Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Block-Chain Compliance for IoT Security: A Survey

G.Chandra Sekhar, P. Balamurugan, , ,
1 :Research Scholar, Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology, Chennai, Tamilnadu, India; 2: Professor , Department of Computer Science and Engineering at Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology, Chennai, Tamilnadu, India.

Internet of Things would soon become pervasive and ubiquitous due to its uses and easy to manage across various applications. Moreover, IoT has reached the extent of communicating the data from very close proximity to a distant place more than 10Kilometers. The extensive usage of the IoT devices makes the service provider overwhelming in terms of the revenue. It poses challenges to scale the technology to respond to the requests from numerous devices and instances for the actions and decisions to be taken. In addition to the IoT communication, security is a vital activity for every communication across IoT devices. In this paper, an exhaustive study has been conducted on the significance of IoT communication and the challenges involved and the span of security across various layers of the IoT. Furthermore, the survey on Blockchain and the possible integration for IoT communication has been discussed. Finally, the study expresses different integration challenges existing in the present times, which further helps to explore the blockchain adaptability for IoT security.

G.Chandra Sekhar, P. Balamurugan." Block-Chain Compliance for IoT Security: A Survey". International Journal of Computer Engineering In Research Trends (IJCERT) , ISSN:2349-7084, Vol.7, Issue 09, pp. 22-33, September - 2020, URL:,

Keywords : Internet of Things, Blockchain, security, interoperability, scalability, Network Standards, IoT Communications.

