978 0 7503 3663 5.preview
978 0 7503 3663 5.preview
978 0 7503 3663 5.preview
Internet of Things
Series editors
Prateek Agrawal
University of Klagenfurt, Austria and Lovely Professional University, India
Anand Sharma
Mody University of Science and Technology, India
Vishu Madaan
Lovely Professional University, India
Seifedine Kadry
Faculty of Applied Computing and Technology (FACT), Noroff University College,
Kristiansand, Norway
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system
or transmitted in any form or by any means, electronic, mechanical, photocopying, recording
or otherwise, without the prior permission of the publisher, or as expressly permitted by law or
under terms agreed with the appropriate rights organization. Multiple copying is permitted in
accordance with the terms of licences issued by the Copyright Licensing Agency, the Copyright
Clearance Centre and other reproduction rights organizations.
Permission to make use of IOP Publishing content other than as set out above may be sought
at [email protected].
Lakshmana Kumar Ramasamy and Seifedine Kadry have asserted their right to be identified as
the authors of this work in accordance with sections 77 and 78 of the Copyright, Designs and
Patents Act 1988.
DOI 10.1088/978-0-7503-3663-5
Version: 20210501
IOP ebooks
British Library Cataloguing-in-Publication Data: A catalogue record for this book is available
from the British Library.
US Office: IOP Publishing, Inc., 190 North Independence Mall West, Suite 601, Philadelphia,
PA 19106, USA
Contents
Preface x
Acknowledgements xi
Author biographies xii
v
Blockchain in the Industrial Internet of Things
vi
Blockchain in the Industrial Internet of Things
vii
Blockchain in the Industrial Internet of Things
viii
Blockchain in the Industrial Internet of Things
ix
Preface
x
Acknowledgements
xi
Author biographies
Seifedine Kadry
Dr Seifedine Kadry has a Bachelor degree in 1999 from Lebanese
University, MS degree in 2002 from Reims University (France)
and EPFL (Lausanne), PhD in 2007 from Blaise Pascal University
(France), HDR degree (Habilitation) in 2017 from Rouen
University. At present, his research focuses on data science,
education using technology, system prognostics, stochastic
systems, and applied mathematics. He is an ABET program
evaluator for computing, and ABET program evaluator for Engineering Tech.
He is an IET Fellow. Currently, he is a full professor of data science at Noroff
University College, Norway.
xii
IOP Publishing
Chapter 1
Internet of things (IoT)
The Internet of Things (IoT) refers to the evolutionary stage of the internet, which
makes a global communicating infrastructure between humans and machines. IoT is
constructing the global infrastructure which will change the fundamental aspects of our
lives, from health services to manufacturing, from agriculture to mining. IoT will offer
the necessary facilities of the latest rising artificial intelligence (AI) development. This
chapter discusses the overview, characteristics, advantages, disadvantages, common
uses, security, trust, privacy and functional view of IoT. Furthermore, this chapter
proposes application areas of IoT in detail.
abilities. Furthermore, the propagation of IoT provides a lot of benefits but also
provides potential threats. An overlooked factor so far is the rise in energy
expenditure. IoT nodes are anticipated to always be accessible on other nodes.
IoT offers a lot of benefits, including:
• Locating and tracing abilities: Customers should be capable of tracking the
nodes and locating them in a short amount of time.
• Ubiquitous information swap: In IoT where nodes are linked to the internet
and where information is transmitted. Ubiquitous means intelligence.
Therefore, intelligence sensors collect information and transmit it using a
prearranged input.
• Enhanced power solution: Customers should be capable of tracking even the
strongest node, and the customer should be capable of obtaining the best
result.
• Data and intelligence management: IoT does not always require providing
commands to the instrument; where the node gives intelligence and informa-
tion previously it can start working and obtains decisions and discovers
solutions based on intelligence.
• Scalability: IoT should be the measurability, as with any number of IoT
nodes above an extensive network all nodes should distinguish uniquely.
Also, numerous significant IoT problems can be identified. These open problems
make it clear that the complexity of internet design currently needs significant
capabilities to alter.
• Unprotected authorization/authentication: The administrator usually presents
authentication to verify the customer identity, and the authorization utilizes
rewriting or modifying the content for that appliance and the consent that the
administrator will give.
• The technology of server: The number of IoT nodes over the IoT field
increases the demand and the number of IoT node replies, moreover increases
simultaneously depending entirely on the server where customers use the
1-2
Blockchain in the Industrial Internet of Things
interface. The server response to the IoT node demand should be made
immediately. There must be no delay in responding to the customer.
• Management of storage: A massive quantity of information is created. When
connected IoT nodes have a massive quantity of multimedia data transmitted,
they have big data and other types of inconsistent files where data is held
concerning these IoT nodes, these files do not take much space. Still, many of
them should be useable as soon as possible.
• Data management: As transmission between nodes is completed, more
information is created daily between nodes, and there is more information
to be transmitted from one location to another. Consideration should be
given to whether specific information is transmitted or not.
• Security: Provision of security can be challenging as the automation of nodes
has increased, which has generated novel security problems.
1-3
Blockchain in the Industrial Internet of Things
security. This encompasses the security of customer information and the security
of customer welfare: protecting networks, endpoints, and is a universal message
that represents generating a measurable safety model.
• Dynamic changes: Device status changes drastically, for instance, sleep
and wakefulness, connection and disconnection and content of IoT nodes
contain speed and position. Besides, the number of IoT nodes can modify
energetically.
• Heterogeneity: Various IoT nodes depending on various networks and
hardware platforms. They should connect to other nodes via various
networks.
• Connectivity: This permits IoT to have ease of access and compatibility. Ease
of access is obtainable on the network though compatibility, presenting the
same capabilities for using and producing content.
• Services related to things: IoT can present a lot of services related to things
within things restrictions. To present services related to things within things
limitations, both techniques in the global and data world will alter.
• Interconnectivity: In terms of IoT, anything could be linked to universal data
and contact the IoT basic organizational and physical structures.
1-4
Blockchain in the Industrial Internet of Things
engagement remains are inactive. IoT changes this, attaining a rich and
productive engagement, including the spectator.
• Advanced information compilation: Today’s information compilation under-
goes restrictions in plans for practical usage. IoT smashes it down into those
gaps and then puts it right where people desire for investigating our planet.
• Decreased waste: IoT generates development fields more clearly. Recent
statistics provide us with insignificant intelligence, rather IoT presents
actuality data that leads to efficient resource management.
1-5
Blockchain in the Industrial Internet of Things
There are lots of use cases that assist users in recognizing the needs of the IoT
scheme.
Notification system: Messages from IoT devices can be collected and examined.
Notices made when certain conditions are met.
Sensor network: The scheme can work definitely as an information collection
scheme for the sensor sets.
