978 0 7503 3663 5.preview

Download as pdf or txt
Download as pdf or txt
You are on page 1of 39

Blockchain in the Industrial

Internet of Things

Online at: https://doi.org/10.1088/978-0-7503-3663-5


IOP Series in Next Generation Computing

Series editors
Prateek Agrawal
University of Klagenfurt, Austria and Lovely Professional University, India

Anand Sharma
Mody University of Science and Technology, India

Vishu Madaan
Lovely Professional University, India

About the series


The motive of this series is to develop a trusted library on advanced computational
methods, technologies and their applications.
This series focuses on the latest developments in next generation computing, and
in particular on the synergy between computer science and other disciplines. Books
in the series will explore new developments in various disciplines that are relevant for
computational perspective including foundations, systems, innovative applications
and other research contributions related to the overall design of computational
tools, models and algorithms that are relevant for the respective domain. It
encompasses research and development in artificial intelligence, machine learning,
block chain technology, quantum cryptography, quantum computing, nanoscience,
bioscience-based sensors, IoT applications, nature inspired algorithms, computer
vision, bioinformatics etc. and their applications in the areas of science, engineering,
business and social sciences. It covers a broad spectrum of applications in the
community, from industry, government, and academia.
The aim of the series is to provide an opportunity for prospective researchers
and experts to publish works based on next generation computing and its diverse
applications. It also provides a data-sharing platform that will bring together interna-
tional researchers, professionals and academics. This series brings together thought
leaders, researchers, industry practitioners, and potential users of different disciplines to
develop new trends and opportunities, exchange ideas and practices related to advanced
computational methods and promote interdisciplinary knowledge.
Blockchain in the Industrial
Internet of Things
Lakshmana Kumar Ramasamy
Hindusthan College of Engineering and Technology, Coimbatore, India

Seifedine Kadry
Faculty of Applied Computing and Technology (FACT), Noroff University College,
Kristiansand, Norway

IOP Publishing, Bristol, UK


ª IOP Publishing Ltd 2021

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system
or transmitted in any form or by any means, electronic, mechanical, photocopying, recording
or otherwise, without the prior permission of the publisher, or as expressly permitted by law or
under terms agreed with the appropriate rights organization. Multiple copying is permitted in
accordance with the terms of licences issued by the Copyright Licensing Agency, the Copyright
Clearance Centre and other reproduction rights organizations.

Permission to make use of IOP Publishing content other than as set out above may be sought
at [email protected].

Lakshmana Kumar Ramasamy and Seifedine Kadry have asserted their right to be identified as
the authors of this work in accordance with sections 77 and 78 of the Copyright, Designs and
Patents Act 1988.

ISBN 978-0-7503-3663-5 (ebook)


ISBN 978-0-7503-3661-1 (print)
ISBN 978-0-7503-3664-2 (myPrint)
ISBN 978-0-7503-3662-8 (mobi)

DOI 10.1088/978-0-7503-3663-5

Version: 20210501

IOP ebooks

British Library Cataloguing-in-Publication Data: A catalogue record for this book is available
from the British Library.

Published by IOP Publishing, wholly owned by The Institute of Physics, London

IOP Publishing, Temple Circus, Temple Way, Bristol, BS1 6HG, UK

US Office: IOP Publishing, Inc., 190 North Independence Mall West, Suite 601, Philadelphia,
PA 19106, USA
Contents

Preface x
Acknowledgements xi
Author biographies xii

1 Internet of things (IoT) 1-1


1.1 IoT overview 1-1
1.1.1 IoT essential characteristics 1-3
1.1.2 IoT benefits 1-4
1.1.3 IoT drawbacks 1-5
1.2 IoT common uses 1-6
1.3 IoT—security 1-7
1.3.1 Trust for IoT 1-8
1.3.2 IoT privacy 1-9
1.4 Functional view of IoT 1-9
1.5 Application domains 1-10
1.5.1 Smart industry 1-10
1.5.2 Smart mobility and transport 1-11
1.5.3 Smart buildings 1-11
1.5.4 Smart energy 1-11
1.5.5 Smart production 1-12
1.5.6 Smart environment monitoring 1-12
1.5.7 Smart living 1-12
1.5.8 Smart health 1-13
1.5.9 Smart water monitoring and smart food 1-14
1.5.10 Smart city 1-14
1.6 Summary 1-15
References 1-15

2 Industrial Internet of Things 2-1


2.1 Industrial IoT overview 2-1
2.2 How does the IIoT system work? 2-2
2.3 IIoT advantages 2-2
2.4 IIoT versus IoT differences 2-4
2.5 IIoT vendors 2-4

v
Blockchain in the Industrial Internet of Things

2.6 Industrial IoT applications 2-5


2.6.1 Maintenance 2-5
2.6.2 Infrastructure 2-6
2.6.3 Supply chain 2-6
2.6.4 Process control 2-7
2.7 Industrial IoT challenges 2-7
2.7.1 Security 2-7
2.7.2 Interoperability 2-8
2.7.3 Scalability 2-9
2.7.4 Reliability 2-9
2.7.5 Network performance 2-10
2.7.6 Management 2-10
2.8 IIoT futures 2-11
2.9 Summary 2-12
References 2-12

3 Blockchain technology 3-1


3.1 Overview of blockchain 3-1
3.2 Public key cryptography (PKI) in the blockchain 3-3
3.2.1 Authentication 3-3
3.2.2 Privacy of the message 3-4
3.3 Hashing 3-5
3.4 Bitcoin mining 3-5
3.4.1 Process of mining 3-6
3.5 Chaining blocks 3-6
3.6 Proof of work (PoW) 3-7
3.7 Bitcoin mining and network 3-8
3.8 Incentives to miners 3-9
3.9 Merkle tree of blockchain 3-9
3.10 Payment verification in blockchain 3-10
3.11 Conflicts resolution 3-11
3.12 Privacy in blockchain 3-12
3.13 Mitigating attacks on bitcoin 3-12
3.13.1 Race attack 3-12
3.13.2 51% attack 3-13
3.13.3 Finney attack 3-13
3.14 Conclusion 3-13
References 3-13

vi
Blockchain in the Industrial Internet of Things

4 Blockchain key characteristics 4-1


4.1 Immutability 4-1
4.1.1 How does it confront fraudulence? 4-2
4.1.2 How is immutability achieved? 4-2
4.1.3 Challenges to Immutability of Blockchain 4-3
4.1.4 Solution 4-4
4.2 Decentralization 4-4
4.2.1 Why is this so useful? 4-4
4.3 Improved safety 4-5
4.3.1 Hashing is irreversible 4-6
4.4 Distributed ledgers 4-6
4.4.1 Why is this one of the critical characteristics of blockchain? 4-8
4.5 Consensus 4-9
4.6 Quick solution 4-10
4.7 Summary 4-11
References 4-11

5 Smart contract 5-1


5.1 Overview of smart contract 5-1
5.2 Operating methods of smart contracts 5-2
5.3 Sites and programming languages 5-3
5.4 Features and the importance of smart contracts 5-4
5.5 Application views of smart contracts 5-4
5.6 Challenges 5-5
5.7 Current developments and upcoming trends of smart contracts 5-6
5.7.1 Current developments 5-7
5.7.2 Upcoming trends: parallel blockchain and smart contracts 5-7
5.8 Advantages of smart contracts 5-7
5.8.1 Accuracy 5-8
5.8.2 Transparency and clear communication 5-8
5.8.3 Speed and performance 5-9
5.8.4 Security 5-9
5.8.5 Cost reduction 5-10
5.9 Summary 5-10
References 5-10

vii
Blockchain in the Industrial Internet of Things

6 Taxonomy of blockchain systems 6-1


6.1 Decentralized applications of AI 6-1
6.2 Decentralized operations 6-5
6.3 Blockchain types 6-7
6.4 Decentralized infrastructure for AI applications 6-9
6.5 Role of consensus protocols for AI appliances 6-11
6.6 Summary 6-14
References 6-14

7 Combination of blockchain and IIOT 7-1


7.1 Opportunities for integrating blockchain with IIoT 7-1
7.2 IIoT with blockchain combination (BIIoT) 7-3
7.3 Challenges at a blockchain–IIoT incorporation 7-7
7.3.1 Capability and scalability of storage 7-7
7.3.2 Safety 7-8
7.3.3 Information confidentiality with anonymity 7-9
7.3.4 Smart contract 7-10
7.3.5 Legal problems 7-11
7.3.6 Consensus 7-11
7.4 BIIoT usage 7-12
7.5 Summary 7-12
References 7-12

8 BIIOT architecture 8-1


8.1 Architecture of BIIoT 8-1
8.2 Physical layer 8-1
8.3 Service layer of blockchain 8-2
8.3.1 Nodes with lightweight 8-2
8.3.2 Private blockchain 8-3
8.3.3 Consensus procedure 8-4
8.3.4 Application layer 8-5
8.4 BIIoT architecture execution procedure 8-5
8.4.1 System initialization 8-5
8.5 Another dimension of BIIoT architecture 8-9
8.6 Summary 8-11
References 8-12

viii
Blockchain in the Industrial Internet of Things

9 BIIOT deployment 9-1


9.1 General deployment of BIIoT 9-1
9.2 Deployment of BIIoT in smart industry 9-6
9.2.1 Initialization 9-6
9.2.2 Handling transactions 9-7
9.2.3 Shared overlay 9-9
9.3 Key challenges of BIIoT 9-9
9.4 Summary 9-10
References 9-11

10 BIIOT applications 10-1


10.1 Smart manufacturing 10-1
10.2 Management of supply chain 10-2
10.3 Food industry 10-3
10.4 Smart grid 10-3
10.5 Health care 10-4
10.6 IoV and UAV 10-7
10.7 Retail and E-commerce industry 10-8
10.8 Summary 10-9
References 10-9

ix
Preface

Blockchain is a continuously-growing ledger that maintains a constant record of all


business dealings in a safe, period sequence and unchanging manner. It could utilize
for the safe exchange of cash, assets, agreements, and so on. The Industrial Internet
of Things (IIoT) is the expansion and utilization of the Internet of Things (IoT) in
industrial applications and areas. Effectually, it is the integration of Industry 4.0,
which seems to pay more attention to the performance of the industrial progression.
In this book, we did our best to cover comprehensively these two topics and the
benefits of their combination. In chapter 1, we define IoT with the discussion of
different areas of its applications. Chapter 2, discusses the overview, working
process, advantages, applications, challenges, and futures of IIoT. The debate on
blockchain’s overview, its structure, and how it is executed in different aspects is
provided in chapter 3. In chapter 4, we show the six essential blockchain key
characteristics. Chapter 5 debates the smart contract’s overview, its structure, how it
is executed and its different aspects. The taxonomy of blockchain for Artificial
Intelligence (AI) classified concerning decentralization of AI algorithms and
functions, blockchain type and formation, and the basic consensus algorithms
used for decentralized dispersed transaction verifications over vital networks, is
given in chapter 6. Chapter 7 investigates the combination of blockchain with IIoT.
In chapter 8, we examine the latest model for linking IIoT to the blockchain. We
name the combination of blockchain and IIoT as the Blockchain of Industrial
Internet of Things (BIIoT). The structure of BIIoT proposed in this chapter as well.
The deployment discussion of BIIoT was given in chapter 9. The last chapter is
dedicated to BIIoT industrial applications.
The authors

x
Acknowledgements

Acknowledgements of Lakshmana Kumar Ramasamy


First I would like to thank the Almighty for helping me in writing a book. This book
would not have been possible without the cooperation of Hindusthan College of
Engineering and Technology that allowed me to develop and test insight-related
ideas in projects, workshops, and consulting engagements over the last eight-plus
years. I want to acknowledge the management of Hindusthan Institutions, who have
constantly encouraged me to ‘get this book done.’ I cannot thank them enough for
being my unrelenting source of inspiration to challenge how things get done in the
academic world. I am eternally grateful to my parents and father in law, who taught
me discipline, tough love, manners, respect, and so much more that has helped me
succeed in life. Finally, I want to thank my wife, Jayanthi, a lifelong partner who
makes both the journey and destination worthwhile and especially my kids,
Nirantharaa and Mhaghizhan for tolerating my incessant disappearances into my
home office. An additional thanks to the IOP family; I’m deeply indebted for their
wonderful editorial support and guidance.

