Mitigating Security and Privacy issues in IoT Application using Blockchain: A Review

  • P. Shorubiga
  • R. Shyam
Keywords: Blockchain, Internet of Things (IoT), privacy, security, Literature review, cyber security


We live in a world where everything is connected via the Internet of Things (IoT). Despite this, IoT privacy remains a serious challenge, particularly due to IoT networks' vast scale and dispersed nature. Using protected solutions, such as incorporating blockchain technology into privacy-based services, is one approach to privacy-related concerns. Various Internet of Things security and authentication issues have been resolved by the decentralized nature of blockchain technology. This paper examines how blockchain technology mitigates the security and privacy concerns of IoT networks. In addition, we investigate the structure and uses of blockchain technology for recommender system privacy and trust management solutions. The limitations of adopting the blockchain technology also discussed. From the analysis of literature works, the blockchain technology could be able to circumvent IoT limitations such as data security and privacy. In addition, it may offer IoT customers distributed storage, transparency, trust, safe distributed IoT networks, and privacy and security assurance.


[1] J. Sengupta, S. Ruj, and S. Das Bit, “A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT,” J. Netw. Comput. Appl., vol. 149, p. 102481, 2020, doi: 10.1016/j.jnca.2019.102481.
[2] M. Sadrishojaei, N. J. Navimipour, M. Reshadi, and M. Hosseinzadeh, “A New Preventive Routing Method Based on Clustering and Location Prediction in the Mobile Internet of Things,” IEEE Internet Things J., vol. 8, no. 13, pp. 10652–10664, 2021, doi: 10.1109/JIOT.2021.3049631.
[3] D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012, doi: 10.1016/j.adhoc.2012.02.016.
[4] Z. Ghanbari, N. Jafari Navimipour, M. Hosseinzadeh, and A. Darwesh, “Resource allocation mechanisms and approaches on the Internet of Things,” Cluster Comput., vol. 22, no. 4, pp. 1253–1282, 2019, doi: 10.1007/s10586-019-02910-8.
[5] C. Ge, Z. Liu, and L. Fang, “A blockchain based decentralized data security mechanism for the Internet of Things,” J. Parallel Distrib. Comput., vol. 141, pp. 1–9, 2020, doi: 10.1016/j.jpdc.2020.03.005.
[6] C. Perera, C. H. Liu, and S. Jayawardena, “The Emerging Internet of Things Marketplace from an Industrial Perspective: A Survey,” IEEE Trans. Emerg. Top. Comput., vol. 3, no. 4, pp. 585–598, 2015, doi: 10.1109/TETC.2015.2390034.
[7] D. Bandyopadhyay and J. Sen, “Internet of things: Applications and challenges in technology and standardization,” Wirel. Pers. Commun., vol. 58, no. 1, pp. 49–69, 2011, doi: 10.1007/s11277-011-0288-5.
[8] M. U. Farooq and M. Waseem, “A Critical Analysis on the Security Concerns of Internet of Things ( IoT ),” vol. 111, no. 7, pp. 1–6, 2020.
[9] B. Khoo, “RFID as an Enabler of the Internet of Things : Issues of Security and Privacy,” 2011, doi: 10.1109/iThings/CPSCom.2011.83.
[10] F. A. Alaba, M. Othman, A. T. Hashem, and F. Alotaibi, “Author ’ s Accepted Manuscript Internet of things Security : A Survey Reference :,” 2017, doi: 10.1016/j.jnca.2017.04.002.
[11] H. Lu, “Proactive eavesdropping in UAV-aided mobile relay systems,” 2020.
[12] H. I. Ahmed, A. A. Nasr, S. Abdel-mageid, and H. K. Aslan, “A survey of IoT security threats and defenses A survey of IoT security threats and defenses,” no. October, 2019, doi: 10.19101/IJACR.2019.940116.
[13] A. Kamble and S. Bhutad, “SURVEY ON INTERNET OF THINGS ( IOT ),” 2018 2nd Int. Conf. Inven. Syst. Control, no. Icisc, pp. 307–312, 2018.
[14] C. Pereira and A. Aguiar, “A Realistic RF Jamming Model for Vehicular Networks : Design and Validation,” pp. 1868–1872, 2013.
[15] N. Of, “A s s i w s n,” pp. 2–23, 2006.
[16] V. Rq et al., “$ vxuyh\ rq &rgh ,qmhfwlrq $wwdfnv lq 0reloh &orxg &rpsxwlqj (qylurqphqw,” pp. 135–140, 2018.
How to Cite
Shorubiga, P., & Shyam, R. (2022). Mitigating Security and Privacy issues in IoT Application using Blockchain: A Review. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 8(2), 78-86.

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.