ACKNOWLEDGMENT
Our profound gratitude goes to members of the Fac-
ulty of Engineering and Physical Science, Southamp-
ton University, Department of Engineering and Tech-
nology, University of Derby, and the Cyber Security
Group, University of Southampton, for their unre-
served support and guidance that contributed to the
conceptualization of this project.
REFERENCES
(2015). Man hacks monitor, screams at baby girl.
Abie, H. and Balasingham, I. (2012). Risk-based adaptive
security for smart iot in ehealth. In Proceedings of the
7th International Conference on Body Area Networks,
pages 269–275.
Ali, B. and Awad, A. I. (2018). Cyber and physical security
vulnerability assessment for iot-based smart homes.
Sensors, 18:817.
Anderson, J. and Rainie, L. The internet of things will thrive
by 2025, pewresearch internet project, may 2014.
Androulaki, E., Barger, A., Bortnikov, V., Cachin, C.,
Christidis, K., De Caro, A., Enyeart, D., Ferris, C.,
Laventman, G., Manevich, Y., et al. (2018). Hyper-
ledger fabric: a distributed operating system for per-
missioned blockchains. In Proceedings of the thir-
teenth EuroSys conference, pages 1–15.
Arndt, R. Z. (2018). Every device you own can get hacked.
Assiri, A. and Almagwashi, H. (2018). Iot security and
privacy issues. 2018 1st International Conference on
Computer Applications & Information Security (IC-
CAIS), pages 1–5.
Associated Press, F. B. (2020). Hacked hospital chain says
all 250 us facilities affected.
Atlam, H., Alenezi, A., Hussein, R., Hussein, K., Wills, G.,
et al. (2018). Validation of an adaptive risk-based ac-
cess control model for the internet of things. Interna-
tional Journal of Computer Network and Information
Security, 10(1):26–35.
Griggs, K. N., Ossipova, O., Kohlios, C. P., Baccarini,
A. N., Howson, E. A., and Hayajneh, T. (2018).
Healthcare blockchain system using smart contracts
for secure automated remote patient monitoring. Jour-
nal of medical systems, 42(7):130.
Jurcut, A., Niculcea, T., Ranaweera, P., and Le-Khac, N.-A.
(2020). Security considerations for internet of things:
A survey. SN Computer Science, 1(4).
Kshetri, N. (2017). Can blockchain strengthen the internet
of things? IT Professional, 19(4):68–72.
Li, X., Nie, L., Chen, S., Zhan, D., and Xu, X. (2015). An
iot service framework for smart home: Case study on
hem. In 2015 IEEE International Conference on Mo-
bile Services, pages 438–445. IEEE.
Living, G. C. (2019). Almost half of companies still can’t
detect iot device breaches, reveals gemalto study.
Lyu, M., Sherratt, D., Sivanathan, A., Gharakheili, H. H.,
Radford, A., and Sivaraman, V. (2017). Quantifying
the reflective ddos attack capability of household iot
devices. In Proceedings of the 10th ACM Conference
on Security and Privacy in Wireless and Mobile Net-
works, pages 46–51.
Miorandi, D., Sicari, S., De Pellegrini, F., and Chlamtac,
I. (2012). Internet of things: Vision, applications and
research challenges. Ad hoc networks, 10(7):1497–
1516.
ODNI Public Affairs, B. M. (2016). Dni clapper provides
series of threat assessments on capitol hill.
O’Neill, M. et al. (2016). Insecurity by design: Today’s iot
device security problem. Engineering, 2(1):48–49.
Pan, J., Wang, J., Hester, A., Alqerm, I., Liu, Y., and Zhao,
Y. (2019). Edgechain: An edge-iot framework and
prototype based on blockchain and smart contracts.
IEEE Internet of Things Journal, 6(3):4719–4732.
Shackelford, S. J., Raymond, A., Charoen, D., Balakrish-
nan, R., Dixit, P., Gjonaj, J., and Kavi, R. (2017).
When toasters attack: A polycentric approach to en-
hancing the security of things. U. Ill. L. Rev., page
415.
Sicari, S., Rizzardi, A., Miorandi, D., and Coen-Porisini, A.
(2018). Securing the smart home: A real case study.
Internet Technology Letters, 1(3):e22.
Solove, D. J. (2008). Understanding privacy. Legal Studies.
Sousa, J., Bessani, A., and Vukolic, M. (2018). A byzan-
tine fault-tolerant ordering service for the hyperledger
fabric blockchain platform. In 2018 48th annual
IEEE/IFIP international conference on dependable
systems and networks (DSN), pages 51–58. IEEE.
Suryadevara, N. K. and Mukhopadhyay, S. C. (2015). Smart
Homes. Springer.
Vlajic, N. and Zhou, D. (2018). Iot as a land of opportunity
for ddos hackers. Computer, 51(7):26–34.
Walport, M. et al. (2016). Distributed ledger technology:
Beyond blockchain. UK Government Office for Sci-
ence, 1:1–88.
Zarei, J. and Sadoughi, F. (2016). Information security risk
management for computerized health information sys-
tems in hospitals: a case study of iran. Risk manage-
ment and healthcare policy, 9:75.
Zheng, Z., Xie, S., Dai, H.-N., Chen, W., Chen, X., Weng,
J., and Imran, M. (2020). An overview on smart con-
tracts: Challenges, advances and platforms. Future
Generation Computer Systems, 105:475–491.
Malicious Activity Detection using Smart Contracts in IoT
295