Log in

A review study on blockchain-based IoT security and forensics

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The term Internet of Things (IoT) represents all communicating countless heterogeneous devices to share data and resources via the internet. The speedy advance of IoT devices proposes limitless benefits, but it also brings new challenges regarding security and forensics. Likewise, IoT devices can generate a massive amount of data that desires integrity and security during its handling and processing in an efficient way. IoT devices and data can be vulnerable to various types of cyber-crimes at each IoT layer. For combating these cyber-crimes in IoT infrastructure, IoT forensic term has shown up. The IoT forensic is the process of performing digital forensic investigation in the IoT environment in a forensically sound and timely fashion manner. Sundry challenges face the IoT forensics that requires urgent solutions and mitigation methods; digital evidence needs to be collected, preserved, analyzed, processed, and reported in a trusted manner to be acceptable for presenting in the court of law. Preserving the evidence unchanged or tampered with is the most critical challenge in digital forensics. Authentication is another challenge facing digital forensics; who is allowed to deal with the evidence? One of the most recent solutions for supporting IoT forensics is the use of Blockchain. Using Blockchain in digital forensics guarantees data integrity, immutability, scalability, and security. Therefore, this paper presents a comprehensive review of IoT security and forensics with the integration with Blockchain technology. It begins by providing an inclusive discussion of IoT security, as well as the need for IoT forensics, and the concepts of Blockchain. Then, a review of Blockchain-based IoT security and forensics issues is presented. Finally, a discussion of open research directions is provided.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Germany)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Abomhara M (2015) Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J Cyber Secur Mobil 4(1):65–88

    Article  Google Scholar 

  2. Adhikary T et al (2019) “The Internet of Things (IoT) Augmentation in Healthcare: An Application Analytics.“ International Conference on Intelligent Computing and Communication Technologies. Springer, Singapore

  3. Ahmed Z et al (2019) Protecting IoTs from Mirai Botnet Attacks Using Blockchains. 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE

  4. Albataineh A, Izzat A (2019) IoT and the Risk of Internet Exposure: Risk Assessment Using Shodan Queries. 2019 IEEE 20th International Symposium on” A World of Wireless, Mobile and Multimedia Networks“(WoWMoM). IEEE

  5. Alam MM et al (2018) A survey on the roles of communication technologies in IoT-based personalized healthcare applications. IEEE Access 6:36611–36631

    Article  Google Scholar 

  6. AlHammadi A et al (2019) “Survey of IoT-Based Smart Home Approaches.“ 2019 Advances in Science and Engineering Technology International Conferences (ASET). IEEE

  7. Alhanahnah M, Stevens C, Bagheri H (2020) Scalable analysis of interaction threats in iot systems. Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis

  8. Alhasnawi BN, Jasim BH (2020) Internet of Things (IoT) for Smart Grids: A Comprehensive Review. J **’an Univ Archit 63:1006–7930

    Google Scholar 

  9. Arcenegui J, Arjona R, Baturone I (2020) Secure Management of IoT Devices Based on Blockchain Non-fungible Tokens and Physical Unclonable Functions. International Conference on Applied Cryptography and Network Security. Springer, Cham

  10. Arefin ASMS, Nahiyan KMT, Rabbani M (2020) “The Basics of Healthcare IoT: Data Acquisition, Medical Devices, Instrumentations and Measurements”. In: A Handbook of Internet of Things in Biomedical and Cyber Physical System. Springer, Cham, pp 1–37

    Google Scholar 

  11. Ashokkumar M, Thirumurugan T (2018) “Integrated IOT based design and Android operated Multi-purpose Field Surveillance Robot for Military Use.“ International Conference for Phoenixes on Emerging Current Trends in Engineering and Management (PECTEAM 2018) Atlantis Press

  12. Atlam HF et al (2018) Blockchain with internet of things: Benefits, challenges, and future directions. Int J Intell Syst Appl 10(6):40–48

    Article  Google Scholar 

  13. Badotra S et al (2020) (“IoT-Enabled Healthcare Network With SDN.“ 2020) 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO). IEEE

  14. Bae J, Lim H (2018) Random Mining Group Selection to Prevent 51 % Attacks on Bitcoin.“ 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Workshops N (DSN-W). IEEE

  15. Balakrishna S et al (2019) A Survey on Semantic Approaches for IoT Data Integration in Smart Cities. International Conference on Intelligent Computing and Communication Technologies. Springer, Singapore