Reactive system: Study of IoT device sensed information could incite actuators to
be accelerated. Users retain a word reactive for schemes that do not execute standard
regulatory rules.
Analysis system: Messages from IoT devices are collected and examined, other
than in that event, the research is continuing. Research outcomes can be created
occasionally.
Event latency: Delays from capturing an event to its receiver cannot be significant
for volume-based apps but are significant for online research.
Control scheme: IoT device sensed information is nourishing to regulate the
instructions that produce the effects for the actuator. Users may discover the
category of non-functional necessities that execute to most IoT schemes. Non-
functional necessities in the scheme force non-functional needs on the elements.
Buffer volume and event loss rate: If there are no strict limits on event manufacturing
standards, the surroundings can generate multiple events over some time over the
scheme. The event loss rate holds the preferred abilities, while buffer volume is a
practical need that may directly link to the strength of the elements.
1-6
Blockchain in the Industrial Internet of Things
1.3 IoT—security
Security is ultimately seen as a significant necessity for each kind of computer
scheme, containing IoT schemes. However, most IoT schemes are significantly safer
than standard Windows/Linux/Mac schemes. IoT safety issues arise from a variety
of reasons: insufficient hardware safety elements, inadequately created software with
broad limitations of susceptibilities, and different safety creation faults.
Unprotected IoT devices generate safety issues for the whole IoT scheme. Since
devices generally contain a lifespan of numerous years, an enormous established
foundation of vulnerable IoT nodes would cause safety issues in the future. Unprotected
IoT schemes create safety issues across the internet. IoT nodes abound; unprotected
IoT devices are perfectly suitable for a lot of attacks (especially denial-of-service (DoS)).
Consumer details are secure from direct theft; however, the IoT needs to be built,
thereby low confidentiality information could not be merely utilized for conjecture
about high confidentiality information.
Example: A German article states that attackers have hacked the safety scheme.
They disturbed the management scheme, which prevented the furnace from closing
correctly, resulting in serious harm. Therefore, users may know the consequence of
the assault earlier, determining a suitable defence.
Challenges: Aside from pricing and availability of IoT nodes everywhere, different
safety problems cause continual trouble to the IoT shown in figure 1.5:
• Device similarity: IoT nodes are well homogeneous. These nodes use a similar
communication technique and elements. If one scheme or node is vulnerable
from susceptibility, numerous others contain a similar problem.
• Unexpected activities: The vast amount of IoT nodes used and their vast list of
empowering techniques denotes that these nodes activities in the area may be
unexpected. A particular scheme might be well-designed within management
systems; however, there are no assurances of how it will communicate with
other nodes.
• Device longevity: One of the advantages of IoT nodes is long life, but that
long life denotes that they can live longer with their node assistance. One can
measure the similarity or dissimilarity between this and conventional schemes
that have to assist and modernize after a long time, with numerous terminating
1-7
Blockchain in the Industrial Internet of Things
their utilization. Abandonware and Orphan nodes do not have a similar safety
toughness for different schemes because of the emergence of techniques over
time.
• Complex deployment: One of the primary objectives of IoT is to put superior
networks and research where they could not go before. Unexpectedly, this
makes a difficulty for physical protection of nodes in these areas that are
extreme or only accessible with difficulty.
• Lack of transparency: Numerous IoT nodes fail to present clarity in terms of
their performance. Consumers are unable to see or use their procedures and
can only assume the nodes work correctly. They cannot regulate unnecessary
activities or information gathering; moreover, when the producer updates the
node, it might carry unnecessary activities.
• No warnings: One more purpose of IoT is to offer the best performance in the
absence of interruption. This initiates consumer consciousness issues.
Consumers are not aware of the nodes or recognize when an unfamiliar thing
becomes invalid. Safety violations may continue for a long time in the absence
of discovery.
1-8
Blockchain in the Industrial Internet of Things
utilized by types of equipment without DoS attack [2]. The building of hope
structures that tackle this necessity will need improvements in fields, for example:
• Lightweight public key infrastructures (PKIs) as a basis for confidence
management. Improvements are predicted in hierarchy and cross-certification
ideas to allow decisions to deal with the scalable necessities.
• Lightweight key management schemes to allow confidence relations to be set
up and to share encryption tools using minimal contact and procedure tools,
as well as limited resource nature of numerous IoT nodes.
• Data quality is a necessity for numerous IoT-designed schemes where a set of
data that describes data about other information can be utilized to offer IoT
information reliable estimation.
• Decentralized and self-configuring schemes are substituted by PKI to set up
reliability, for instance, a federated identity, Peer-to-peer (P2P) network.
• Reliability negotiation is a process that permits two parties to discuss routinely,
basically a sequence of reliability tenets, the low condition of reliability needed
to allow an act of assistance or a data strip.
• Guaranteed techniques for reliable sites contain protocols, software, hard-
ware, etc.
• Access control to avoid information violations. One instance is usage regu-
lation, which is the procedure of guaranteeing the proper use of specific data
according to a pre-defined principle, after which the access to data is allowed [3].
1-9
Blockchain in the Industrial Internet of Things
1-10
Blockchain in the Industrial Internet of Things
1-11
Blockchain in the Industrial Internet of Things
1-12
Blockchain in the Industrial Internet of Things
Smart home products: Transparent LCD display refrigerator that shows what is
inside, expired food details, ingredients for a well-stocked kitchen and all the data
obtainable through the app on the smartphone [11]. Washing machines permit one
to control the laundry from far away and work routinely when electricity prices are
very low. Smart cooking apps monitor the automatic cleaning function of the oven
and permitting adjustable temperature control from a distance.
Meteorological station: Shows conditions of the outside weather, for example,
humidity, heat, atmospheric pressure, air velocity and rainfall using meters capable
of transmitting information over long distances.
Regular checking of safety procedures and standards: Baby alarm, an optical tool
used to record images, and house alarm schemes that are making human beings
feeling safer in their everyday lives at home.
Gas detector: Real-time data concerning gas consumption and the state of gas
piping can present by linking local gas meters to the internet protocol (IP) network.
Concerning monitoring and assessing water quality, the result could be a diminution
in labour and repair prices, enhanced precision and meter readings price reduction,
and perhaps gas usage diminution.
1-13
Blockchain in the Industrial Internet of Things
Sleep control: IoT devices situated across the bed sense usual movements, such as
breathing and heartbeat and huge movements caused by tossing and turning at night
when asleep, presenting information obtainable via the smartphone app.
1-14
Blockchain in the Industrial Internet of Things
1.6 Summary
This chapter describes an overview, characteristics, advantages, disadvantages,
common uses, security, trust, privacy and functional view of IoT. Furthermore,
we propose application areas of IoT in detail. IoT can promote a functional variety
of industrial appliances like logistics, manufacturing, food business and services.
