Abstract
The term Internet of Things (IoT) represents all communicating countless heterogeneous devices to share data and resources via the internet. The speedy advance of IoT devices proposes limitless benefits, but it also brings new challenges regarding security and forensics. Likewise, IoT devices can generate a massive amount of data that desires integrity and security during its handling and processing in an efficient way. IoT devices and data can be vulnerable to various types of cyber-crimes at each IoT layer. For combating these cyber-crimes in IoT infrastructure, IoT forensic term has shown up. The IoT forensic is the process of performing digital forensic investigation in the IoT environment in a forensically sound and timely fashion manner. Sundry challenges face the IoT forensics that requires urgent solutions and mitigation methods; digital evidence needs to be collected, preserved, analyzed, processed, and reported in a trusted manner to be acceptable for presenting in the court of law. Preserving the evidence unchanged or tampered with is the most critical challenge in digital forensics. Authentication is another challenge facing digital forensics; who is allowed to deal with the evidence? One of the most recent solutions for supporting IoT forensics is the use of Blockchain. Using Blockchain in digital forensics guarantees data integrity, immutability, scalability, and security. Therefore, this paper presents a comprehensive review of IoT security and forensics with the integration with Blockchain technology. It begins by providing an inclusive discussion of IoT security, as well as the need for IoT forensics, and the concepts of Blockchain. Then, a review of Blockchain-based IoT security and forensics issues is presented. Finally, a discussion of open research directions is provided.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Abomhara M (2015) Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J Cyber Secur Mobil 4(1):65–88
Adhikary T et al (2019) “The Internet of Things (IoT) Augmentation in Healthcare: An Application Analytics.“ International Conference on Intelligent Computing and Communication Technologies. Springer, Singapore
Ahmed Z et al (2019) Protecting IoTs from Mirai Botnet Attacks Using Blockchains. 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE
Albataineh A, Izzat A (2019) IoT and the Risk of Internet Exposure: Risk Assessment Using Shodan Queries. 2019 IEEE 20th International Symposium on” A World of Wireless, Mobile and Multimedia Networks“(WoWMoM). IEEE
Alam MM et al (2018) A survey on the roles of communication technologies in IoT-based personalized healthcare applications. IEEE Access 6:36611–36631
AlHammadi A et al (2019) “Survey of IoT-Based Smart Home Approaches.“ 2019 Advances in Science and Engineering Technology International Conferences (ASET). IEEE
Alhanahnah M, Stevens C, Bagheri H (2020) Scalable analysis of interaction threats in iot systems. Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis
Alhasnawi BN, Jasim BH (2020) Internet of Things (IoT) for Smart Grids: A Comprehensive Review. J Xi’an Univ Archit 63:1006–7930
Arcenegui J, Arjona R, Baturone I (2020) Secure Management of IoT Devices Based on Blockchain Non-fungible Tokens and Physical Unclonable Functions. International Conference on Applied Cryptography and Network Security. Springer, Cham
Arefin ASMS, Nahiyan KMT, Rabbani M (2020) “The Basics of Healthcare IoT: Data Acquisition, Medical Devices, Instrumentations and Measurements”. In: A Handbook of Internet of Things in Biomedical and Cyber Physical System. Springer, Cham, pp 1–37
Ashokkumar M, Thirumurugan T (2018) “Integrated IOT based design and Android operated Multi-purpose Field Surveillance Robot for Military Use.“ International Conference for Phoenixes on Emerging Current Trends in Engineering and Management (PECTEAM 2018) Atlantis Press
Atlam HF et al (2018) Blockchain with internet of things: Benefits, challenges, and future directions. Int J Intell Syst Appl 10(6):40–48
Badotra S et al (2020) (“IoT-Enabled Healthcare Network With SDN.“ 2020) 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO). IEEE
