CLC number: TP393
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2020-03-30
Cited: 0
Clicked: 7969
Citations: Bibtex RefMan EndNote GB/T7714
Raheel Ahmed Memon, Jian Ping Li, Junaid Ahmed, Muhammad Irshad Nazeer, Muhammad Ismail, Khursheed Ali. Cloud-based vs. blockchain-based IoT: a comparative survey and way forward[J]. Frontiers of Information Technology & Electronic Engineering, 2020, 21(4): 563-586.
@article{title="Cloud-based vs. blockchain-based IoT: a comparative survey and way forward",
author="Raheel Ahmed Memon, Jian Ping Li, Junaid Ahmed, Muhammad Irshad Nazeer, Muhammad Ismail, Khursheed Ali",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="21",
number="4",
pages="563-586",
year="2020",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.1800343"
}
%0 Journal Article
%T Cloud-based vs. blockchain-based IoT: a comparative survey and way forward
%A Raheel Ahmed Memon
%A Jian Ping Li
%A Junaid Ahmed
%A Muhammad Irshad Nazeer
%A Muhammad Ismail
%A Khursheed Ali
%J Frontiers of Information Technology & Electronic Engineering
%V 21
%N 4
%P 563-586
%@ 2095-9184
%D 2020
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.1800343
TY - JOUR
T1 - Cloud-based vs. blockchain-based IoT: a comparative survey and way forward
A1 - Raheel Ahmed Memon
A1 - Jian Ping Li
A1 - Junaid Ahmed
A1 - Muhammad Irshad Nazeer
A1 - Muhammad Ismail
A1 - Khursheed Ali
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 21
IS - 4
SP - 563
EP - 586
%@ 2095-9184
Y1 - 2020
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.1800343
Abstract: The internet of Things (IoT) has been evolving for more than a decade. Technological advancements have increased its popularity, but concerns and risks related to IoT are growing considerably along with the increased number of connected devices. In 2013, a new cryptography-based infrastructure called blockchain emerged with the potential to replace the existing cloud-based infrastructure of IoT through decentralization. In this article, we provide a taxonomy of the challenges in the current IoT infrastructure, and a literature survey with a taxonomy of the issues to expect in the future of the IoT after adopting blockchain as an infrastructure. The two architectures are compared based on their strengths and weaknesses. Then a brief survey of ongoing key research activities in blockchain is presented, which will have considerable impact on overcoming the challenges encountered in the applicability of blockchain in IoT. Finally, considering the challenges and issues in both infrastructures and the latest research activities, we propose a high-level hybrid IoT approach that uses the cloud, edge/fog, and blockchain together to avoid the limitations of each infrastructure.
[1]Aazam M, Khan I, Alsaffar AA, et al., 2014. Cloud of Things: integrating Internet of Things and cloud computing and the issues involved. Proc 11th Int Bhurban Conf on Applied Sciences and Technology, p.414-419.
[2]Ahmed F, Ko YB, 2016. Mitigation of black hole attacks in routing protocol for low power and lossy networks. Secur Commun Netw, 9(18):5143-5154.
[3]Akoush S, Sohan R, Rice A, et al., 2011. Free lunch: exploiting renewable energy for computing. https://www.usenix.org/events/hotos/tech/final_files/Akoush.pdf [Accessed on Sept. 22, 2018].
[4]Almadhoun R, Kadadha M, Alhemeiri M, et al., 2018. A user authentication scheme of IoT devices using blockchain- enabled fog nodes. IEEE/ACS 15th Int Conf on Computer Systems and Applications, p.1-8.
[5]Amazon, 2006. Announcing Amazon Elastic Compute Cloud (Amazon EC2) - beta. https://aws.amazon.com/about-aws/whats-new/2006/08/24/announcing-amazon-elastic-compute-cloud-amazon-ec2---beta/ [Accessed on Jan. 18, 2018].
[6]Andersen MP, Kolb J, Chen KF, et al., 2017. Wave: a decentralized authorization system for IoT via blockchain smart contracts. https://www2.eecs.berkeley.edu/Pubs/TechRpts/2017/EECS-2017-234.pdf [Accessed on May 29, 2019].