Novel standards, novel trade, competition, and the need to transport nonstop goods
are challenges new businesses face nowadays. As a result, a lot of companies rely on
Industrial Internet of Things (IIoT), which refers to any performance executed by
businesses to model, supervise and enhance their business processes during insights
gathered from thousands of linked machines to assist them in enhancing economical
profit. Therefore, the next chapter discusses IIoT in detail.
References
[1] Nia A M and Jha N K 2017 A comprehensive study of the security of Internet-of-Things
IEEE Trans. Emerging Top. Comput. 5 586–602
[2] Daud M, Rasiah R and George M 2018 Denial of service: (DoS) impact on sensors 4th Int.
Conf. on Info. Management (ICIM)
[3] Yang Y, Liu X and Deng R H 2018 Lightweight break-glass access control system for
healthcare Internet-of-Things IEEE Trans. on Industrial Informatics 14 3610–7
[4] Yang Y, Wu L, Yin G, Li L and Zhao H 2017 A survey on security and privacy issues in
internet-of-things IEEE Internet Things J. 4 1250–8
[5] Jamal H, Huzaifa M and Sodunke M A 2019 Smart heat stress and toxic gases monitoring
instrument with a developed graphical user interface using IoT Int. Conf. on Electrical,
Commun., and Computer Engineering (ICECCE)
[6] Kodali R K and Rajanarayanan S C 2019 IoT based indoor air quality monitoring system
Int. Conf. on Wireless Commun. Signal Processing and Networking (WiSPNET)
[7] Barman B K, Yadav S N and Kumar S 2018 IOT based smart energy meter for efficient
energy utilization in smart grid 2nd Int. Conf. on Power, Energy and Environment: Towards
Smart Technology (ICEPE)
[8] Wu F, Wu T and Yuce M R 2019 Design and implementation of a wearable sensor network
system for IoT-connected safety and health application IEEE 5th World Forum on the
Internet of Things (WF-IoT)
[9] Muthukumar S, Sherine Mary W and Jayanthi S 2018 IoT based air pollution monitoring
and control system Int. Conf. on Inventive Res. in Comput. Appl. (ICIRCA)
[10] Prabha B 2019 An IoT based efficient fire supervision monitoring and alerting system Third
Int. Conf. on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)
1-15
Blockchain in the Industrial Internet of Things
[11] Agarwal K, Agarwal A and Misra G 2019 Review and performance analysis on wireless
smart home and home automation using IoT Third Int. Conf. on I-SMAC
[12] Rajurkar C, Prabaharan S R S and Muthulakshmi S 2017 IoT based water management
IEEE Int. Conf. on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)
1-16
Blockchain in the Industrial Internet of Things
Chapter 2
[1] Karmakar A, Dey N, Baral T, Chowdhury M and Rehan M 2019 Industrial Internet of
Things: a review IEEE 2019 Int. Conf. on Opto-Electronics and Applied Optics
[2] Tomas J P 2017 Thames water rolls out smart meter project in london https://wiprodigital.
com/cases/progressive-metering-a-utilitys-strategic-move-into-predictive-planning/
[3] Daugherty P, Banerjee P, Negm W and Alter A E 2015 Driving unconventional growth
through the Industrial Internet of Things, Accenture Technology
[4] Yu X and Guo H 2019 A survey on IIoT security 2019 IEEE VTS Asia Pacific Wireless
Communications Symp.
[5] Sisinni E, Saifullah A, Han S, Jennehag U and Gidlund M 2018 Industrial Internet of
Things: challenges, opportunities, and directions IEEE Trans. Industr. Inform. 14 4724–34
[6] Anis M, Gadallah Y and Elhennawy H 2016 Machine-to-machine communications over the
Internet of Things: private Wi-Fi access prospects IEEE 2016 Wireless Days (WD)
[7] Buntz 2017 The top 20 industrial IoT applications https://iotworldtoday.com/2017/09/20/top-
20-industrial-iot-applications/
Blockchain in the Industrial Internet of Things
[8] Yang C, Shen W and Wang X 2016 Applications of Internet of Things in manufacturing
2016 IEEE 20th Int. Conf. on Computer Supported Cooperative Work in Design
[9] Breivold H P and Sandström K 2015 Internet of Things for industrial automation—
challenges and technical solutions 2015 IEEE Int. Conf. on Data Science and Data
Intensive Systems
[10] Jahan S, Rahman M S and Saha S 2017 Application specific tunneling protocol selection for
virtual private networks 2017 IEEE Int. Conf. on Networking, Systems and Security
[11] Fraile F, Tagawa T, Poler R and Ortiz A 2018 Trustworthy industrial IoT gateways for
interoperability platforms and ecosystems IEEE Internet Things J. 5 4506–14
[12] Wollschlaeger M, Sauter T and Jasperneite J 2017 The future of industrial communication:
automation networks in the era of the Internet of Things and Industry 4.0 IEEE Ind.
Electron. Mag. 11 17–27
Chapter 3
[1] Zheng Z, Xie S, Dai H, Chen X and Wang H 2017 An overview of blockchain technology:
architecture, consensus, and future trends 2017 IEEE Int. Congress on Big Data
[2] Osmov V, Kurbanniyazov A and Hussain R 2019 On the blockchain-based general-purpose
public key infrastructure 2019 IEEE/ACS 16th Int. Conf. on Computer Systems and
Applications
[3] Bhulania I P and Raj G 2018 Analysis of cryptographic hash in blockchain for bitcoin
mining process 2018 IEEE Int. Conf. on Advances in Computing and Communication
Engineering
[4] Kaur Chadha G and Singh A 2019 Bitcoin block-chain mining 2019 IEEE 9th Int. Conf. on
Cloud Computing
[5] Liu S and He S 2019 Application of block chaining technology in finance and accounting
field 2019 IEEE Int. Conf. on Intelligent Transportation, Big Data & Smart City
[6] Gemeliarana I G A K and Sari R F 2018 Evaluation of Proof of Work (POW) blockchains
security network on selfish mining 2018 IEEE Int. Seminar on Research of Information
Technology and Intelligent Systems
[7] Zhu J, Liu P and He L 2017 Mining information on Bitcoin network data 2017 IEEE Int.
Conf. on Internet of Things (iThings)
[8] Chang S Y and Park Y 2019 Silent timestamping for blockchain mining pool security 2019
IEEE Int. Conf. on Computing, Networking and Communications
[9] Sharma B, Sekharan C N and Zuo F 2018 Merkle-tree based approach for ensuring integrity
of electronic medical records 2018 9th IEEE Annual Ubiquitous Computing, Electronics &
Mobile Communication Conf.
