SurveyonIoTsecurity-Challengesandsolutionusingmachinelearningartificialintelligenceandblockchaintechnology.pdf

    Internet of Things 11 (2020) 100227

    Contents lists available at ScienceDirect

    Internet of Things

    journal homepage: www.elsevier.com/locate/iot

    Review article

    Survey on IoT security: Challenges and solution using

    machine learning, artificial intelligence and blockchain

    technology

    Bhabendu Kumar Mohanta a , ∗, Debasish Jena a , Utkalika Satapathy a , Srikanta Patnaik b

    a Department of Computer Science & Engineering, IIIT Bhubaneswar, Odisha 751003, India b Department of Computer Science and Engineering, SOA University, Bhubaneswar 751030, India

    a r t i c l e i n f o

    Article history:

    Received 24 January 2020

    Revised 8 May 2020

    Accepted 12 May 2020

    Available online 20 May 2020

    Keywords:

    IoT

    Security

    Machine learning

    Artificial intelligence

    Blockchain technology

    a b s t r a c t

    Internet of Things (IoT) is one of the most rapidly used technologies in the last decade

    in various applications. The smart things are connected in wireless or wired for commu-

    nication, processing, computing, and monitoring different real-time scenarios. The things

    are heterogeneous and have low memory, less processing power. The implementation of

    the IoT system comes with security and privacy challenges because traditional based ex-

    isting security protocols do not suitable for IoT devices. In this survey, the authors initially

    described an overview of the IoT technology and the area of its application. The primary

    security issue CIA (confidentially, Integrity, Availability) and layer-wise issues are identi-

    fied. Then the authors systematically study the three primary technology Machine learn-

    ing(ML), Artificial intelligence (AI), and Blockchain for addressing the security issue in IoT.

    In the end, an analysis of this survey, security issues solved by the ML, AI, and Blockchain

    with research challenges are mention.

    © 2020 Elsevier B.V. All rights reserved.

    1. Introduction

    Internet of Things (IoT) is a network of smart things that share information over the internet. The smart things are used

    to deploy in a different environment to capture the information, and some events are triggered. The applications of IoT is a

    smart city, smart home, Intelligent transportation system, agriculture, hospital, supply chain system, earthquake detection, a

    smart grid system. As per CISCO estimated, the IoT devices connected will be 50 billion at the end of 2020. The grown of IoT

    devices is rapidly changing as it crosses the total world population. The data generated by the IoT devices are enormous. In

    traditional IoT, architecture is three types physical, network, and application layer. In the physical layer, devices are embed-

    ded with some technology which way they sense the environment and also able to connect in wired or wireless to the other

    device. Like in the smart home system fridge can place an order automatically to the registered retailer whenever the fruits

    chamber empty it, and notification will be sent to the home users. The similarity in smart hospital patients can monitor in

    an emergency through sensors and corresponding computing devices. As the sensors are low-end devices, less computation

    power, and have heterogeneous properties. Implementation of IoT comes with lots of challenges. The standardization, inter-

    operability, data storage, processing, trust management, identity, confidentiality, integrity, availability, security, and privacy

    ∗ Corresponding author. E-mail addresses: [email protected] (B.K. Mohanta), [email protected] (D. Jena), [email protected] (U. Satapathy).

    https://doi.org/10.1016/j.iot.2020.100227

    2542-6605/© 2020 Elsevier B.V. All rights reserved.

    2 B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227

    Table 1

    Related surveys work on IoT security.

    Reference paper Year Contribution

    Jing et al. [3] 2014 The security issue of three layers of IoT and its corresponding solution are surveyed in this paper.

    Ngu et al. [4] 2016 The IoT middleware based architecture is proposed and explained each layer details. The authors also described

    the adaptability and security issues in the IoT middleware system.

    Mosenia et al. [5] 2016 The authors in this survey explained the reference model and security threads present on the edge side of the

    model. The paper also reviewed the countermeasure to address the possible solutions.

    Lin et al. [6] 2017 The paper initially described the IoT and Cyber-Physical Systems (CPS) integration. The security and privacy

    issues survey in detail. The edge/fog computing integration with IoT is also explained in this survey paper.

    Yang et al. [7] 2017 The paper has done a survey on security and privacy issue on IoT applications and systems. The authors

    reviewed the authentication protocol in the IoT system. The challenging security issue in four-layer architecture

    based IoT application are explained in details.

    Alaba et al. [8] 2017 The authors in this survey investigated the state of art security issues in IoT applications. The threats and

    vulnerability of the system in terms of communications, architecture, and applications are extensively reviewed.

    the paper concludes with the solution approach for different security issues.

    Grammatikis et al. [9] 2018 The paper provides a detailed study of IoT security layer-wise. The suitable countermeasure and potential

    threats model are discussed in detail.

    Das et al. [10] 2018 The authors in this paper investigate the security and threat model in IoT applications. The paper mentioned

    some of the issues in IoT systems like authentication, trust management, and access control. Some solution

    approach was also addressed.

    Di Martino et al. [11] 2018 This paper reviewed the different standardized architecture of IoT systems and the current solution approach in

    terms of Security and Interoperability are explained.

    Hassija et al. [12] 2019 The authors of this paper reviewed the security and threat in IoT applications. The different solution approach

    using machine learning, fog computing, edge computing, and Blockchain was proposed.

    Proposed paper 2020 The authors in this paper initially identified the necessary Infrastructure, Protocol, Application of the IoT

    system. Then security issue is identified in the IoT model. Some emerging technique which can be used to solve

    the security issues in IoT is identified. After a rigorous survey, the authors found that machine learning,

    Blockchain, and Artificial intelligence are the current solution approach to solve the Security issue in IoT.

    are some of the open challenges in various IoT applications [1] . The IoT is one of the most emerging technologies in the last

    decade and its uses in numerous applications area. Security and privacy are still challenges in many applications area. Some

    research work addressing security and privacy issue in IoT is already done. But as the new technology comes, which can ad-

    dress so of the security issue in IoT. So in this work, authors have identified three leading technologies like ML, Blockchain,

    and AI, which address different security issues.

    1.1. Objective and contribution

    The main objective of this survey is to find out the security and privacy challenges that exist in IoT applications. The

    authors also identified some emerging technology that can address security issues present in the system. Here the main

    goal is to find the research challenges and corresponding solution approach in IoT security.

    The following are the contribution of the paper:

    • The paper explained the IoT architecture and its enabling technology with challenges. • The security issues in the IoT system are identified as in-depth layer-wise. • An extensive survey on similar technologies like machine learning, artificial intelligence, and Blockchain technology inte-

    gration with IoT security are performed.

    • The research challenges and corresponding solution approach with emerging technology (ML, AI, Blockchain) are alsoexplained.

    1.2. Paper organization

    The rest of the paper organized as in Section 2 related work of security and privacy issues of IoT are identified, and

    comparison was also made. The IoT architecture details and associated technology are described in Section 3 . The security

    issues are explained in Section 4 . The different security issues address in IoT applications using Machine Learning, Artificial

    intelligence, and Blockchain technology are explained in detail in Sections 5 –7 sequentially. An analysis of the entire survey

    and future challenges are summarized in Section 8 . The paper concludes with a summary of the work done in Section 9 .

    2. Related work

    The authors explain the underlying system architecture and security issues in paper [2] . Previously some works related

    to a security issue in IoT applications, infrastructure are already done. In Table 1 , a summary of some of the survey works

    is mentioned. Although several works already exist in this regard from different perspectives, for implementation purposes,

    there is no such study done. So in this survey, authors have identified the recent emerging technology (ML, AI, Blockchain),

    which can be addressed security issues in IoT. Some of the work integration with recent technology and IoT has already

    B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227 3

    Fig. 1. Internet of things infrastructure.

    been done. In this survey, the authors tried to give the details about the insight of that technology how it will solve security

    challenges in IoT. This will helps the reader to understand the IoT infrastructure creation and implementing it securely.

    3. Internet of things (IoT) infrastructure,protocol, application

    Internet of Things (IoT) has lots of potentials to apply in different real-time applications. It integrates sensors, smart de-

    vices, radiofrequency identification (RFID), and the Internet to build an intelligent system. As per Goldman Sachs estimated

    28 billion smart things would be connected to a different network by 2020. The growth of IoT in the last decade in such

    a way that it incorporates everything from sensors to cloud computing intermediate with fog/edge computing. The IoT has

    different types of a network like a distributed, ubiquitous, grid, and vehicular. The applications of IoT made a huge impact

    in day to day life like sensors deploy in the patient body to monitoring in critical condition, monitoring gas leakage in smart

    kitchen, agriculture field, smart car parking, smart transportation, tracking goods details in supply chain system using sen-

    sors in the vehicle. The sensors are resource constraint devices connected through wired or wirelessly across heterogeneous

    networks. The IoT networks are possessed different security, privacy, and vulnerable to the attacker.

    3.1. IoT infrastructure

    IoT application consists of different smart things that collect, process, compute and communicate with other smart things.

    IoT has three layers physical, network, and application layer. Recently industries are developed many things which are em-

    bedded with intelligent things. As shown in Fig. 1 IoT infrastructure consists of not only sensors, but it also integrates with

    some emerging technology. The IoT application is based on either IoT-Cloud or IoT-Fog-Cloud. The security issue like data

    privacy [13] , machine to machine communication [14] , real-time monitoring [15] and IoT testbed [16] are need to be ad-

    dressed for efficient IoT applications. The architecture of IoT may be centralized, distributed, decentralized structure. In IoT

    application processing and computing in real-time is one of the most challenging issues. Cloud computing provides more

    storage and assures security to the data. But recently, most of the real-time monitoring IoT application demand processing

    and computing in the edge of the network. So that quick action can be taken like monitoring the health condition of the

    serious patient, fire detection. When processing and computing are done on the edge of the network using fog devices, it

    becomes more vulnerable to the attacker as their devices are lightweight device traditional security is not applicable. During

    analytic data, a technique like a machine learning is recently used to make the IoT system more intelligent and independent

    to make a decision. The different smart devices are connected to make an application using some standard protocols. The

    security issue exists in IoT infrastructure, which needs to be addressed to build trust among end-users and make the system

    temper-proof. The data interoperability [17] in the IoT system works using an intelligent algorithm.