Acknowledgements of Seifedine Kadry


First and foremost, I would like to praise and thank God, the Almighty, who has
granted countless blessings and knowledge. I want to thank the IOP family widely
for this opportunity; I am particularly grateful to the Series Editor Professor Prateek
Agrawal, and to John Navas and Sarah Armstrong for all the support they gave us,
without them this project would still be in process. I want to thank my family, my
lovely wife Diana and my little angel Hadi. Special thanks go to my teachers and
supervisors to whom I owe a lot.

xi
Author biographies

Lakshmana Kumar Ramasamy


Dr Lakshmana Kumar Ramasamy is currently associated with
Hindusthan College of Engineering and Technology, India. He is
also a Director-Research & Development (Artificial Intelligence)
in a Canadian based company (ASIQC) in Vancouver region of
British Columbia, Canada. He is the Founding Member of IEEE
SIG of Big Data for Cyber Security and Privacy, IEEE. He is a
global chapter lead for MLCS [Machine Learning for Cyber
Security]. He himself is involved in research and expertise in AI and Blockchain
technologies. He holds the Data Science certification from John Hopkins University,
United States. He also holds the Amazon Cloud Architect certification from
Amazon Web Services. He holds the privileged Gold level partnership award
from Infosys for bridging the gap between industry and academia in 2017. He
holds the privileged Silver level partnership award from Infosys for bridging the gap
between industry and academia in 2016. He is an Editor-In-Chief for the Book
Series, ‘Advances in Quantum Computing, Artificial Intelligence, and Data Sciences
for Industrial Transformation Series’, and also Editor-In-Chief for Focus Series,
‘Convergence of IoT and Blockchain Through Machine Learning Approaches’,
CRC Press—Taylor & Francis Group, LLC, USA. He is a core member in Artificial
Intelligence Editorial Advisory Board of Cambridge Scholars Publishing, UK. He is
an Editorial board member of Trends in Renewable Energy Journal, USA and
Frontiers in Communications and Networks, Switzerland. He is the Associate Editor
in International Journal of Quality Control and Standards in Science and Engineering
(IJQCSSE), IGI Publishers, USA. As part of his professional career, he has around
50+ publications in international journals and conferences. He has participated in
eight edited books from Elsevier, CRC Press, Springer and Wiley. He holds around
19 Indian patents and two international patents. He is an ACM distinguished
speaker and IEEE brand ambassador.

Seifedine Kadry
Dr Seifedine Kadry has a Bachelor degree in 1999 from Lebanese
University, MS degree in 2002 from Reims University (France)
and EPFL (Lausanne), PhD in 2007 from Blaise Pascal University
(France), HDR degree (Habilitation) in 2017 from Rouen
University. At present, his research focuses on data science,
education using technology, system prognostics, stochastic
systems, and applied mathematics. He is an ABET program
evaluator for computing, and ABET program evaluator for Engineering Tech.
He is an IET Fellow. Currently, he is a full professor of data science at Noroff
University College, Norway.

xii
IOP Publishing

Blockchain in the Industrial Internet of Things


Lakshmana Kumar Ramasamy and Seifedine Kadry

Chapter 1
Internet of things (IoT)

The Internet of Things (IoT) refers to the evolutionary stage of the internet, which
makes a global communicating infrastructure between humans and machines. IoT is
constructing the global infrastructure which will change the fundamental aspects of our
lives, from health services to manufacturing, from agriculture to mining. IoT will offer
the necessary facilities of the latest rising artificial intelligence (AI) development. This
chapter discusses the overview, characteristics, advantages, disadvantages, common
uses, security, trust, privacy and functional view of IoT. Furthermore, this chapter
proposes application areas of IoT in detail.

1.1 IoT overview


IoT has grown to be a marketing trend and general news piece. Beyond exagger-
ation, IoT appeared as a powerful technique with appliances in numerous domains.
IoT has origins in multiple former methods: sensor networks, embedded systems and
pervasive informatics. Many IoT devices are linked mutually to develop specific
purpose schemes; in the global network, they are rarely utilized as public access
devices.
An IoT node is a sensor contained hardware piece that broadcasts sensed
information to users or any other devices over the internet. IoT nodes embed into
industrial equipment, mobile and medical instruments, wireless sensors, and more.
Top examples of IoTs are connected smart city, smart industry, smart transport,
smart buildings [1], smart energy, smart manufacturing, smart environment mon-
itoring, smart living, smart health, smart food and water monitoring. Figure 1.1
shows the IoT network architecture. This architecture has a lot of IoT sensors for
sensing purposes such as temperature, humidity, pressure etc. After sensing, these
data are transmitted to a cloud server via an IoT gateway. Furthermore, users can
access these data through mobile apps and so on.
Due to the accessibility of low cost and smart devices, the IoT network refers to a
smart system. IoT devices operate independently with their hearing and transmission

doi:10.1088/978-0-7503-3663-5ch1 1-1 ª IOP Publishing Ltd 2021


Blockchain in the Industrial Internet of Things

Figure 1.1. IoT network architecture.

abilities. Furthermore, the propagation of IoT provides a lot of benefits but also
provides potential threats. An overlooked factor so far is the rise in energy
expenditure. IoT nodes are anticipated to always be accessible on other nodes.
IoT offers a lot of benefits, including:
• Locating and tracing abilities: Customers should be capable of tracking the
nodes and locating them in a short amount of time.
• Ubiquitous information swap: In IoT where nodes are linked to the internet
and where information is transmitted. Ubiquitous means intelligence.
Therefore, intelligence sensors collect information and transmit it using a
prearranged input.
• Enhanced power solution: Customers should be capable of tracking even the
strongest node, and the customer should be capable of obtaining the best
result.
• Data and intelligence management: IoT does not always require providing
commands to the instrument; where the node gives intelligence and informa-
tion previously it can start working and obtains decisions and discovers
solutions based on intelligence.
• Scalability: IoT should be the measurability, as with any number of IoT
nodes above an extensive network all nodes should distinguish uniquely.

Also, numerous significant IoT problems can be identified. These open problems
make it clear that the complexity of internet design currently needs significant
capabilities to alter.
• Unprotected authorization/authentication: The administrator usually presents
authentication to verify the customer identity, and the authorization utilizes
rewriting or modifying the content for that appliance and the consent that the
administrator will give.
• The technology of server: The number of IoT nodes over the IoT field
increases the demand and the number of IoT node replies, moreover increases
simultaneously depending entirely on the server where customers use the

1-2
Blockchain in the Industrial Internet of Things

Figurere 1.2. Characteristics of IoT.

interface. The server response to the IoT node demand should be made
immediately. There must be no delay in responding to the customer.
• Management of storage: A massive quantity of information is created. When
connected IoT nodes have a massive quantity of multimedia data transmitted,
they have big data and other types of inconsistent files where data is held
concerning these IoT nodes, these files do not take much space. Still, many of
them should be useable as soon as possible.
• Data management: As transmission between nodes is completed, more
information is created daily between nodes, and there is more information
to be transmitted from one location to another. Consideration should be
given to whether specific information is transmitted or not.
• Security: Provision of security can be challenging as the automation of nodes
has increased, which has generated novel security problems.

1.1.1 IoT essential characteristics


Figure 1.2 shows IoT essential characteristics discussed as follows:
• Enormous scale: The number of IoT nodes that require handling and
connecting will be a order of magnitude higher than the IoT nodes currently
linked to the internet. Of particular importance will be the administration of
the information created and its analysis for appliance reasons. It is about
content semantics, with content management.
• Safety: As customers achieve advantages from IoT, customers should not fail
to remember security. As senders and receivers of IoT, they should plan for

1-3
Blockchain in the Industrial Internet of Things

security. This encompasses the security of customer information and the security
of customer welfare: protecting networks, endpoints, and is a universal message
that represents generating a measurable safety model.
• Dynamic changes: Device status changes drastically, for instance, sleep
and wakefulness, connection and disconnection and content of IoT nodes
contain speed and position. Besides, the number of IoT nodes can modify
energetically.
• Heterogeneity: Various IoT nodes depending on various networks and
hardware platforms. They should connect to other nodes via various
networks.
• Connectivity: This permits IoT to have ease of access and compatibility. Ease
of access is obtainable on the network though compatibility, presenting the
same capabilities for using and producing content.
• Services related to things: IoT can present a lot of services related to things
within things restrictions. To present services related to things within things
limitations, both techniques in the global and data world will alter.
• Interconnectivity: In terms of IoT, anything could be linked to universal data
and contact the IoT basic organizational and physical structures.

1.1.2 IoT benefits


Currently, every part of business and lifestyle hopes to realise the benefits of IoT.
Figure 1.3 shows a list of a few of the benefits that IoT will provide:
• Technical enhancement: Similar techniques and data that enhance con-
sumer observation of IoT facts and enhance IoT node usage, and facilitate
the most significant advances in technique. IoT opens up a world of actual
data performance and field performance.
• Enhanced consumer engagement: Recent statistics have the problem of
ambiguity and fundamental errors in precision; also, as mentioned,

Figure 1.3. Advantages of IoT.