  16. Baliga A et al (2018) Performance evaluation of the quorum blockchain platform. ar**v preprint ar**v:1809.03421

  17. Bansal A, Ahirwar MK, Shukla PK (2018) A Survey on Classification Algorithms Used in Healthcare Environment of the Internet of Things. Int J Comput Sci Engineering 6(7):883–887

    Google Scholar 

  18. Bao J, Hamdaoui B, Wong W-K (2020) IoT device type identification using hybrid deep learning approach for increased IoT security. 2020 International Wireless Communications and Mobile Computing (IWCMC). IEEE

  19. Brignoli MA et al (2020) Combining exposure indicators and predictive analytics for threats detection in real industrial IoT sensor networks. 2020 IEEE International Workshop on Metrology for Industry 4.0 & IoT. IEEE

  20. Brotsis S et al (2019) Blockchain solutions for forensic evidence preservation in IoT environments. 2019 IEEE Conference on Network Softwarization (NetSoft). IEEE

  21. Bui KHN, Jung JJ (2019) ACO-based Dynamic Decision Making for Connected Vehicles in IoT System. IEEE Transactions on Industrial Informatics

  22. Burmaoglu S, Saritas O (2019) and Haydar Yalcin. “Defense 4.0: Internet of Things in Military.“ Emerging Technologies for Economic Development. Springer, Cham, pp 303–320

    Book  Google Scholar 

  23. Catarinucci L et al (2015) An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J 2(6):515–526

    Article  Google Scholar 

  24. Chen J et al (2019) Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users. 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE

  25. Cohen AE et al (2018) “Radio Frequency IoT Sensors in Military Operations in a Smart City.“ MILCOM 2018–2018 IEEE Military Communications Conference (MILCOM). IEEE

  26. Dasaklis TK, Casino F, Patsakis C (2020) SoK: Blockchain Solutions for Forensics. ar**v preprint ar**v:2005.12640

  27. Deepika K, Usha J (2020) Implementation of Personnel Localization & Automation Network (PLAN) Using Internet of Things (IoT). Procedia Computer Science 171:868–877

    Article  Google Scholar 

  28. Dragičević T, Siano P, Prabaharan SR (2019) Future Generation 5G Wireless Networks for Smart Grid. A Comprehensive Review. Energies 12(11):2140

    Google Scholar 

  29. Easley D, O’Hara M, Basu S (2019) From mining to markets: The evolution of bitcoin transaction fees.“ J Financ Econ

  30. Ejaz W et al (2019) Unmanned Aerial Vehicles enabled IoT Platform for Disaster Management. Energies 12(14):2706

    Article  Google Scholar 

  31. El-Din HE, Manjaiah DH (2017) Internet of Things in Cloud Computing. In: Acharjya D, Geetha M (eds) Internet of Things: Novel Advances and Envisioned Applications. Stud Big Data 25. Springer, Cham

    Google Scholar 

  32. Fahmi F et al (2020) Integrated Car Telemetry System Based On Internet Of Things: Application And Challenges. J Eng Sci Technol 15(6):3757–3771

    Google Scholar 

  33. Farooq M, Shoaib et al (2020) Role of IoT Technology in Agriculture. A Systematic Literature Review. Electronics 9(2):319

    Google Scholar 

  34. Gandhi DA, Ghosal M (2018) “Intelligent Healthcare Using IoT: A Extensive Survey.“ 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT). IEEE

  35. Gentry E et al (2019) SEAKER: A tool for fast digital forensic triage. Future of Information and Communication Conference. Springer, Cham

  36. González-Zamar M-D et al (2020) IoT technology applications-based smart cities: Research analysis. Electronics 9.8:1246

  37. Goudos SK et al (2019) Communication Protocols for the IoT-Based Smart Grid. IoT for Smart Grids. Springer, Cham, pp 55–83

    Google Scholar 

  38. Gupta BB, Quamara (2020) An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurr Comput Pract Exp 32:e4946 21 )

    Article  Google Scholar 

  39. Harbawi M, Varol A (2017) An improved digital evidence acquisition model for the Internet of Things forensic I: A theoretical framework. 2017 5th Int Symp Digit Forensic Secur ISDFS 2017 520–525

  40. Harish KV, Amutha B (2018) Survey on Security in Autonomous Cars. International Conference on Communications and Cyber Physical Engineering (2018) Springer, Singapore