    3.2. Standard protocol

    The basic IoT architecture is a four layer network. Each of these layer consists of some standard protocol as shown in

    Table 2 .

    3.2.1. MQTT

    MQTT stands for transportation of MQ Telemetry. It is a straightforward and lightweight messaging protocol for pub-

    lishing / subscribe, designed for restricted devices and low bandwidth, high latency, or unreliable networks. The design

    principles are to minimize the requirements for network bandwidth and device resources while also trying to ensure reli-

    ability and some degree of delivery assurance. These principles also result in making the protocol ideal for the emerging

    world of low end connected devices “machine-to-machine” (M2 M) or “Internet of Things.”

    4 B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227

    Table 2

    Protocols & attacks on IoT layers.

    Protocols & possible attacks in IoT layers

    Layer Protocol name Possible security attack

    Application MQTT, CoAP, REST, AMQP Repudiation Attack, DDoS Attack, HTTP Flood Attack, SQL Injection

    Attack, Cross-Site Scripting, Parameter Tampering, Slowloris Attack

    Transport TCP, UDP, DCCP, SCTP, RSVP, QUIC SYN Flood, Smruf Attack,Injection Attack, Mitnick Attack, Opt-ack Attack

    Network CLNS, DDP, EIGRP, ICMP, IGMP,

    IPsec, IPv4, IPv6, OSPF, RIM

    IP Address Spoofing, DoS Attack, Black Hole Attack, Worm Hole Attack,

    Byzantine Attack, Resource Consumption Attack.

    Pysical DSL, ISDN, IDA, USB, Bluetooth,

    CAN, Ethernet

    Access Control Attack, Physical damage 0r Destruction, Disconnection of

    Physical Links

    3.2.2. CoAP

    Constrained Application Protocol (CoAP), as defined in RFC 7252, is a specialized Internet Application Protocol for re-

    stricted devices. It allows those restricted devices called “nodes” to use similar protocols to communicate with the broader

    Internet. CoAP is designed to be used by devices on the same network.

    3.2.3. REST

    REST stands for State Transfer Member. REST is an architecture based on web standards and uses the HTTP protocol.

    It revolves around resources where each element is a resource, and a resource is accessed using standard HTTP methods

    through a specific interface. Roy Fielding introduced REST in 20 0 0. A REST server offers access to resources in REST archi-

    tecture, and REST user accesses and modifies resources. Here, URIs / global IDs classify each asset. REST uses a variety of

    representations to describe a resource such as text, JSON, XML.

    3.2.4. AMQP

    An open standard for transferring business messages between applications or organizations is the Advanced Message

    Queuing Protocol (AMQP). It connects systems, feeds business processes with the information they need, and transmits the

    instructions that achieve their goals reliably forward.

    3.2.5. TCP

    Transmission Control Protocol (TCP) is a connection-oriented communications protocol that provides the facility to ex-

    change messages in a network between computer devices.

    3.2.6. UDP

    A Transport Layer protocol is the User Datagram Protocol (UDP). UDP is part of the Internet Protocol suite, known as UDP

    / IP. Like TCP, this protocol is unstable and unconnected. There is thus no need to create a link before transferring data.

    3.2.7. DCCP

    DCCP provides a way for congestion-control mechanisms to be accessed without having to implement them at the ap-

    plication layer. It allows flow-based semiconducting, as in the Transmission Control Protocol (TCP), but does not provide

    reliable delivery on-order. Sequenced transmission across multiple streams is not possible in DCCP, as in the Stream Control

    Transmission Protocol (SCTP). A DCCP link requires both the network acknowledgment and data traffic. Acknowledgments

    notify a sender that their packets have arrived and whether they have been labeled with an Explicit Notification of Conges-

    tion (ECN).

    3.2.8. SCTP

    The Stream Control Transmission Protocol (SCTP) is a computer networking communication protocol that operates at the

    transportation layer and serves a similar role to the popular TCP and UDP protocols. It is defined in RFC 4960 by IETF.SCTP

    incorporates some of the features of both UDP and TCP: it is message-oriented like UDP and ensures secure, in-sequence

    congestion-controlled transmission of messages like TCP. It differs from those protocols by providing multi-homing and

    redundant paths to increase resilience and reliability.

    3.2.9. RSVP

    The Resource Reservation Protocol (RSVP) is a transport layer [1] protocol designed to use the distributed infrastructure

    model to reserve resources across a network. RSVP works over an IPv4 or IPv6 and sets up resource reservations for multi-

    cast or unicast data flows, initiated by the recipient. It does not transmit data from applications but is similar to a control

    protocol, such as the Internet Control Message Protocol (ICMP) or the Internet Group Management Protocol (IGMP). RSVP is

    set out in RFC 2205.

    B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227 5

    3.2.10. QUIC

    QUIC (pronounced’ quick’) is a general-purpose network layer protocol initially designed by Google’s Jim Roskind, intro-

    duced and deployed in 2012, publicly announced in 2013 as an extended experiment and defined by the IETF. While still an

    Internet-Draft, more than half of all Chrome web browser connections to Google’s servers use QUIC.[citation needed] Most

    other web browsers don’t follow the protocol.

    3.2.11. CLNS

    Connectionless mode Network Service (CLNS) or simply Connectionless Network Service is an OSI Network Layer data-

    gram service that does not require a circuit to be set up before data is transmitted, and routes messages to their destinations

    independently of any other messages. CLNS is not an Internet service but offers f eatures similar to those offered by the In-

    ternet Protocol (IP) and User Datagram Protocol (UDP) in an OSI Network environment.

    3.2.12. DDP

    Distributed Data Protocol (or DDP) is a client-server protocol designed to query and update a server-side database and

    to synchronize such updates between clients. It uses a messaging pattern for publish-subscribe. The Meteor JavaScript ap-

    plication was developed for use.

    3.2.13. ICMP

    Connectionless-mode Network Service (CLNS) or simply Connectionless Network Service is an OSI Network Layer data-

    gram service that does not allow a circuit to be set up before data is transmitted and routes messages to their destinations

    independently of any other messages. As such, it is a best-effort rather than a “reliable” delivery service. CLNS is not an

    Internet service but offers f eatures similar to those offered by the Internet Protocol (IP) and User Datagram Protocol (UDP)

    in an OSI Network environment.

    3.2.14. DSI

    Digital Serial Interface (DSI) is a protocol for regulating lighting (initially electrical ballast) in buildings. It is based on

    Manchester-coded 8-bit protocol, 1200 baud data rate, 1 start bit, 8 data bits (dim value), 4 stop bits, and is the basis

    for the more advanced Digital Addressable Lighting Interface (DALI) protocol. The technology uses a single byte (0–255 or

    0x00-0xFF) to communicate the lighting level. DSI was the first use of digital communication to control lighting and was

    the precursor to DALI.

    3.2.15. ISDN

    Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of

    voice, video, data, and other network services over the traditional circuits of the public switched telephone network. The

    key feature of ISDN is that it integrates speech and data on the same lines, adding features that were not available in the

    classic telephone system. In the emergency mode of IoT devices, the ISDN facility can be useful.

    3.3. Application

    IoT applications are nowadays developed in many fields. The development of many open-source platforms like Azure

    IoT Suite, IBM Watson, Amazon Web Services (AWS), Oracle IoT, Kaa, Bevywise IoT platform used for industrial IoT, IoTIFY

    cloud-based platform used to build scalable IoT applications. Most of the opensource platform is enabled with AI and ML

    technology for intelligent processing and computing the information. The manufacture of smart devices that can read, pro-

    cess, and computing the things makes the IoT as one of the emerging fields. There are many application areas where IoT

    is used, as shown in Fig. 2 . In these eight different application fields, IoT has already made an impact on enhancing and

    increasing the efficiency of the system.

    3.3.1. Smart home

    The IoT makes the traditional home system into an intelligent one. The refrigerator, smart television, security camera, gas

    sensors, temperature sensor, light system all can sense the home environment, communicate and connect to the internet

    through wired or wireless. Even the refrigerator can place an order to the registered retail shop and give notification to

    the user. Due to the development of smart things, the living standard becomes more comfortable. In paper [18] , authors

    design a smart home system based on IoT technology. Using technology like IoT and Fog computing home converted into an

    intelligent home system where monitoring of the home can be done remotely as well as processing can be done instantly.

    The authentication of devices is essential to prevent unwanted access to the IoT network. The authors in Satapathy et al.

    [19] and Panda et al. [20] proposed different authentication schemes for a smart home network. Still, some security issues

    [21] , are exist in IoT based smart home systems.

    6 B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227

    Fig. 2. Internet of things applications.

    3.3.2. Smart hospital

    Since the development of IoT patient monitoring in real-time is possible with the use of sensors and fog/edge computing,

    the paper [22] , authors have proposed an IoT-cloud based framework for data collection in the healthcare system. Similarly,

    in Moosavi et al. [23] , authors performed the authentication and authorization of the smart devices in the healthcare system.

    In the healthcare system, privacy is one of the main issues, so proper security and privacy protocol need to be developed to

    secure the system.

    3.3.3. Smart city

    The ever-growing city has lots of problems like traffic management, waste management, waste management, and en-

    vironmental management. The city needs a solution to monitor and control the problem exist. In papers [24,25] , authors

    explained the challenges that exist in implementing smart cities and done a survey in detail about how IoT can solve an

    existing problem. Using IoT and associated technology, a smart city can be developed to enhance the living standard of the

    city, maintaining the security and privacy issue of the citizen.