1-4
Blockchain in the Industrial Internet of Things

engagement remains are inactive. IoT changes this, attaining a rich and
productive engagement, including the spectator.
• Advanced information compilation: Today’s information compilation under-
goes restrictions in plans for practical usage. IoT smashes it down into those
gaps and then puts it right where people desire for investigating our planet.
• Decreased waste: IoT generates development fields more clearly. Recent
statistics provide us with insignificant intelligence, rather IoT presents
actuality data that leads to efficient resource management.

1.1.3 IoT drawbacks


IoT provides an inspiring collection of advantages; it moreover provides an essential
collection of challenges. Figure 1.4 shows a list of some of its main problems:
• Security: IoT generates an environmental scheme for frequently linked nodes
contacting networks. Furthermore, the scheme provides minimal regulation
despite safety measurements. It protects consumers from different types of
hackers [1].
• Privacy: IoT expertise presents private information with complete informa-
tion, not including the involvement of the consumer.
• Flexibility: Consumers are worried regarding the elasticity of the IoT scheme
for easy integration. The anxiety is about discovering themselves with too
many contradictory or protected source codes.
• Compliance: IoT, similar to all other technologies in the trade sector, should
obey the rules. Its difficulty creates the problem of compatibility seeming like
a daunting challenge when many think that typical software compatibility is
a war.

Figure 1.4. Disadvantages of IoT.

1-5
Blockchain in the Industrial Internet of Things

• Complexity: A few consumers discover that IoT schemes are complicated in


the rule of schema, ordering, and storage provided for their usage of
numerous techniques and a massive collection of newly permitted techniques.

1.2 IoT common uses


IoT schemes are helpful for many types of appliances:
• Industrial schemes utilize sensors to monitor together with the industry
procedures themselves—product excellence—and the condition of the appa-
ratus. A growing number of electric motors, for instance, contain sensors that
gather information utilized to forecast future motor breakdowns.
• Smart buildings utilize sensors to discover the positions of persons and the
condition of a building. That information can be utilized to regulate ventilation/
air conditioning and lighting schemes to decrease working prices. Smart
buildings also utilize sensors to monitor the physical condition of the building.
• Smart cities utilize sensors to monitor persons walking rather than travelling
in a vehicle as well as vehicle traffic, and can compile information from smart
buildings.
• Vehicles utilize network sensors to monitor vehicle condition and offer
enhancement, decrease energy expenditure, and reduce inferior discharges.
• Medical schemes link with a variety of patient monitoring sensors that can be
situated at home, in an emergency vehicle, or in a hospital.

There are lots of use cases that assist users in recognizing the needs of the IoT
scheme.
Notification system: Messages from IoT devices can be collected and examined.
Notices made when certain conditions are met.
Sensor network: The scheme can work definitely as an information collection
scheme for the sensor sets.
Reactive system: Study of IoT device sensed information could incite actuators to
be accelerated. Users retain a word reactive for schemes that do not execute standard
regulatory rules.
Analysis system: Messages from IoT devices are collected and examined, other
than in that event, the research is continuing. Research outcomes can be created
occasionally.
Event latency: Delays from capturing an event to its receiver cannot be significant
for volume-based apps but are significant for online research.
Control scheme: IoT device sensed information is nourishing to regulate the
instructions that produce the effects for the actuator. Users may discover the
category of non-functional necessities that execute to most IoT schemes. Non-
functional necessities in the scheme force non-functional needs on the elements.
Buffer volume and event loss rate: If there are no strict limits on event manufacturing
standards, the surroundings can generate multiple events over some time over the
scheme. The event loss rate holds the preferred abilities, while buffer volume is a
practical need that may directly link to the strength of the elements.

1-6
Blockchain in the Industrial Internet of Things

Availability and reliability: As IoT, schemes are dispersed; availability is often


utilized to explain dispersed schemes. Reliability may determine across network
components instead of total scheme reliability.
Throughput and service latency: Finally, procedures would be executed through
maintenance. Users could indicate throughput and delays of maintenance.
A lifetime of service: IoT schemes are always anticipated to contain longevity
greater than users anticipate for PC schemes. The lifespan of a scheme or subdivision
of a scheme might be longer than that of an element, mainly if a scheme utilizes
passive sensors and different elements.

1.3 IoT—security
Security is ultimately seen as a significant necessity for each kind of computer
scheme, containing IoT schemes. However, most IoT schemes are significantly safer
than standard Windows/Linux/Mac schemes. IoT safety issues arise from a variety
of reasons: insufficient hardware safety elements, inadequately created software with
broad limitations of susceptibilities, and different safety creation faults.
Unprotected IoT devices generate safety issues for the whole IoT scheme. Since
devices generally contain a lifespan of numerous years, an enormous established
foundation of vulnerable IoT nodes would cause safety issues in the future. Unprotected
IoT schemes create safety issues across the internet. IoT nodes abound; unprotected
IoT devices are perfectly suitable for a lot of attacks (especially denial-of-service (DoS)).
Consumer details are secure from direct theft; however, the IoT needs to be built,
thereby low confidentiality information could not be merely utilized for conjecture
about high confidentiality information.

Example: A German article states that attackers have hacked the safety scheme.
They disturbed the management scheme, which prevented the furnace from closing
correctly, resulting in serious harm. Therefore, users may know the consequence of
the assault earlier, determining a suitable defence.

Challenges: Aside from pricing and availability of IoT nodes everywhere, different
safety problems cause continual trouble to the IoT shown in figure 1.5:
• Device similarity: IoT nodes are well homogeneous. These nodes use a similar
communication technique and elements. If one scheme or node is vulnerable
from susceptibility, numerous others contain a similar problem.
• Unexpected activities: The vast amount of IoT nodes used and their vast list of
empowering techniques denotes that these nodes activities in the area may be
unexpected. A particular scheme might be well-designed within management
systems; however, there are no assurances of how it will communicate with
other nodes.
• Device longevity: One of the advantages of IoT nodes is long life, but that
long life denotes that they can live longer with their node assistance. One can
measure the similarity or dissimilarity between this and conventional schemes
that have to assist and modernize after a long time, with numerous terminating

1-7
Blockchain in the Industrial Internet of Things

Figure 1.5. Security challenges of IoT.

their utilization. Abandonware and Orphan nodes do not have a similar safety
toughness for different schemes because of the emergence of techniques over
time.
• Complex deployment: One of the primary objectives of IoT is to put superior
networks and research where they could not go before. Unexpectedly, this
makes a difficulty for physical protection of nodes in these areas that are
extreme or only accessible with difficulty.
• Lack of transparency: Numerous IoT nodes fail to present clarity in terms of
their performance. Consumers are unable to see or use their procedures and
can only assume the nodes work correctly. They cannot regulate unnecessary
activities or information gathering; moreover, when the producer updates the
node, it might carry unnecessary activities.
• No warnings: One more purpose of IoT is to offer the best performance in the
absence of interruption. This initiates consumer consciousness issues.
Consumers are not aware of the nodes or recognize when an unfamiliar thing
becomes invalid. Safety violations may continue for a long time in the absence
of discovery.

1.3.1 Trust for IoT


A trustworthy structure needs to be able to manage people and equipment as
consumers, e.g. it needs to transfer hope to people and to be strongly sufficient to be

1-8
Blockchain in the Industrial Internet of Things

utilized by types of equipment without DoS attack [2]. The building of hope
structures that tackle this necessity will need improvements in fields, for example:
• Lightweight public key infrastructures (PKIs) as a basis for confidence
management. Improvements are predicted in hierarchy and cross-certification
ideas to allow decisions to deal with the scalable necessities.
• Lightweight key management schemes to allow confidence relations to be set
up and to share encryption tools using minimal contact and procedure tools,
as well as limited resource nature of numerous IoT nodes.
• Data quality is a necessity for numerous IoT-designed schemes where a set of
data that describes data about other information can be utilized to offer IoT
information reliable estimation.
• Decentralized and self-configuring schemes are substituted by PKI to set up
reliability, for instance, a federated identity, Peer-to-peer (P2P) network.
• Reliability negotiation is a process that permits two parties to discuss routinely,
basically a sequence of reliability tenets, the low condition of reliability needed
to allow an act of assistance or a data strip.
• Guaranteed techniques for reliable sites contain protocols, software, hard-
ware, etc.
• Access control to avoid information violations. One instance is usage regu-
lation, which is the procedure of guaranteeing the proper use of specific data
according to a pre-defined principle, after which the access to data is allowed [3].

1.3.2 IoT privacy


Most of the data in an IoT scheme can be private information; there is a need to
assist in anonymous and limited private data management. There are many fields
where development is needed:
• Cryptographic technologies that allow secured data to be saved and pro-
gressed and distributed, without the data being accessible to third parties.
• Securing the secrecy of the area, where the area can be incorporated into
things related to human beings [3, 4].
• Restriction of private data presumption, people may desire to maintain it
confidential, by looking at IoT associated transactions.
• Maintaining data as the neighborhood as is feasible utilizing key management
and distributed computing.
• A soft identifier application, where consumer identity can be utilized to make
a wide variety of different identities for particular appliances. One soft
identifier may not build for a particular theme without exposing unnecessary
details, which could lead to a violation of confidentiality [4].

1.4 Functional view of IoT


The IoT system indicates to uniquely discoverable devices with their visual pre-
sentations in a structure such as the Internet and IoT problem solving that include
many elements, for example:

1-9
Blockchain in the Industrial Internet of Things

1) IoT local device communication model (a small distance wireless network


can be contacted, for instance, installed on a mobile phone or situated in the
surroundings of a consumer etc). This model is in responsible for acquiring,
monitoring and transmission to remote servers for perpetual storage and
research.
2) Local research module and observation processing obtained by IoT nodes.
3) Model to communicate with remote IoT nodes,directly on the internet or
possibly by proxy. This model is in charge of observation acquired and
transmission to remote servers for perpetual storage and research.
4) Data analytics applications model works on an application server that serves
all customers. It takes demands from the web and mobile customers as well
as appropriate IoT views as input, implements relevant information execut-
ing algorithms and provides output based on skills that will be provided after
to consumers.
5) Consumer interface (mobile or web): measurements of the visual representa-
tion in the given circumstances and consumer communication, e.g. descrip-
tion of customer enquiries.

1.5 Application domains


IoT application areas identified by the IoT European Research Cluster (IERC)
based on the inputs of specialists, reports and studies. Top examples of IoT
applications are smart city, smart industry, smart transport, smart buildings, smart
energy, smart manufacturing, smart environment monitoring, smart living, smart
health, smart food and water monitoring.
Industrial automation and production stressed from the shortlived manufacturing
life cycle and the need for short-term marketing in numerous domains. The next-
generation of production schemes will be constructed on elasticity and redesigned as
an important goal. The new list of IoT appliances presented beneath includes
examples of IoT applications in different areas, indicating why IoT is one of the
planned technique fashions over the subsequent five years.