[7]Armbrust M, Fox A, Griffith R, et al., 2010. A view of cloud computing. Commun ACM, 53(4):50-58.
[8]Aulbach S, Grust T, Jacobs D, et al., 2008. Multi-tenant databases for software as a service: schema-mapping techniques. Proc ACM SIGMOD Int Conf on Management of Data, p.1195-1206.
[9]Bahga A, Madisetti VK, 2016. Blockchain platform for Industrial Internet of Things. J Softw Eng Appl, 9(10): 533-546.
[10]Banafa A, 2017. IoT and blockchain convergence: benefits and challenges. http://iot.ieee.org/newsletter/january-2017/iot-and-blockchain-convergence-benefits-and-challenges. html [Accessed on Feb. 23, 2018].
[11]Bano S, Al-Bassam M, Danzis G, 2017a. The road to scalable blockchain designs. Winter, 42(4):31-36.
[12]Bano S, Sonnino A, Al-Bassam M, et al., 2017b. SoK: consensus in the age of blockchains. https://arxiv.org/pdf/1711.03936.pdf [Accessed on Sept. 27, 2018].
[13]Bawany NZ, Shamsi JA, Salah K, 2017. DDoS attack detection and mitigation using SDN: methods, practices, and solutions. Arab J Sci Eng, 42(2):425-441.
[14]Bellavista P, Zanni A, 2016. Towards better scalability for IoT-cloud interactions via combined exploitation of MQTT and CoAP. IEEE 2nd Int Forum on Research and Technologies for Society and Industry Leveraging a Better Tomorrow, p.1-6.
[15]Bhattasali T, Chaki R, 2011. A survey of recent intrusion detection systems for wireless sensor network. In: Wyld DC, Wozniak M, Chaki N, et al. (Eds.), Advances in Network Security and Applications. Springer Berlin Heidelberg, p.268-280.
[16]Biswas K, Muthukkumarasamy V, 2016. Securing smart cities using blockchain technology. IEEE 18th Int Conf on High Performance Computing and Communications, p.1392- 1393.
[17]Bonneau J, Miller A, Clark J, et al., 2015. SoK: research perspectives and challenges for Bitcoin and crypto- currencies. Proc IEEE Symp on Security and Privacy, p.104-121.
[18]Bonomi F, Milito R, Zhu J, et al., 2012. Fog computing and its role in the Internet of Things. Proc 1st Edition of the MCC Workshop on Mobile Cloud Computing, p.13-16.
[19]Brachmann M, Garcia-Morchon O, Kirsche M, 2011. Security for practical CoAP applications: issues and solution approaches. 10th GI/ITG KuVS Fachgespraech Sensornetze, p.1-4. https://www.researchgate.net/profile/Michael_Kirsche/publication/265973615_Security_for_Practical_CoAP_Applications_Issues_and_Solution_Approaches/links/5583f51c08ae4738295c2028.pdf [Accessed on Feb. 24, 2018].
[20]Brito J, Castillo A, 2013. Bitcoin: a Primer for Policymakers. Mercatus Center at George Mason University.
[21]Brown J, 2017. Companies forge cooperative to explore blockchain-based IoT security. https://www.ciodive.com/news/companies-forge-cooperative-to-explore-blockchain-based-iot-security/435007/ [Accessed on Feb. 23, 2018].
[22]Buterin V, 2013. Ethereum white paper. GitHub Repository.
[23]Buterin V, 2016. Privacy on the blockchain. Available from https://blog.ethereum.org/2016/01/15/privacy-on-the-blockchain/ [Accessed on Sept. 27, 2018].
[24]Cachin C, 2016. Architecture of the Hyperledger Blockchain Fabric. IBM Research. https://pdfs.semanticscholar.org/f852/c5f3fe649f8a17ded391df0796677a59927f.pdf [Accessed on Feb. 24, 2018].
[25]Castro M, Liskov B, 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst, 20(4): 398-461.