    3.3.4. Smart transportation

    In recent times traffic is one of the major problems in a city. The intelligent transportation system is the need of the

    hour. The IoT enables vehicles can collect information from the roadside unit and process to get the details about journey

    path, time, and traffic details. Some of the research work [26,27] addressed the smart transportation issue using IoT. In

    paper [28] , the authors proposed the IoT-ITS system for the transportation system. The authors in Dey et al. [29] proposed

    a “Magtrack” to detect condition of the road surface using in-build mobile sensors and machine learning concepts.

    3.3.5. Smart grid

    The smart grid is one of the application areas of IoT, where a grid system can be made automation using IoT. The elec-

    tric power generation and distribution among consumers can be monitor in real-time. The cybersecurity solution approach

    [30] is explained in detail. The architecture of the IoT-Cloud based system proposed by the authors in paper [31] . The effi-

    cient, economical and distribution can be improved using the IoT technology in the smart grid system.

    B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227 7

    Table 3

    The different security attacks in IoT.

    Different attacks cases and relevant research papers

    Attacks type Paper

    IoT

    Attacks

    Jamming attacks [43]

    DoS attacks [44]

    Intrusion detection System [45]

    Malicious node [46]

    Power analysis attack [47,48]

    Internal attacks [49]

    Access control [50]

    Wormhole attack [51]

    Side channel security [52]

    Distributed Dos [53]

    Man in the Middle attack [54]

    Active attacks [55]

    Routing attacks [56]

    Sybil attacks [57,58]

    Deceptive attack [59]

    Spoofing [60]

    Buffer overflow attack [61]

    Impersonation attack [62]

    3.3.6. Supply chain system

    The IoT smart devices, once used in a supply chain management system, can fundamentally change the traditional way

    to monitor the transport system. By using the IoT technique, the material is easily located, their current condition, packing

    details, and it is easy to track how goods are a move through the supply chain. It increases to maintain the demand-supply

    of good, easy to monitor the material movement, real-time tracking, efficient storage, energy efficient [32] , and distribution.

    The authors in Li et al. [33] , explained how tracking and tracing could be done in real-time using the IoT system. Similarly,

    in paper [34,35] authors, discussed the IoT based architecture and risk management in the supply chain system. In paper

    [34] , authors have proposed artificial intelligent integration with IoT for the retail shop supply chain system.

    3.3.7. Smart retails

    The retail sector also using IoT services along with artificial intelligent [36] to enhance productivity, improve store opera-

    tion, and to take the decision in real-time to manage the inventory system.

    3.3.8. Agriculture

    Agriculture is one of the promising application areas in IoT. In a smart agriculture system by deploying the sensors to

    monitor the soil quality, water management, crop growing condition, etc. which improve the farming efficiency by reducing

    time and cost. In real-time, a user can monitor all details from the remote locations. In paper [37,38] authors proposed

    smart irrigation using machine learning and IoT to enhance farming. similarly, in paper [39,40] , smart water management

    and weather conditions in the agriculture system are explained in detail. Likewise, in paper [41,42] , smart agriculture system

    integration with IoT technologies is explained in detail. As some of the work already done in the field of agriculture, still

    some security issues exist like mobility, infrastructure, and secure processing of the collected data.

    4. Security attacks in internet of things

    In Table 3 some common Internet of Things attacks in the different layer is shown along with the current research work

    done on the corresponding attacks types.

    Jamming attack is a subset of DoS attacks where the attacker tries to affect the communication channel in paper [43] au-

    thors also explained the details about the jamming attacks.

    Dos attack is one of the common attack used in IoT applications. Most of the IoT devices are a low-end device which

    is vulnerable to the attacker. The attacker gets under the data traffic stream through device connection or infrastructure.

    Denial of service (DoS) attacks, consists of a huge volume of network packets, targeting the node present in the application

    causes service interrupt in real-time [44] .

    Intrusion detection system(IDS) is the process in which network traffic is control by the attacker. There are some types

    of IDS attacks, like misuse detection, anomaly detection, Host-based IDS, and Network-based IDS. The authors in paper

    [45] described the IDS attacks in IoT network.

    Malicious node attack is possible in a distributed IoT network due to the heterogeneous nature of the smart devices.

    The identify the genius node or fake node in the network is a challenging one. In paper [46] authors proposed a perception

    and K-mean to build the trust among the node and detect the malicious node.

    8 B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227

    Fig. 3. The basic machine learning based model integration with IoT.

    Power analysis attack and its corresponding solution approach are explained in papers [47,48] . This attack is mainly

    made to gain the computational power of the nodes so that the basic cryptographic algorithm is not possible to execute. In

    an IoT network, privacy also needs to be maintained to build trust among the node.

    Internal attack in paper [49] and Access control attack in paper [50] are discussed in details. Wormhole attack is taken

    place at the 6LoWPAN layer, where the attacker makes a tunnel between two nodes that are connected [51] .

    The Side channel security attack in cloud-based IoT application along with the security challenges are explained in paper

    [52] . Similarly, Distributed Dos attack is the process where the server is unreachable so that smart nodes in the network

    can not get the services it desires to get [53] .

    Man-in-the-middle attack, where the attacker relays the message or change the message during the transmission in

    the insecure channel, explained in Li et al. [54] IoT-Fog network. Active attacks is explained in Zhang et al. [55] and its

    corresponding solution in the physical layer of the IoT network. There are different types of active attacks possible in IoT,

    where attackers make changes in the target node. The authors in Raoof et al. [56] explained the Routing attacks in routing

    protocol lossy network based on IoT application. The Sybil attack is one most common types of attack in IoT. The authors in

    Zhang et al. [57] and Mishra et al. [58] study the phases of Sybil attacks and their countermeasures in the internet of things.

    The Deceptive attack in La et al. [59] and Spoofing attack in Zhang et al. [60] authors have addressed the corresponding

    attacks and their security analysis in the internet of things applications. The Buffer overflow attacks is the process of

    writing the program in a block of memory where the memory space is insufficient. The A IoT network, when nodes execute

    the different programs in the deices for processing or computation purpose attackers, can capture that and perform memory

    overflow attack. The detecting buffer overflow attack and providing appropriate security design in explained in Xu et al. [61] .

    In a large IoT network where heterogeneous devices are connected and communicate with each other. The trust is one of

    the major issues in the network. The Impersonation [62] attacks where a fake node behaves like a genius node in the

    network and tries to gain the information from other nodes. This is one of the most challenging issues in IoT applications

    where smart devices are heterogeneous and low-end devices.

    5. Security issue address using machine learning

    The machine learning is a technique to perform computational intelligently. The model needs to design and test using

    different learning methods. Figs. 3 and 4 describe the basic principle of machine learning functionality and integration

    with IoT applications. As discussed in Section 3.3 application of the Internet of Things is many. Some of the application

    requirement is decision should be taken before the actual event occurs. For example, predicting the fire in a kitchen or any

    industrial area and alarm the sound to prevent the fire. This could be possible if machine learning technologies are used in

    IoT applications. Also, it needs to address the security issue present in the IoT system ta make the system tamper-proof. An

    efficient framework [63] is required to process and compute the huge data collection using a machine learning technique.

    In paper [64] , authors review the security issue associated when applying machine learning in a smart grid application. In

    paper [65,66] authors address the intrusion detection in IoT application.

    In Tables 4–6 the details machine learning integration with IoT security issue related work are explained.

    6. Security issue address using artificial intelligence

    The innovation of smart devices having sensing and acting capability makes the IoT system usability in widely. As the

    numbers of devices are connected to the network are huge, which generate a large volume of data. To process and perform

    computation is a challenging task in an IoT environment. So Artificial intelligence comes as a rescue along with some other

    emerging technology to address the security issue in IoT. As shown in Fig. 5 , IoT and AI can combine to improve the analysis

    of the system, improve operational efficiency, and improve the accuracy rate. The authors in Ghosh et al. [82] explained that

    B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227 9

    Fig. 4. In-depth model of machine learning in IoT application.

    Table 4

    Machine learning apply on different IoT security.

    Reference Years Contribution

    [63] 2018 The authors proposed a framework to monitor security in Mobile IoT using Big data processing and ML.

    [64] 2019 Application of ML methods on big data generated in the smart grid to extract useful information and to detect

    and protect the data from cyber-security threats.

    [65] 2019 Review on Network Intrusion Detection System (NIDS) in an IoT environment using ML algorithms.

    [66] 2019 The authors proposed, a 3-layer Intrusion Detection System (IDS) using a supervised learning method of ML to

    distinguish between malicious or benign network activity and to detect network-based cyber-attacks such as

    DoS, MITM/Spoofing, Replay, and Reconnaissance and also to detect a multi-stage attack on IoT networks.

    [67] 2017 Proposed a physical-layer authentication (PLA) scheme based on extreme learning machine (ELM)with a

    2-dimensional measure space to ameliorate spoofing detection accuracy.

    [68] 2017 Proposed an ML-based malicious app detection tool that uses naive Bayesian, J48 decision tree as a classifier

    model to detect malicious applications instantaneously in Android devices.

    [69] 2018 Implemented an autonomous and adaptive detection mechanisms using ML and software-defined networking

    (SDN) for their IoT security framework to deal with the problem of erratic behavior and heterogeneity of IoT

    systems.

    [70] 2018 Presented the different ML methods that can be applied to the data generated in the IoT system based

    environments like Smart cities to pull out the higher-level information if it.

    Fig. 5. The common functionality in IoT and artificial intelligence.

    10 B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227

    Table 5

    Machine learning apply on different IoT security.