1.5.1 Smart industry


Machine-to-machine appliances: Automatic machine diagnostics and asset
management.
The liquid level of a tank or vessel: Monitoring fuel and water levels in storage
vessels and wells.
Silo volume calculator: Measure of emptiness and weight of merchandise.
Air quality within and around buildings and structures: Supervising of dangerous
gas and oxygen quantities within an industrial process plant that manufactures
chemicals to guarantee the safety of workers and merchandise [5, 6].
The presence of ozone: Ozone monitoring for the period of dry meat processing in
the food industry.
Measurement and monitoring of temperature: Temperature control inside medical
refrigerator systems with important ingredients.

1-10
Blockchain in the Industrial Internet of Things

1.5.2 Smart mobility and transport


Shipment Quality: Supervising of container openings, vibrations, impacts, or any
damage for insurance.
NFC Payment: Enable merchants to get credit or debit card payments online by
offering a link to a merchant bank or acquirer based in a place or time required to
complete the activities of public transportation, museums, galleries, and so on.
Object Location: Search individual objects in large locations such as repositories
or ports.
Monitor the activity of fleet vehicles and assets: Route control of critical assets
such as jewels, medical drugs or hazardous materials.
Non-compatibility discovery of storage: Alerting of containers’ emission of readily
combustible materials close to others holding explosives.
Car management: Car sharing organizations run the usage of vehicles using
smartphones with net connections fixed in each car.
Automatic vehicle diagnosis: Data gathering from CAN Bus to transmit a real-
time alarm to immediate risks or to offer tips to a person who drives a vehicle.

1.5.3 Smart buildings


Liquid availability: Liquid discovery in data centres, buildings for storing goods and
significant construction underground to avert collapse and the process of slow
destruction by chemical action.
Access control of perimeter: Selective restriction of access to protected areas and
the discovery of human beings in unauthorized areas [3].
Control of indoor climate: Measuring and controlling a physical quantity that
expresses hot and cold, equipment for producing light, carbon dioxide in fresh air at
ppm and so on.
Preserving culture through art: Condition monitoring within museums and art
galleries.
Intrusion prevention system: Discovery of doors and windows openings and
breaches to detect intruders, especially into a building with criminal intent.
Residential-irrigation: Smart irrigation and monitoring system.

1.5.4 Smart energy


Installation of photovoltaic: Supervising and enhancing of operation in solar power
stations [7].
Grid modernization: Power usage supervising and controlling.
Wind energy converter: Supervising and examining the flow of power from a wind
energy converter, as well as two-way contact with smart meters for customers to
examine usage patterns.
Radiation rate: Shared calculation of radiation rates in surrounding nuclear
power plants to create leak warnings.
Stream: Measuring water force that pushes water through pipes in water flow
schemes.

1-11
Blockchain in the Industrial Internet of Things

1.5.5 Smart production


Composting: Temperature and humidity management in hay, alfalfa, straw, and so
on to deter fungi and various microbiological contaminations.
Intelligent management of manufactures: Controlling stock rotation based on
FIFO (First-IN, First-OUT) rules on warehouse shelving and storage to stock
replenishment automation.
Descendant care: Controlled breeding in farm animals to guarantee their health
and survival [8].
Measurements of toxic gas: Research of air pollution in farm buildings and the
discovery of dangerous gases from stables [5, 6].
Tracking animals: Locating and identifying animals that graze in open grazing
lands or area in the largest stables.
Telecommuting: Providing workers with technology to allow local offices will
decrease costs, increase productive capacity, and increase job opportunities while
decreasing staff housing, reducing office maintenance and cleaning, and removing
everyday office travel.
Production-line monitoring: Production-line monitoring and managment based on
radio-frequency identification (RFID), sensors, video surveillance, remote data
sharing and cloud-based solutions that allow production-line information to change
to business-based schemes.

1.5.6 Smart environment monitoring


Air contamination: Decreasing CO2 emissions from industries, vehicles and hazard-
ous gases created in agriculture fields [5, 9].
Discovery of forest fire: Flue gases monitoring and monitoring of preventive fire
conditions for the identification of warning areas [10].
Protection against avalanches and landslides: Monitoring of the water stored in the
soil, density of the Earth and vibrations to discover harmful patterns in earth states.
Wildlife protection: Tracking calls use GSM/GPS modules to discover and trace
wildlife and supply their co-ordinates through SMS.
Premature earthquake discovery: Distributed control in certain quake areas.
Monitoring oceans and coasts: Using a variety of sensors combined in aircraft, ships,
satellites etc for maritime security, fishing vessel tracing and unsafe oil supplies etc.
Weather station networks: Research of meteorological conditions in agricultural
land to predict the formation of ice, drought and air change.

1.5.7 Smart living


Water and energy consumption: Monitoring energy and water use to get advice on
how to save costs and resources.
Smart shopping system: Get advice on where to sell based on consumer prefer-
ences, buying behavior, the existence of allergies, or expiration dates.
Remote control devices: Remotely turn on and off devices to prevent accidents and
for energy saving.

1-12
Blockchain in the Industrial Internet of Things

Smart home products: Transparent LCD display refrigerator that shows what is
inside, expired food details, ingredients for a well-stocked kitchen and all the data
obtainable through the app on the smartphone [11]. Washing machines permit one
to control the laundry from far away and work routinely when electricity prices are
very low. Smart cooking apps monitor the automatic cleaning function of the oven
and permitting adjustable temperature control from a distance.
Meteorological station: Shows conditions of the outside weather, for example,
humidity, heat, atmospheric pressure, air velocity and rainfall using meters capable
of transmitting information over long distances.
Regular checking of safety procedures and standards: Baby alarm, an optical tool
used to record images, and house alarm schemes that are making human beings
feeling safer in their everyday lives at home.
Gas detector: Real-time data concerning gas consumption and the state of gas
piping can present by linking local gas meters to the internet protocol (IP) network.
Concerning monitoring and assessing water quality, the result could be a diminution
in labour and repair prices, enhanced precision and meter readings price reduction,
and perhaps gas usage diminution.

1.5.8 Smart health


Activity monitors as support for older persons’ physical activity: Wireless body area
network measures movement, critical signals, blurred vision and the cellular unit,
gathering, displaying and storing activity information.
Falling-detection: Help for the elderly or disabled who live independently.
Pharmacy refrigerators: The conditions of the regulation within cold storage for
storing medicines, vaccines and organic components.
Patient monitoring: Surveillance of patient health status within hospitals and
nursing homes.
Personal care of sports people: Vital sign monitoring in high-performance areas
and camps. Fitness and health manufacture for these reasons are available, that
calculate fitness, steps, weight, blood pressure, and other details.
Managing chronic illness: Patient surveillance programs with full patient details
can be obtainable for monitoring chronic illness patients remotely. Admission to a
reduced medical facility, low price, and temporary hospital stay can be just a few of
the advantages.
Hand hygiene approach: Monitoring scheme by using RFID tags for wristbands
with the integration of Bluetooth LE tags at the patient’s hand hygiene control,
where vibration alerts are transmitted to notify during handwashing. The entire
information gathered generates statistics that can utilize tracking patient morbidity
in specific health staff [8].
Ultraviolet light: Measuring UV sunlight to alert humans not to be exposed at
specific times.
Oral care: A Bluetooth-connected dental brush with an app on the smartphone
examines the task of brushing teeth and provides details on the smartphone to obtain
confidential information or to show statistics to the dental surgeon.

1-13
Blockchain in the Industrial Internet of Things

Sleep control: IoT devices situated across the bed sense usual movements, such as
breathing and heartbeat and huge movements caused by tossing and turning at night
when asleep, presenting information obtainable via the smartphone app.

1.5.9 Smart water monitoring and smart food


Water Leaks: Discovery of water availability in outside tanks and pressure differ-
ences in pipelines.
Quality of water: Analysis of the appropriateness of water in natural flowing
watercourses and oceans for all of the animal life present in a particular region or
time and the appropriateness for potable usage.
Flooding: Monitoring the variability of flow rates of rivers, reservoirs and dams.
Control the supply chain: Monitoring storage conditions during supply chain
activities and manufacture tracing for tracking reasons.
Water management: Real-time data concerning water condition and water usage
can gather by linking a water meter to the IP network [12].
Enhancement of wine excellence: Monitoring water stored in the soil and trunk
width in vineyards to regulate sugar levels in grapes and health of grapevine.
Grounds where the game of golf is played (golf course): Selected irrigation in arid
areas to decrease the essential green-water assets.
Greenhouses: Regulate microclimatic level to increase vegetable and fruit man-
ufacture and excellence.
In-field water quality monitoring: Decreasing food spoilage with excellent track-
ing, statistical management, continuous data acquisition, and crop field manage-
ment, with excellent management of fertilization, irrigation and electricity.

1.5.10 Smart city


City noise mapping: Monitoring noise in the concentric zone, including bar areas in
real-time.
Construction health: Vibration and conditions of materials monitoring in statues,
bridges, monuments and popular buildings [8].
Traffic jam: Pedestrian and vehicle level monitoring to enhance walking and
driving paths.
Safer cities: Video surveillance system, public address sound systems and fire
prevention and control systems.
Intelligent lighting: Smart and weather adaptive lights in raised sources of light on
the edge of a road.
IoT applications differ, and IoT applications work for various consumers. Various
categories of consumers have various driving requirements. From an IoT point of view,
there are three essential consumer categorizations:
• individual citizens;
• groups of citizens (citizens of a nation, state and city);
• companies.

1-14
Blockchain in the Industrial Internet of Things

Examples of IoT applications required by individual citizens are such that:


• Increasing their security or the security of members of their family—for
instance, remote control for a security alarm system, or activity recognition
for older people;
• Facilitating easy-to-perform tasks—for instance: home inventory manage-
ment reminder.

1.6 Summary
This chapter describes an overview, characteristics, advantages, disadvantages,
common uses, security, trust, privacy and functional view of IoT. Furthermore,
we propose application areas of IoT in detail. IoT can promote a functional variety
of industrial appliances like logistics, manufacturing, food business and services.
Novel standards, novel trade, competition, and the need to transport nonstop goods
are challenges new businesses face nowadays. As a result, a lot of companies rely on
Industrial Internet of Things (IIoT), which refers to any performance executed by
businesses to model, supervise and enhance their business processes during insights
gathered from thousands of linked machines to assist them in enhancing economical
profit. Therefore, the next chapter discusses IIoT in detail.