  41. Hassan WH (2019) Current research on Internet of Things (IoT) security: A survey. Comput Netw 148:283–294

    Article  Google Scholar 

  42. Hassija V et al (2019) “A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. " IEEE Access 7:82721–82743

    Article  Google Scholar 

  43. Hemdan EED, Manjaiah DH (2017) Digital Investigation of Cybercrimes Based on Big Data Analytics Using Deep Learning. Deep Learn Innov Convergence Big Data 9

  44. Hossain M, Karim Y, Hasan R (2018) FIF-IoT: A forensic investigation framework for IoT using a public digital ledger. 2018 IEEE International Congress on Internet of Things (ICIOT). IEEE

  45. Hsu C-L, Chen W-X, Tuan-Vinh L (2020) An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things. Sensors 20(22):6471

    Article  Google Scholar 

  46. Hu X et al (2020) An IoT-Based Cyber-Physical Framework for Turbine Assembly Systems. IEEE Access 8:59732–59740

    Article  Google Scholar 

  47. Huang S et al (2020) Identifying physical-layer attacks for IoT security: An automatic modulation classification approach using multi-module fusion neural network. Phys Commun 43:101180

    Article  Google Scholar 

  48. Humayun M et al (2020) Cyber Security Threats and Vulnerabilities: A Systematic Map** Study. Arab J Sci Eng 1–19

  49. Janarthanan T, Bagheri M, Zargari S (2021) IoT Forensics: An Overview of the Current Issues and Challenges. Digit Forensic Investig Internet Things (IoT) Devices 223–254

  50. Jehan S (2017) Rockchain A distributed data intelligence platform White Paper Beta 1.1 Sébastien Jehan

  51. Jiang X, Lora M, Chattopadhyay S (2020) An experimental analysis of security vulnerabilities in industrial IoT devices. ACM Trans Internet Technol 20(2):1–24

    Article  Google Scholar 

  52. Jiao S, Lui RP (2019) A survey on physical authentication methods for smart objects in IoT ecosystem. Internet Things 6:100043

    Article  Google Scholar 

  53. Khan NS, Chishti MA, Saleem M (2019) Identifying Various Risks in Cyber-Security and Providing a Mind-Map of Network Security Issues to Mitigate Cyber-Crimes.“ Proceedings of 2nd International Conference on Communication, Computing and Networking. Springer, Singapore

  54. Khoa TA et al (2020) Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study Wirel Commun Mob Comput 2020

  55. Kimani K, Oduol V, Langat K (2019) Cyber security challenges for IoT-based smart grid networks. Int J Crit Infrastruct Prot 25:36–49

    Article  Google Scholar 

  56. Kłos M, El Fray I (2020) Securing Event Logs with Blockchain for IoT. International Conference on Computer Information Systems and Industrial Management. Springer, Cham, 2020

  57. Kosba A et al (2016) Hawk: The blockchain model of cryptography and privacy-preserving smart contracts.“ 2016 IEEE Symposium on Security and Privacy (SP). IEEE

  58. Kshetri N (2017) Can blockchain strengthen the internet of things? IT Prof 19(4):68–72

    Article  Google Scholar 

  59. Kulkarni O (2019) Preventing the Man-in-the-Middle Attack on Internet Communication using Blockchain Technology. Diss. Dublin, National College of Ireland

  60. Kumar G et al (2019) Proof-of-Work consensus approach in Blockchain Technology for Cloud and Fog Computing using Maximization-Factorization Statistics. IEEE Internet Things J

  61. Kumar T et al (2020) BlockEdge: Blockchain-Edge Framework for Industrial IoT Networks. IEEE Access 8:154166–154185

    Article  Google Scholar 

  62. Kwon D et al (2018) A study on development of the blind spot detection system for the IoT-based smart connected car. 2018 IEEE International Conference on Consumer Electronics (ICCE). IEEE

  63. Li F et al (2019) Enhanced Cyber-Physical Security in Internet of Things through Energy Auditing. IEEE Internet Things J

  64. Li X et al (2020) A survey on the security of blockchain systems. Future Gener Comput Syst 107:841–853

    Article  Google Scholar 

  65. Li M et al (2020) LEChain: A blockchain-based lawful evidence management scheme for digital forensics. Future Gener Comput Syst 115:406–420

    Article  Google Scholar 

  66. Li S, Qin T, Min G (2019) Blockchain-Based Digital Forensics Investigation Framework in the Internet of Things and Social Systems. IEEE Trans Comput Soc Syst 6(6):1433–1441