[10] Pouraghily A and Wolf T 2019 A lightweight payment verification protocol for blockchain
trans. on IoT devices 2019 IEEE Int. Conf. on Computing, Networking and Communications
[11] Destefanis G, Marchesi M and Ortu M 2018 Smart contracts vulnerabilities: a call for
blockchain software engineering 2018 IEEE Int. Workshop on Blockchain Oriented Software
Engineering
[12] Bernabe J B, Canovas J L and Hernandez-Ramos J L 2019 Privacy-preserving solutions for
blockchain: review and challenges IEEE Access 7 164908–40
[13] Shalini S and Santhi H 2019 A survey on various attacks in bitcoin and cryptocurrency 2019
IEEE Int. Conf. on Communication and Signal Processing
Blockchain in the Industrial Internet of Things
Chapter 4
[1] Arun M, Balamurali S, Rawal B S, Duan Q, Kumar R L and Balamurugan B 2020 Mutual
authentication and authorized data access between fog and user-based on blockchain
technology IEEE INFOCOM 2020-IEEE Conf. on Computer Communications Workshops
(INFOCOM WKSHPS) (Piscataway, NJ: IEEE), pp 37–42
[2] Hofmann F, Wurster S, Ron E and Böhmecke-Schwafert M 2017 The immutability concept
of blockchains and benefits of early standardization 2017 ITU Kaleidoscope: Challenges for a
Data-Driven Society (ITU K) (Piscataway, NJ: IEEE), pp 1–8
[3] Ye C, Li G, Cai H, Gu Y and Fukuda A 2018 Analysis of security in the blockchain: A case
study in 51%-attack detecting 2018 5th Int. Conf. on Dependable Systems and Their
Applications (DSA) (Piscataway, NJ: IEEE), pp 15–24
[4] Puthal D, Malik N, Mohanty S P, Kougianos E and Yang C 2018 The blockchain is a
decentralized security framework [future directions] IEEE Consum. Electron. Mag. 7 18–21
[5] Yang Z, Yang K, Lei L, Zheng K and Leung V C 2018 Blockchain-based decentralized trust
management in vehicular networks IEEE Internet Things J. 6 1495–505
[6] Wang S, Zhang Y and Zhang Y 2018 A blockchain-based framework for data sharing with
fine-grained access control in decentralized storage systems IEEE Access 6 38437–50
[7] Halpin H and Piekarska M 2017 Introduction to security and privacy on the blockchain 2017
IEEE Eur. Symp. on Security and Privacy Workshops (EuroS&PW) (Piscataway, NJ:
IEEE), pp 1–3
[8] Fernández-Caramès T M and Fraga-Lamas P 2020 Towards post-quantum blockchain: A
review on blockchain cryptography resistant to quantum computing attacks IEEE Access 8
21091–116
[9] Ajao L A, Agajo J, Adedokun E A and Karngong L 2019 Crypto hash algorithm-based
blockchain technology for managing decentralized ledger database in the oil and gas industry
Multidiscip. Sci. J. 2 300–25
[10] Bacon J, Michels J D, Millard C and Singh J 2018 Blockchain demystified: a technical and
legal introduction to distributed and centralized ledgers Rich. J.L. & Tech. 25 1
[11] Zia M F, Benbouzid M, Elbouchikhi E, Muyeen S M, Techato K and Guerrero J M 2020
Microgrid transactive energy: review, architectures, distributed ledger technologies, and
market analysis IEEE Access 8 19410–32
[12] Dai M, Zhang S, Wang H and Jin S 2018 A low storage room requirement framework for
distributed ledger in the blockchain IEEE Access 6 22970–5
[13] Zheng Z, Xie S, Dai H, Chen X and Wang H 2017 An overview of blockchain technology:
Architecture, consensus, and future trends 2017 IEEE Int. Congress on Big Data (BigData
Congress) (Piscataway, NJ: IEEE), pp 557–64
[14] Mingxiao D, Xiaofeng M, Zhe Z, Xiangwei W and Qijun C 2017 A review on consensus
algorithm of blockchain 2017 IEEE Int. Conf. on Systems, Man, and Cybernetics (SMC)
(Piscataway, NJ: IEEE), pp 2567–72
[15] Bach L M, Mihaljevic B and Zagar M 2018 Comparative analysis of blockchain consensus
algorithms 2018 41st Int. Convention on Information and Communication Technology,
Electronics and Microelectronics (MIPRO) (Piscataway, NJ: IEEE), pp 1545–50
[16] Chen Y H, Chen S H and Lin I C 2018 Blockchain-based smart contract forbidding system
2018 IEEE Int. Conf. on Applied System Invention (ICASI) (Piscataway, NJ: IEEE), pp
208–11
Blockchain in the Industrial Internet of Things
[17] Xiong W and Xiong L 2019 Smart contract-based data trading mode using blockchain and
machine learning IEEE Access 7 102331–44
[18] Niranjanamurthy M, Nithya B N and Jagannatha S 2019 Analysis of Blockchain
technology: pros, cons and SWOT Cluster Comput. 22 14743–57
Chapter 5
[1] Szabo N 2017 Smart contracts: building blocks for digital markets, 1996. URL: http://www.
fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool
2006/szabo.best.vwh.net/smart_contracts_2.html
[2] Zichichi M, Contu M, Ferretti S and D’Angelo G 2019 LikeStarter: a smart-contract based
social DAO for crowdfunding IEEE INFOCOM 2019-IEEE Conf. on Computer
Communications Workshops (INFOCOM WKSHPS) (Piscataway, NJ: IEEE), pp 313–8
[3] Yavuz E, Koç A K, Çabuk U C and Dalkılıç G 2018 Towards secure e-voting using the
ethereum blockchain 2018 6th Int. Symp. on Digital Forensic and Security (ISDFS)
(Piscataway, NJ: IEEE), pp 1–7
[4] Cheng J C, Lee N Y, Chi C and Chen Y H 2018 Blockchain and smart contract for a digital
certificate 2018 IEEE Int. Conf. on Applied System Invention (ICASI) (Piscataway, NJ:
IEEE), pp 1046–51
[5] Sukhwani H, Wang N, Trivedi K S and Rindos A 2018 Performance modelling of hyper
ledger fabric (permissioned blockchain network) 2018 IEEE 17th Int. Symp. on Network
Computing and Applications (NCA) (Piscataway, NJ: IEEE), pp 1–8
[6] Singh G, Chelini L, Corda S, Awan A J, Stuijk S, Jordans R, Corporaal H and Boonstra A J
2018 A review of near-memory computing architectures: opportunities and challenges 2018
21st Euromicro Conf. on Digital System Design (DSD) (Piscataway, NJ: IEEE), pp 608–17
[7] Orjuela K G, Gaona-García P A and Marin C E 2020 Towards an agriculture solution for
product supply chain using blockchain: case study Agro-chain with BigchainDB Acta Agric.