References
[1] Nia A M and Jha N K 2017 A comprehensive study of the security of Internet-of-Things
IEEE Trans. Emerging Top. Comput. 5 586–602
[2] Daud M, Rasiah R and George M 2018 Denial of service: (DoS) impact on sensors 4th Int.
Conf. on Info. Management (ICIM)
[3] Yang Y, Liu X and Deng R H 2018 Lightweight break-glass access control system for
healthcare Internet-of-Things IEEE Trans. on Industrial Informatics 14 3610–7
[4] Yang Y, Wu L, Yin G, Li L and Zhao H 2017 A survey on security and privacy issues in
internet-of-things IEEE Internet Things J. 4 1250–8
[5] Jamal H, Huzaifa M and Sodunke M A 2019 Smart heat stress and toxic gases monitoring
instrument with a developed graphical user interface using IoT Int. Conf. on Electrical,
Commun., and Computer Engineering (ICECCE)
[6] Kodali R K and Rajanarayanan S C 2019 IoT based indoor air quality monitoring system
Int. Conf. on Wireless Commun. Signal Processing and Networking (WiSPNET)
[7] Barman B K, Yadav S N and Kumar S 2018 IOT based smart energy meter for efficient
energy utilization in smart grid 2nd Int. Conf. on Power, Energy and Environment: Towards
Smart Technology (ICEPE)
[8] Wu F, Wu T and Yuce M R 2019 Design and implementation of a wearable sensor network
system for IoT-connected safety and health application IEEE 5th World Forum on the
Internet of Things (WF-IoT)
[9] Muthukumar S, Sherine Mary W and Jayanthi S 2018 IoT based air pollution monitoring
and control system Int. Conf. on Inventive Res. in Comput. Appl. (ICIRCA)
[10] Prabha B 2019 An IoT based efficient fire supervision monitoring and alerting system Third
Int. Conf. on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)

1-15
Blockchain in the Industrial Internet of Things

[11] Agarwal K, Agarwal A and Misra G 2019 Review and performance analysis on wireless
smart home and home automation using IoT Third Int. Conf. on I-SMAC
[12] Rajurkar C, Prabaharan S R S and Muthulakshmi S 2017 IoT based water management
IEEE Int. Conf. on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)

1-16
Blockchain in the Industrial Internet of Things

Full list of references


Chapter 1
[1] Nia A M and Jha N K 2017 A comprehensive study of the security of Internet-of-Things
IEEE Trans. Emerging Top. Comput. 5 586–602
[2] Daud M, Rasiah R and George M 2018 Denial of service: (DoS) impact on sensors 4th Int.
Conf. on Info. Management (ICIM)
[3] Yang Y, Liu X and Deng R H 2018 Lightweight break-glass access control system for
healthcare Internet-of-Things IEEE Trans. on Industrial Informatics 14 3610–7
[4] Yang Y, Wu L, Yin G, Li L and Zhao H 2017 A survey on security and privacy issues in
internet-of-things IEEE Internet Things J. 4 1250–8
[5] Jamal H, Huzaifa M and Sodunke M A 2019 Smart heat stress and toxic gases monitoring
instrument with a developed graphical user interface using IoT Int. Conf. on Electrical,
Commun., and Computer Engineering (ICECCE)
[6] Kodali R K and Rajanarayanan S C 2019 IoT based indoor air quality monitoring system
Int. Conf. on Wireless Commun. Signal Processing and Networking (WiSPNET)
[7] Barman B K, Yadav S N and Kumar S 2018 IOT based smart energy meter for efficient
energy utilization in smart grid 2nd Int. Conf. on Power, Energy and Environment: Towards
Smart Technology (ICEPE)
[8] Wu F, Wu T and Yuce M R 2019 Design and implementation of a wearable sensor network
system for IoT-connected safety and health application IEEE 5th World Forum on the
Internet of Things (WF-IoT)
[9] Muthukumar S, Sherine Mary W and Jayanthi S 2018 IoT based air pollution monitoring
and control system Int. Conf. on Inventive Res. in Comput. Appl. (ICIRCA)
[10] Prabha B 2019 An IoT based efficient fire supervision monitoring and alerting system Third
Int. Conf. on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)
[11] Agarwal K, Agarwal A and Misra G 2019 Review and performance analysis on wireless
smart home and home automation using IoT Third Int. Conf. on I-SMAC
[12] Rajurkar C, Prabaharan S R S and Muthulakshmi S 2017 IoT based water management
IEEE Int. Conf. on Nextgen Electronic Technologies: Silicon to Software (ICNETS2)

Chapter 2
[1] Karmakar A, Dey N, Baral T, Chowdhury M and Rehan M 2019 Industrial Internet of
Things: a review IEEE 2019 Int. Conf. on Opto-Electronics and Applied Optics
[2] Tomas J P 2017 Thames water rolls out smart meter project in london https://wiprodigital.
com/cases/progressive-metering-a-utilitys-strategic-move-into-predictive-planning/
[3] Daugherty P, Banerjee P, Negm W and Alter A E 2015 Driving unconventional growth
through the Industrial Internet of Things, Accenture Technology
[4] Yu X and Guo H 2019 A survey on IIoT security 2019 IEEE VTS Asia Pacific Wireless
Communications Symp.
[5] Sisinni E, Saifullah A, Han S, Jennehag U and Gidlund M 2018 Industrial Internet of
Things: challenges, opportunities, and directions IEEE Trans. Industr. Inform. 14 4724–34
[6] Anis M, Gadallah Y and Elhennawy H 2016 Machine-to-machine communications over the
Internet of Things: private Wi-Fi access prospects IEEE 2016 Wireless Days (WD)
[7] Buntz 2017 The top 20 industrial IoT applications https://iotworldtoday.com/2017/09/20/top-
20-industrial-iot-applications/
Blockchain in the Industrial Internet of Things

[8] Yang C, Shen W and Wang X 2016 Applications of Internet of Things in manufacturing
2016 IEEE 20th Int. Conf. on Computer Supported Cooperative Work in Design
[9] Breivold H P and Sandström K 2015 Internet of Things for industrial automation—
challenges and technical solutions 2015 IEEE Int. Conf. on Data Science and Data
Intensive Systems
[10] Jahan S, Rahman M S and Saha S 2017 Application specific tunneling protocol selection for
virtual private networks 2017 IEEE Int. Conf. on Networking, Systems and Security
[11] Fraile F, Tagawa T, Poler R and Ortiz A 2018 Trustworthy industrial IoT gateways for
interoperability platforms and ecosystems IEEE Internet Things J. 5 4506–14
[12] Wollschlaeger M, Sauter T and Jasperneite J 2017 The future of industrial communication:
automation networks in the era of the Internet of Things and Industry 4.0 IEEE Ind.
Electron. Mag. 11 17–27

Chapter 3
[1] Zheng Z, Xie S, Dai H, Chen X and Wang H 2017 An overview of blockchain technology:
architecture, consensus, and future trends 2017 IEEE Int. Congress on Big Data
[2] Osmov V, Kurbanniyazov A and Hussain R 2019 On the blockchain-based general-purpose
public key infrastructure 2019 IEEE/ACS 16th Int. Conf. on Computer Systems and
Applications
[3] Bhulania I P and Raj G 2018 Analysis of cryptographic hash in blockchain for bitcoin
mining process 2018 IEEE Int. Conf. on Advances in Computing and Communication
Engineering
[4] Kaur Chadha G and Singh A 2019 Bitcoin block-chain mining 2019 IEEE 9th Int. Conf. on
Cloud Computing
[5] Liu S and He S 2019 Application of block chaining technology in finance and accounting
field 2019 IEEE Int. Conf. on Intelligent Transportation, Big Data & Smart City
[6] Gemeliarana I G A K and Sari R F 2018 Evaluation of Proof of Work (POW) blockchains
security network on selfish mining 2018 IEEE Int. Seminar on Research of Information
Technology and Intelligent Systems
[7] Zhu J, Liu P and He L 2017 Mining information on Bitcoin network data 2017 IEEE Int.
Conf. on Internet of Things (iThings)
[8] Chang S Y and Park Y 2019 Silent timestamping for blockchain mining pool security 2019
IEEE Int. Conf. on Computing, Networking and Communications
[9] Sharma B, Sekharan C N and Zuo F 2018 Merkle-tree based approach for ensuring integrity
of electronic medical records 2018 9th IEEE Annual Ubiquitous Computing, Electronics &
Mobile Communication Conf.
[10] Pouraghily A and Wolf T 2019 A lightweight payment verification protocol for blockchain
trans. on IoT devices 2019 IEEE Int. Conf. on Computing, Networking and Communications
[11] Destefanis G, Marchesi M and Ortu M 2018 Smart contracts vulnerabilities: a call for
blockchain software engineering 2018 IEEE Int. Workshop on Blockchain Oriented Software
Engineering
[12] Bernabe J B, Canovas J L and Hernandez-Ramos J L 2019 Privacy-preserving solutions for
blockchain: review and challenges IEEE Access 7 164908–40
[13] Shalini S and Santhi H 2019 A survey on various attacks in bitcoin and cryptocurrency 2019
IEEE Int. Conf. on Communication and Signal Processing
Blockchain in the Industrial Internet of Things

