2020 IEEE Asia-Pacific Conf. Comput. Sci. Data Eng. CSDE 2020, 2020, doi: 10.1109/CSDE50874.2020.9411380.
V. Khetani, Y. Gandhi, S. Bhattacharya, S. N. Ajani, and S. Limkar, “INTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING Cross-Domain Analysis of ML and DL : Evaluating their Impact in Diverse Domains,” vol. 11, pp. 253–262, 2023.
Al-Barazanchi et al., “Blockchain-Technology-Based Solutions for IOT Security,” Iraqi J. Comput. Sci. Math., vol. 3, no. 1, pp. 53–63, 2022, doi: 10.52866/ijcsm.2022.01.01.006.
A. Alfa, J. K. Alhassan, O. M. Olaniyi, and M. Olalere, “Blockchain technology in IoT systems: current trends, methodology, problems, applications, and future directions,” J. Reliab. Intell. Environ., vol. 7, no. 2, pp. 115–143, 2021, doi: 10.1007/s40860-020-00116-z.
O. Alfandi, S. Khanji, L. Ahmad, and A. Khattak, “A survey on boosting IoT security and privacy through blockchain: Exploration, requirements, and open issues,” Cluster Comput., vol. 24, no. 1, pp. 37–55, 2021, doi: 10.1007/s10586-020-03137-8.
N. Adhikari and M. Ramkumar, “IoT and Blockchain Integration: Applications, Opportunities, and Challenges,” Network, vol. 3, no. 1, pp. 115–141, 2023, doi: 10.3390/network3010006.
Ayub Khan, A. A. Laghari, Z. A. Shaikh, Z. Dacko-Pikiewicz, and S. Kot, “Internet of Things (IoT) Security With Blockchain Technology: A State-of-the-Art Review,” IEEE Access, vol. 10, no. November, pp. 122679–122695, 2022, doi: 10.1109/ACCESS.2022.3223370.
Z. Rahman, X. Yi, S. T. Mehedi, R. Islam, and A. Kelarev, “Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions,” Electronics, vol. 11, no. 9, p. 1416, Apr. 2022, doi: 10.3390/electronics11091416.
Benet, “IPFS - Content Addressed, Versioned, P2P File System,” pp. 2021–2022, 2014, [Online]. Available: http://arxiv.org/abs/1407.3561.
Dorri, S. S. Kanhere, and R. Jurdak, “Blockchain in internet of things: Challenges and Solutions,” 2019 Int. Conf. Electron. Information, Commun., pp. 1–2, 2016, [Online]. Available: http://arxiv.org/abs/1608.05187.
Song, J. Nang, and J. Jang, “Design of anomaly detection and visualization tool for iot blockchain,” Proc. - 2018 Int. Conf. Comput. Sci. Comput. Intell. CSCI 2018, pp. 1464–1465, 2018, doi: 10.1109/CSCI46756.2018.00292.
Minoli and B. Occhiogrosso, “Blockchain mechanisms for IoT security,” Internet of Things (Netherlands), vol. 1–2, pp. 1–13, 2018, doi: 10.1016/j.iot.2018.05.002.
A. Khan and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,” Futur. Gener. Comput. Syst., vol. 82, pp. 395–411, 2018, doi: 10.1016/j.future.2017.11.022.
H. T. T. Truong, M. Almeida, G. Karame, and C. Soriente, “Towards secure and decentralized sharing of IoT data,” Proc. - 2019 2nd IEEE Int. Conf. Blockchain, Blockchain 2019, pp. 176–183, 2019, doi: 10.1109/Blockchain.2019.00031.
J. Hathaliya, P. Sharma, S. Tanwar, and R. Gupta, “Blockchain-based Remote Patient Monitoring in,” pp. 87–91, 2019.
Tseng, X. Yao, S. Otoum, M. Aloqaily, and Y. Jararweh, “Blockchain-based database in an IoT environment: challenges, opportunities, and analysis,” Cluster Comput., vol. 23, no. 3, pp. 2151–2165, 2020, doi: 10.1007/s10586-020-03138-7.
R. A. Memon, J. P. Li, J. Ahmed, M. I. Nazeer, M. Ismail, and K. Ali, “Cloud-based vs. blockchain-based IoT: a comparative survey and way forward,” Front. Inf. Technol. Electron. Eng., vol. 21, no. 4, pp. 563–586, 2020, doi: 10.1631/FITEE.1800343.