    Reference Years Contribution

    [71] 2018 The proposed a reliable, scalable, and robust Swarm Intelligence (SI)-based IoT system to

    overcome the problem of dynamic and heterogeneity behavior of IoT systems.

    [72] 2018 The authors presented a Dense Random Neural Networks (RNN) based deep-learning technique

    by analyzing the traffic flow exchange in IoT gateways. To detect the network attacks online

    such as TCP SYN attack, which is a variety of denial-of-service (DoS) attacks.

    [73] 2018 The authors proposed a robust real-time distributed fog-based attack detection framework for

    IoT, which relies on a fog computing paradigm and a newly proposed ELM-based

    Semi-supervised Fuzzy C-Means (ESFCM). Extreme Learning Machine (ELM) algorithm provides

    good generalization performance at a faster detection rate, and semi-supervised Fuzzy C-Means

    method handles the labeled data issue in IoT.

    [74] 2018 The proposed a new darknet analysis method to find the traffic patterns of a specific scanning

    attack i.e., TCP SYN packets due to the majority of darknet packets using the association rule

    learning.

    [75] 2018 The authors proposed a novel algorithm for quantifiable intelligent trust assessment model to

    overcome the issue of potential discrimination. The data analytics is done over delicate

    information such as locations, interests, and activities, using the SVM model of ML. This process

    generates exact and inherent trust values for probable actors. It helps in determining whether

    an incoming interaction is trustworthy or not, based on several trusts features corresponding to

    an IoT environment.

    Table 6

    Machine learning apply on different IoT security.

    Reference Years Contribution

    [76] 2018 The authors proposed a system for real-time monitoring of the health parameters to detect

    bombs nearby and to predict the warzone environment. Using various sensors to collect the

    data, network infrastructure like LoRaWAN and ZigBee to transmit those data to the cloud and

    K-Means Clustering machine learning algorithm to analyze the data.

    [77] 2018 Proposed a Deep Learning (DL) based secure framework for Intrusion detection system using

    Restricted Boltzmann Machines (RBM) for SDN based IoT.

    [78] 2019 The authors proposed a robust prediction model for real-life mobile phone data of individual

    users using a rule-based machine learning classification technique, i.e., decision tree on the

    noise-free quality dataset. Naive Bayes classifier and Laplace estimator are used to improving

    the prediction accuracy of the model by removing the noisy instances in the data.

    [79] 2019 Proposed an ML-based anomaly detection system which can detect cyber-attacks like backdoor,

    command injection, and Structured Query Language (SQL) injection attacks in the Industrial

    Internet of Things (IIoT) devices.

    [80] 2019 Authors compared the performances of various ML models such as Logistic Regression (LR),

    Support Vector Machine (SVM), Decision Tree (DT), Random Forest (RF), and Artificial Neural

    Network (ANN) for predicting attacks like DoS, Data Type Probing, Malicious Control, Malicious

    Operation, Scan, Spying and Wrong Setup, and anomalies on the IoT systems accurately.

    [81] 2019 Presented the preliminary work of neural network (NN)-based specific emitter identification

    (SEI) on IoT devices using raw in-phase and quadrature (IQ) streams, with protocols to secure

    IoT networks by providing an extra layer of security and trust.

    AI could help IoT huge volume, unstructured data, heterogeneous data to compute in real-time, which makes the system

    realistic. The authors propose the large margin cosine estimation (LMCE) technique in this paper [83] to detect the adversary

    in IoT enable environments. The malware detection work in the IoT system using

    AI is addressed in paper [84] . Similarly, in paper [85] , the authors proposed a model using Blockchain and AI in IoT

    architecture to make the system tamper-proof. In Fig. 6 , integration of IoT and AI with some basic functionality are shown.

    The combination of AI and IoT some work is already done by the researcher addressing that AI can be a driving force to

    make the IoT system more improve in decision making and doing computation.The authors apply a master attack in IoT

    enables smart city application based on AI [86] . Similarly, in Zou et al. [87] , the authors explained Edge and fog computing

    for IoT applications.

    7. Security issue address using blockchain technology

    Blockchain technology is a decentralized/distributed network where each is connected to others in some way. The mes-

    sage is broadcast in the Blockchain network. As shown in Fig. 7 distributed architecture based on blockchain techniques in

    IoT application. A block consists of lots of valid transaction and its associated attributes. The smart contract [88] are self

    executable program used to implement the business logic in the network. The Blockchain network uses different consen-

    sus algorithm [89] to meet the consensus among the nodes. The details Blockchain architecture and application areas are

    explained in paper [90] by the authors. The authors in paper [91,92] described the mechanism and related work on IoT

    security along with Blockchain as a solution approach.The authors have proposed a secure framework for the internet of

    B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227 11

    Fig. 6. Integration of IoT and AI and their basic properties.

    Fig. 7. Blockchain based different IoT applications.

    things applications based on a distributed Blockchain system in Satapathy et al. [93] . The use of Blockchain technology in

    IoT is briefly given in paper [94] by the authors. The many IoT security challenges and corresponding Blockchain solutions,

    along with the implementation challenges, are review by the authors in paper [95] . In Tables 7–10 details review regarding

    blockchain and IoT security issue are described.

    8. Analysis of the survey and research challenges

    The Internet of Things (IoT) in recent time attract lots of attention to the research community as well as an industry

    sector. The IoT devices are manufactures in large number which already cross the total world population. These smart de-

    vices are connected to different applications for capturing information from the environment. The IoT devices are resource

    constraint devices, so devices are vulnerable to the attacker. Security and privacy issues are important for IoT applications.

    So this survey is carried out in-depth to identified security and privacy issues that exist in the IoT system up to March

    2020. The solution approaches of these security and privacy issues solved by some emerging technologies are also discussed.

    12 B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227

    Table 7

    Blockchain technology work on IoT security.

    Reference Years Contribution

    [96] 2017 The authors in this paper proposed a distributed Blockchain-based model. The proposed system

    one miner is used to control the communication within the smart home as well as an external

    source. The framework is secure against fundamental security goals.

    [97] 2018 The authors evaluated the feasibility of using blockchain nodes on IoT devices.

    [98] 2018 The authors proposed a distributed ledger-based blockchain (DL-BC) technology to address

    security and privacy issues in IoT, such as spoofing, false authentication.

    [99] 2018 Proposed distributed intelligence that performs instance decision making and reduces

    unnecessary data transfer to the cloud, addressing various security challenges in the IoT

    paradigm.

    [91] 2018 The authors proposed a blockchain-based compromised firmware detection and self-healing

    approach that can be deployed in an IoT environment for secure datasets sharing.

    [100] 2018 The authors proposed a blockchain-based secure scheme to resolve the issue of time

    announcements in IoT.

    [101] 2018 Proposed the Named Data Networking (NDN) of Things architecture and the blockchain solution

    to deal with the security attacks in this.

    [102] [103] 2018 The authors proposed a blockchain-based high-level security management scheme for various

    IoT devices.

    [104] 2020 The authors explored the major benefits and design challenges for integration of blockchain

    technologies for IoT applications.

    Table 8

    Blockchain technology work on IoT security.

    Reference Years Contribution

    [105] 2019 The authors proposed device classification methods by applying machine learning algorithms on

    the data stored in the blockchain network which in turn helps to enhance the security of IoT

    environment by detecting unauthorised devices.

    [106] 2019 The authors proposed a trust management framework for providing secure and trustworthy

    access control and also detecting and removing malicious and compromised nodes in a

    decentralized IoT system.

    [107] 2019 The authors proposed a Secure Private Blockchain-based framework (SPB) using which

    negotiations can be done among the energy prosumers over the energy price and trade energy

    in a distributed manner for a smart grid IoT application.

    [108] 2018 The authors proposed a permissioned blockchain based framework to find provenance of supply

    chain products.

    [109] 2019 The authors proposed a three-layered trust management framework – TrustChain, based on

    consortium blockchain for tracking the interactions among supply chain participants and based

    on these interactions it dynamically assign trust and reputation scores.

    [110] 2018 The authors proposed a noble blockchain-based framework for providing a private and secure

    communication model for smart vehicles so that they can trust the data they receive are

    generated by a trusted node.

    Table 9

    Blockchain technology work on IoT security.

    Reference Years Contribution

    [111] 2018 Authors proposed a Permissioned blockchain architecture to handle the most expensive

    computation in pairing-based cryptographic protocols i.e., secure outsourcing of bilinear

    pairings (SOBP).

    [112] 2019 The authors proposed a credit-based proof-of-work (PoW) mechanism in blockchain for IoT

    devices, which can guarantee system security and transaction efficiency.

    [113] 2019 The authors surveyed some of the promising applications that are being implemented using

    blockchain and also outlined solutions to overcome numerous challenges.

    [114] 2019 Proposed an anti-counterfeiting approach for IoT devices exploiting characteristics of memory

    chips to derive a cryptographic secret combined with a blockchain for trusted and reliable

    verification of device identities.

    [115] 2019 Proposed a blockchain-based searchable encryption for electronic health records (EHRs) sharing

    scheme by using smart contracts to perform a reliable and confidential search.

    [116] 2019 The authors proposed a blockchain-based privacy-preserving software update protocol to

    perform secure and reliable updates with an incentive mechanism without hampering the

    privacy of involved users.

    [117] 2019 The authors proposed a blockchain-based energy trading scheme for secure energy trading in

    the Intelligent Transportation System (ITS) by utilizing energy coins.

    B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227 13

    Table 10

    Related work blockchain and IoT security.

    Focus area Reference Contribution

    Privacy Perservation [118,119] [120,121] [122] In an IoT application, privacy is a significant concern for the end-users. The

    blockchain-based encryption techniques are proposed by different authors to

    solve the privacy preservation issue.