Chapter 4
[1] Arun M, Balamurali S, Rawal B S, Duan Q, Kumar R L and Balamurugan B 2020 Mutual
authentication and authorized data access between fog and user-based on blockchain
technology IEEE INFOCOM 2020-IEEE Conf. on Computer Communications Workshops
(INFOCOM WKSHPS) (Piscataway, NJ: IEEE), pp 37–42
[2] Hofmann F, Wurster S, Ron E and Böhmecke-Schwafert M 2017 The immutability concept
of blockchains and benefits of early standardization 2017 ITU Kaleidoscope: Challenges for a
Data-Driven Society (ITU K) (Piscataway, NJ: IEEE), pp 1–8
[3] Ye C, Li G, Cai H, Gu Y and Fukuda A 2018 Analysis of security in the blockchain: A case
study in 51%-attack detecting 2018 5th Int. Conf. on Dependable Systems and Their
Applications (DSA) (Piscataway, NJ: IEEE), pp 15–24
[4] Puthal D, Malik N, Mohanty S P, Kougianos E and Yang C 2018 The blockchain is a
decentralized security framework [future directions] IEEE Consum. Electron. Mag. 7 18–21
[5] Yang Z, Yang K, Lei L, Zheng K and Leung V C 2018 Blockchain-based decentralized trust
management in vehicular networks IEEE Internet Things J. 6 1495–505
[6] Wang S, Zhang Y and Zhang Y 2018 A blockchain-based framework for data sharing with
fine-grained access control in decentralized storage systems IEEE Access 6 38437–50
[7] Halpin H and Piekarska M 2017 Introduction to security and privacy on the blockchain 2017
IEEE Eur. Symp. on Security and Privacy Workshops (EuroS&PW) (Piscataway, NJ:
IEEE), pp 1–3
[8] Fernández-Caramès T M and Fraga-Lamas P 2020 Towards post-quantum blockchain: A
review on blockchain cryptography resistant to quantum computing attacks IEEE Access 8
21091–116
[9] Ajao L A, Agajo J, Adedokun E A and Karngong L 2019 Crypto hash algorithm-based
blockchain technology for managing decentralized ledger database in the oil and gas industry
Multidiscip. Sci. J. 2 300–25
[10] Bacon J, Michels J D, Millard C and Singh J 2018 Blockchain demystified: a technical and
legal introduction to distributed and centralized ledgers Rich. J.L. & Tech. 25 1
[11] Zia M F, Benbouzid M, Elbouchikhi E, Muyeen S M, Techato K and Guerrero J M 2020
Microgrid transactive energy: review, architectures, distributed ledger technologies, and
market analysis IEEE Access 8 19410–32
[12] Dai M, Zhang S, Wang H and Jin S 2018 A low storage room requirement framework for
distributed ledger in the blockchain IEEE Access 6 22970–5
[13] Zheng Z, Xie S, Dai H, Chen X and Wang H 2017 An overview of blockchain technology:
Architecture, consensus, and future trends 2017 IEEE Int. Congress on Big Data (BigData
Congress) (Piscataway, NJ: IEEE), pp 557–64
[14] Mingxiao D, Xiaofeng M, Zhe Z, Xiangwei W and Qijun C 2017 A review on consensus
algorithm of blockchain 2017 IEEE Int. Conf. on Systems, Man, and Cybernetics (SMC)
(Piscataway, NJ: IEEE), pp 2567–72
[15] Bach L M, Mihaljevic B and Zagar M 2018 Comparative analysis of blockchain consensus
algorithms 2018 41st Int. Convention on Information and Communication Technology,
Electronics and Microelectronics (MIPRO) (Piscataway, NJ: IEEE), pp 1545–50
[16] Chen Y H, Chen S H and Lin I C 2018 Blockchain-based smart contract forbidding system
2018 IEEE Int. Conf. on Applied System Invention (ICASI) (Piscataway, NJ: IEEE), pp
208–11
Blockchain in the Industrial Internet of Things

[17] Xiong W and Xiong L 2019 Smart contract-based data trading mode using blockchain and
machine learning IEEE Access 7 102331–44
[18] Niranjanamurthy M, Nithya B N and Jagannatha S 2019 Analysis of Blockchain
technology: pros, cons and SWOT Cluster Comput. 22 14743–57

Chapter 5
[1] Szabo N 2017 Smart contracts: building blocks for digital markets, 1996. URL: http://www.
fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool
2006/szabo.best.vwh.net/smart_contracts_2.html
[2] Zichichi M, Contu M, Ferretti S and D’Angelo G 2019 LikeStarter: a smart-contract based
social DAO for crowdfunding IEEE INFOCOM 2019-IEEE Conf. on Computer
Communications Workshops (INFOCOM WKSHPS) (Piscataway, NJ: IEEE), pp 313–8
[3] Yavuz E, Koç A K, Çabuk U C and Dalkılıç G 2018 Towards secure e-voting using the
ethereum blockchain 2018 6th Int. Symp. on Digital Forensic and Security (ISDFS)
(Piscataway, NJ: IEEE), pp 1–7
[4] Cheng J C, Lee N Y, Chi C and Chen Y H 2018 Blockchain and smart contract for a digital
certificate 2018 IEEE Int. Conf. on Applied System Invention (ICASI) (Piscataway, NJ:
IEEE), pp 1046–51
[5] Sukhwani H, Wang N, Trivedi K S and Rindos A 2018 Performance modelling of hyper
ledger fabric (permissioned blockchain network) 2018 IEEE 17th Int. Symp. on Network
Computing and Applications (NCA) (Piscataway, NJ: IEEE), pp 1–8
[6] Singh G, Chelini L, Corda S, Awan A J, Stuijk S, Jordans R, Corporaal H and Boonstra A J
2018 A review of near-memory computing architectures: opportunities and challenges 2018
21st Euromicro Conf. on Digital System Design (DSD) (Piscataway, NJ: IEEE), pp 608–17
[7] Orjuela K G, Gaona-García P A and Marin C E 2020 Towards an agriculture solution for
product supply chain using blockchain: case study Agro-chain with BigchainDB Acta Agric.
Scand. B: Soil Plant Sci. 71 1–6
[8] Chalaemwongwan N and Kurutach W 2018 Notice of violation of IEEE publication
principles: state of the art and challenges facing consensus protocols on the blockchain
2018 Int. Conf. on Information Networking (ICOIN) (Los Alamitos, CA: IEEE Computer
Society), pp 957–62
[9] Mehar M I, Shier C L, Giambattista A, Gong E, Fletcher G, Sanayhie R, Kim H M and
Laskowski M 2019 Understanding a revolutionary and flawed grand experiment in the
blockchain: the DAO attack J. Cases Inf. Technol. 21 19–32
[10] Delmolino K, Arnett M, Kosba A, Miller A and Shi E 2016 Step by step towards creating a
safe, smart contract: lessons and insights from a cryptocurrency lab Int. Conf. on Financial
Cryptography and Data Security (Berlin: Springer), pp 79–94
[11] Pierro G A and Rocha H 2019 The influence factors on ethereum transaction fees 2019
IEEE/ACM 2nd Int. Workshop on Emerging Trends in Software Engineering for Blockchain
(WETSEB) (Piscataway, NJ: IEEE), pp 24–31
[12] Luu L, Chu D H, Olickel H, Saxena P and Hobor A 2016 Making smart contracts smarter In
Proc. of the 2016 ACM SIGSAC Conf. on Computer and Communications Security pp 254–69
[13] Portmann E 2018 Rezension, blockchain: blueprint for a new economy HMD Praxis der
Wirtschaftsinformati 55 1362–4
[14] Zeng X, Hao N, Zheng J and Xu X 2019 A consortium blockchain paradigm on the hyper
ledger-based peer-to-peer lending system China Commun. 16 38–50
Blockchain in the Industrial Internet of Things

[15] Poongodi M, Sharma A, Vijayakumar V, Bhardwaj V, Sharma A P, Iqbal R and Kumar R


2020 Prediction of the price of Ethereum blockchain cryptocurrency in an industrial finance
system Comput. Electr. Eng. 81 106527
[16] Christidis K and Devetsikiotis M 2016 Blockchains and smart contracts for the internet of
things IEEE Access 4 2292–303
[17] Béres F, Seres I A, Benczúr A A and Quintyne-Collins M 2020 Blockchain is watching you:
profiling and deanonymizing ethereum users arXiv preprint arXiv:2005.14051
[18] Li J, Gu C, Wei F and Chen X 2019 A survey on blockchain anomaly detection using data
mining techniques Int. Conf. on Blockchain and Trustworthy Systems (Singapore: Springer),
pp 491–504
[19] Liu C, Liu H, Cao Z, Chen Z, Chen B and Roscoe B 2018 Regard: finding reentrancy bugs in
smart contracts 2018 IEEE/ACM 40th Int. Conf. on Software Engineering: Companion
(ICSE-Companion) (Piscataway, NJ: IEEE), pp 65–8
[20] Al-Breiki H, Rehman M H, Salah K and Svetinovic D 2020 Trustworthy blockchain oracles:
review, comparison, and open research challenges IEEE Access 8 85675–85
[21] Liao D Y and Wang X 2017 Design of a blockchain-based lottery system for smart cities
applications 2017 IEEE 3rd Int. Conf. on Collaboration and Internet Computing (CIC)
(Piscataway, NJ: IEEE), pp 275–82

Chapter 6
[1] Ye D, Zhang M and Vasilakos A V 2017 A survey of self-organization mechanisms in multi-
agent systems IEEE Trans. Syst. Man Cybern. 47 441–61
[2] Rizk Y, Awad M and Tunstel E W 2018 Decision making in multi-agent systems: a survey
IEEE Trans. Cogn. Devel. Syst. 10 514–29
[3] Fioretto F, Pontelli E and Yeoh W 2018 Distributed constraint optimization problems and
applications: a survey J. Artif. Intell. Res. 61 623–98
[4] Rehman M H U, Liew C S, Wah T Y and Khan M K 2017 Towards next-generation
heterogeneous mobile data stream mining applications: opportunities, challenges, and future
research directions J. Netw. Comput. Appl. 79 1–24
[5] Rehman M H U, Batool A, Liew C S and Teh Y-W et al 2017 Execution models for mobile
data analytics IT Prof. 19 24–30
[6] Bottou L, Curtis F E and Nocedal J 2018 Optimization methods for large-scale machine
learning SIAM Rev. 60 223–311
[7] Contreras-Cruz M A, Lopez-Perez J J and Ayala-Ramirez V 2017 Distributed path planning
for multi-robot teams based on artificial bee colony 2017 IEEE Congress on IEEE in
Evolutionary Computation (CEC) 541–8
[8] van Zelst S J, van Dongen B F and van der Aalst W M 2018 Event stream-based process
discovery using abstract representations Knowl. Inf. Syst. 54 407–35
[9] Lu H, Li Y, Chen M, Kim H and Serikawa S 2018 Brain intelligence: go beyond artificial
intelligence Mob. Netw. Appl. 23 368–75
[10] Kurtulmus A B and Daniel K 2018 Trustless machine learning contracts; evaluating and
exchanging machine learning models on the ethereum blockchain arXiv preprint
arXiv:1802.10185
[11] Kim H, Park J, Bennis M and Kim S-L 2018 On-device federated learning via blockchain
and its latency analysis arXiv preprint arXiv:1808.03949
Blockchain in the Industrial Internet of Things

[12] Hatem M, Burns E and Ruml W 2018 Solving large problems with the heuristic search:
General-purpose parallel external-memory search J. Artif. Intell. Res. 62 233–68
[13] Banerjee S, Singh P K and Bajpai J 2018 A comparative study on decisionmaking capability
between human and artificial intelligence Nature Inspired Computing (Berlin: Springer), pp 203–10
[14] Vo H T, Kundu A and Mohania M K 2018 Research directions in blockchain data
management and analytics EDBT 445–8
[15] Lai L and Suda N 2018 Rethinking machine learning development and deployment for edge
devices arXiv preprint arXiv:1806.07846
[16] Dinh T T A, Wang J, Chen G, Liu R, Ooi B C and Tan K-L 2017 Blockbench: a framework
for analyzing private blockchains Proc. of the 2017 ACM Int. Conf. on Management of Data
(New York: ACM), pp 1085–100
[17] Li Z, Kang J, Yu R, Ye D, Deng Q and Zhang Y 2018 Consortium blockchain for secure
energy trading in the industrial internet of things IEEE Trans. Ind. Inf. 14 3690–700
[18] Joshi D 2017 IBM, Amazon & Microsoft are offering their blockchain technology as a
service Business Insider Oct 24
[19] Hwang G-H, Chen P-H, Lu C-H, Chiu C, Lin H-C and Jheng A-J 2018 Infinitechain: a
multi-chain architecture with distributed auditing of sidechains for public blockchains Int.
Conf. on Blockchain (Berlin: Springer), pp 47–60
[20] Androulaki E et al 2018 Hyperledger fabric: a distributed operating system for permissioned
blockchains Proc. of the 13th EuroSys Conf. (New York: ACM), p 30
[21] Chen L, Xu L, Shah N, Gao Z, Lu Y and Shi W 2017 On security analysis of proof-of-
elapsed-time (PoET) Stabilization, Safety, and Security of Distributed Systems SSS 2017
Lecture Notes in Computer Science vol 10616 ed P Spirakis and P Tsigas (Cham: Springer)
[22] Angelis S D, Aniello L, Baldoni R, Lombardi F, Margheri A and Sassone V 2018 Pbft vs
proof-of-authority: applying the cap theorem to permissioned blockchain Italian Conf. on
Cyber Security (ITASEC) (Milan)