[1] 	Zhu, Yongxu, Gan Zheng, and Kai-Kit Wong. "Blockchain-Empowered Decentralized Storage in Air-to-Ground Industrial Networks." IEEE Transactions on Industrial Informatics15, no. 6 (2019): 3593-601. doi:10.1109/tii.2019.2903559. 
[2] 	Kogure, K. Kamakura, T. Shima, and T. Kubo, "Blockchain Technology for Next Generation ICT," Fujitsu Sci. Tech. J., vol. 53, no. 5, pp. 56–61, 2017. 
[3] 	Tosh, Deepak K., Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Kevin A. Kwiat, and Laurent Njilla. "Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack." 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), 2017. 
[4] 	Ding, Sheng, Jin Cao, Chen Li, Kai Fan, and Hui Li. "A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT." IEEE Access7 (2019): 38431-8441. doi:10.1109/access.2019.2905846. 
[5] 	Xu, Xiwei, Ingo Weber, Mark Staples, Liming Zhu, Jan Bosch, Len Bass, Cesare Pautasso, and Paul Rimba. "A Taxonomy of Blockchain-Based Systems for Architecture Design." 2017 IEEE International Conference on Software Architecture (ICSA), 2017. 
[6] 	Al-Sarawi, Shadi, Mohammed Anbar, Kamal Alieyan, and Mahmood Alzubaidi. "Internet of Things (IoT) Communication Protocols: Review." 2017 8th International Conference on Information Technology (ICIT), 2017. 
[7] 	Gigli, Matthew, and Simon Koo. "Internet of Things: Services and Applications Categorization." Advances in Internet of Things 01, no. 02 (2011): 27–31. 
[8] 	Datta, Soumya Kanti, Christian Bonnet, Rui Pedro Ferreira Da Costa, and Jerome Harri. "DataTweet: An Architecture Enabling Data-Centric IoT Services." 2016 IEEE Region 10 Symposium (TENSYMP), 2016. 
[9] 	Zhu, Konglin, Zhicheng Chen, Wenke Yan, and Lin Zhang. "Security Attacks in Named Data Networking of Things and a Blockchain Solution." IEEE Internet of Things Journal6, no. 3 (2019): 4733-741. doi:10.1109/jiot.2018.2877647. 
[10] 	Ferrari, P., E. Sisinni, D. Brandao, and M. Rocha. "Evaluation of Communication Latency in Industrial IoT Applications." 2017 IEEE International Workshop on Measurement and Networking (M&N), 2017. 
[11] 	Khaled, Ahmed E., and Sumi Helal. "Interoperable Communication Framework for Bridging RESTful and Topic-Based Communication in IoT." Future Generation Computer Systems 92 (2019): 628–43. 
[12] 	Kovacs, Erno, Martin Bauer, Jaeho Kim, Jaeseok Yun, Franck Le Gall, and Mengxuan Zhao. "Standards-Based Worldwide Semantic Interoperability for IoT." IEEE Communications Magazine 54, no. 12 (2016): 40–46. 
[13] 	Qu, Chao, Ming Tao, Jie Zhang, Xiaoyu Hong, and Ruifen Yuan. "Blockchain Based Credibility Verification Method for IoT Entities." Security and Communication Networks2018 (2018): 1-11. doi:10.1155/2018/7817614. 
[14] 	Novo, Oscar. "Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT." IEEE Internet of Things Journal 5, no. 2 (2018): 1184–95. 
[15] 	Vresk, Tomislav, and Igor Cavrak. "Architecture of an Interoperable IoT Platform Based on Microservices." 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2016. 
[16] 	Negka, Lydia, Georgios Gketsios, Nikolaos A. Anagnostopoulos, Georgios Spathoulas, Athanasios Kakarountas, and Stefan Katzenbeisser. "Employing Blockchain and Physical Unclonable Functions for Counterfeit IoT Devices Detection." Proceedings of the International Conference on Omni-Layer Intelligent Systems - COINS 19, 2019. doi:10.1145/3312614.3312650. 
[17] 	Chung, Kyungyong, and Roy C. Park. "P2P Cloud Network Services for IoT Based Disaster Situations Information." Peer-to-Peer Networking and Applications 9, no. 3 (2015): 566–77.
[18] 	Stergiou, Christos, Kostas E. Psannis, Byung-Gyu Kim, and Brij Gupta. "Secure Integration of IoT and Cloud Computing." Future Generation Computer Systems 78 (2018): 964–75. 
[19] 	Abdur, Mirza, Sajid Habib, Muhammad Ali, and Saleem Ullah. "Security Issues in the Internet of Things (IoT): A Comprehensive Study." International Journal of Advanced Computer Science and Applications 8, no. 6 (2017). 
[20] 	Tweneboah-Koduah, Samuel, Knud Erik Skouby, and Reza Tadayoni. "Cyber Security Threats to IoT Applications and Service Domains." Wireless Personal Communications 95, no. 1 (2017): 169–85. 
[21] 	Alam, Tanweer. "Blockchain and Its Role in the Internet of Things (IoT)," 2019. 
[22] 	Viriyasitavat, Wattana, and Danupol Hoonsopon. "Blockchain Characteristics and Consensus in Modern Business Processes." Journal of Industrial Information Integration 13 (2019): 32–39. 
[23] 	Kaivan Karimi, Gary Atkinson, "What the Internet of Things (IoT) Needs to Become a Reality", White paper of free scale and Arm. 2014. p. 1–16. 
[24] 	Zhang, Yu, and Jiangtao Wen. "The IoT Electric Business Model: Using Blockchain Technology for the Internet of Things." Peer-to-Peer Networking and Applications 10, no. 4 (2016): 983–94. 
[25] 	Kum, Seung Woo, Jaewon Moon, Taeboem Lim, and Jong Il Park. "A Novel Design of IoT Cloud Delegate Framework to Harmonize Cloud-Scale IoT Services." 2015 IEEE International Conference on Consumer Electronics (ICCE), 2015. 
[26] 	Angin, Pelin, Melih Burak Mert, Okan Mete, Azer Ramazanli, Kaan Sarica, and Bora Gungoren. "A Blockchain-Based Decentralized Security Architecture for IoT." Lecture Notes in Computer Science Internet of Things – ICIOT 2018, 2018, 3-18. doi:10.1007/978-3-319-94370-1_1. 
[27] 	T. Salman, and R. Jain, "A Survey of Protocols and Standards for Internet of Things," Advanced Computing and Communications, Vol. 1, No. 1, March 2017. 
