“…Lack of trust and fairness in nodes [48], [17], [20], [23], [28], [29], [30] Information leak due to un-restricted access control [14], [15] IoT low performance for conventional access control [31] Privacy leak risk [29] Lack of strong encryption enforcement [47], [32] Lack of standardised communication protocol [47] Malicious attacks and cyberattacks (including identity spoofing, message eavesdropping, message tampering, content poisoning, physical and cloning attacks) [11], [45], [46], [14], [49], [50], [20], [25], [33], [34] Lack of authentication mechanism [45], [52], [50], [19], [22], [27], [34], [36] , [37], [35] Resource constrained IoT actuators and sensors [51] Security weaknesses and vulnerabilities [46], [49], [55], [33], [38], [39], [56] Access control founded on blockchain technology related issues in IoT environment: higher cost, increased transaction delays and scalability [53],…”