Bae J, Lim H (2018) Random Mining Group Selection to Prevent 51 % Attacks on Bitcoin.“ 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Workshops N (DSN-W). IEEE
Balakrishna S et al (2019) A Survey on Semantic Approaches for IoT Data Integration in Smart Cities. International Conference on Intelligent Computing and Communication Technologies. Springer, Singapore
Baliga A et al (2018) Performance evaluation of the quorum blockchain platform. arXiv preprint arXiv:1809.03421
Bansal A, Ahirwar MK, Shukla PK (2018) A Survey on Classification Algorithms Used in Healthcare Environment of the Internet of Things. Int J Comput Sci Engineering 6(7):883–887
Bao J, Hamdaoui B, Wong W-K (2020) IoT device type identification using hybrid deep learning approach for increased IoT security. 2020 International Wireless Communications and Mobile Computing (IWCMC). IEEE
Brignoli MA et al (2020) Combining exposure indicators and predictive analytics for threats detection in real industrial IoT sensor networks. 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT. IEEE
Brotsis S et al (2019) Blockchain solutions for forensic evidence preservation in IoT environments. 2019 IEEE Conference on Network Softwarization (NetSoft). IEEE
Bui KHN, Jung JJ (2019) ACO-based Dynamic Decision Making for Connected Vehicles in IoT System. IEEE Transactions on Industrial Informatics
Burmaoglu S, Saritas O (2019) and Haydar Yalcin. “Defense 4.0: Internet of Things in Military.“ Emerging Technologies for Economic Development. Springer, Cham, pp 303–320
Catarinucci L et al (2015) An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J 2(6):515–526
Chen J et al (2019) Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users. 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE
Cohen AE et al (2018) “Radio Frequency IoT Sensors in Military Operations in a Smart City.“ MILCOM 2018–2018 IEEE Military Communications Conference (MILCOM). IEEE
Dasaklis TK, Casino F, Patsakis C (2020) SoK: Blockchain Solutions for Forensics. arXiv preprint arXiv:2005.12640
Deepika K, Usha J (2020) Implementation of Personnel Localization & Automation Network (PLAN) Using Internet of Things (IoT). Procedia Computer Science 171:868–877
Dragičević T, Siano P, Prabaharan SR (2019) Future Generation 5G Wireless Networks for Smart Grid. A Comprehensive Review. Energies 12(11):2140
Easley D, O’Hara M, Basu S (2019) From mining to markets: The evolution of bitcoin transaction fees.“ J Financ Econ
Ejaz W et al (2019) Unmanned Aerial Vehicles enabled IoT Platform for Disaster Management. Energies 12(14):2706
El-Din HE, Manjaiah DH (2017) Internet of Things in Cloud Computing. In: Acharjya D, Geetha M (eds) Internet of Things: Novel Advances and Envisioned Applications. Stud Big Data 25. Springer, Cham
Fahmi F et al (2020) Integrated Car Telemetry System Based On Internet Of Things: Application And Challenges. J Eng Sci Technol 15(6):3757–3771
Farooq M, Shoaib et al (2020) Role of IoT Technology in Agriculture. A Systematic Literature Review. Electronics 9(2):319
Gandhi DA, Ghosal M (2018) “Intelligent Healthcare Using IoT: A Extensive Survey.“ 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE
Gentry E et al (2019) SEAKER: A tool for fast digital forensic triage. Future of Information and Communication Conference. Springer, Cham
González-Zamar M-D et al (2020) IoT technology applications-based smart cities: Research analysis. Electronics 9.8:1246
Goudos SK et al (2019) Communication Protocols for the IoT-Based Smart Grid. IoT for Smart Grids. Springer, Cham, pp 55–83
Gupta BB, Quamara (2020) An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurr Comput Pract Exp 32:e4946 21 )
Harbawi M, Varol A (2017) An improved digital evidence acquisition model for the Internet of Things forensic I: A theoretical framework. 2017 5th Int Symp Digit Forensic Secur ISDFS 2017 520–525
Harish KV, Amutha B (2018) Survey on Security in Autonomous Cars. International Conference on Communications and Cyber Physical Engineering (2018) Springer, Singapore