Scand. B: Soil Plant Sci. 71 1–6
[8] Chalaemwongwan N and Kurutach W 2018 Notice of violation of IEEE publication
principles: state of the art and challenges facing consensus protocols on the blockchain
2018 Int. Conf. on Information Networking (ICOIN) (Los Alamitos, CA: IEEE Computer
Society), pp 957–62
[9] Mehar M I, Shier C L, Giambattista A, Gong E, Fletcher G, Sanayhie R, Kim H M and
Laskowski M 2019 Understanding a revolutionary and flawed grand experiment in the
blockchain: the DAO attack J. Cases Inf. Technol. 21 19–32
[10] Delmolino K, Arnett M, Kosba A, Miller A and Shi E 2016 Step by step towards creating a
safe, smart contract: lessons and insights from a cryptocurrency lab Int. Conf. on Financial
Cryptography and Data Security (Berlin: Springer), pp 79–94
[11] Pierro G A and Rocha H 2019 The influence factors on ethereum transaction fees 2019
IEEE/ACM 2nd Int. Workshop on Emerging Trends in Software Engineering for Blockchain
(WETSEB) (Piscataway, NJ: IEEE), pp 24–31
[12] Luu L, Chu D H, Olickel H, Saxena P and Hobor A 2016 Making smart contracts smarter In
Proc. of the 2016 ACM SIGSAC Conf. on Computer and Communications Security pp 254–69
[13] Portmann E 2018 Rezension, blockchain: blueprint for a new economy HMD Praxis der
Wirtschaftsinformati 55 1362–4
[14] Zeng X, Hao N, Zheng J and Xu X 2019 A consortium blockchain paradigm on the hyper
ledger-based peer-to-peer lending system China Commun. 16 38–50
Blockchain in the Industrial Internet of Things
Chapter 6
[1] Ye D, Zhang M and Vasilakos A V 2017 A survey of self-organization mechanisms in multi-
agent systems IEEE Trans. Syst. Man Cybern. 47 441–61
[2] Rizk Y, Awad M and Tunstel E W 2018 Decision making in multi-agent systems: a survey
IEEE Trans. Cogn. Devel. Syst. 10 514–29
[3] Fioretto F, Pontelli E and Yeoh W 2018 Distributed constraint optimization problems and
applications: a survey J. Artif. Intell. Res. 61 623–98
[4] Rehman M H U, Liew C S, Wah T Y and Khan M K 2017 Towards next-generation
heterogeneous mobile data stream mining applications: opportunities, challenges, and future
research directions J. Netw. Comput. Appl. 79 1–24
[5] Rehman M H U, Batool A, Liew C S and Teh Y-W et al 2017 Execution models for mobile
data analytics IT Prof. 19 24–30
[6] Bottou L, Curtis F E and Nocedal J 2018 Optimization methods for large-scale machine
learning SIAM Rev. 60 223–311
[7] Contreras-Cruz M A, Lopez-Perez J J and Ayala-Ramirez V 2017 Distributed path planning
for multi-robot teams based on artificial bee colony 2017 IEEE Congress on IEEE in
Evolutionary Computation (CEC) 541–8
[8] van Zelst S J, van Dongen B F and van der Aalst W M 2018 Event stream-based process
discovery using abstract representations Knowl. Inf. Syst. 54 407–35
[9] Lu H, Li Y, Chen M, Kim H and Serikawa S 2018 Brain intelligence: go beyond artificial
intelligence Mob. Netw. Appl. 23 368–75
[10] Kurtulmus A B and Daniel K 2018 Trustless machine learning contracts; evaluating and
exchanging machine learning models on the ethereum blockchain arXiv preprint
arXiv:1802.10185
[11] Kim H, Park J, Bennis M and Kim S-L 2018 On-device federated learning via blockchain
and its latency analysis arXiv preprint arXiv:1808.03949
Blockchain in the Industrial Internet of Things
[12] Hatem M, Burns E and Ruml W 2018 Solving large problems with the heuristic search:
General-purpose parallel external-memory search J. Artif. Intell. Res. 62 233–68
[13] Banerjee S, Singh P K and Bajpai J 2018 A comparative study on decisionmaking capability
between human and artificial intelligence Nature Inspired Computing (Berlin: Springer), pp 203–10
[14] Vo H T, Kundu A and Mohania M K 2018 Research directions in blockchain data
management and analytics EDBT 445–8
[15] Lai L and Suda N 2018 Rethinking machine learning development and deployment for edge
devices arXiv preprint arXiv:1806.07846
[16] Dinh T T A, Wang J, Chen G, Liu R, Ooi B C and Tan K-L 2017 Blockbench: a framework
for analyzing private blockchains Proc. of the 2017 ACM Int. Conf. on Management of Data
(New York: ACM), pp 1085–100
[17] Li Z, Kang J, Yu R, Ye D, Deng Q and Zhang Y 2018 Consortium blockchain for secure
energy trading in the industrial internet of things IEEE Trans. Ind. Inf. 14 3690–700
[18] Joshi D 2017 IBM, Amazon & Microsoft are offering their blockchain technology as a
service Business Insider Oct 24
[19] Hwang G-H, Chen P-H, Lu C-H, Chiu C, Lin H-C and Jheng A-J 2018 Infinitechain: a
multi-chain architecture with distributed auditing of sidechains for public blockchains Int.