[26]Chae SH, Choi W, Lee JH, et al., 2014. Enhanced secrecy in stochastic wireless networks: artificial noise with secrecy protected zone. IEEE Trans Inform Forens Secur, 9(10): 1617-1628.
[27]Chen YY, Trappe W, Martin RP, 2007. Detecting and localizing wireless spoofing attacks. 4th Annual IEEE Communications Society Conf on Sensor, Mesh and Ad Hoc Communications and Networks, p.193-202.
[28]Christidis K, Devetsikiotis M, 2016. Blockchains and smart contracts for the Internet of Things. IEEE Access, 4:2292- 2303.
[29]Cisco, 2015. Fog computing the Internet of Things: extend the cloud to where the things are. White Paper. https://www.cisco.com/c/dam/en_us/solutions/trends/iot/docs/computing-overview.pdf
[30]Cohn RJ, Coppen RJ, Banks A, et al., 2014. MQTT version 3.1. https://www.oasis-open.org/committees/download.php/52951/mqtt-v3.1.1-csd06.pdf [Accessed on May 29, 2019].
[31]Conzon D, Bolognesi T, Brizzi P, et al., 2012. The VIRTUS middleware: an XMPP based architecture for secure IoT communications. 21st Int Conf on Computer Communications and Networks, p.1-6.
[32]Courtois NT, Bahack L, 2014. On subversive miner strategies and block withholding attack in Bitcoin digital currency. https://arxiv.org/abs/1402.1718 [Accessed on Sept. 16, 2018].
[33]Dhillon V, Metcalf D, Hooper M, 2017. Blockchain enabled applications: understand the blockchain ecosystem and how to make it work for you. Apress, Berkeley, CA.
[34]Dorri A, Kanhere SS, Jurdak R, et al., 2017a. LSB: a lightweight scalable blockchain for IoT security and privacy. https://arxiv.org/pdf/1712.02969.pdf [Accessed on Sept. 14, 2018].
[35]Dorri A, Kanhere SS, Jurdak R, et al., 2017b. Blockchain for IoT security and privacy: the case study of a smart home. IEEE Int Conf on Pervasive Computing and Communi- cations Workshops (PerCom Workshops), p.618-623.
[36]Drescher D, 2017. Blockchain basics. Apress, Berkeley, CA.
[37]Dvir A, Holczer T, Buttyan L, 2011. VeRA-version number and rank authentication in RPL. IEEE 8th Int Conf on Mobile Ad-hoc and Sensor Systems, p.709-714.
[38]Dwork C, Naor M, 1993. Pricing via processing or combatting junk mail. In: Brickell EF (Ed.), Advances in Cryptology—CRYPTO’ 92. Springer Berlin Heidelberg, p.139-147.
[39]Elham H, Lebbat A, Medromi H, 2012. Enhance security of cloud computing through fork virtual machine. IEEE Int Conf on Complex Systems, p.1-4.
[40]Eyal I, Sirer EG, 2018. Majority is not enough: Bitcoin mining is vulnerable. Commun ACM, 61(7):95-102.
[41]Eyal I, Gencer AE, Sirer EG, et al., 2015. Bitcoin-NG: a scalable blockchain protocol. https://arxiv.org/abs/1510.02037
[42]Ficco M, Esposito C, Xiang Y, et al., 2017. Pseudo-dynamic testing of realistic edge-fog cloud ecosystems. IEEE Commun Mag, 55(11):98-104.
[43]Formisano C, Pavia D, Gurgen L, et al., 2015. The advantages of IoT and cloud applied to smart cities. 3rd Int Conf on Future Internet of Things and Cloud, p.325-332.
[44]Foschini L, Taleb T, Corradi A, et al., 2011. M2M-based metropolitan platform for IMS-enabled road traffic management in IoT. IEEE Commun Mag, 49(11):50-57.
[45]Gaetani E, Aniello L, Baldoni R, et al., 2017. Blockchain- based database to ensure data integrity in cloud computing environments. Italian Conf on Cybersecurity. https://eprints.soton.ac.uk/411996/ [Accessed on Sept. 27, 2018].