Hassan WH (2019) Current research on Internet of Things (IoT) security: A survey. Comput Netw 148:283–294
Hassija V et al (2019) “A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. " IEEE Access 7:82721–82743
Hemdan EED, Manjaiah DH (2017) Digital Investigation of Cybercrimes Based on Big Data Analytics Using Deep Learning. Deep Learn Innov Convergence Big Data 9
Hossain M, Karim Y, Hasan R (2018) FIF-IoT: A forensic investigation framework for IoT using a public digital ledger. 2018 IEEE International Congress on Internet of Things (ICIOT). IEEE
Hsu C-L, Chen W-X, Tuan-Vinh L (2020) An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things. Sensors 20(22):6471
Hu X et al (2020) An IoT-Based Cyber-Physical Framework for Turbine Assembly Systems. IEEE Access 8:59732–59740
Huang S et al (2020) Identifying physical-layer attacks for IoT security: An automatic modulation classification approach using multi-module fusion neural network. Phys Commun 43:101180
Humayun M et al (2020) Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study. Arab J Sci Eng 1–19
Janarthanan T, Bagheri M, Zargari S (2021) IoT Forensics: An Overview of the Current Issues and Challenges. Digit Forensic Investig Internet Things (IoT) Devices 223–254
Jehan S (2017) Rockchain A distributed data intelligence platform White Paper Beta 1.1 Sébastien Jehan
Jiang X, Lora M, Chattopadhyay S (2020) An experimental analysis of security vulnerabilities in industrial IoT devices. ACM Trans Internet Technol 20(2):1–24
Jiao S, Lui RP (2019) A survey on physical authentication methods for smart objects in IoT ecosystem. Internet Things 6:100043
Khan NS, Chishti MA, Saleem M (2019) Identifying Various Risks in Cyber-Security and Providing a Mind-Map of Network Security Issues to Mitigate Cyber-Crimes.“ Proceedings of 2nd International Conference on Communication, Computing and Networking. Springer, Singapore
Khoa TA et al (2020) Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study Wirel Commun Mob Comput 2020
Kimani K, Oduol V, Langat K (2019) Cyber security challenges for IoT-based smart grid networks. Int J Crit Infrastruct Prot 25:36–49
Kłos M, El Fray I (2020) Securing Event Logs with Blockchain for IoT. International Conference on Computer Information Systems and Industrial Management. Springer, Cham, 2020
Kosba A et al (2016) Hawk: The blockchain model of cryptography and privacy-preserving smart contracts.“ 2016 IEEE Symposium on Security and Privacy (SP). IEEE
Kshetri N (2017) Can blockchain strengthen the internet of things? IT Prof 19(4):68–72
Kulkarni O (2019) Preventing the Man-in-the-Middle Attack on Internet Communication using Blockchain Technology. Diss. Dublin, National College of Ireland
Kumar G et al (2019) Proof-of-Work consensus approach in Blockchain Technology for Cloud and Fog Computing using Maximization-Factorization Statistics. IEEE Internet Things J
Kumar T et al (2020) BlockEdge: Blockchain-Edge Framework for Industrial IoT Networks. IEEE Access 8:154166–154185
Kwon D et al (2018) A study on development of the blind spot detection system for the IoT-based smart connected car. 2018 IEEE International Conference on Consumer Electronics (ICCE). IEEE
Li F et al (2019) Enhanced Cyber-Physical Security in Internet of Things through Energy Auditing. IEEE Internet Things J
Li X et al (2020) A survey on the security of blockchain systems. Future Gener Comput Syst 107:841–853
Li M et al (2020) LEChain: A blockchain-based lawful evidence management scheme for digital forensics. Future Gener Comput Syst 115:406–420
Li S, Qin T, Min G (2019) Blockchain-Based Digital Forensics Investigation Framework in the Internet of Things and Social Systems. IEEE Trans Comput Soc Syst 6(6):1433–1441
Lin J et al (2020) Mcunet: Tiny deep learning on IoT devices. arXiv preprint arXiv:2007.10319
Lonzetta AM et al (2018) Security vulnerabilities in Bluetooth technology as used in IoT. J Sens Actuator Netw 7(3):28
Luque-Vega, Luis F et al (2020) Smart Cities Oriented Project Planning and Evaluation Methodology Driven by Citizen Perception—IoT Smart Mobility Case. Sustainability 12.17:7088