[28] 	Lee, Jay, Moslem Azamfar, and Jaskaran Singh. "A Blockchain Enabled Cyber-Physical System Architecture for Industry 4.0 Manufacturing Systems." Manufacturing Letters20 (2019): 34-39. doi:10.1016/j.mfglet.2019.05.003. 
[29] 	Ali, Jawad, Toqeer Ali, Yazed Alsaawy, Ahmad Shahrafidz Khalid, and Shahrulniza Musa. "Blockchain-based Smart-IoT Trust Zone Measurement Architecture." Proceedings of the International Conference on Omni-Layer Intelligent Systems - COINS 19, 2019. doi:10.1145/3312614.3312646. 
[30] 	Ganchev, I., Zhanlin Ji, and M. Odroma. "A Generic IoT Architecture for Smart Cities." 25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communities Technologies (ISSC 2014/CIICT 2014), 2014. 
[31] 	T. hoon Kim, C. Ramos, S. Mohammed, Smart city and iot, Future Generation Computer Systems 76 (2017) 159 – 162. 
[32] 	Skouby, K E, and P Lynggaard. "Smart Home and Smart City Solutions Enabled by 5G, IoT, AAI and CoT Services." 2014 International Conference on Contemporary Computing and Informatics (IC3I), 2014. 
[33] 	Lauridsen, Mads, Huan Nguyen, Benny Vejlgaard, Istvan Z. Kovacs, Preben Mogensen, and Mads Sorensen. "Coverage Comparison of GPRS, NB-IoT, LoRa, and SigFox in a 7800 km² Area." 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017. 
[34] 	Chen, Hao, Xueqin Jia, and Heng Li. "A Brief Introduction to IoT Gateway." IET International Conference on Communication Technology and Application (ICCTA 2011), 2011. 
[35] 	Rasid, M F A, W M W Musa, N A A Kadir, A M Noor, F Touati, W Mehmood, L Khriji, A Al-Busaidi, and A Ben Mnaouer. "Embedded Gateway Services for Internet of Things Applications in Ubiquitous Healthcare." 2014 2nd International Conference on Information and Communication Technology (ICoICT), 2014. 
[36] 	Chze, Paul Loh Ruen, and Kan Siew Leong. "A Secure Multi-Hop Routing for IoT Communication." 2014 IEEE World Forum on Internet of Things (WF-IoT), 2014. 
[37] 	Reyna, Ana, Cristian Martín, Jaime Chen, Enrique Soler, and Manuel Díaz. "On Blockchain and Its Integration with IoT. Challenges and Opportunities." Future Generation Computer Systems88 (2018): 173-90. doi:10.1016/j.future.2018.05.046. 
[38] 	Pustišek, Matevž, Dejan Dolenc, and Andrej Kos. "LDAF: Low-Bandwidth Distributed Applications Framework in a Use Case of Blockchain-Enabled IoT Devices." Sensors19, no. 10 (2019): 2337. doi:10.3390/s19102337. 
[39] 	Makhdoom, Imran, Mehran Abolhasan, and Wei Ni. "Blockchain for IoT: The Challenges and a Way Forward." Proceedings of the 15th International Joint Conference on E-Business and Telecommunications, 2018. doi:10.5220/0006905604280439. 
[40] 	Desai, Pratikkumar, Amit Sheth, and Pramod Anantharam. "Semantic Gateway as a Service Architecture for IoT Interoperability." 2015 IEEE International Conference on Mobile Services, 2015. 
[41] 	Duncan, Bob, Andreas Happe, and Alfred Bratterud. "Enterprise IoT Security and Scalability." Proceedings of the 9th International Conference on Utility and Cloud Computing - UCC 16, 2016. 
[42] 	Ahram, Tareq, Arman Sargolzaei, Saman Sargolzaei, Jeff Daniels, and Ben Amaba. "Blockchain Technology Innovations." 2017 IEEE Technology & Engineering Management Conference (TEMSCON), 2017. 
[43] 	Christidis, Konstantinos, and Michael Devetsikiotis. "Blockchains and Smart Contracts for the Internet of Things." IEEE Access 4 (2016): 2292–2303. 
[44] 	Puthal, Deepak, Nisha Malik, Saraju P. Mohanty, Elias Kougianos, and Chi Yang. "The Blockchain as a Decentralized Security Framework [Future Directions]." IEEE Consumer Electronics Magazine 7, no. 2 (2018): 18–21. 
[45] 	Biswas, Sujit, Kashif Sharif, Fan Li, Boubakr Nour, and Yu Wang. "A Scalable Blockchain Framework for Secure Transactions in IoT." IEEE Internet of Things Journal6, no. 3 (2019): 4650-659. doi:10.1109/jiot.2018.2874095. 
[46] 	Koš?ál, Kristián, Pavol Helebrandt, Matej Belluš, Michal Ries, and Ivan Kotuliak. "Management and Monitoring of IoT Devices Using Blockchain." Sensors19, no. 4 (2019): 856. doi:10.3390/s19040856. 
[47] 	Risius, Marten, and Kai Spohrer. "A Blockchain Research Framework." Business & Information Systems Engineering 59, no. 6 (2017): 385–409. 
[48] 	Gervais, Arthur, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. "On the Security and Performance of Proof of Work Blockchains." Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS16, 2016. 
[49] 	Maroufi, M., Abdolee, R., & Tazekand, B. (2019). "On the Convergence of Blockchain and Internet of Things (IoT) Technologies". Journal of Strategic Innovation and Sustainability, 14(1).

DOI Link :

Download :

Refbacks : Currently there are no Refbacks


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events

Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.

Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.

IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert

IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)

Emerging Sources Citation Index (in process)

IJCERT title is under evaluation by Scopus.

Key Dates

☞   LAST DATE OF SUBMISSION : 31st March 2023
In 7 Days

Important Announcements

All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index

Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)

Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links

Conference Proposal