[46]Garai Á, Attila A, Péntek I, 2016. Cognitive telemedicine IoT technology for dynamically adaptive eHealth content management reference framework embedded in cloud architecture. 7th IEEE Int Conf on Cognitive Infocommunications, p.187-192.
[47]Gervais A, Karame GO, Wüst K, et al., 2016. On the security and performance of proof of work blockchains. Proc ACM SIGSAC Conf on Computer and Communications Security, p.3-16.
[48]Goiri Í, Beauchea R, Le K, et al., 2011a. Greenslot: scheduling energy consumption in green datacenters. Proc Int Conf for High Performance Computing, Networking, Storage and Analysis, p.1-11.
[49]Goiri Í, Le K, Guitart J, et al., 2011b. Intelligent placement of datacenters for Internet services. 31st Int Conf on Distributed Computing Systems, p.131-142.
[50]Granjal J, Monteiro E, Sá Silva J, 2013a. End-to-end transport- layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication. IFIP Networking Conf, p.1-9. http://ieeexplore.ieee.org/abstract/document/6663530/ [Accessed on Feb. 24, 2018].]
[51]Granjal J, Monteiro E, Sá Silva J, 2013b. Application-layer security for the WoT: extending CoAP to support end-to- end message security for Internet-integrated sensing applications. LNCS, 7889:140-153.
[52]Granjal J, Monteiro E, Sá Silva J, 2015. Security for the Internet of Things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor, 17(3): 1294-1312.
[53]Hameed A, Khoshkbarforoushha A, Ranjan R, et al., 2016. A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems. Computing, 98(7):751-774.
[54]Henze M, Wolters B, Matzutt R, et al., 2017. Distributed configuration, authorization and management in the cloud-based Internet of Things. IEEE Trustcom/ BigDataSE/ICESS, p.185-192.
[55]Hilton S, 2016. Dyn analysis summary of Friday October 21 Attack. Company News. https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/ [Accessed on Feb. 24, 2018].
[56]Hong YWP, Lan PC, Kuo CCJ, 2013. Enhancing physical- layer secrecy in multiantenna wireless systems: an overview of signal processing approaches. IEEE Signal Process Mag, 30(5):29-40.
[57]Hummen R, Hiller J, Wirtz H, et al., 2013. 6LoWPAN fragmentation attacks and mitigation mechanisms. Proc 6th ACM Conf on Security and Privacy in Wireless and Mobile Networks, p.55-66.
[58]Hur J, Noh DK, 2011. Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans Parall Distrib Syst, 22(7):1214-1221.
[59]Jagdeep K, Meghna S, 2017. Extending IoTs into the cloud- based platform for examining Amazon web services. Examining Cloud Computing Technologies Through the Internet of Things, p.216-227.
[60]Jakobsson M, Juels A, 1999. Proofs of work and bread pudding protocols (extended abstract). In: Preneel B (Ed.), Secure Information Networks. Springer, Boston, MA, p.258-272.
[61]Juniper Research, 2015. Cybercrime will cost businesses over $2 trillion by 2019. Press Releases. https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion [Accessed on Feb. 24, 2018].
[62]Khan MA, Salah K, 2018. IoT security: review, blockchain solutions, and open challenges. Fut Gener Comput Syst, 82:395-411.
[63]Khosravi A, Buyya R, 2018. Energy and carbon footprint- aware management of geo-distributed cloud data centers: a taxonomy, state of the art, and future directions. https://www.igi-global.com/chapter/energy-and-carbon-footprint-aware-management-of-geo-distributed-cloud- data-centers/189954 [Accessed on Sept. 22, 2018].
[64]Kim HG, 2008. Protection against packet fragmentation attacks at 6LoWPAN adaptation layer. Proc Int Conf on Convergence and Hybrid Information Technology, p.796- 801.
[65]Kokoris-Kogias E, Jovanovic P, Gailly N, et al., 2016. Enhancing Bitcoin security and performance with strong consistency via collective signing. https://arxiv.org/abs/1602.06997
[66]Kshetri N, 2017a. Can blockchain strengthen the Internet of Things? IT Prof, 19(4):68-72.