Conf. on Blockchain (Berlin: Springer), pp 47–60
[20] Androulaki E et al 2018 Hyperledger fabric: a distributed operating system for permissioned
blockchains Proc. of the 13th EuroSys Conf. (New York: ACM), p 30
[21] Chen L, Xu L, Shah N, Gao Z, Lu Y and Shi W 2017 On security analysis of proof-of-
elapsed-time (PoET) Stabilization, Safety, and Security of Distributed Systems SSS 2017
Lecture Notes in Computer Science vol 10616 ed P Spirakis and P Tsigas (Cham: Springer)
[22] Angelis S D, Aniello L, Baldoni R, Lombardi F, Margheri A and Sassone V 2018 Pbft vs
proof-of-authority: applying the cap theorem to permissioned blockchain Italian Conf. on
Cyber Security (ITASEC) (Milan)
Chapter 7
[1] Reyna A, Martn C, Chen J, Soler E and Daz M 2018 On blockchain and its integration with
IoT. Challenges and opportunities Future Gener. Comput. Syst. 88 173–90
[2] Farooq S M, Hussain S S and Ustun T S 2019 Elliptic curve digital signature algorithm
(ECDSA) certificate-based authentication scheme for advanced metering infrastructure 2019
Innovations in Power and Advanced Computing Technologies (i-PACT) vol 1 (Piscataway,
NJ: IEEE), pp 1–6
[3] Fotiou N, Siris V A and Polyzos G C 2018 Interacting with the Internet of Things using
smart contracts and blockchain technologies Int. Conf. on Security, Privacy and Anonymity
in Computation, Communication and Storage (Cham: Springer), pp 443–52
[4] Lu Q and Xu X 2017 Adaptable blockchain-based systems: a case study for product
traceability IEEE Softw. 34 21–7
[5] Zhang Y and Wen J 2017 The IoT electric business model: using blockchain technology for
the internet of things Peer Peer Netw. Appl. 10 983–94
[6] Feng Q, He D, Zeadally S, Khan M K and Kumar N 2019 A survey on privacy protection in
the blockchain system J. Netw. Comput. Appl. 126 45–58
[7] Li Q, Yue Y and Wang Z 2020 Deep robust cramer shoup delay optimized fully
homomorphic for IIOT secured transmission in cloud computing Comput. Commun. 161
10–8
Blockchain in the Industrial Internet of Things
[8] Han G, Que W, Jia G and Zhang W 2018 Resource-utilization-aware energy-efficient server
consolidation algorithm for green computing in IIOT J. Netw. Comput. Appl. 103 205–14
[9] Hammi M T, Hammi B, Bellot P and Serhrouchni A 2018 Bubbles of trust: a decentralized
blockchain-based authentication system for IoT Comput. Secur. 78 126–42
[10] Liu S, Guo C, Al-Turjman F, Muhammad K and de Albuquerque V H 2020 Reliability of
response region: a novel mechanism in visual tracking by edge computing for IIoT
environments Mech. Syst. Sig. Process. 138 106537
[11] Sengupta J, Ruj S and Bit S D 2020 A comprehensive survey on attacks, security issues and
blockchain solutions for IoT and IIoT J. Netw. Comput. Appl. 149 102481
[12] Narayanan R and Murthy C S 2017 A probabilistic framework for protocol conversions in
IIoT networks with heterogeneous gateways IEEE Commun. Lett. 21 2456–9
[13] Afanasev M Y, Fedosov Y V, Krylova A A and Shorokhov S A 2018 An application of
blockchain and smart contracts for machine-to-machine communications in cyber-physical
production systems 2018 IEEE Industrial Cyber-Physical Systems (ICPS) (Piscataway, NJ:
IEEE), pp 13–9
[14] Waheed A and Krishna P V 2020 Comparing biometric and blockchain security mechanisms
in smart parking system 2020 Int. Conf. on Inventive Computation Technologies (ICICT)
(Piscataway, NJ: IEEE), pp 634–8
[15] Kochovski P, Gec S, Stankovski V, Bajec M and Drobintsev P D 2019 Trust management in
a blockchain-based fog computing platform with trustless smart oracles Future Gener.
Comput. Syst. 101 747–59
[16] Reyna A, Martín C, Chen J, Soler E and Díaz M 2018 On blockchain and its integration
with IoT. Challenges and opportunities Future Gener. Comput. Syst. 88 173–90
[17] Tajalli S Z, Mardaneh M, Taherian-Fard E, Izadian A, Kavousi-Fard A, Dabbaghjamanesh
M and Niknam T 2020 DoS-resilient distributed optimal scheduling in a fog supporting
IIoT-based smart microgrid IEEE Trans. Ind. Appl. 56 2968–77
[18] Ismail S, Almayouf R, Chehab S, Alghamdi S, Almutairi A, Alasmari B and Altherwy R
2020 Edge IoT-cloud framework based on blockchain 2020 2nd Int. Conf. on Computer and
Information Sciences (ICCIS) (Piscataway, NJ: IEEE), pp 1–7
[19] Ansari D B, Rehman A and Ali R 2018 Internet of Things (IoT) protocols: a brief
exploration of MQTT and CoAP Int. J. Comput. Appl. 975 8887
[20] Tiburski R T, Amaral L A, de Matos E, de Azevedo D F and Hessel F 2017 Evaluating the
use of TLS and DTLS protocols in IoT middleware systems applied to E-health 2017 14th
IEEE Annual Consumer Communications & Networking Conf. (CCNC) (Piscataway, NJ:
IEEE), pp 480–5
[21] Knezevic D B and Kasunic N 2020 Security challenges of Wi-Fi connected beer cooler and
serving IIoT device 2020 5th Int. Conf. on Smart and Sustainable Technologies (SpliTech)
(Piscataway, NJ: IEEE), pp 1–5
[22] Geetha B G 2018 Signature verification and bloom hashing technique for efficient cloud data
storage Wirel. Pers. Commun. 103 3079–97
[23] Qiu Z, Hao J, Guo Y and Zhang Y 2020 Dual vote confirmation based consensus design for
blockchain integrated IoT NOMS 2020–2020 IEEE/IFIP Network Operations and
Management Symp. (Piscataway, NJ: IEEE), pp 1–7
[24] Zhao S, Li S and Yao Y 2019 Blockchain-enabled industrial Internet of Things technology
IEEE Trans. Comput. Social Syst. 6 1442–53
Blockchain in the Industrial Internet of Things
Chapter 8
[1] Kumar S and Jasuja A 2017 Air quality monitoring system based on IoT using Raspberry Pi
In 2017 Int. Conf. on Computing, Communication and Automation (ICCCA) (Piscataway,
NJ: IEEE), pp 1341–6
[2] Rouzbeh B, Bone G M, Ashby G and Li E 2019 Design, implementation and control of an
improved hybrid pneumatic-electric actuator for robot arms IEEE Access 7 14699–713
[3] Liu Y, Wang K, Lin Y and Xu W 2019 LightChain: a lightweight blockchain system for
industrial Internet of Things IEEE Trans. Ind. Inf. 15 3571–81
[4] Xinyi Y, Yi Z and He Y 2018 Technical characteristics and model of blockchain 2018 10th Int.
Conf. on Communication Software and Networks (ICCSN) (Piscataway, NJ: IEEE), pp 562–6
[5] Latif S, Idrees Z, Ahmad J, Zheng L and Zou Z 2020 A blockchain-based architecture for
secure and trustworthy operations in the IoT J. Ind. Inf. Integr. 21 100190
[6] Sahoo M, Singhar S S, Nayak B and Mohanta B K 2019 A blockchain-based framework
secured by ECDSA to curb drug counterfeiting 2019 10th Int. Conf. on Computing,
Communication and Networking Technologies (ICCCNT) (Piscataway, NJ: IEEE), pp 1–6
[7] Simos D E, Mekesis S, Kuhn D R and Kacker R N 2017 Combinatorial coverage
measurement of test vectors used in cryptographic algorithm validation STC’17: Proc. of
the 2017 IEEE Software Technology Conf.