Madhugundu DK, Ahmed F, Roy B (2018) A Survey on Security Issues and Challenges in IoT Based Smart Home. Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT)
Malkar N et al (2019) Survey Paper on An IoT Based Smart Parking System
Manne JM et al (2020) Smart Automation using IoT. Int J Res Appl Sci Eng Technol (IJRASET) 8(V)
Meneghello F et al (2019) IoT: Internet of Threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J
Mercan S et al (2020) A Cost-efficient IoT Forensics Framework with Blockchain. arXiv preprint arXiv:2004.14691
Mercan S et al (2020) A Cost-efficient IoT Forensics Framework with Blockchain. arXiv preprint arXiv:2004.14691
Mishra L, Varma S (2020) Internet of Things for Military Applications. (2020) 7th International Conference on Computing for Sustainable Global Development (INDIACom). IEEE
Nadeem K, Saeed N, Ahmed N (2020) A Comparative Study of Digital Forensics and Cybercrime Investigation
Nasralla MM, García-Magariño I (2020) and Jaime Lloret. “Defenses Against Perception-Layer Attacks on IoT Smart Furniture for Impaired People. IEEE Access 8:119795–119805
Neshenko N et al (2019) Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Communications Surveys & Tutorials
Nieto A, Rios R, Lopez J (2017) A methodology for privacy-aware iot-forensics. Proc 16th IEEE Int Conf Trust Secur Priv Comput Commun 11th IEEE Int Conf Big Data Sci Eng 14th IEEE Int Conf Embed Softw Syst 626–633
Novak M (2020) Digital Evidence in Criminal Cases Before the US Courts of Appeal: Trends and Issues for Consideration. J Digit Forensics Secur Law 14(4):3
Olivares-Rojas JC et al (2018) A Comparative Assessment of Blockchains in Embedded Systems. 2018 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC). IEEE
Pajila PB, Julie EG (2019) Detection of DDoS Attack Using SDN in IoT: A Survey. Intelligent Communication Technologies and Virtual Mobile Networks. Springer, Cham
Palmer G (2001) A road map for digital forensic research. First digital forensic research workshop, utica, new york
Panwar N et al (2019) “Smart Home Survey on Security and Privacy.“ arXiv preprint arXiv:1904.05476
Pawanraj SP, Jagadeesh BN (2020) Design of IoT Robot for Military Applications
Pradhan M (2018) “A Survey of Smart City Assets for Future Military Usage.“ 2018 International Symposium on Networks, Computers and Communications (ISNCC). IEEE
Praveen MM, Dhandapani S (2020) “IOT Based Military Robot Enhanced With Raspberry PI”. Solid State Technol 63(5):7195–7202
Qian LP et al (2019) “HybridIoT: Integration of hierarchical multiple access and computation offloading for IoT-based smart cities”. IEEE Network 33(2):6–13
Radhika R, Kulothungan K (2019) Mitigation of Distributed Denial of Service Attacks on the Internet of Things. Appl Math 13(5):831–837
Rana MM, Bo R (2020) “IoT-based cyber-physical communication architecture: Challenges and research directions”. IET Cyber Phys Syst Theory Appl 5(1):25–30
Restuccia F et al (2019) Blockchain for the Internet of Things: Present and Future. arXiv preprint arXiv:1903.07448
Reyna A et al (2018) “On blockchain and its integration with IoT. Challenges and opportunities”. Future Gener Comput Syst 88:173–190
Ricci J, Baggili I, Breitinger F (2019) Blockchain-Based Distributed Cloud Storage Digital Forensics: Where’s the Beef? IEEE Secur Privacy 17(1):34–42
Robberts C, Toft J (2019) Finding Vulnerabilities in IoT Devices: Ethical Hacking of Electronic Locks
Sadique KM, Rahmani R, Johannesson P (2018) Towards Security on Internet of Things: Applications and Challenges in Technology. Proc Comput Sci 141:199–206
Saleh F (2019) Blockchain without waste: Proof-of-stake. Available at SSRN 3183935
Salim MM, Rathore S, Park JH (2019) Distributed denial of service attacks and its defenses in IoT: a survey. J Supercomput 1–44
Servida F, Casey E (2019) IoT forensic challenges and opportunities for digital traces. Digit Investig 28:S22–S29
Shaaban A, Konstantin S (2016) Practical Windows Forensics. Packt Publishing Ltd
Sharma V et al (2019) Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey. arXiv preprint arXiv:1903.05362
Shi Y et al (2019) Energy Audition based Cyber-Physical Attack Detection System in IoT.