Chapter 7
[1] Reyna A, Martn C, Chen J, Soler E and Daz M 2018 On blockchain and its integration with
IoT. Challenges and opportunities Future Gener. Comput. Syst. 88 173–90
[2] Farooq S M, Hussain S S and Ustun T S 2019 Elliptic curve digital signature algorithm
(ECDSA) certificate-based authentication scheme for advanced metering infrastructure 2019
Innovations in Power and Advanced Computing Technologies (i-PACT) vol 1 (Piscataway,
NJ: IEEE), pp 1–6
[3] Fotiou N, Siris V A and Polyzos G C 2018 Interacting with the Internet of Things using
smart contracts and blockchain technologies Int. Conf. on Security, Privacy and Anonymity
in Computation, Communication and Storage (Cham: Springer), pp 443–52
[4] Lu Q and Xu X 2017 Adaptable blockchain-based systems: a case study for product
traceability IEEE Softw. 34 21–7
[5] Zhang Y and Wen J 2017 The IoT electric business model: using blockchain technology for
the internet of things Peer Peer Netw. Appl. 10 983–94
[6] Feng Q, He D, Zeadally S, Khan M K and Kumar N 2019 A survey on privacy protection in
the blockchain system J. Netw. Comput. Appl. 126 45–58
[7] Li Q, Yue Y and Wang Z 2020 Deep robust cramer shoup delay optimized fully
homomorphic for IIOT secured transmission in cloud computing Comput. Commun. 161
10–8
Blockchain in the Industrial Internet of Things

[8] Han G, Que W, Jia G and Zhang W 2018 Resource-utilization-aware energy-efficient server
consolidation algorithm for green computing in IIOT J. Netw. Comput. Appl. 103 205–14
[9] Hammi M T, Hammi B, Bellot P and Serhrouchni A 2018 Bubbles of trust: a decentralized
blockchain-based authentication system for IoT Comput. Secur. 78 126–42
[10] Liu S, Guo C, Al-Turjman F, Muhammad K and de Albuquerque V H 2020 Reliability of
response region: a novel mechanism in visual tracking by edge computing for IIoT
environments Mech. Syst. Sig. Process. 138 106537
[11] Sengupta J, Ruj S and Bit S D 2020 A comprehensive survey on attacks, security issues and
blockchain solutions for IoT and IIoT J. Netw. Comput. Appl. 149 102481
[12] Narayanan R and Murthy C S 2017 A probabilistic framework for protocol conversions in
IIoT networks with heterogeneous gateways IEEE Commun. Lett. 21 2456–9
[13] Afanasev M Y, Fedosov Y V, Krylova A A and Shorokhov S A 2018 An application of
blockchain and smart contracts for machine-to-machine communications in cyber-physical
production systems 2018 IEEE Industrial Cyber-Physical Systems (ICPS) (Piscataway, NJ:
IEEE), pp 13–9
[14] Waheed A and Krishna P V 2020 Comparing biometric and blockchain security mechanisms
in smart parking system 2020 Int. Conf. on Inventive Computation Technologies (ICICT)
(Piscataway, NJ: IEEE), pp 634–8
[15] Kochovski P, Gec S, Stankovski V, Bajec M and Drobintsev P D 2019 Trust management in
a blockchain-based fog computing platform with trustless smart oracles Future Gener.
Comput. Syst. 101 747–59
[16] Reyna A, Martín C, Chen J, Soler E and Díaz M 2018 On blockchain and its integration
with IoT. Challenges and opportunities Future Gener. Comput. Syst. 88 173–90
[17] Tajalli S Z, Mardaneh M, Taherian-Fard E, Izadian A, Kavousi-Fard A, Dabbaghjamanesh
M and Niknam T 2020 DoS-resilient distributed optimal scheduling in a fog supporting
IIoT-based smart microgrid IEEE Trans. Ind. Appl. 56 2968–77
[18] Ismail S, Almayouf R, Chehab S, Alghamdi S, Almutairi A, Alasmari B and Altherwy R
2020 Edge IoT-cloud framework based on blockchain 2020 2nd Int. Conf. on Computer and
Information Sciences (ICCIS) (Piscataway, NJ: IEEE), pp 1–7
[19] Ansari D B, Rehman A and Ali R 2018 Internet of Things (IoT) protocols: a brief
exploration of MQTT and CoAP Int. J. Comput. Appl. 975 8887
[20] Tiburski R T, Amaral L A, de Matos E, de Azevedo D F and Hessel F 2017 Evaluating the
use of TLS and DTLS protocols in IoT middleware systems applied to E-health 2017 14th
IEEE Annual Consumer Communications & Networking Conf. (CCNC) (Piscataway, NJ:
IEEE), pp 480–5
[21] Knezevic D B and Kasunic N 2020 Security challenges of Wi-Fi connected beer cooler and
serving IIoT device 2020 5th Int. Conf. on Smart and Sustainable Technologies (SpliTech)
(Piscataway, NJ: IEEE), pp 1–5
[22] Geetha B G 2018 Signature verification and bloom hashing technique for efficient cloud data
storage Wirel. Pers. Commun. 103 3079–97
[23] Qiu Z, Hao J, Guo Y and Zhang Y 2020 Dual vote confirmation based consensus design for
blockchain integrated IoT NOMS 2020–2020 IEEE/IFIP Network Operations and
Management Symp. (Piscataway, NJ: IEEE), pp 1–7
[24] Zhao S, Li S and Yao Y 2019 Blockchain-enabled industrial Internet of Things technology
IEEE Trans. Comput. Social Syst. 6 1442–53
Blockchain in the Industrial Internet of Things

Chapter 8
[1] Kumar S and Jasuja A 2017 Air quality monitoring system based on IoT using Raspberry Pi
In 2017 Int. Conf. on Computing, Communication and Automation (ICCCA) (Piscataway,
NJ: IEEE), pp 1341–6
[2] Rouzbeh B, Bone G M, Ashby G and Li E 2019 Design, implementation and control of an
improved hybrid pneumatic-electric actuator for robot arms IEEE Access 7 14699–713
[3] Liu Y, Wang K, Lin Y and Xu W 2019 LightChain: a lightweight blockchain system for
industrial Internet of Things IEEE Trans. Ind. Inf. 15 3571–81
[4] Xinyi Y, Yi Z and He Y 2018 Technical characteristics and model of blockchain 2018 10th Int.
Conf. on Communication Software and Networks (ICCSN) (Piscataway, NJ: IEEE), pp 562–6
[5] Latif S, Idrees Z, Ahmad J, Zheng L and Zou Z 2020 A blockchain-based architecture for
secure and trustworthy operations in the IoT J. Ind. Inf. Integr. 21 100190
[6] Sahoo M, Singhar S S, Nayak B and Mohanta B K 2019 A blockchain-based framework
secured by ECDSA to curb drug counterfeiting 2019 10th Int. Conf. on Computing,
Communication and Networking Technologies (ICCCNT) (Piscataway, NJ: IEEE), pp 1–6
[7] Simos D E, Mekesis S, Kuhn D R and Kacker R N 2017 Combinatorial coverage
measurement of test vectors used in cryptographic algorithm validation STC’17: Proc. of
the 2017 IEEE Software Technology Conf.
[8] Cao B, Wang X, Zhang W, Song H and Lv Z 2020 A many-objective optimization model of
industrial internet of things based on a private blockchain IEEE Netw. 34 78–83
[9] Mingxiao D, Xiaofeng M, Zhe Z, Xiangwei W and Qijun C 2017 A review on consensus
algorithm of blockchain 2017 IEEE Int. Conf. on Systems, Man, and Cybernetics (SMC)
(Piscataway, NJ: IEEE), pp 2567–72
[10] Abdi A I, Eassa F E, Jambi K, Almarhabi K and AL-Ghamdi A S 2020 Blockchain
platforms and access control classification for IoT systems Symmetry. 12 1663
[11] Tukur Y M, Thakker D and Awan I U 2019 Ethereum blockchain-based solution to insider
threats on perception layer of IoT systems 2019 IEEE Global Conf. on the Internet of Things
(GCIoT) (Piscataway, NJ: IEEE), pp 1–6
[12] Kan L, Wei Y, Muhammad A H, Siyuan W, Linchao G and Kai H 2018 A multiple
blockchains architecture on inter-blockchain communication 2018 IEEE Int. Conf. on Software
Quality, Reliability and Security Companion (QRS-C) (Piscataway, NJ: IEEE), pp 139–45
[13] Xu X 2020 Towards automated migration for blockchain-based decentralized application In
2020 IEEE/ACM 42nd Int. Conf. on Software Engineering: Companion Proc. (ICSE-
Companion) (Piscataway, NJ: IEEE), pp 155–7
[14] Wan S, Li M, Liu G and Wang C 2019 Recent advances in consensus protocols for
blockchain: a survey Wirel. Netw. 26 5579–93
[15] Ochoa J J, Bere G, Aenugu I R, Kim T and Choo K K 2020 Blockchain-as-a-Service (BaaS)
for battery energy storage systems 2020 IEEE Texas Power and Energy Conf. (TPEC)
(Piscataway, NJ: IEEE), pp 1–6

Chapter 9
[1] Perkins C D, Wroble E J and Halpin H A 2017 Creating a drone superhighway using the
blockchain https://neironix.io/documents/whitepaper/7764683f65f9877790bb6c3350b3cf87.pdf
[2] Chandel S, Zhang S and Wu H 2020 Using blockchain in IoT: is it a smooth road ahead for
real? Future of Information and Communication Conference (Cham: Springer), pp 159–71
Blockchain in the Industrial Internet of Things