[8] Cao B, Wang X, Zhang W, Song H and Lv Z 2020 A many-objective optimization model of
industrial internet of things based on a private blockchain IEEE Netw. 34 78–83
[9] Mingxiao D, Xiaofeng M, Zhe Z, Xiangwei W and Qijun C 2017 A review on consensus
algorithm of blockchain 2017 IEEE Int. Conf. on Systems, Man, and Cybernetics (SMC)
(Piscataway, NJ: IEEE), pp 2567–72
[10] Abdi A I, Eassa F E, Jambi K, Almarhabi K and AL-Ghamdi A S 2020 Blockchain
platforms and access control classification for IoT systems Symmetry. 12 1663
[11] Tukur Y M, Thakker D and Awan I U 2019 Ethereum blockchain-based solution to insider
threats on perception layer of IoT systems 2019 IEEE Global Conf. on the Internet of Things
(GCIoT) (Piscataway, NJ: IEEE), pp 1–6
[12] Kan L, Wei Y, Muhammad A H, Siyuan W, Linchao G and Kai H 2018 A multiple
blockchains architecture on inter-blockchain communication 2018 IEEE Int. Conf. on Software
Quality, Reliability and Security Companion (QRS-C) (Piscataway, NJ: IEEE), pp 139–45
[13] Xu X 2020 Towards automated migration for blockchain-based decentralized application In
2020 IEEE/ACM 42nd Int. Conf. on Software Engineering: Companion Proc. (ICSE-
Companion) (Piscataway, NJ: IEEE), pp 155–7
[14] Wan S, Li M, Liu G and Wang C 2019 Recent advances in consensus protocols for
blockchain: a survey Wirel. Netw. 26 5579–93
[15] Ochoa J J, Bere G, Aenugu I R, Kim T and Choo K K 2020 Blockchain-as-a-Service (BaaS)
for battery energy storage systems 2020 IEEE Texas Power and Energy Conf. (TPEC)
(Piscataway, NJ: IEEE), pp 1–6
Chapter 9
[1] Perkins C D, Wroble E J and Halpin H A 2017 Creating a drone superhighway using the
blockchain https://neironix.io/documents/whitepaper/7764683f65f9877790bb6c3350b3cf87.pdf
[2] Chandel S, Zhang S and Wu H 2020 Using blockchain in IoT: is it a smooth road ahead for
real? Future of Information and Communication Conference (Cham: Springer), pp 159–71
Blockchain in the Industrial Internet of Things
[3] Ullah H S, Aslam S and Anrjomand N 2020 Blockchain in healthcare and medicine: a
contemporary research of applications, challenges, and future perspectives (arXiv preprint
arXiv:2004.06795)
[4] Park I, Lee T and Jang J 2020 Trade-off in implementation of P2P energy trading over
hyperledger blockchain 2020 IEEE Int. Conf. on Consumer Electronics-Asia (ICCE-Asia)
(Piscataway, NJ: IEEE), pp 1–4
[5] Chitchyan R and Murkin J 2018 Review of blockchain technology and its expectations: case
of the energy sector (arXiv preprint arXiv:1803.03567)
[6] Karafiloski E and Mishev A 2017 Blockchain solutions for big data challenges: a literature
review IEEE EUROCON 2017—17th Int. Conference on Smart Technologies (Piscataway,
NJ: IEEE), pp 763–8
[7] Abadi F A, Ellul J and Azzopardi G 2018 The blockchain of things, beyond bitcoin: a
systematic review 2018 IEEE International Conference on the Internet of Things (iThings)
and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical
and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (Piscataway, NJ:
IEEE), pp 1666–72
[8] Chain of things, available online: https://chainofthings.com/ (accessed 21 January 2021)
[9] Katuwal G J, Pandey S, Hennessey M and Lamichhane B 2018 Applications of blockchain
in healthcare: current landscape & challenges (arXiv preprint arXiv:1812.02776)
[10] Veena P, Panikkar S, Nair S and Brody P 2015 Empowering the edge-practical insights on a
decentralized internet of things, empowering the edge-practical insights on a decentralized
Internet of Things IBM Institute for Business Value 17
[11] Riddle and code available online: https://riddleandcode.com/poc (accessed 21 January 2021).
[12] DuPont Q 2017 Experiments in algorithmic governance: a history and ethnography of ‘The
DAO,’ a failed decentralized autonomous organization Bitcoin and Beyond ed M Campbell-
Verduyn (London: Taylor & Francis), pp 157–77
Chapter 10
[1] Christidis K and Devetsikiotis M 2016 Blockchain and smart contracts for the internet of
things IEEE Access 4 2292–303
[2] Kusiak A 2018 Smart manufacturing Int. J. Prod. Res. 56 508–17
[3] Wan J, Li J, Imran M, Li D and e-Amin F 2019 A blockchain-based solution for enhancing
security and privacy in smart factory IEEE Trans. Ind. Inf. 15 3652–60
[4] Huang J, Kong L, Dai H N, Ding W, Cheng L, Chen G, Jin X and Zeng P 2020 Blockchain-
based mobile crowdsensing in industrial systems IEEE Trans. Indus. Inform. 16 6553–63
[5] Konstantinidis I, Siaminos G, Timplalexis C, Zervas P, Peristeras V and Decker S 2018
Blockchain for business applications: a systematic literature review Business Information
Systems ed W Abramowicz and A Paschke (Cham: Springer International Publishing), pp
384–99
[6] Kim H M and Laskowski M 2018 Toward an ontology-driven blockchain design for supply-
chain provenance Intell. Syst. Account. Finance Manag. 25 18–27
[7] Tapscott A and Tapscott D 2017 How blockchain is changing finance Harv. Bus. Rev.
https://hbr.org/2017/03/how-blockchain-is-changing-finance
[8] Tian F 2016 An agri-food supply chain traceability system for China based on RFID amp;
amp; blockchain technology 13th Int. Conf. on Service Systems and Service Management
(ICSSSM) 1–6
Blockchain in the Industrial Internet of Things
[9] Sander F, Semeijn J and Mahr D 2018 The acceptance of blockchain technology in meat
traceability and transparency Br. Food J. 120 2066–79
[10] Bettín-Díaz R, Rojas A E and Mejía-Moncayo C 2018 Methodological approach to the
definition of a blockchain system for the food industry supply chain traceability
Computational Science and Its Applications—ICCSA (Cham: Springer International
Publishing), pp 19–33
[11] Lin Q, Wang H, Pei X and Wang J 2019 Food safety traceability system based on blockchain
and epics IEEE Access 7 20698–707
[12] Zhang C, Wu J, Zhou Y, Cheng M and Long C 2018 Peer-to-peer energy trading in a
microgrid Appl. Energy 220 1–12
[13] Li Z, Kang J, Yu R, Ye D, Deng Q and Zhang Y 2018 Consortium blockchain for secure
energy trading in industrial Internet of Things IEEE Trans. Ind. Inf. 14 3690–700
[14] Aitzhan N Z and Svetinovic D 2018 Security and privacy in decentralized energy trading
through multi-signatures, blockchain and anonymous messaging streams IEEE Trans.