[67]Kshetri N, 2017b. Blockchain’s roles in strengthening cyber- security and protecting privacy. Telecommun Pol, 41(10): 1027-1038.
[68]Li DR, Shen X, Chen NC, et al., 2017. Space-based information service in Internet plus era. Sci China Inform Sci, 60(10):102308.
[69]Li JW, Jia CF, Li J, et al., 2012. Outsourcing encryption of attribute-based encryption with mapreduce. LNCS, 7618: 191-201.
[70]Li Y, Marier-Bienvenue T, Perron-Brault A, et al., 2018. Blockchain technology in business organizations: a scoping review. Proc 51st Hawaii Int Conf on System Sciences.
[71]Liao CF, Bao SW, Cheng CJ, et al., 2017. On design issues and architectural styles for blockchain-driven IoT services. IEEE Int Conf on Consumer Electronics, p.351-352.
[72]Lin IC, Liao TC, 2017. A survey of blockchain security issues and challenges. Int J Netw Secur, 19(5):653-659.
[73]Liu CH, Yang B, Liu TC, 2014. Efficient naming, addressing and profile services in Internet-of-Things sensory environments. Ad Hoc Netw, 18:85-101.
[74]Luu L, Chu DH, Olickel H, et al., 2016a. Making smart contracts smarter. Proc ACM SIGSAC Conf on Computer and Communications Security, p.254-269.
[75]Luu L, Narayanan V, Zheng CD, et al., 2016b. A secure sharding protocol for open blockchains. Proc ACM SIGSAC Conf on Computer and Communications Security, p.17-30.
[76]Mahalle PN, Anggorojati B, Prasad NR, et al., 2013. Identity authentication and capability based access control (IACAC) for the Internet of Things. J Cyber Secur Mob, 1:309-348.
[77]Manral J, 2015. IoT enabled insurance ecosystem— possibilities, challenges and risks. http://arxiv.org/abs/1510.03146
[78]Marinakis YD, Walsh ST, Harms R, 2017. Internet of Things technology diffusion forecasts. Portland Int Conf on Management of Engineering and Technology, p.1-5.
[79]Memon RA, Li JP, Ahmed J, 2019a. Simulation model for blockchain systems using queuing theory. Electronics, 8(2):234.
[80]Memon RA, Li JP, Ahmed J, et al., 2019b. Modeling of blockchain based systems using queuing theory simulation. 15th Int Computer Conf on Wavelet Active Media Technology and Information Processing, p.107- 111.
[81]Moar J, 2017. Cybercrime & the Internet of Threats. White Paper, Juniper Research.
[82]Mollah MB, Azad MAK, Vasilakos A, 2017. Security and privacy challenges in mobile cloud computing: survey and way ahead. J Netw Comput Appl, 84:38-54.
[83]Mosakheil JH, 2018. Security threats classification in blockchains. http://repository.stcloudstate.edu/msia_etds/48 [Accessed on Sept. 25, 2018].
[84]Nakamoto S, 2008. Bitcoin: a peer-to-peer electronic cash system. https://bitcoinsv.io/bitcoin
[85]Nakano SM, 2018. Cryptocurrency and Blockchain Blueprint for Beginners: All You Need to Know about Bitcoin, Ethereum, Ripple, Litecoin and other Popular Crypto- currencies. CreateSpace Independent Publishing Platform, USA.
[86]Ning HS, Liu H, 2015. Cyber-physical-social-thinking space based science and technology framework for the Internet of Things. Sci China Inform Sci, 58(3):1-19.
[87]Noubir G, Lin GL, 2003. Low-power DOS attacks in data wireless LANs and countermeasures. ACM SIGMOBILE Mob Comput Commun Rev, 7(3):29-30.
[88]Ourad AZ, Belgacem B, Salah K, 2018. Using blockchain for IoT access control and authentication management. LNCS, 10972:150-164.
[89]Qi RM, Feng C, Liu Z, et al., 2017. Blockchain-powered Internet of Things, E-governance and E-democracy. In: Vinod KT (Ed.), E-Democracy for Smart Cities. Springer, Singapore, p.509-520.