    Article  MathSciNet  Google Scholar 

  67. Lin J et al (2020) Mcunet: Tiny deep learning on IoT devices. ar**v preprint ar**v:2007.10319

  68. Lonzetta AM et al (2018) Security vulnerabilities in Bluetooth technology as used in IoT. J Sens Actuator Netw 7(3):28

    Article  Google Scholar 

  69. Luque-Vega, Luis F et al (2020) Smart Cities Oriented Project Planning and Evaluation Methodology Driven by Citizen Perception—IoT Smart Mobility Case. Sustainability 12.17:7088

  70. Madhugundu DK, Ahmed F, Roy B (2018) A Survey on Security Issues and Challenges in IoT Based Smart Home. Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT)

  71. Malkar N et al (2019) Survey Paper on An IoT Based Smart Parking System

  72. Manne JM et al (2020) Smart Automation using IoT. Int J Res Appl Sci Eng Technol (IJRASET) 8(V)

  73. Meneghello F et al (2019) IoT: Internet of Threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J

  74. Mercan S et al (2020) A Cost-efficient IoT Forensics Framework with Blockchain. ar**v preprint ar**v:2004.14691

  75. Mercan S et al (2020) A Cost-efficient IoT Forensics Framework with Blockchain. ar**v preprint ar**v:2004.14691

  76. Mishra L, Varma S (2020) Internet of Things for Military Applications. (2020) 7th International Conference on Computing for Sustainable Global Development (INDIACom). IEEE

  77. Nadeem K, Saeed N, Ahmed N (2020) A Comparative Study of Digital Forensics and Cybercrime Investigation

  78. Nasralla MM, García-Magariño I (2020) and Jaime Lloret. “Defenses Against Perception-Layer Attacks on IoT Smart Furniture for Impaired People. IEEE Access 8:119795–119805

    Article  Google Scholar 

  79. Neshenko N et al (2019) Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Communications Surveys & Tutorials

  80. Nieto A, Rios R, Lopez J (2017) A methodology for privacy-aware iot-forensics. Proc 16th IEEE Int Conf Trust Secur Priv Comput Commun 11th IEEE Int Conf Big Data Sci Eng 14th IEEE Int Conf Embed Softw Syst 626–633

  81. Novak M (2020) Digital Evidence in Criminal Cases Before the US Courts of Appeal: Trends and Issues for Consideration. J Digit Forensics Secur Law 14(4):3

    Google Scholar 

  82. Olivares-Rojas JC et al (2018) A Comparative Assessment of Blockchains in Embedded Systems. 2018 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC). IEEE

  83. Pajila PB, Julie EG (2019) Detection of DDoS Attack Using SDN in IoT: A Survey. Intelligent Communication Technologies and Virtual Mobile Networks. Springer, Cham

    Google Scholar 

  84. Palmer G (2001) A road map for digital forensic research. First digital forensic research workshop, utica, new york

  85. Panwar N et al (2019) “Smart Home Survey on Security and Privacy.“ ar**v preprint ar**v:1904.05476

  86. Pawanraj SP, Jagadeesh BN (2020) Design of IoT Robot for Military Applications

  87. Pradhan M (2018) “A Survey of Smart City Assets for Future Military Usage.“ 2018 International Symposium on Networks, Computers and Communications (ISNCC). IEEE

  88. Praveen MM, Dhandapani S (2020) “IOT Based Military Robot Enhanced With Raspberry PI”. Solid State Technol 63(5):7195–7202

    Google Scholar 

  89. Qian LP et al (2019) “HybridIoT: Integration of hierarchical multiple access and computation offloading for IoT-based smart cities”. IEEE Network 33(2):6–13

    Article  Google Scholar 

  90. Radhika R, Kulothungan K (2019) Mitigation of Distributed Denial of Service Attacks on the Internet of Things. Appl Math 13(5):831–837

    MathSciNet  Google Scholar 

  91. Rana MM, Bo R (2020) “IoT-based cyber-physical communication architecture: Challenges and research directions”. IET Cyber Phys Syst Theory Appl 5(1):25–30

    Article  Google Scholar 

  92. Restuccia F et al (2019) Blockchain for the Internet of Things: Present and Future. ar**v preprint ar**v:1903.07448

  93. Reyna A et al (2018) “On blockchain and its integration with IoT. Challenges and opportunities”. Future Gener Comput Syst 88:173–190

    Article  Google Scholar 

  94. Ricci J, Baggili I, Breitinger F (2019) Blockchain-Based Distributed Cloud Storage Digital Forensics: Where’s the Beef? IEEE Secur Privacy 17(1):34–42

