4.6 Article

Securing Digital Ledger Technologies-Enabled IoT Devices: Taxonomy, Challenges, and Solutions

期刊

IEEE ACCESS
卷 10, 期 -, 页码 46238-46254

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2022.3169141

关键词

Security; Blockchains; Peer-to-peer computing; Distributed ledger; Internet of Things; Computer architecture; Wireless sensor networks; Blockchain; decentralized; the IoT; IOTA; direct acyclic graph (DAG); Tangle; cybersecurity; privacy; confidentiality

资金

  1. Cleveland Foundation IoT Start-Up Grant [200002018]

向作者/读者索取更多资源

With the rapid proliferation of IoT devices and sensors, the security implications for these devices are becoming more concerning. Blockchain technology, particularly the DAG-based implementation like IOTA, is seen as a promising solution to ensure the security of IoT devices and data. This paper provides a thorough analysis of existing security studies for IOTA and proposes future research recommendations to address the gaps and limitations in current security schemes.
With the faster maturity and stability of digitization, connectivity and edge technologies, the number of the Internet of Things (IoT) devices and sensors is flourishing fast in important junctions such as homes, hotels, hospitals, retail stores, manufacturing floors, railway stations, airports, oil wells, warehouses, etc. However, in this extremely connected world, the security implications for IoT devices are getting worse with the constant rise in malicious cyberattacks. The challenge is how to secure IoT sensors, services and data. The blockchain technology, a prominent distributed ledger technology (DLT), is being pronounced as the way forward for safeguarding IoT devices and data. The Directed Acyclic Graph (DAG)-based DLT has the inherent potential to realize the benefits of blockchain with better performance. IOTA is a DAG-based blockchain implementation for the IoT era. The Tangle, the IOTA's network immutably records the exchange of data and value. It ensures that the information is trustworthy and cannot be tampered with nor destroyed. In this work, we depict a thorough analysis of the existing security studies for IOTA. Then, we identify the gaps and the limitations of these security solution schemes, and finally, propose future security research recommendations that can potentially fill these gaps to secure DLT-enabled IoT devices.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据