2021
DOI: 10.3390/electronics10141732
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preservation in Resource-Constrained IoT Devices Using Blockchain—A Survey

Abstract: With opportunities brought by Internet of Things (IoT), it is quite a challenge to assure privacy preservation when a huge number of resource-constrained distributed devices is involved. Blockchain has become popular for its benefits, including decentralization, persistence, immutability, auditability and consensus. With the implementation of blockchain in IoT, the benefits provided by blockchain can be derived in order to make IoT more efficient and maintain trust. In this paper, we discuss some applications … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(14 citation statements)
references
References 138 publications
(154 reference statements)
0
14
0
Order By: Relevance
“…Big data is therefore a vast amount of rapidly changing data with mixed data types. According to [16], IoT deployments in many industries meet the privacy challenges faced by IoT in resource-constrained devices. It provides an opportunity to address some of the uses of blockchain in various fields and IoT privacy concerns.…”
Section: Literature Surveymentioning
confidence: 99%
“…Big data is therefore a vast amount of rapidly changing data with mixed data types. According to [16], IoT deployments in many industries meet the privacy challenges faced by IoT in resource-constrained devices. It provides an opportunity to address some of the uses of blockchain in various fields and IoT privacy concerns.…”
Section: Literature Surveymentioning
confidence: 99%
“…These methods can facilitate trade between entities with high levels of trust, thereby eliminating the possibility of dealing with dishonest sellers in smart marketplace context. These techniques frequently result in risky double-spending and require substantial computational resources 45 – 47 . When clusters are formed based on the similarity of their members' profiles, uniformity is not guaranteed 41 .…”
Section: Related Workmentioning
confidence: 99%
“…This study researched prior Blockchain scalability research, such as those mentioned in current surveys on Blockchain scalability and the fundamental scalability principles accessible in contemporary literature [ 93 ]. As a result, this section analyses and specifies significant characteristics that may be used to characterize a Blockchain system’s scalability.…”
Section: Background Knowledgementioning
confidence: 99%