P. Patil, M. Sangeetha, and V. Bhaskar, “Blockchain for IoT Access Control, Security and Privacy: A Review,” Wirel. Pers. Commun., vol. 117, no. 3, pp. 1815–1834, 2021, doi: 10.1007/s11277-020-07947-2.
Attkan and V. Ranga, “Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security,” Complex Intell. Syst., vol. 8, no. 4, pp. 3559–3591, 2022, doi: 10.1007/s40747-022-00667-z.
S. S. Hameedi and O. Bayat, “Improving IoT Data Security and Integrity Using Lightweight Blockchain Dynamic Table,” Appl. Sci., vol. 12, no. 18, 2022, doi: 10.3390/app12189377.
W. Liang and N. Ji, “Privacy challenges of IoT-based blockchain: a systematic review,” Cluster Comput., vol. 25, no. 3, pp. 2203–2221, 2022, doi: 10.1007/s10586-021-03260-0.
Nehme, R. El Sibai, J. Bou Abdo, A. R. Taylor, and J. Demerjian, “Converged AI, IoT, and blockchain technologies: a conceptual ethics framework,” AI Ethics, vol. 2, no. 1, pp. 129–143, 2022, doi: 10.1007/s43681-021-00079-8.
D. Ravi, S. Ramachandran, R. Vignesh, V. R. Falmari, and M. Brindha, “Privacy preserving transparent supply chain management through Hyperledger Fabric,” Blockchain Res. Appl., vol. 3, no. 2, p. 100072, 2022, doi: https://doi.org/10.1016/j.bcra.2022.100072.
T. Ye, M. Luo, Y. Yang, K. R. Choo, and D. He, “A Survey on Redactable Blockchain: Challenges and Opportunities,” IEEE Trans. Netw. Sci. Eng., pp. 1–15, 2022, doi: 10.1109/TNSE.2022.3233448.
M. Akhtar, D. R. Rizvi, M. A. Ahad, S. S. Kanhere, M. Amjad, and G. Coviello, “Efficient data communication using distributed ledger technology and iota-enabled internet of things for a future machine-to-machine economy,” Sensors, vol. 21, no. 13, pp. 1–38, 2021, doi: 10.3390/s21134354.
S. Shalaby, A. A. Abdellatif, A. Al-Ali, A. Mohamed, A. Erbad, and M. Guizani, “Performance Evaluation of Hyperledger Fabric,” 2020 IEEE Int. Conf. Informatics, IoT, Enabling Technol. ICIoT 2020, no. April, pp. 608–613, 2020, doi: 10.1109/ICIoT48696.2020.9089614.
C.-C. Chou, N.-C. Richard Hwang, C.-W. Li, T. Wang, and Y.-Y. Wang, “Implementing a multichain framework using hyperledger for supply chain transparency in a dynamic partnership: A feasibility study,” Comput. Ind. Eng., vol. 175, p. 108906, 2023, doi: https://doi.org/10.1016/j.cie.2022.108906.
De Vries, “Cryptocurrencies on the road to sustainability: Ethereum paving the way for Bitcoin,” Patterns, vol. 4, no. 1, p. 100633, 2023, doi: 10.1016/j.patter.2022.100633.
Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “LSB: A Lightweight Scalable Blockchain for IoT security and anonymity,” J. Parallel Distrib. Comput., vol. 134, pp. 180–197, 2019, doi: 10.1016/j.jpdc.2019.08.005.
W. F. Silvano and R. Marcelino, “Iota Tangle: A cryptocurrency to communicate Internet-of-Things data,” Futur. Gener. Comput. Syst., vol. 112, pp. 307–319, 2020, doi: https://doi.org/10.1016/j.future.2020.05.047.
L. Vishwakarma and D. Das, “SCAB - IoTA: Secure communication and authentication for IoT applications using blockchain,” J. Parallel Distrib. Comput., vol. 154, pp. 94–105, 2021, doi: https://doi.org/10.1016/j.jpdc.2021.04.003.
Sahoo, D. K. . (2021). Improved Routing and Secure Data Transmission in Mobile Adhoc Networks Using Trust Based Efficient Randomized Multicast Protocol. Research Journal of Computer Systems and Engineering, 2(2), 06:11. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/25
Aoudni, Y., Donald, C., Farouk, A., Sahay, K. B., Babu, D. V., Tripathi, V., & Dhabliya, D. (2022). Cloud security based attack detection using transductive learning integrated with hidden markov model. Pattern Recognition Letters, 157, 16-26. doi:10.1016/j.patrec.2022.02.012
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.