4.6 Article

Securing Digital Ledger Technologies-Enabled IoT Devices: Taxonomy, Challenges, and Solutions

Journal

IEEE ACCESS
Volume 10, Issue -, Pages 46238-46254

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2022.3169141

Keywords

Security; Blockchains; Peer-to-peer computing; Distributed ledger; Internet of Things; Computer architecture; Wireless sensor networks; Blockchain; decentralized; the IoT; IOTA; direct acyclic graph (DAG); Tangle; cybersecurity; privacy; confidentiality

Funding

  1. Cleveland Foundation IoT Start-Up Grant [200002018]

Ask authors/readers for more resources

With the rapid proliferation of IoT devices and sensors, the security implications for these devices are becoming more concerning. Blockchain technology, particularly the DAG-based implementation like IOTA, is seen as a promising solution to ensure the security of IoT devices and data. This paper provides a thorough analysis of existing security studies for IOTA and proposes future research recommendations to address the gaps and limitations in current security schemes.
With the faster maturity and stability of digitization, connectivity and edge technologies, the number of the Internet of Things (IoT) devices and sensors is flourishing fast in important junctions such as homes, hotels, hospitals, retail stores, manufacturing floors, railway stations, airports, oil wells, warehouses, etc. However, in this extremely connected world, the security implications for IoT devices are getting worse with the constant rise in malicious cyberattacks. The challenge is how to secure IoT sensors, services and data. The blockchain technology, a prominent distributed ledger technology (DLT), is being pronounced as the way forward for safeguarding IoT devices and data. The Directed Acyclic Graph (DAG)-based DLT has the inherent potential to realize the benefits of blockchain with better performance. IOTA is a DAG-based blockchain implementation for the IoT era. The Tangle, the IOTA's network immutably records the exchange of data and value. It ensures that the information is trustworthy and cannot be tampered with nor destroyed. In this work, we depict a thorough analysis of the existing security studies for IOTA. Then, we identify the gaps and the limitations of these security solution schemes, and finally, propose future security research recommendations that can potentially fill these gaps to secure DLT-enabled IoT devices.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available