    Article  Google Scholar 

  95. Robberts C, Toft J (2019) Finding Vulnerabilities in IoT Devices: Ethical Hacking of Electronic Locks

  96. Sadique KM, Rahmani R, Johannesson P (2018) Towards Security on Internet of Things: Applications and Challenges in Technology. Proc Comput Sci 141:199–206

    Article  Google Scholar 

  97. Saleh F (2019) Blockchain without waste: Proof-of-stake. Available at SSRN 3183935

  98. Salim MM, Rathore S, Park JH (2019) Distributed denial of service attacks and its defenses in IoT: a survey. J Supercomput 1–44

  99. Servida F, Casey E (2019) IoT forensic challenges and opportunities for digital traces. Digit Investig 28:S22–S29

    Article  Google Scholar 

  100. Shaaban A, Konstantin S (2016) Practical Windows Forensics. Packt Publishing Ltd

  101. Sharma V et al (2019) Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey. ar**v preprint ar**v:1903.05362

  102. Shi Y et al (2019) Energy Audition based Cyber-Physical Attack Detection System in IoT.

  103. Singh P (2020) Blockchain based Security Solutions with IoT Application in Construction Industry. IOP Conference Series: Earth and Environmental Science 614(1). IOP Publishing

  104. Singh S, Kumar S, Rathore, Park JH (2020) Blockiotintelligence: A blockchain-enabled intelligent IoT architecture with artificial intelligence. Future Gener Comput Syst 110:721–743

    Article  Google Scholar 

  105. Sodhro A, Hassan et al (2019) Towards an optimal resource management for IoT based Green and sustainable smart cities. J Clean Prod 220:1167–1179

    Article  Google Scholar 

  106. Sokullu R, Akkaş MA (2020) “Unmanned Aerial Vehicle and IoT as Enabling Technologies for 5G: Frameworks, Applications and Challenges. In: " Internet of Things, Smart Computing and Technology: A Roadmap Ahead. Springer, Cham, pp 217–239

    Chapter  Google Scholar 

  107. Spathoulas G et al (2019) Collaborative Blockchain-Based Detection of Distributed Denial of Service Attacks Based on Internet of Things Botnets. Future Internet 11:226 11 )

    Article  Google Scholar 

  108. Stanislav M, Tod B (2015) Hacking iot: A case study on baby monitor exposures and vulnerabilities. Rapid 7

  109. Stoyanova M et al (2020) A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches and Open Issues. IEEE Commun Surv Tutor

  110. Suchitra C, Vandana CP (2016) Internet of Things and Security Issues. Int J Comput Sci Mob Comput 5(1):35–41

    Google Scholar 

  111. Syed NF et al (2020) Denial of service attack detection through machine learning for the IoT. J Inf Telecommuni 1–22

  112. Tama BA et al (2017) A critical review of blockchain and its current applications.“ 2017 International Conference on Electrical Engineering and Science C (ICECOS). IEEE

  113. Tewari A, Gupta BB (2020) Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Gener Comput Syst 108:909–920

    Article  Google Scholar 

  114. Thibault L et al (2018) Real-Time Air Pollution Exposure and Vehicle Emissions Estimation Using IoT, GNSS Measurements and Web-Based Simulation Models. 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall). IEEE

  115. Tseng L et al (2020) Blockchain-based database in an IoT environment: challenges, opportunities, and analysis. Cluster Comput 23(3):2151–2165

    Article  Google Scholar 

  116. Vaccari I, Aiello M, Cambiaso E (2020) Slowtt: A slow denial of service against iot networks. Information 11.9:452

  117. Valdeolmillos D et al (2019) “Blockchain Technology: A Review of the Current Challenges of Cryptocurrency.“ International Congress on Blockchain and Applications. Springer, Cham

    Google Scholar 

  118. Vangala A et al (2020) Smart secure sensing for IoT-based agriculture: Blockchain perspective. IEEE Sens J

  119. Vengatesan K et al (2018) Analysis of Mirai Botnet Malware Issues and Its Prediction Methods in Internet of Things.“ International conference on Computer Networks, Big data and IoT. Springer, Cham

  120. von Solms B, von Solms R (2018) Cybersecurity and information security–what goes where? Inf Comput Secur 26(1):2–9

    Article  Google Scholar 

  121. Wang C et al (2019) A dependable time series analytic framework for cyber-physical systems of iot-based smart grid. ACM Trans Cyber Phys Syst 3(1):7

