
In the article (Alajlan et al., 2023), the authors
review various articles on the topic, addressing vul-
nerabilities of IoT devices caused by firmware obso-
lescence, physical threats, user authentication, data
exposure, and low computational and energy capac-
ity. They then propose the implementation of a
blockchain network as a security layer for data shar-
ing through IoT. This layer could mitigate IoT secu-
rity issues with data encryption for transmitted data
protection, user authentication through the blockchain
network, and data decentralization. However, the
authors note that the implementation of blockchain
also brings challenges such as scalability, data trans-
parency, transaction and processing speed, and low
energy power of IoT equipment. The blockchain net-
work itself could be an attack vector if not well imple-
mented, such as 51 percent attacks (where the attacker
takes control of 51 percent of the network nodes and
can alter the validation of contracts) and violation
of smart contracts by exploiting programming flaws.
The challenges for implementation, as cited above,
pass, according to the author, through the develop-
ment and implementation of security factors in each
of the layers. He suggests the implementation of secu-
rity layers such as Explainable Artificial Intelligence
(XAI) along with the blockchain, which evaluates and
verifies data through the security standards that the
AI was trained on. Finally, he suggests that the fu-
ture should focus on the adaptability of the blockchain
network to different scenarios and the development of
blockchain systems explicitly adapted to IoT security.
The main areas of focus include scalability, interop-
erability, energy efficiency, privacy preservation, and
standardization.
The article (Zhang et al., 2020) discusses the use
of Blockchain in the industry, particularly with IoT.
Data from IoT devices may not be reliable, as many
devices are not secure. It proposes the creation of
a network called the Internet Blockchain of Things
(IoT) to address the issue of trust in data from sensors.
It also highlights the implementation challenges, es-
pecially scalability, and to solve these challenges, the
multidisciplinary implementation of various concepts
is suggested.
The article (Choi et al., 2021) addresses security
issues in IoT devices for a specific case (Photovoltaic
Panels). The authors point out vulnerabilities that
can be exploited, such as lack of proper configura-
tion, physical insecurity of the equipment, and weak
user passwords. The article describes a type of at-
tack called MITM, where the attacker can take on a
role in the network, intercepting, capturing, or modi-
fying data. The article then proposes a proof of con-
cept where they set up a network with two edge de-
vices acting as a blockchain to validate logins and
data traffic between the photovoltaic panels and the
server. They use Kali Linux to simulate an attacker
and manage to validate the attack through the compar-
ison of hashes between the IoT device and the server.
Through blockchain, they can identify the attacking
device and validate their proof of concept as positive.
The article (M
´
arcio et al., 2021) discusses the con-
cept of smart cities with devices connected to a large
network and a significant number of IoT devices. It
proposes the use of Smart Contracts and Blockchain
as a security layer to validate the data produced by
these devices. The article highlights that the main is-
sues faced in an IoT network are: a lack of consensus
among suppliers (different types of materials and pro-
tocols), access to devices, and updates for energy and
firmware. The article suggests solving the security
issues of IoT devices by validating data and authen-
ticating their entry, creating a secure and decentral-
ized network. It proposes a framework based on a
blockchain network that integrates the physical layer
(IoT sensors), communication, and the application in-
terface. Using fog computing to validate the captured
data and perform pre-processing, validating the data
according to the smart contracts (reliable sources) be-
fore sending them to the higher cloud layer.
The article (Reilly et al., 2019) also addresses the
application of IoT in smart cities. The authors espe-
cially highlight the problem of data integrity in IoT
networks, and in the case of smart cities, this issue
is severe because it can compromise critical cyber-
physical systems. Among the problems mentioned
are the lack of standardization in communication pro-
tocols, limited hardware resources, and varying de-
vice models. Such problems can be exploited by ma-
licious actors and compromise the validity of the data
trafficked. They propose the adoption of a blockchain
as a layer to ensure data integrity. The authors ana-
lyze some existing IoT blockchains, highlighting the
benefits and problems of adopting them (issues with
scalability and vulnerability to 51 percent attacks are
mentioned). They then propose a solution for data
validation on a public network (to avoid the 51 per-
cent attack) using Ethereum (as it is lightweight and
can handle a significant volume of data). The created
solution is tested on over 100 devices with satisfac-
tory results, but with a transaction cost that could be-
come high over time, given the high number of trans-
actions.
The article (Cabrera-Guti
´
errez et al., 2022) dis-
cusses the integration of Hardware Security Modules
(HSM) and permissioned (private) blockchain in in-
dustrial IIoT networks. The article reports the grow-
ing adoption of IIoT devices for providing data for
ICEIS 2024 - 26th International Conference on Enterprise Information Systems
348