2022
DOI: 10.1109/access.2022.3224222
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Literature Review of Lightweight Blockchain for IoT

Abstract: The Internet of Things (IoT) has become an essential part of our society. IoT devices are used in our houses, hospitals, cars, industry, etc., making our lives easier. Nonetheless, there are a number of serious concerns about security, privacy and performance issues in IoT. It has been proven that the aforementioned issues are strictly related to the high degree of centralisation of current IoT architecture. Thus, there is an increasing interest in adopting blockchain in IoT. However, blockchain adoption is no… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 135 publications
0
2
0
Order By: Relevance
“…To deal with unauthorized access and threats, additional security measures must be added to the hashing process. 3 However, as more devices are added, monitoring collaboration among them becomes easier, but scalability issues remain unaddressed. 4 Therefore, before integrating them into the working environment, it is imperative to carefully analyze various existing protocols and select an appropriate one.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To deal with unauthorized access and threats, additional security measures must be added to the hashing process. 3 However, as more devices are added, monitoring collaboration among them becomes easier, but scalability issues remain unaddressed. 4 Therefore, before integrating them into the working environment, it is imperative to carefully analyze various existing protocols and select an appropriate one.…”
Section: Introductionmentioning
confidence: 99%
“…To successfully advance the growth, it is also crucial to monitor air traffic factors when working with equipment like drones. To deal with unauthorized access and threats, additional security measures must be added to the hashing process 3 . However, as more devices are added, monitoring collaboration among them becomes easier, but scalability issues remain unaddressed 4 .…”
Section: Introductionmentioning
confidence: 99%