    Authentication [123,124] [125,126] [127] [128] The device authentication is one of the important factors for secure

    communication in the IoT network. The different methods, like mutual

    authentication, PSO-AES, and distributed authentication, are used for IoT

    device authentication using blockchain techniques.

    Access Control [129,130] The management of devices accessibility in the IoT system is essential as

    critical information is sense using different smart things. The attribute-based

    access control and blockchain-based permission delegation access control

    techniques are proposed by the researcher to manage the accessibility of the

    vital information securely.

    Scalability [131,132] The work has already been done to address the scalable issue in IoT network

    using blockchain.

    Information Share [133,134] [135,136] [137,138] [139,140] Information exchange in the IoT network is very important in real-time

    monitoring of the environment. The blockchain-based secure information

    share mechanism is integrated with the IoT system.

    Trust Management [141,142] [143,144] [145] In many IoT applications, multiple nodes are required in the decision-making

    process for better and efficient decisions. Some work has already been done

    regarding trust management.

    Initially, different research databases like ScienceDirect, IEEE Xplore, Inderscience, ACM Digital Library, DBLP, google

    scholar, Springer are used to search 500 articles. The word used to search the articles are “Internet of Things”, “IoT”, “secu-

    rity”, “privacy”, “machine learning”, “blockchain”, “artificial intelligence”.

    The number of articles are reduces to number 250 after reading the abstract and title. Again duplicate or redundant

    articles are remove. In the final stage 145 numbers of article are consider after reading the full text.

    8.1. Summary of the review

    In this survey, authors have work on the Security issues that exist in the IoT system. The purpose of this survey is to

    identify the solution need to address the security issue. Security is one of the most challenging tasks and need to address

    in IoT applications to be successful.

    8.1.1. Critical analysis of machine learning

    The machine learning technique is consists of supervised and unsupervised. The IoT application generates a huge volume

    of information. Before data are computation is done, data are needed through the verification process to avoid any mali-

    cious data or redundancy data. This survey, authors identified 29 numbers of articles that address the security issue of IoT

    applications. Machine learning addresses the following security issues:

    • Intrusion detection system. • Malware detection. • Anomaly detection. • Unauthorized IoT devices identification. • Distributed denial-of-service. • Jamming attack, Spoofing attack. • Authentication, Eavesdropping. • False data injection, Impersonation.

    8.1.2. Critical analysis of blockchain technology

    In this survey, Section 7 the details blockchain technology and corresponding research works are mention in Tables 7–10 .

    The 58 numbers of an article are listed. The authors found blockchain is the most promising technology recently researchers

    are working on to solve the security issue of IoT applications. The following security issues are address by the blockchain

    technology:

    • Identity verification. • Firmware detection and self healing. • Privacy preservation and Address space. • Data integrity and Secure communication. • Authentication and authorization. • Access control and Information Sharing. • Secure storage and computation.

    • Trust Management.

    14 B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227

    8.1.3. Critical analysis of artificial intelligence

    As per the survey done in this paper, authors found 6 numbers of papers address the security issue of IoT. In an ap-

    plication like smart transportation and smart weather forecasting, the prediction is essential. The AI provides some of the

    security issues like malware detection, privacy preservation, and authorization.

    8.2. Research challenges

    Some of the research challenges are underlined below:

    1. As the huge number of IoT devices are connected, system throughput and consensus algorithm problems still exist.

    2. Scalability issue of IoT needs to be consider when addressing security protocols.

    3. Secure computation and processing are other areas that need to address.

    4. The security protocol should be design in terms of light-weight to meet the resource constraint devices.

    9. Conclusion

    In this paper, the authors firstly study in-depth the various security challenges exist in IoT application. Secondly, the

    authors have surveyed to address existing security challenges. From the survey, it was found that some research has already

    been done in various technology like Machine learning, Artificial intelligence, and Blockchain technology, which are capable

    of addressing the existing security issue. So in detail study has been made in three technology machine learning, artificial

    intelligence and Blockchain technology, and their integration with IoT. Security is an important issue that needs to address.

    In this survey, the authors outline the emerging technology like ML, AI, and Blockchain integrate with IoT to make the

    system more secure. Some of the research challenges mention in the end.

    Declaration of Competing Interest

    The authors do not have conflict of interest with any one.

    References

    [1] A. Čolakovi ́c , M. Hadžiali ́c , Internet of things (IoT): a review of enabling technologies, challenges, and open research issues, Comput. Netw. 144 (2018)

    17–39 . [2] D. Mocrii , Y. Chen , P. Musilek , IoT-based smart homes: a review of system architecture, software, communications, privacy and security, Internet

    Things 1 (2018) 81–98 . [3] Q. Jing , A.V. Vasilakos , J. Wan , J. Lu , D. Qiu , Security of the internet of things: perspectives and challenges, Wirel. Netw. 20 (8) (2014) 2481–2501 .

    [4] A.H. Ngu , M. Gutierrez , V. Metsis , S. Nepal , Q.Z. Sheng , Iot middleware: a survey on issues and enabling technologies, IEEE Internet Things J. 4 (1)(2016) 1–20 .

    [5] A. Mosenia , N.K. Jha , A comprehensive study of security of internet-of-things, IEEE Trans. Emerg. Top. Comput. 5 (4) (2016) 586–602 .

    [6] J. Lin , W. Yu , N. Zhang , X. Yang , H. Zhang , W. Zhao , A survey on internet of things: architecture, enabling technologies, security and privacy, andapplications, IEEE Internet Things J. 4 (5) (2017) 1125–1142 .

    [7] Y. Yang , L. Wu , G. Yin , L. Li , H. Zhao , A survey on security and privacy issues in internet-of-things, IEEE Internet Things J. 4 (5) (2017) 1250–1258 . [8] F.A. Alaba , M. Othman , I.A.T. Hashem , F. Alotaibi , Internet of things security: a survey, J. Netw. Comput. Appl. 88 (2017) 10–28 .

    [9] P.I.R. Grammatikis , P.G. Sarigiannidis , I.D. Moscholios , Securing the internet of things: challenges, threats and solutions, Internet Things 5 (2018)41–70 .

    [10] A.K. Das , S. Zeadally , D. He , Taxonomy and analysis of security protocols for internet of things, Future Gener. Comput. Syst. 89 (2018) 110–125 .

    [11] B. Di Martino , M. Rak , M. Ficco , A. Esposito , S. Maisto , S. Nacchia , Internet of things reference architectures, security and interoperability: a survey,Internet Things 1 (2018) 99–112 .

    [12] V. Hassija , V. Chamola , V. Saxena , D. Jain , P. Goyal , B. Sikdar , A survey on IoT security: application areas, security threats, and solution architectures,IEEE Access 7 (2019) 82721–82743 .

    [13] A. Al-Hasnawi , S.M. Carr , A. Gupta , Fog-based local and remote policy enforcement for preserving data privacy in the internet of things, InternetThings 7 (2019) 10 0 069 .

    [14] K.-C. Chen , S.-Y. Lien , Machine-to-machine communications: technologies and challenges, Ad Hoc Netw. 18 (2014) 3–23 .

    [15] V. Casola , A. De Benedictis , A. Riccio , D. Rivera , W. Mallouli , E.M. de Oca , A security monitoring system for internet of things, Internet Things 7 (2019)10 0 080 .

    [16] S. Siboni , V. Sachidananda , Y. Meidan , M. Bohadana , Y. Mathov , S. Bhairav , A. Shabtai , Y. Elovici , Security testbed for internet-of-things devices, IEEETrans. Reliab. 68 (1) (2018) 23–44 .

    [17] R. Nawaratne , D. Alahakoon , D. De Silva , P. Chhetri , N. Chilamkurti , Self-evolving intelligent algorithms for facilitating data interoperability in IoTenvironments, Future Gener. Comput. Syst. 86 (2018) 421–432 .

    [18] K. Bing , L. Fu , Y. Zhuo , L. Yanlei , Design of an internet of things-based smart home system, in: 2011 2nd International Conference on Intelligent

    Control and Information Processing, 2, IEEE, 2011, pp. 921–924 . [19] U. Satapathy , B.K. Mohanta , D. Jena , S. Sobhanayak , An ECC based lightweight authentication protocol for mobile phone in smart home, in: 2018 IEEE

    13th International Conference on Industrial and Information Systems (ICIIS), IEEE, 2018, pp. 303–308 . [20] S.S. Panda , D. Jena , B.K. Mohanta , A remote device authentication scheme for secure communication in cloud based IoT, in: 2019 2nd International

    Conference on Innovations in Electronics, Signal Processing and Communication (IESC), IEEE, 2019, pp. 165–171 . [21] R.K. Kodali , V. Jain , S. Bose , L. Boppana , IoT based smart security and home automation system, in: 2016 International Conference on Computing,

    Communication and Automation (ICCCA), IEEE, 2016, pp. 1286–1289 .

    [22] K. Jaiswal , S. Sobhanayak , B.K. Mohanta , D. Jena , IoT-cloud based framework for patient’s data collection in smart healthcare system using raspber-ry-pi, in: 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA), IEEE, 2017, pp. 1–4 .

    [23] S.R. Moosavi , T.N. Gia , A.-M. Rahmani , E. Nigussie , S. Virtanen , J. Isoaho , H. Tenhunen , Sea: a secure and efficient authentication and authorizationarchitecture for IoT-based healthcare using smart gateways, Procedia Comput. Sci. 52 (2015) 452–459 .

    [24] Y. Mehmood , F. Ahmad , I. Yaqoob , A. Adnane , M. Imran , S. Guizani , Internet-of-things-based smart cities: recent advances and challenges, IEEE Com-mun. Mag. 55 (9) (2017) 16–24 .