[90]Qian XC, Zhang JD, 2010. Study on the structure of “Internet of Things (IoT)” business operation support platform. IEEE 12th Int Conf on Communication Technology, p.1068-1071.
[91]Ray PP, 2016. A survey of IoT cloud platforms. Fut Comput Inform J, 1(1-2):35-46.
[92]Riaz R, Kim KH, Ahmed HF, 2009. Security analysis survey and framework design for IP connected LoWPANs. Proc Int Symp on Autonomous Decentralized Systems, p.29-34.
[93]Rimal BP, Choi E, Lumb I, 2009. A taxonomy and survey of cloud computing systems. 5th Int Joint Conf on INC, IMS, and IDC, p.44-51.
[94]Rimba P, Tran AB, Weber I, et al., 2017. Comparing blockchain and cloud services for business process execution. IEEE Int Conf on Software Architecture, p.257-260.
[95]Sagiroglu S, Sinanc D, 2013. Big data: a review. Int Conf on Collaboration Technologies and Systems, p.42-47.
[96]Samaniego M, Deters R, 2017. Blockchain as a service for IoT. IEEE Int Conf on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), p.433-436.
[97]SAP, 2017. SAP announces first co-innovation customers, partners in blockchain initiative for Internet of Things. https://news.sap.com/sap-announces-first-co-innovation-customers-partners-in-blockchain-initiative-for-internet-of-things/ [Accessed on Feb. 24, 2018].
[98]Seibold S, Samman G, 2016. Consensus immutable agreement for the Internet of Value. Technical Report. https://assets.kpmg.com/content/dam/kpmg/pdf/2016/06/kpmg-blockchain-consensus-mechanism.pdf
[99]Sethi M, Arkko J, Keränen A, 2012. End-to-end security for sleepy smart object networks. 37th Annual IEEE Conf on Local Computer Networks, p.964-972.
[100]Sherif MH, 2016. Protocols for Secure Electronic Commerce (3rd Ed.). CRC Press, Boca Raton, USA.
[101]Shveta, Pandey A, 2014. Energy conservation and security issues in cloud computing: a review. Int J Adv Comput Sci Cloud Comput, 2(1):57-60.
[102]Sicari S, Rizzardi A, Grieco LA, et al., 2015. Security, privacy and trust in Internet of Things: the road ahead. Comput Netw, 76:146-164.
[103]Singh D, Tripathi G, Jara AJ, 2014. A survey of Internet-of- Things: future vision, architecture, challenges and services. IEEE World Forum on Internet of Things, p.287- 292.
[104]Singh I, Lee SW, 2018. Comparative requirements analysis for the feasibility of blockchain for secure cloud. In: Kamalrudin M, Ahmad S, Ikram N (Eds.), Requirements Engineering for Internet of Things. Springer, Singapore, p.57-72.
[105]Singh J, Pasquier T, Bacon J, et al., 2016. Twenty security considerations for cloud-supported Internet of Things. IEEE Int Things J, 3(3):269-284.
[106]Singhal B, Dhameja G, Panda PS, 2018. Building an Ethereum DApp. In: Beginning Blockchain. Apress, Berkeley, CA, p.319-375.
[107]Soubra D, 2012. The 3Vs that define Big Data. https://www.datasciencecentral.com/forum/topics/the-3vs-that-define-big-data
[108]Stergiou C, Psannis KE, Kim BG, et al., 2018. Secure integration of IoT and cloud computing. Fut Gener Comput Syst, 78:964-975.
[109]Stormer H, Meier A, 2012. ePayment. In: eBusiness & eCommerce. Springer Berlin Heidelberg, p.181-202.
[110]Strite CP, 1920. Bread-Toaster. US1394450A. https://patents.google.com/patent/US1394450 [Accessed on Feb. 23, 2018].
[111]Sun L, Li Y, Memon RA, 2017. An open IoT framework based on microservices architecture. China Commun, 14(2): 154-162.
[112]Szabo N, 1996. Smart contracts: building blocks for digital markets. http://www.alamut.com/subj/economics/nick_szabo/smartContracts.html [Accessed on Feb. 24, 2018].
