TY - GEN
T1 - A Survey on Security Threats in Blockchain-based Internet of Things Systems
AU - Kim, Donghee
AU - Hur, Junbeom
N1 - Funding Information:
ACKNOWLEDGMENT This work was supported by IITP grant funded by the MSIT, Korea (No.2019-0-00533, 2022-0-00411, IITP-2022-2021-0-01810) and Basic Science Research Program through the National Research Foundation funded by the Ministry of Education, Korea (NRF-2021R1A6A1A13044830).
Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - The Blockchain-based Internet of Things (BIoT) systems are widely used in diverse industrial fields including agriculture, healthcare, sports business, and so on. However, since the Internet of Things (IoT) devices composing the BIoT systems typically have limited computation and communication resources, the IoT systems are likely to be exposed to various security threats. Lightweight blockchain can provide increased security, privacy, scalability and performance to the IoT systems. However, blockchain itself still has lots of security threats and vulnerability issues depending on its applications. Therefore, in-depth investigation of the security and potential vulnerability of blockchain is important to the secure BIoT systems. In this paper, we explore the security threats of the four layers of the BIoT systems, which is physical layer, network layer, blockchain layer and application layer. We then discuss its implication and future work in the BIoT security literature.
AB - The Blockchain-based Internet of Things (BIoT) systems are widely used in diverse industrial fields including agriculture, healthcare, sports business, and so on. However, since the Internet of Things (IoT) devices composing the BIoT systems typically have limited computation and communication resources, the IoT systems are likely to be exposed to various security threats. Lightweight blockchain can provide increased security, privacy, scalability and performance to the IoT systems. However, blockchain itself still has lots of security threats and vulnerability issues depending on its applications. Therefore, in-depth investigation of the security and potential vulnerability of blockchain is important to the secure BIoT systems. In this paper, we explore the security threats of the four layers of the BIoT systems, which is physical layer, network layer, blockchain layer and application layer. We then discuss its implication and future work in the BIoT security literature.
KW - attack
KW - Blockchain
KW - IoT
KW - security
KW - vulnerability
UR - http://www.scopus.com/inward/record.url?scp=85143255076&partnerID=8YFLogxK
U2 - 10.1109/ICTC55196.2022.9952581
DO - 10.1109/ICTC55196.2022.9952581
M3 - Conference contribution
AN - SCOPUS:85143255076
T3 - International Conference on ICT Convergence
SP - 2134
EP - 2138
BT - ICTC 2022 - 13th International Conference on Information and Communication Technology Convergence
PB - IEEE Computer Society
T2 - 13th International Conference on Information and Communication Technology Convergence, ICTC 2022
Y2 - 19 October 2022 through 21 October 2022
ER -