    B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227 15

    [25] H. Arasteh , V. Hosseinnezhad , V. Loia , A. Tommasetti , O. Troisi , M. Shafie-Khah , P. Siano , IoT-based smart cities: a survey, in: 2016 IEEE 16th Interna-tional Conference on Environment and Electrical Engineering (EEEIC), IEEE, 2016, pp. 1–6 .

    [26] A.J. Neto , Z. Zhao , J.J. Rodrigues , H.B. Camboim , T. Braun , Fog-based crime-assistance in smart IoT transportation system, IEEE Access 6 (2018)11101–11111 .

    [27] L.F. Herrera-Quintero , J.C. Vega-Alfonso , K.B.A. Banse , E.C. Zambrano , Smart ITS sensor for the transportation planning based on IoT approaches usingserverless and microservices architecture, IEEE Intell. Transp. Syst. Mag. 10 (2) (2018) 17–27 .

    [28] S. Muthuramalingam , A. Bharathi , N. Gayathri , R. Sathiyaraj , B. Balamurugan , et al. , IoT based intelligent transportation system IoT-ITS for global

    perspective: a case study, in: Internet of Things and Big Data Analytics for Smart Generation, Springer, 2019, pp. 279–300 . [29] M.R. Dey , U. Satapathy , P. Bhanse , B.K. Mohanta , D. Jena , Magtrack: detecting road surface condition using smartphone sensors and machine learning,

    in: TENCON 2019-2019 IEEE Region 10 Conference (TENCON), IEEE, 2019, pp. 2485–2489 . [30] X.C. Yin , Z.G. Liu , L. Nkenyereye , B. Ndibanje , Toward an applied cyber security solution in IoT-based smart grids: an intrusion detection system

    approach, Sensors 19 (22) (2019) 4952 . [31] A . Meloni , P.A . Pegoraro , L. Atzori , A. Benigni , S. Sulis , Cloud-based IoT solution for state estimation in smart grids: exploiting virtualization and

    edge-intelligence technologies, Comput. Netw. 130 (2018) 156–165 . [32] A.O. Akmandor , Y. Hongxu , N.K. Jha , Smart, secure, yet energy-efficient, internet-of-things sensors, IEEE Trans. Multi-Scale Comput. Syst. 4 (4) (2018)

    914–930 .

    [33] Z. Li , G. Liu , L. Liu , X. Lai , G. Xu , IoT-based tracking and tracing platform for prepackaged food supply chain, Ind. Manag. Data Syst. 117 (9) (2017)1906–1916 .

    [34] Y.P. Tsang , K.L. Choy , C.-H. Wu , G.T. Ho , C.H. Lam , P. Koo , An internet of things (IoT)-based risk monitoring system for managing cold supply chainrisks, Ind. Manag. Data Syst. 118 (7) (2018) 1432–1462 .

    [35] C. Verdouw , R.M. Robbemond , T. Verwaart , J. Wolfert , A.J. Beulens , A reference architecture for IoT-based logistic information systems in agri-foodsupply chains, Enterp. Inf. Syst. 12 (7) (2018) 755–779 .

    [36] L. Liu , B. Zhou , Z. Zou , S.-C. Yeh , L. Zheng , A smart unstaffed retail shop based on artificial intelligence and IoT, in: 2018 IEEE 23rd International

    Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), IEEE, 2018, pp. 1–4 . [37] M. Mehra , S. Saxena , S. Sankaranarayanan , R.J. Tom , M. Veeramanikandan , IoT based hydroponics system using deep neural networks, Comput. Elec-

    tron. Agric. 155 (2018) 473–486 . [38] A. Goap , D. Sharma , A. Shukla , C.R. Krishna , An IoT based smart irrigation management system using machine learning and open source technologies,

    Comput. Electron. Agric. 155 (2018) 41–49 . [39] C. Kamienski , J.-P. Soininen , M. Taumberger , R. Dantas , A. Toscano , T. Salmon Cinotti , R. Filev Maia , A. Torre Neto , Smart water management platform:

    IoT-based precision irrigation for agriculture, Sensors 19 (2) (2019) 276 .

    [40] B. Keswani , A.G. Mohapatra , A. Mohanty , A. Khanna , J.J. Rodrigues , D. Gupta , V.H.C. de Albuquerque , Adapting weather conditions based IoT enabledsmart irrigation technique in precision agriculture mechanisms, Neural Comput. Appl. 31 (1) (2019) 277–292 .

    [41] N.K. Nawandar , V.R. Satpute , IoT based low cost and intelligent module for smart irrigation system, Comput. Electron. Agric. 162 (2019) 979–990 . [42] M. Ayaz , M. Ammad-Uddin , Z. Sharif , A. Mansour , E.-H.M. Aggoune , Internet-of-things (IoT)-based smart agriculture: toward making the fields talk,

    IEEE Access 7 (2019) 129551–129583 . [43] M. López , A. Peinado , A. Ortiz , An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless

    networks, Comput. Netw. 165 (2019) 106945 .

    [44] Z.A. Baig , S. Sanguanpong , S.N. Firdous , T.G. Nguyen , C. So-In , et al. , Averaged dependence estimators for dos attack detection in IoT networks, FutureGener. Comput. Syst. 102 (2020) 198–209 .

    [45] M. Almiani , A. AbuGhazleh , A. Al-Rahayfeh , S. Atiewi , A. Razaque , Deep recurrent neural network for IoT intrusion detection system, Simul. Modell.Pract. Theory 101 (2019) 102031 .

    [46] L. Liu , Z. Ma , W. Meng , Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks, Future Gener. Comput. Syst.101 (2019) 865–879 .

    [47] J. Moon , I.Y. Jung , J.H. Park , IoT application protection against power analysis attack, Comput. Electr. Eng. 67 (2018) 566–578 .

    [48] Y. Niu , J. Zhang , A. Wang , C. Chen , An efficient collision power attack on AES encryption in edge computing, IEEE Access 7 (2019) 18734–18748 . [49] N. Tariq , M. Asim , Z. Maamar , M.Z. Farooqi , N. Faci , T. Baker , A mobile code-driven trust mechanism for detecting internal attacks in sensor node-pow-

    ered IoT, J Parallel Distrib. Comput. 134 (2019) 198–206 . [50] H. Yan , Y. Wang , C. Jia , J. Li , Y. Xiang , W. Pedrycz , IoT-FBAC: function-based access control scheme using identity-based encryption in IoT, Future

    Gener. Comput. Syst. 95 (2019) 344–353 . [51] S. Deshmukh-Bhosale , S.S. Sonavane , A real-time intrusion detection system for wormhole attack in the RPL based internet of things, Procedia Manuf.

    32 (2019) 840–847 .

    [52] H. Yi , Z. Nie , Side-channel security analysis of UOV signature for cloud-based internet of things, Future Gener. Comput. Syst. 86 (2018) 704–708 . [53] D. Yin , L. Zhang , K. Yang , A DDoS attack detection and mitigation with software-defined internet of things framework, IEEE Access 6 (2018)

    24694–24705 . [54] C. Li , Z. Qin , E. Novak , Q. Li , Securing SDN infrastructure of IoT–fog networks from MitM attacks, IEEE Internet Things J. 4 (5) (2017) 1156–1164 .

    [55] N. Zhang , R. Wu , S. Yuan , C. Yuan , D. Chen , RAV: relay aided vectorized secure transmission in physical layer security for internet of things underactive attacks, IEEE Internet Things J. 6 (5) (2019) 8496–8506 .

    [56] A . Raoof , A . Matrawy , C.-H. Lung , Routing attacks and mitigation methods for RPL-based internet of things, IEEE Commun. Surv. Tutor. 21 (2) (2018)1582–1606 .

    [57] K. Zhang , X. Liang , R. Lu , X. Shen , Sybil attacks and their defenses in the internet of things, IEEE Internet Things J. 1 (5) (2014) 372–383 .

    [58] A .K. Mishra , A .K. Tripathy , D. Puthal , L.T. Yang , Analytical model for Sybil attack phases in internet of things, IEEE Internet Things J. 6 (1) (2018)379–387 .

    [59] Q.D. La , T.Q. Quek , J. Lee , S. Jin , H. Zhu , Deceptive attack and defense game in honeypot-enabled networks for the internet of things, IEEE InternetThings J. 3 (6) (2016) 1025–1035 .

    [60] P. Zhang , S.G. Nagarajan , I. Nevat , Secure location of things (SLOT): mitigating localization spoofing attacks in the internet of things, IEEE InternetThings J. 4 (6) (2017) 2199–2206 .

    [61] B. Xu , W. Wang , Q. Hao , Z. Zhang , P. Du , T. Xia , H. Li , X. Wang , A security design for the detecting of buffer overflow attacks in IoT device, IEEE Access

    6 (2018) 72862–72869 . [62] S. Tu , M. Waqas , S.U. Rehman , M. Aamir , O.U. Rehman , Z. Jianbiao , C.-C. Chang , Security in fog computing: a novel technique to tackle an imperson-

    ation attack, IEEE Access 6 (2018) 74993–75001 . [63] I. Kotenko , I. Saenko , A. Branitskiy , Framework for mobile internet of things security monitoring based on big data processing and machine learning,

    IEEE Access 6 (2018) 72714–72723 . [64] E. Hossain , I. Khan , F. Un-Noor , S.S. Sikander , M.S.H. Sunny , Application of big data and machine learning in smart grid, and associated security

    concerns: a review, IEEE Access 7 (2019) 13960–13988 .

    [65] N. Chaabouni , M. Mosbah , A. Zemmari , C. Sauvignac , P. Faruki , Network intrusion detection for IoT security based on learning techniques, IEEECommun. Surv. Tutor. 21 (3) (2019) 2671–2701 .

    [66] E. Anthi , L. Williams , M. Słowi ́nska , G. Theodorakopoulos , P. Burnap , A supervised intrusion detection system for smart home IoT devices, IEEE InternetThings J. 6 (5) (2019) 9042–9053 .