[113]Thakur M, 2017. Authentication, authorization and accounting with Ethereum blockchain. https://helda.helsinki.fi/bitstream/handle/10138/228842/aaa-ethereum-blockchain.pdf [Accessed on Sept. 11, 2018].
[114]Underwood S, 2016. Blockchain beyond Bitcoin. Commun ACM, 59(11):15-17.
[115]van der Meulen R, 2017. Gartner Says 8.4 Billion Connected “Things” will be in use in 2017, up 31 Percent from 2016. Gartner Press Release.
[116]Wang J, Wu P, Wang XY, et al., 2017. The outlook of blockchain technology for construction engineering management. Front Eng Manag, 4(1):67-75.
[117]Wang WB, Fan SQ, 2018. Attacking OpenSSL ECDSA with a small amount of side-channel information. Sci China Inform Sci, 61(3):032105.
[118]Wang YF, Uehara T, Sasaki R, 2015. Fog computing: issues and challenges in security and forensics. IEEE 39th Annual Computer Software and Applications Conf, p.53-59.
[119]Warren W, Bandeali A, 2017. 0x: an open protocol for decentralized exchange on the ethereum blockchain. https://0x.org/pdfs/0x_white_paper.pdf [Accessed on Feb. 24, 2018].
[120]Weekly K, Pister K, 2012. Evaluating sinkhole defense techniques in RPL networks. 20th Int Conf on Network Protocols, p.1-6.
[121]Whitmore A, Agarwal A, Da XL, 2015. The Internet of Things—a survey of topics and trends. Inform Syst Front, 17(2):261-274.
[122]Wilkinson S, Boshevski T, Brandoff J, et al., 2014. Storj—a peer-to-peer cloud storage network. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.693.785 [Accessed on Sept. 15, 2018].
[123]Wilusz D, Rykowski J, 2013. The architecture of coupon-based, semi-off-line, anonymous micropayment system for Internet of Things. In: Camarinha-Matos LM, Tomic S, Graça P (Eds.), Technological Innovation for the Internet of Things. Springer Berlin Heidelberg, p.125-132.
[124]Worldometer, 2018. World Population Projections. http://www.worldometers.info/world-population/world-population-projections/ [Accessed on Sept. 15, 2018].
[125]Xiao L, Greenstein LJ, Mandayam NB, et al., 2009. Channel- based detection of Sybil attacks in wireless networks. IEEE Trans Inform Forens Secur, 4(3):492-503.
[126]Xiong ZH, Zhang Y, Niyato D, et al., 2017. When mobile blockchain meets edge computing. https://arxiv.org/abs/1711.05938?context=cs
[127]Xu WY, Trappe W, Zhang YY, et al., 2005. The feasibility of launching and detecting jamming attacks in wireless networks. Proc 6th ACM Int Symp on Mobile Ad Hoc Networking and Computing, p.46-57.
[128]Yang C, Puthal D, Mohanty SP, et al., 2017. Big-sensing-data curation for the cloud is coming: a promise of scalable cloud-data-center mitigation for next-generation IoT and wireless sensor networks. IEEE Consum Electron Mag, 6(4):48-56.
[129]Yao Q, 2018. A systematic framework to understand central bank digital currency. Sci China Inform Sci, 61(3): 033101.
[130]Yi SH, Qin ZR, Li Q, 2015. Security and privacy issues of fog computing: a survey. In: Xu K, Zhu H (Eds.), Wireless Algorithms, Systems, and Applications. Springer, Cham, p.685-695.
[131]Zhao JC, Zhang JF, Feng Y, et al., 2010. The study and application of the IoT technology in agriculture. 3rd Int Conf on Computer Science and Information Technology, p.462-465.
[132]Zhao W, Wang CW, Nakahira Y, 2011. Medical application on Internet of Things. IET Int Conf on Commun Technology and Application, p.660-665.
[133]Zhou J, Cao ZF, Dong XL, et al., 2017. Security and privacy for cloud-based IoT: challenges. IEEE Commun Mag, 55(1):26-33.
Open peer comments: Debate/Discuss/Question/Opinion
<1>