Singh P (2020) Blockchain based Security Solutions with IoT Application in Construction Industry. IOP Conference Series: Earth and Environmental Science 614(1). IOP Publishing
Singh S, Kumar S, Rathore, Park JH (2020) Blockiotintelligence: A blockchain-enabled intelligent IoT architecture with artificial intelligence. Future Gener Comput Syst 110:721–743
Sodhro A, Hassan et al (2019) Towards an optimal resource management for IoT based Green and sustainable smart cities. J Clean Prod 220:1167–1179
Sokullu R, Akkaş MA (2020) “Unmanned Aerial Vehicle and IoT as Enabling Technologies for 5G: Frameworks, Applications and Challenges. In: " Internet of Things, Smart Computing and Technology: A Roadmap Ahead. Springer, Cham, pp 217–239
Spathoulas G et al (2019) Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets. Future Internet 11:226 11 )
Stanislav M, Tod B (2015) Hacking iot: A case study on baby monitor exposures and vulnerabilities. Rapid 7
Stoyanova M et al (2020) A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches and Open Issues. IEEE Commun Surv Tutor
Suchitra C, Vandana CP (2016) Internet of Things and Security Issues. Int J Comput Sci Mob Comput 5(1):35–41
Syed NF et al (2020) Denial of service attack detection through machine learning for the IoT. J Inf Telecommuni 1–22
Tama BA et al (2017) A critical review of blockchain and its current applications.“ 2017 International Conference on Electrical Engineering and Science C (ICECOS). IEEE
Tewari A, Gupta BB (2020) Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Gener Comput Syst 108:909–920
Thibault L et al (2018) Real-Time Air Pollution Exposure and Vehicle Emissions Estimation Using IoT, GNSS Measurements and Web-Based Simulation Models. 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall). IEEE
Tseng L et al (2020) Blockchain-based database in an IoT environment: challenges, opportunities, and analysis. Cluster Comput 23(3):2151–2165
Vaccari I, Aiello M, Cambiaso E (2020) Slowtt: A slow denial of service against iot networks. Information 11.9:452
Valdeolmillos D et al (2019) “Blockchain Technology: A Review of the Current Challenges of Cryptocurrency.“ International Congress on Blockchain and Applications. Springer, Cham
Vangala A et al (2020) Smart secure sensing for IoT-based agriculture: Blockchain perspective. IEEE Sens J
Vengatesan K et al (2018) Analysis of Mirai Botnet Malware Issues and Its Prediction Methods in Internet of Things.“ International conference on Computer Networks, Big data and IoT. Springer, Cham
von Solms B, von Solms R (2018) Cybersecurity and information security–what goes where? Inf Comput Secur 26(1):2–9
Wang C et al (2019) A dependable time series analytic framework for cyber-physical systems of iot-based smart grid. ACM Trans Cyber Phys Syst 3(1):7
Wang F et al (2020) A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure. Wirel Commun Mob Comput2020
Wang Q et al (2020) Blockchain for the IoT and industrial IoT: A review. Internet Things 10:100081
Wang Q et al (2020) A Comparative Study of Blockchain Consensus Algorithms. J Phys Conf Ser 1437(1). IOP Publishing
Wang C et al (2020) Industrial Cyber-Physical Systems-based Cloud IoT Edge for Federated Heterogeneous Distillation. IEEE Trans Ind Inform