    [67] N. Wang , T. Jiang , S. Lv , L. Xiao , Physical-layer authentication based on extreme learning machine, IEEE Commun. Lett. 21 (7) (2017) 1557–1560 .

    16 B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227

    [68] L. Wei , W. Luo , J. Weng , Y. Zhong , X. Zhang , Z. Yan , Machine learning-based malicious application detection of android, IEEE Access 5 (2017)25591–25601 .

    [69] F. Restuccia , S. D’Oro , T. Melodia , Securing the internet of things in the age of machine learning and software-defined networking, IEEE InternetThings J. 5 (6) (2018) 4 829–4 842 .

    [70] M.S. Mahdavinejad , M. Rezvan , M. Barekatain , P. Adibi , P. Barnaghi , A.P. Sheth , Machine learning for internet of things data analysis: a survey, Digit.Commun. Netw. 4 (3) (2018) 161–175 .

    [71] O. Zedadra , A. Guerrieri , N. Jouandeau , G. Spezzano , H. Seridi , G. Fortino , Swarm intelligence-based algorithms within IoT-based systems: a review, J.

    Parallel Distrib. Comput. 122 (2018) 173–187 . [72] O. Brun , Y. Yin , E. Gelenbe , Deep learning with dense random neural network for detecting attacks against IoT-connected home environments, Pro-

    cedia Comput. Sci. 134 (2018) 458–463 . [73] S. Rathore , J.H. Park , Semi-supervised learning based distributed attack detection framework for IoT, Appl. Soft Comput. 72 (2018) 79–89 .

    [74] N. Hashimoto , S. Ozawa , T. Ban , J. Nakazato , J. Shimamura , A darknet traffic analysis for IoT malwares using association rule learning, ProcediaComput. Sci. 144 (2018) 118–123 .

    [75] U. Jayasinghe , G.M. Lee , T.-W. Um , Q. Shi , Machine learning based trust computational model for IoT services, IEEE Trans. Sustain. Comput. 4 (1)(2018) 39–52 .

    [76] A. Gondalia , D. Dixit , S. Parashar , V. Raghava , A. Sengupta , V.R. Sarobin , IoT-based healthcare monitoring system for war soldiers using machine

    learning, Procedia Comput. Sci. 133 (2018) 1005–1013 . [77] A. Dawoud , S. Shahristani , C. Raun , Deep learning and software-defined networks: towards secure IoT architecture, Internet Things 3 (2018) 82–89 .

    [78] I.H. Sarker , A machine learning based robust prediction model for real-life mobile phone data, Internet Things 5 (2019) 180–193 . [79] M. Zolanvari , M.A. Teixeira , L. Gupta , K.M. Khan , R. Jain , Machine learning based network vulnerability analysis of industrial internet of things, IEEE

    Internet Things J. 6 (4) (2019) 6 822–6 834 . [80] M. Hasan , M.M. Islam , M.I.I. Zarif , M. Hashem , Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches, Internet

    Things 7 (2019) 10 0 059 .

    [81] J.M. McGinthy , L.J. Wong , A.J. Michaels , Groundwork for neural network-based specific emitter identification authentication for IoT, IEEE InternetThings J. 6 (4) (2019) 6429–6440 .

    [82] A. Ghosh , D. Chakraborty , A. Law , Artificial intelligence in internet of things, CAAI Trans. Intell. Technol. 3 (4) (2018) 208–218 . [83] S. Wang , Z. Qiao , Robust pervasive detection for adversarial samples of artificial intelligence in IoT environments, IEEE Access 7 (2019) 88693–88704 .

    [84] M. Zolotukhin , T. Hämäläinen , On artificial intelligent malware tolerant networking for IoT, in: 2018 IEEE Conference on Network Function Virtualiza-tion and Software Defined Networks (NFV-SDN), IEEE, 2018, pp. 1–6 .

    [85] S.K. Singh, S. Rathore, J.H. Park, BlockIoTIntelligence: a blockchain-enabled intelligent IoT architecture with artificial intelligence, Future Gener. Com-

    put. Syst. (2019), doi: 10.1016/j.future.2019.09.002 . [86] G. Falco , A. Viswanathan , C. Caldera , H. Shrobe , A master attack methodology for an ai-based automated attack planner for smart cities, IEEE Access

    6 (2018) 4 8360–4 8373 . [87] Z. Zou , Y. Jin , P. Nevalainen , Y. Huan , J. Heikkonen , T. Westerlund , Edge and fog computing enabled ai for IoT-an overview, in: 2019 IEEE International

    Conference on Artificial Intelligence Circuits and Systems (AICAS), IEEE, 2019, pp. 51–56 . [88] B.K. Mohanta , S.S. Panda , D. Jena , An overview of smart contract and use cases in blockchain technology, in: 2018 9th International Conference on

    Computing, Communication and Networking Technologies (ICCCNT), IEEE, 2018, pp. 1–4 .

    [89] S.S. Panda , B.K. Mohanta , U. Satapathy , D. Jena , D. Gountia , T.K. Patra , Study of blockchain based decentralized consensus algorithms, in: TENCON2019-2019 IEEE Region 10 Conference (TENCON), IEEE, 2019, pp. 908–913 .

    [90] B.K. Mohanta , D. Jena , S.S. Panda , S. Sobhanayak , Blockchain technology: a survey on applications and security privacy challenges, Internet Things(2019) 100107 .

    [91] M. Banerjee , J. Lee , K.-K.R. Choo , A blockchain future for internet of things security: a position paper, Digital Commun. Netw. 4 (3) (2018) 149–160 . [92] D. Minoli , B. Occhiogrosso , Blockchain mechanisms for IoT security, Internet Things 1 (2018) 1–13 .

    [93] U. Satapathy , B.K. Mohanta , S.S. Panda , S. Sobhanayak , D. Jena , A secure framework for communication in internet of things application using hyper-

    ledger based blockchain, in: 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, 2019,pp. 1–7 .

    [94] T.M. Fernández-Caramés , P. Fraga-Lamas , A review on the use of blockchain for the internet of things, IEEE Access 6 (2018) 32979–33001 . [95] M.A. Khan , K. Salah , IoT security: review, blockchain solutions, and open challenges, Future Gener. Comput. Syst. 82 (2018) 395–411 .

    [96] A. Dorri , S.S. Kanhere , R. Jurdak , P. Gauravaram , Blockchain for IoT security and privacy: the case study of a smart home, in: 2017 IEEE InternationalConference on Pervasive Computing and Communications Workshops (PerCom Workshops), IEEE, 2017, pp. 618–623 .

    [97] A. Reyna , C. Martín , J. Chen , E. Soler , M. Díaz , On blockchain and its integration with IoT. challenges and opportunities, Future Gener. Comput. Syst.

    88 (2018) 173–190 . [98] N.M. Kumar , P.K. Mallick , Blockchain technology for security issues and challenges in IoT, Procedia Comput. Sci. 132 (2018) 1815–1823 .

    [99] K.M. Sadique , R. Rahmani , P. Johannesson , Towards security on internet of things: applications and challenges in technology, Procedia Comput. Sci.141 (2018) 199–206 .

    [100] K. Fan , S. Wang , Y. Ren , K. Yang , Z. Yan , H. Li , Y. Yang , Blockchain-based secure time protection scheme in IoT, IEEE Internet Things J. 6 (3) (2018)4671–4679 .

    [101] K. Zhu , Z. Chen , W. Yan , L. Zhang , Security attacks in named data networking of things and a blockchain solution, IEEE Internet Things J. 6 (3) (2018)4733–4741 .

    [102] Y. Qian , Y. Jiang , J. Chen , Y. Zhang , J. Song , M. Zhou , M. Pustišek , Towards decentralized IoT security enhancement: blockchain approach, Comput.

    Electr. Eng. 72 (2018) 266–273 . [103] B.K. Mohanta , U. Satapathy , S.S. Panda , D. Jena , A novel approach to solve security and privacy issues for IoT applications using blockchain, in: 2019

    International Conference on Information Technology (ICIT), IEEE, 2019, pp. 394–399 . [104] V. Dedeoglu , R. Jurdak , A. Dorri , R. Lunardi , R. Michelin , A. Zorzo , S. Kanhere , Blockchain technologies for IoT, in: Advanced Applications of Blockchain

    Technology, Springer, 2020, pp. 55–89 . [105] A. Dorri , C. Roulin , R. Jurdak , S.S. Kanhere , On the activity privacy of blockchain for IoT, in: 2019 IEEE 44th Conference on Local Computer Networks

    (LCN), IEEE, 2019, pp. 258–261 .

    [106] G.D. Putra, V. Dedeoglu, S.S. Kanhere, R. Jurdak, Trust management in decentralized IoT access control system, arXiv preprint arXiv:1912.10247 (2019).[107] A. Dorri , F. Luo , S.S. Kanhere , R. Jurdak , Z.Y. Dong , Spb: a secure private blockchain-based solution for distributed energy trading, IEEE Commun. Mag.

    57 (7) (2019) 120–126 . [108] S. Malik , S.S. Kanhere , R. Jurdak , Productchain: scalable blockchain framework to support provenance in supply chains, in: 2018 IEEE 17th Interna-

    tional Symposium on Network Computing and Applications (NCA), IEEE, 2018, pp. 1–10 . [109] S. Malik , V. Dedeoglu , S.S. Kanhere , R. Jurdak , Trustchain: trust management in blockchain and IoT supported supply chains, in: 2019 IEEE Interna-

    tional Conference on Blockchain (Blockchain), IEEE, 2019, pp. 184–193 .