[3] Ullah H S, Aslam S and Anrjomand N 2020 Blockchain in healthcare and medicine: a
contemporary research of applications, challenges, and future perspectives (arXiv preprint
arXiv:2004.06795)
[4] Park I, Lee T and Jang J 2020 Trade-off in implementation of P2P energy trading over
hyperledger blockchain 2020 IEEE Int. Conf. on Consumer Electronics-Asia (ICCE-Asia)
(Piscataway, NJ: IEEE), pp 1–4
[5] Chitchyan R and Murkin J 2018 Review of blockchain technology and its expectations: case
of the energy sector (arXiv preprint arXiv:1803.03567)
[6] Karafiloski E and Mishev A 2017 Blockchain solutions for big data challenges: a literature
review IEEE EUROCON 2017—17th Int. Conference on Smart Technologies (Piscataway,
NJ: IEEE), pp 763–8
[7] Abadi F A, Ellul J and Azzopardi G 2018 The blockchain of things, beyond bitcoin: a
systematic review 2018 IEEE International Conference on the Internet of Things (iThings)
and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical
and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (Piscataway, NJ:
IEEE), pp 1666–72
[8] Chain of things, available online: https://chainofthings.com/ (accessed 21 January 2021)
[9] Katuwal G J, Pandey S, Hennessey M and Lamichhane B 2018 Applications of blockchain
in healthcare: current landscape & challenges (arXiv preprint arXiv:1812.02776)
[10] Veena P, Panikkar S, Nair S and Brody P 2015 Empowering the edge-practical insights on a
decentralized internet of things, empowering the edge-practical insights on a decentralized
Internet of Things IBM Institute for Business Value 17
[11] Riddle and code available online: https://riddleandcode.com/poc (accessed 21 January 2021).
[12] DuPont Q 2017 Experiments in algorithmic governance: a history and ethnography of ‘The
DAO,’ a failed decentralized autonomous organization Bitcoin and Beyond ed M Campbell-
Verduyn (London: Taylor & Francis), pp 157–77

Chapter 10
[1] Christidis K and Devetsikiotis M 2016 Blockchain and smart contracts for the internet of
things IEEE Access 4 2292–303
[2] Kusiak A 2018 Smart manufacturing Int. J. Prod. Res. 56 508–17
[3] Wan J, Li J, Imran M, Li D and e-Amin F 2019 A blockchain-based solution for enhancing
security and privacy in smart factory IEEE Trans. Ind. Inf. 15 3652–60
[4] Huang J, Kong L, Dai H N, Ding W, Cheng L, Chen G, Jin X and Zeng P 2020 Blockchain-
based mobile crowdsensing in industrial systems IEEE Trans. Indus. Inform. 16 6553–63
[5] Konstantinidis I, Siaminos G, Timplalexis C, Zervas P, Peristeras V and Decker S 2018
Blockchain for business applications: a systematic literature review Business Information
Systems ed W Abramowicz and A Paschke (Cham: Springer International Publishing), pp
384–99
[6] Kim H M and Laskowski M 2018 Toward an ontology-driven blockchain design for supply-
chain provenance Intell. Syst. Account. Finance Manag. 25 18–27
[7] Tapscott A and Tapscott D 2017 How blockchain is changing finance Harv. Bus. Rev.
https://hbr.org/2017/03/how-blockchain-is-changing-finance
[8] Tian F 2016 An agri-food supply chain traceability system for China based on RFID amp;
amp; blockchain technology 13th Int. Conf. on Service Systems and Service Management
(ICSSSM) 1–6
Blockchain in the Industrial Internet of Things

[9] Sander F, Semeijn J and Mahr D 2018 The acceptance of blockchain technology in meat
traceability and transparency Br. Food J. 120 2066–79
[10] Bettín-Díaz R, Rojas A E and Mejía-Moncayo C 2018 Methodological approach to the
definition of a blockchain system for the food industry supply chain traceability
Computational Science and Its Applications—ICCSA (Cham: Springer International
Publishing), pp 19–33
[11] Lin Q, Wang H, Pei X and Wang J 2019 Food safety traceability system based on blockchain
and epics IEEE Access 7 20698–707
[12] Zhang C, Wu J, Zhou Y, Cheng M and Long C 2018 Peer-to-peer energy trading in a
microgrid Appl. Energy 220 1–12
[13] Li Z, Kang J, Yu R, Ye D, Deng Q and Zhang Y 2018 Consortium blockchain for secure
energy trading in industrial Internet of Things IEEE Trans. Ind. Inf. 14 3690–700
[14] Aitzhan N Z and Svetinovic D 2018 Security and privacy in decentralized energy trading
through multi-signatures, blockchain and anonymous messaging streams IEEE Trans.
Dependable Secure Comput. 15 840–52
[15] Pop C, Cioara T, Antal M, Anghel I, Salomie I and Bertoncini M 2018 Blockchain-based
decentralized management of demand response programs in smart energy grids Sensors 2018 162
[16] Wang K, Shao Y, Shu L, Zhu C and Zhang Y 2016 Mobile big data fault-tolerant processing
for e-health networks IEEE Network 30 36–42
[17] Esposito C, Santis A D, Tortora G, Chang H and Choo K R 2018 Blockchain: a panacea for
healthcare cloud-based data security and privacy? IEEE Cloud Comput. 5 31–7
[18] Griggs K N, Osipova O, Kohlios C P, Baccarini A N, Howson E A and Hayajneh T 2018
Healthcare blockchain system using smart contracts for secure automated remote patient
monitoring J. Med. Syst. 42 130
[19] Bhuiyan M Z A, Zaman A, Wang T, Wang G, Tao H and Hassan M M 2018 Blockchain
and big data to transform the healthcare Proc. of the Int. Conf. on Data Processing and
Applications, ser. ICDPA (New York: ACM), pp 62–8
[20] Sun Y, Zhang R, Wang X, Gao K and Liu L 2018 A decentralizing attribute-based signature
for healthcare blockchain 2018 27th Int. Conf. on Computer Communication Networks
(ICCCN) pp 1–9
[21] Rahman M A, Hossain M S, Loukas G, Hassanain E, Rahman S S, Alhamid M F and
Guizani M 2018 Blockchain-based mobile edge computing framework for secure therapy
applications IEEE Access 6 72469–78
[22] Wu F et al 2020 A new coronavirus associated with human respiratory disease in China
Nature 579 265–9
[23] Esposito C, De Santis A, Tortora G, Chang H and Choo K-K R 2018 Blockchain: a panacea
for healthcare cloud-based data security and privacy? IEEE Cloud Comput. 5 31–7
[24] Wu H-T and Tsai C-W 2018 Toward blockchains for healthcare systems: applying the
bilinear pairing technology to ensure privacy protection and accuracy in data sharing IEEE
Consum. Electron. Mag. 7 65–71
[25] Salahuddin M A, Al-Fuqaha A, Guizani M, Shuaib K and Sallabi F 2017 Softwarization of
Internet of Things infrastructure for secure and smart healthcare Computer 50 74–9
[26] Nugent T et al 2016 Improving data transparency in clinical trials using blockchain smart
contracts F1000 Res. 5 2541
[27] Xia Q I, Sifah E B, Asamoah K O, Gao J, Du X and Guizani M 2017 MeDShare: trust-less
medical data sharing among cloud service providers via blockchain IEEE Access 5 14757–67
Blockchain in the Industrial Internet of Things

[28] Zhang J, Xue N and Huang X 2016 A secure system for pervasive social network-based
healthcare IEEE Access 4 9239–50
[29] Vruddhula S 2018 Application of on-dose identification and blockchain to prevent drug
counterfeiting Pathogens Global Health 112 161
[30] Alangot B and Achuthan K 2017 Trace and track: enhanced pharma supply chain
infrastructure to prevent fraud Proc. Int. Conf. Ubiquitous Commun. Netw. Comput.
(Bangalore; Cham: Springer), 189–95
[31] Bocek T, Rodrigues B B, Strasser T and Stiller B 2017 Blockchains everywhere—a use-case
of blockchains in the pharma supply-chain Proc. IFIP/IEEE Symp. Integr. Netw. Service
Manage (IM) 772–7
[32] Nchinda N, Cameron A, Retzepi K and Lippman A 2019 MedRec: a network for personal
information distribution 2019 Int. Conf. on Computing, Networking and Communications
(ICNC) (IEEE), 637–41
[33] Franks P C 2020 Implications of blockchain distributed ledger technology for records
management and information governance programs Records Manage. J. 30 287–99
[34] Yang Z, Yang K, Lei L, Zheng K and Leung V C M 2018 Blockchain-based decentralized
trust management in vehicular networks IEEE Internet Things J. 6 1495–505
[35] Kang J, Yu R, Huang X, Maharjan S, Zhang Y and Hossain E 2017 Enabling localized
peer-to-peer electricity trading among plug-in hybrid electric vehicles using consortium
blockchain IEEE Trans. Ind. Inf. 13 3154–64
[36] Kang J, Yu R, Huang X, Wu M, Maharjan S, Xie S and Zhang Y 2019 Blockchain for
secure and efficient data sharing in vehicular edge computing and networks IEEE Internet
Things J. 6 4660–70
[37] Liu H, Zhang Y and Yang T 2018 Blockchain-enabled security in electric vehicles cloud and
edge computing IEEE Netw. 32 78–83
[38] Dai Y, Xu D, Maharjan S, Qiao G and Zhang Y 2019 Artificial intelligence empowered edge
computing and caching for the internet of vehicles IEEE Wirel. Commun. Mag. 26 12–8
[39] Zeng Y, Zhang R and Lim T J 2016 Wireless communications with unmanned aerial
vehicles: opportunities and challenges IEEE Commun. Mag. 54 36–42
[40] Kimchi G, Buchmueller D, Green S A, Beckman B C, Isaacs S, Navot A, Hensel F, Bar-
Zeev A and Rault S S J-M 2017 Unmanned aerial vehicle delivery system US Patent
9,573,684
[41] Wang L, Chen F and Yin H 2016 Detecting and tracking vehicles in traffic by unmanned
aerial vehicles Autom. Constr. 72 294–308
[42] Cheng N, Xu W, Shi W, Zhou Y, Lu N, Zhou H and Shen X 2018 Airground integrated
mobile edge networks: architecture, challenges, and opportunities IEEE Commun. Mag. 56
26–32
[43] Li B, Fei Z and Zhang Y 2019 UAV communications for 5G and beyond: Recent advances
and future trends IEEE Internet Things J. 6 2241–63
[44] Kapitonov A, Lonshakov S, Krupenkin A and Berman I 2017 Blockchain-based protocol of
autonomous business activity for multiagent systems consisting of UAVs 2017 Workshop on
Research, Education and Development of Unmanned Aerial Systems (RED-UAS) 84–9
[45] Kumar A, Kundu A, Pickover C A and Weldemariam K 2018 Unmanned aerial vehicle data
management US Patent App. 15/463,147

You might also like