Dependable Secure Comput. 15 840–52
[15] Pop C, Cioara T, Antal M, Anghel I, Salomie I and Bertoncini M 2018 Blockchain-based
decentralized management of demand response programs in smart energy grids Sensors 2018 162
[16] Wang K, Shao Y, Shu L, Zhu C and Zhang Y 2016 Mobile big data fault-tolerant processing
for e-health networks IEEE Network 30 36–42
[17] Esposito C, Santis A D, Tortora G, Chang H and Choo K R 2018 Blockchain: a panacea for
healthcare cloud-based data security and privacy? IEEE Cloud Comput. 5 31–7
[18] Griggs K N, Osipova O, Kohlios C P, Baccarini A N, Howson E A and Hayajneh T 2018
Healthcare blockchain system using smart contracts for secure automated remote patient
monitoring J. Med. Syst. 42 130
[19] Bhuiyan M Z A, Zaman A, Wang T, Wang G, Tao H and Hassan M M 2018 Blockchain
and big data to transform the healthcare Proc. of the Int. Conf. on Data Processing and
Applications, ser. ICDPA (New York: ACM), pp 62–8
[20] Sun Y, Zhang R, Wang X, Gao K and Liu L 2018 A decentralizing attribute-based signature
for healthcare blockchain 2018 27th Int. Conf. on Computer Communication Networks
(ICCCN) pp 1–9
[21] Rahman M A, Hossain M S, Loukas G, Hassanain E, Rahman S S, Alhamid M F and
Guizani M 2018 Blockchain-based mobile edge computing framework for secure therapy
applications IEEE Access 6 72469–78
[22] Wu F et al 2020 A new coronavirus associated with human respiratory disease in China
Nature 579 265–9
[23] Esposito C, De Santis A, Tortora G, Chang H and Choo K-K R 2018 Blockchain: a panacea
for healthcare cloud-based data security and privacy? IEEE Cloud Comput. 5 31–7
[24] Wu H-T and Tsai C-W 2018 Toward blockchains for healthcare systems: applying the
bilinear pairing technology to ensure privacy protection and accuracy in data sharing IEEE
Consum. Electron. Mag. 7 65–71
[25] Salahuddin M A, Al-Fuqaha A, Guizani M, Shuaib K and Sallabi F 2017 Softwarization of
Internet of Things infrastructure for secure and smart healthcare Computer 50 74–9
[26] Nugent T et al 2016 Improving data transparency in clinical trials using blockchain smart
contracts F1000 Res. 5 2541
[27] Xia Q I, Sifah E B, Asamoah K O, Gao J, Du X and Guizani M 2017 MeDShare: trust-less
medical data sharing among cloud service providers via blockchain IEEE Access 5 14757–67
Blockchain in the Industrial Internet of Things
[28] Zhang J, Xue N and Huang X 2016 A secure system for pervasive social network-based
healthcare IEEE Access 4 9239–50
[29] Vruddhula S 2018 Application of on-dose identification and blockchain to prevent drug
counterfeiting Pathogens Global Health 112 161
[30] Alangot B and Achuthan K 2017 Trace and track: enhanced pharma supply chain
infrastructure to prevent fraud Proc. Int. Conf. Ubiquitous Commun. Netw. Comput.
(Bangalore; Cham: Springer), 189–95
[31] Bocek T, Rodrigues B B, Strasser T and Stiller B 2017 Blockchains everywhere—a use-case
of blockchains in the pharma supply-chain Proc. IFIP/IEEE Symp. Integr. Netw. Service
Manage (IM) 772–7
[32] Nchinda N, Cameron A, Retzepi K and Lippman A 2019 MedRec: a network for personal
information distribution 2019 Int. Conf. on Computing, Networking and Communications
(ICNC) (IEEE), 637–41
[33] Franks P C 2020 Implications of blockchain distributed ledger technology for records
management and information governance programs Records Manage. J. 30 287–99
[34] Yang Z, Yang K, Lei L, Zheng K and Leung V C M 2018 Blockchain-based decentralized
trust management in vehicular networks IEEE Internet Things J. 6 1495–505
[35] Kang J, Yu R, Huang X, Maharjan S, Zhang Y and Hossain E 2017 Enabling localized
peer-to-peer electricity trading among plug-in hybrid electric vehicles using consortium
blockchain IEEE Trans. Ind. Inf. 13 3154–64
[36] Kang J, Yu R, Huang X, Wu M, Maharjan S, Xie S and Zhang Y 2019 Blockchain for
secure and efficient data sharing in vehicular edge computing and networks IEEE Internet
Things J. 6 4660–70
[37] Liu H, Zhang Y and Yang T 2018 Blockchain-enabled security in electric vehicles cloud and
edge computing IEEE Netw. 32 78–83
[38] Dai Y, Xu D, Maharjan S, Qiao G and Zhang Y 2019 Artificial intelligence empowered edge
computing and caching for the internet of vehicles IEEE Wirel. Commun. Mag. 26 12–8
[39] Zeng Y, Zhang R and Lim T J 2016 Wireless communications with unmanned aerial
vehicles: opportunities and challenges IEEE Commun. Mag. 54 36–42
[40] Kimchi G, Buchmueller D, Green S A, Beckman B C, Isaacs S, Navot A, Hensel F, Bar-
Zeev A and Rault S S J-M 2017 Unmanned aerial vehicle delivery system US Patent
9,573,684
[41] Wang L, Chen F and Yin H 2016 Detecting and tracking vehicles in traffic by unmanned
aerial vehicles Autom. Constr. 72 294–308
[42] Cheng N, Xu W, Shi W, Zhou Y, Lu N, Zhou H and Shen X 2018 Airground integrated
mobile edge networks: architecture, challenges, and opportunities IEEE Commun. Mag. 56
26–32
[43] Li B, Fei Z and Zhang Y 2019 UAV communications for 5G and beyond: Recent advances
and future trends IEEE Internet Things J. 6 2241–63
[44] Kapitonov A, Lonshakov S, Krupenkin A and Berman I 2017 Blockchain-based protocol of
autonomous business activity for multiagent systems consisting of UAVs 2017 Workshop on
Research, Education and Development of Unmanned Aerial Systems (RED-UAS) 84–9
[45] Kumar A, Kundu A, Pickover C A and Weldemariam K 2018 Unmanned aerial vehicle data
management US Patent App. 15/463,147