    Article  Google Scholar 

  122. Wang F et al (2020) A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure. Wirel Commun Mob Comput2020

  123. Wang Q et al (2020) Blockchain for the IoT and industrial IoT: A review. Internet Things 10:100081

    Article  Google Scholar 

  124. Wang Q et al (2020) A Comparative Study of Blockchain Consensus Algorithms. J Phys Conf Ser 1437(1). IOP Publishing

  125. Wang C et al (2020) Industrial Cyber-Physical Systems-based Cloud IoT Edge for Federated Heterogeneous Distillation. IEEE Trans Ind Inform

  126. Weber RH (2010) Internet of Things – New security and privacy challenges. Comput Law Secur Rev 26(1):23–30

    Article  Google Scholar 

  127. Wheelus C, Zhu X (2020) IoT Network Security: Threats, Risks, and a Data-Driven Defense Framework. IoT 1.2:259–285

  128. Wood G (2016) Polkadot: Vision for a heterogeneous multi-chain framework. White Pap

  129. Worley C et al (2020) Scrybe: A Second-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications. In: Blockchain Cybersecurity, Trust and Privacy. Springer, Cham, pp 51–67

    Chapter  Google Scholar 

  130. **ao Y et al (2019) A Survey of Distributed Consensus Protocols for Blockchain Networks. ar**v preprint ar**v:1904.04098

  131. **ong Y, Du J (2019) Electronic evidence preservation model based on blockchain. Proceedings of the 3rd International Conference on Cryptography, Security and Privacy

  132. Xu S et al (2019) A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance. Future Gener Comput Syst 97:284–294

    Article  Google Scholar 

  133. Yang L et al (2018) Hide your hackable smart home from remote attacks: The multipath onion IoT Gateways.“ European Symposium on Research in Computer Security. Springer, Cham

  134. Yang F et al (2019) “Delegated Proof of Stake With Downgrade: A Secure and Efficient Blockchain Consensus Algorithm With Downgrade Mechanism”. IEEE Access 7:118541–118555

    Article  Google Scholar 

  135. Yaqoob I, Hashem IAT, Ahmed A, Kazmi SMA, Hong CS (2019) Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges. Futur Gener Comput Syst 92:265–275

  136. Yao Y et al (2019) Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution. European Symposium on Research in Computer Security. Springer, Cham

  137. Yu Q, Zhang Z, Dofe J (2020) Proactive Defense Against Security Threats on IoT Hardware. Model Des Secur Internet Things 407–433

  138. Zaidan AA, Zaidan BB (2020) A review on intelligent process for smart home applications based on IoT: coherent taxonomy, motivation, open challenges, and recommendations. Artif Intell Rev 53(1):141–165

    Article  Google Scholar 

  139. Zaidan AA et al (2018) “A survey on communication components for IoT-based technologies in smart homes”. Telecommun Syst 69(1):1–25

    Article  Google Scholar 

  140. Zaidi N et al (2018) A Study of Exposure of IoT Devices in India: Using Shodan Search Engine. Information Systems Design and Intelligent Applications. Springer, Singapore, pp 1044–1053

    Google Scholar 

  141. Zgheib R et al (2020) “A scalable semantic framework for IoT healthcare applications.“ J Ambient Intell Hum Comput 1–19

  142. Zhang S, Lee JH (2019) Double-spending with a Sybil Attack in the Bitcoin Decentralized Network.“ IEEE Trans Ind Inform

  143. Zhang S, Lee JH (2020) Analysis of the main consensus protocols of blockchain. ICT Express 6(2):93–97

    Article  Google Scholar 

  144. Zheng S et al (2018) User perceptions of smart home IoT privacy. Proceedings of the ACM on Human-Computer Interaction 2.CSCW 200

  145. Zhou Z et al (2019) Potential risk of IoT device supporting IR remote control. Comput Netw 148:307–317

    Article  Google Scholar 

  146. Zieliski Z, Chudzikiewicz J, Furtak J (2019) An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT. Security and Fault Tolerance in Internet of Things. Springer, Cham, pp 111–128

    Google Scholar 

  147. Zyskind G, Nathan O, Pentland A (2015) Enigma: Decentralized computation platform with guaranteed privacy. ar**v preprint ar**v:1506.03471

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Randa Kamal.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kamal, R., Hemdan, E.ED. & El-Fishway, N. A review study on blockchain-based IoT security and forensics. Multimed Tools Appl 80, 36183–36214 (2021). https://doi.org/10.1007/s11042-021-11350-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11350-9

Keywords

Navigation