    [110] R.A . Michelin , A . Dorri , M. Steger , R.C. Lunardi , S.S. Kanhere , R. Jurdak , A.F. Zorzo , Speedychain: a framework for decoupling data from blockchain forsmart cities, in: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, 2018,

    pp. 145–154 . [111] C. Lin , D. He , X. Huang , X. Xie , K.-K.R. Choo , Blockchain-based system for secure outsourcing of bilinear pairings, Inf Sci 527 (2018) 590–601 .

    B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227 17

    [112] J. Huang , L. Kong , G. Chen , M.-Y. Wu , X. Liu , P. Zeng , Towards secure industrial IoT: blockchain system with credit-based consensus mechanism, IEEETrans. Ind. Inf. 15 (6) (2019) 36 80–36 89 .

    [113] A.R. Rao , D. Clarke , Perspectives on emerging directions in using IoT devices in blockchain applications, Internet Things (2019) 10 0 079 . [114] M.Á. Prada-Delgado , I. Baturone , G. Dittmann , J. Jelitto , A. Kind , PUF-derived IoT identities in a zero-knowledge protocol for blockchain, Internet

    Things 9 (2019) 10 0 057 . [115] L. Chen , W.-K. Lee , C.-C. Chang , K.-K.R. Choo , N. Zhang , Blockchain based searchable encryption for electronic health record sharing, Future Gener.

    Comput. Syst. 95 (2019) 420–429 .

    [116] Y. Zhao , Y. Liu , A. Tian , Y. Yu , X. Du , Blockchain based privacy-preserving software updates with proof-of-delivery for internet of things, J. ParallelDistrib. Comput. 132 (2019) 141–149 .

    [117] R. Chaudhary , A. Jindal , G.S. Aujla , S. Aggarwal , N. Kumar , K.-K.R. Choo , Best: blockchain-based secure energy trading in SDN-enabled intelligenttransportation system, Comput. Secur. 85 (2019) 288–299 .

    [118] M.U. Hassan , M.H. Rehmani , J. Chen , Privacy preservation in blockchain based IoT systems: integration issues, prospects, challenges, and future re-search directions, Future Gener. Comput. Syst. 97 (2019) 512–529 .

    [119] G. Sagirlar , B. Carminati , E. Ferrari , Decentralizing privacy enforcement for internet of things smart objects, Comput. Netw. 143 (2018) 112–125 . [120] M. Shen , X. Tang , L. Zhu , X. Du , M. Guizani , Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart

    cities, IEEE Internet Things J. 6 (5) (2019) 7702–7712 .

    [121] P. Lv , L. Wang , H. Zhu , W. Deng , L. Gu , An IOT-oriented privacy-preserving publish/subscribe model over blockchains, IEEE Access 7 (2019)41309–41314 .

    [122] J. Xu , K. Xue , S. Li , H. Tian , J. Hong , P. Hong , N. Yu , Healthchain: a blockchain-based privacy preserving scheme for large-scale health data, IEEEInternet Things J. 6 (5) (2019) 8770–8781 .

    [123] M.T. Hammi , B. Hammi , P. Bellot , A. Serhrouchni , Bubbles of trust: a decentralized blockchain-based authentication system for IoT, Comput. Secur. 78(2018) 126–142 .

    [124] C. Lin , D. He , X. Huang , K.-K.R. Choo , A.V. Vasilakos , BSeIn: a blockchain-based secure mutual authentication with fine-grained access control system

    for industry 4.0, J. Netw. Comput. Appl. 116 (2018) 42–52 . [125] A. Mohsin , A. Zaidan , B. Zaidan , O. Albahri , A. Albahri , M. Alsalem , K. Mohammed , Based blockchain-PSO-AES techniques in finger vein biometrics: a

    novel verification secure framework for patient authentication, Comput. Stand. Interfaces 66 (2019) 103343 . [126] M. Conti , M. Hassan , C. Lal , BlockAuth: blockchain based distributed producer authentication in ICN, Comput. Netw. 164 (2019) 106888 .

    [127] Z. Liu , H. Seo , IoT-NUMS: evaluating NUMS elliptic curve cryptography for IoT platforms, IEEE Trans. Inf. Forensics Secur. 14 (3) (2018) 720–729 . [128] B.K. Mohanta , A. Sahoo , S. Patel , S.S. Panda , D. Jena , D. Gountia , Decauth: decentralized authentication scheme for IoT device using Ethereum

    blockchain, in: TENCON 2019-2019 IEEE Region 10 Conference (TENCON), IEEE, 2019, pp. 558–563 .

    [129] S. Ding , J. Cao , C. Li , K. Fan , H. Li , A novel attribute-based access control scheme using blockchain for IoT, IEEE Access 7 (2019) 38431–38441 . [130] G. Ali , N. Ahmad , Y. Cao , M. Asif , H. Cruickshank , Q.E. Ali , Blockchain based permission delegation and access control in internet of things (BACI),

    Comput. Secur. 86 (2019) 318–334 . [131] A. Dorri , S.S. Kanhere , R. Jurdak , P. Gauravaram , LSB: a lightweight scalable blockchain for IoT security and anonymity, J. Parallel Distrib. Comput. 134

    (2019) 180–197 . [132] S. Biswas , K. Sharif , F. Li , B. Nour , Y. Wang , A scalable blockchain framework for secure transactions in IoT, IEEE Internet Things J. 6 (3) (2018)

    4650–4659 .

    [133] H. Si , C. Sun , Y. Li , H. Qiao , L. Shi , IoT information sharing security mechanism based on blockchain technology, Future Gener. Comput. Syst. 101(2019) 1028–1040 .

    [134] Z. Li , L. Liu , A.V. Barenji , W. Wang , Cloud-based manufacturing blockchain: secure knowledge sharing for injection mould redesign, Procedia CIRP 72(2018) 961–966 .

    [135] P. Danzi , A.E. Kalør , Č. Stefanovi ́c , P. Popovski , Delay and communication tradeoffs for blockchain systems with lightweight IoT clients, IEEE InternetThings J. 6 (2) (2019) 2354–2365 .

    [136] D.G. Roy , P. Das , D. De , R. Buyya , QoS-aware secure transaction framework for internet of things using blockchain mechanism, J. Netw. Comput. Appl.

    144 (2019) 59–78 . [137] J. Yang , Z. Lu , J. Wu , Smart-toy-edge-computing-oriented data exchange based on blockchain, J. Syst. Archit. 87 (2018) 36–48 .

    [138] L. Zhou , L. Wang , Y. Sun , P. Lv , BeeKeeper: blockchain-based IoT system with secure storage and homomorphic computation, IEEE Access 6 (2018)43472–43488 .

    [139] J. Pan , J. Wang , A. Hester , I. Alqerm , Y. Liu , Y. Zhao , EdgeChain: an edge-IoT framework and prototype based on blockchain and smart contracts, IEEEInternet Things J. 6 (3) (2018) 4719–4732 .

    [140] R. Li , T. Song , B. Mei , H. Li , X. Cheng , L. Sun , BlockChain for large-scale internet of things data storage and protection, IEEE Trans. Serv. Comput. 12

    (5) (2018) 4719–4732 . [141] R. Casado-Vara , P. Chamoso , F. De la Prieta , J. Prieto , J.M. Corchado , Non-linear adaptive closed-loop control system for improved efficiency in

    IoT-blockchain management, Inf. Fusion 49 (2019) 227–239 . [142] S. Huh , S. Cho , S. Kim , Managing IoT devices using blockchain platform, in: 2017 19th International Conference on Advanced Communication Tech-

    nology (ICACT), IEEE, 2017, pp. 464–467 . [143] A. Maw , S. Adepu , A. Mathur , ICS-BlockOpS: blockchain for operational data security in industrial control system, Pervasive Mob. Comput. 59 (2019)

    101048 . [144] L. Xie , Y. Ding , H. Yang , X. Wang , Blockchain-based secure and trustworthy internet of things in SDN-enabled 5G-VANETs, IEEE Access 7 (2019)

    56656–56666 .

    [145] B.K. Mohanta , S.S. Panda , U. Satapathy , D. Jena , D. Gountia , Trustworthy management in decentralized IoT application using Blockchain, in: 2019 10thInternational Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, 2019, pp. 1–5 .

    • Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology
      • 1 Introduction
        • 1.1 Objective and contribution
        • 1.2 Paper organization
      • 2 Related work
      • 3 Internet of things (IoT) infrastructure,protocol, application
        • 3.1 IoT infrastructure
        • 3.2 Standard protocol
          • 3.2.1 MQTT
          • 3.2.2 CoAP
          • 3.2.3 REST
          • 3.2.4 AMQP
          • 3.2.5 TCP
          • 3.2.6 UDP
          • 3.2.7 DCCP
          • 3.2.8 SCTP
          • 3.2.9 RSVP
          • 3.2.10 QUIC
          • 3.2.11 CLNS
          • 3.2.12 DDP
          • 3.2.13 ICMP
          • 3.2.14 DSI
          • 3.2.15 ISDN
        • 3.3 Application
          • 3.3.1 Smart home
          • 3.3.2 Smart hospital
          • 3.3.3 Smart city
          • 3.3.4 Smart transportation
          • 3.3.5 Smart grid
          • 3.3.6 Supply chain system
          • 3.3.7 Smart retails
          • 3.3.8 Agriculture
      • 4 Security attacks in internet of things
      • 5 Security issue address using machine learning
      • 6 Security issue address using artificial intelligence
      • 7 Security issue address using blockchain technology
      • 8 Analysis of the survey and research challenges
        • 8.1 Summary of the review
          • 8.1.1 Critical analysis of machine learning
          • 8.1.2 Critical analysis of blockchain technology
          • 8.1.3 Critical analysis of artificial intelligence
        • 8.2 Research challenges
      • 9 Conclusion
      • Declaration of Competing Interest
      • References

                                                                                                                                      Order Now