Weber RH (2010) Internet of Things – New security and privacy challenges. Comput Law Secur Rev 26(1):23–30
Wheelus C, Zhu X (2020) IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework. IoT 1.2:259–285
Wood G (2016) Polkadot: Vision for a heterogeneous multi-chain framework. White Pap
Worley C et al (2020) Scrybe: A Second-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications. In: Blockchain Cybersecurity, Trust and Privacy. Springer, Cham, pp 51–67
Xiao Y et al (2019) A Survey of Distributed Consensus Protocols for Blockchain Networks. arXiv preprint arXiv:1904.04098
Xiong Y, Du J (2019) Electronic evidence preservation model based on blockchain. Proceedings of the 3rd International Conference on Cryptography, Security and Privacy
Xu S et al (2019) A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Future Gener Comput Syst 97:284–294
Yang L et al (2018) Hide your hackable smart home from remote attacks: The multipath onion IoT Gateways.“ European Symposium on Research in Computer Security. Springer, Cham
Yang F et al (2019) “Delegated Proof of Stake With Downgrade: A Secure and Efficient Blockchain Consensus Algorithm With Downgrade Mechanism”. IEEE Access 7:118541–118555
Yaqoob I, Hashem IAT, Ahmed A, Kazmi SMA, Hong CS (2019) Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges. Futur Gener Comput Syst 92:265–275
Yao Y et al (2019) Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution. European Symposium on Research in Computer Security. Springer, Cham
Yu Q, Zhang Z, Dofe J (2020) Proactive Defense Against Security Threats on IoT Hardware. Model Des Secur Internet Things 407–433
Zaidan AA, Zaidan BB (2020) A review on intelligent process for smart home applications based on IoT: coherent taxonomy, motivation, open challenges, and recommendations. Artif Intell Rev 53(1):141–165
Zaidan AA et al (2018) “A survey on communication components for IoT-based technologies in smart homes”. Telecommun Syst 69(1):1–25
Zaidi N et al (2018) A Study of Exposure of IoT Devices in India: Using Shodan Search Engine. Information Systems Design and Intelligent Applications. Springer, Singapore, pp 1044–1053
Zgheib R et al (2020) “A scalable semantic framework for IoT healthcare applications.“ J Ambient Intell Hum Comput 1–19
Zhang S, Lee JH (2019) Double-spending with a Sybil Attack in the Bitcoin Decentralized Network.“ IEEE Trans Ind Inform
Zhang S, Lee JH (2020) Analysis of the main consensus protocols of blockchain. ICT Express 6(2):93–97
Zheng S et al (2018) User perceptions of smart home IoT privacy. Proceedings of the ACM on Human-Computer Interaction 2.CSCW 200
Zhou Z et al (2019) Potential risk of IoT device supporting IR remote control. Comput Netw 148:307–317
Zieliski Z, Chudzikiewicz J, Furtak J (2019) An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT. Security and Fault Tolerance in Internet of Things. Springer, Cham, pp 111–128
Zyskind G, Nathan O, Pentland A (2015) Enigma: Decentralized computation platform with guaranteed privacy. arXiv preprint arXiv:1506.03471
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kamal, R., Hemdan, E.ED. & El-Fishway, N. A review study on blockchain-based IoT security and forensics. Multimed Tools Appl 80, 36183–36214 (2021). https://doi.org/10.1007/s11042-021-11350-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11350-9