One-Stop-Shop For The Security Of IoT With Blockchain: A Systematic literature review

Author(s):  
Faraz Masood ◽  
Arman Rasool Faridi

: The Internet of Things (IoT) is one of the most emerging technologies, specially with the introduction of smart cities, smart homes etc. anticipating fifty billion connected devices. IoT devices are usually limited in their processing, storage, and network bandwidth, and are more vulnerable to attacks can be easily hacked and compromised. As IoT deals with personal life, so its security is one of the most critical challenges that need to resolve before its adoption. Distributed ledger technology (DLT), especially blockchain, is a relatively new technology that deals with the distributed immutable ledger. DLT is a promising technology that may solve the security issues of IoT. So a study needs to be done to know what security challenges of IoT can be solved using DLT and what are the ways in which DLT can be used to increase security.In this paper first we have set the research questions, then the systematic literature review has been done in view of research questions, then answers to research questions are presented, and discussion about the answers to research questions have been presented. A solution has been proposed that can be used to increase the security of IoT. Based on the review results, the paper concludes with the suggestions for using blockchain for IoT security.

Author(s):  
Melva Ratchford ◽  
Omar El-Gayar ◽  
Cherie Noteboom ◽  
Yong Wang

2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


2019 ◽  
Vol 38 (1) ◽  
pp. 113-137
Author(s):  
Tsvetanka Georgieva-Trifonova ◽  
Kaloyan Zdravkov ◽  
Donika Valcheva

Purpose The purpose of this paper is to summarize the current state of the existing research on the application of semantic technologies in bibliographic databases by providing answers to a set of research questions resulting from a systematic literature review. Design/methodology/approach The present study consists of conducting a systematic literature review of research works related to the application of semantic technologies in bibliographic databases. A manual keyword search is performed in known academic databases. As a result, a total of 78 literature sources are identified as related to the topic and included in the review. From the selected literature sources, information is extracted, which is then summarized and analyzed according to previously defined research questions and finally reported. Besides, a framework is defined to classify literature sources found and collected as a result of the study. The main criteria, according to which the classification is performed, are the used semantic technology and the research problem for which semantic technologies are applied in bibliographic databases. The classification of the publications is verified by each author independently of others. Findings The conducted systematic scientific review establishes that the evolution of semantic technologies sets a period of increased interest in the researchers, as a result of which the advantages of using them for bibliographic descriptions are examined and practically confirmed. After defining semantic models for bibliographic descriptions and approaches to transform existing bibliographic data into their correspondence, the research interest is directed at their comparison, collation; enrichment to facilitate search and retrieval of useful information. Possible perspectives for future research are outlined, which mainly relate to the complete use of the created data sets and their transformation into knowledge repositories. Originality/value Despite the increasing importance of the semantic technologies in various areas, including the bibliographic databases, there is a lack of comprehensive literature review and classification of literature sources relevant to this topic. The detailed study proposed in the present paper supports introducing with the existing experience in the application of semantic technologies in bibliographic databases, as well as facilitates the discovery of trends and guidelines for future research.


2021 ◽  
Vol 15 (2) ◽  
pp. 67-78
Author(s):  
Gibriel Badjie

Communication and delegation are two important and parts of the leadership function. However, it is still a matter of debate whether leaders can delegate responsibility for communication, especially policy information, to those under their authority. Various opinions state that there is no prohibition for leaders to delegate their responsibilities because this is the leader's prerogative. This study aims to identify whether leadership should or should not delegate communication. The method used in this study was Systematic Literature Review (SLR). The SLR method is used to identify, review, evaluate, and interpret all available research by topic area phenomenon of interest, with specific relevant research questions. The results showed that leaders can delegate communication but it is highly dependent on the type, style, and approach of leadership on the table at that time. Such a leadership style or approach will automatically influence the style and approach of communication and delegation.


2021 ◽  
Vol 11 (20) ◽  
pp. 9543
Author(s):  
Nicolás Matus ◽  
Cristian Rusu ◽  
Sandra Cano

Students’ experiences have been covered by a large number of studies in different areas. Even so, the concept of student experience (SX) is diffuse, as it does not have a widely accepted meaning and is often shaped to the specific purposes of each study. Understanding this concept allows educational institutions to better address the needs of students. For this reason, we conducted a systematic literature review addressing the concept of SX in higher education, specifically aiming at undergraduate students. In this work, we approach the concept of SX from the perspective of customer experience (CX), based on the premise that students are users of higher education institutions’ products, systems and/or services. We reviewed articles published between 2011 and 2021, indexed in five databases (Scopus, Web of Sciences, ACM digital, IEEE Xplore and Science Direct), trying to address research questions concerning: (1) the SX definition; (2) dimensions, attributes and factors that influence SX; and (3) methods used to evaluate the SX. We selected 65 articles and analyzed various SX definitions, as well as scales and surveys to evaluate SX, mainly relating to satisfaction and quality in higher education. We propose a holistic definition of SX and recommend ways to achieve its better analysis.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Zhihao Yu ◽  
Liang Song ◽  
Linhua Jiang ◽  
Omid Khold Sharafi

Purpose Security is the most important issue in Internet of Things (IoT)-based smart cities and blockchain (BC). So, the present paper aims to detect and organize the literature regarding security in the IoT-based smart cities and BC context. It also proposes an agenda for future research. Therefore, the authors did a statistical review of security in IoT and BC in smart cities. The present investigation aims to determine the principal challenges and disturbances in IoT because of the BC adoption, the central BC applications in IoT-based smart cities and the BC future in IoT-based smart cities. Design/methodology/approach IoT) has a notable influence on modernizing and transforming the society and industry for knowledge digitizing. Therefore, it may be perceived and operated in real time. The IoT is undergoing exponential development in industry and investigation. Still, it contains some security and privacy susceptibilities. Naturally, the research community pays attention to the security and privacy of the IoT. Also, the academic community has put a significant focus on BC as a new security project. In the present paper, the significant mechanisms and investigations in BC ground have been checked out systematically because of the significance of security in the IoT and BC in smart cities. Electronic databases were used to search for keywords. Totally, based on different filters, 131 papers have been gained, and 17 related articles have been obtained and analyzed. The security mechanisms of BC in IoT-based smart cities have been ranked into three main categories as follows, smart health care, smart home and smart agriculture. Findings The findings showed that BC’s distinctive technical aspects might impressively find a solution for privacy and security problems encountering the IoT-based smart cities development. They also supply distributed storage, transparency, trust and other IoT support to form a valid, impressive and secure distributed IoT network and provide a beneficial guarantee for IoT-based smart city users’ security and privacy. Research limitations/implications The present investigation aims to be comprehensive, but some restrictions were also observed. Owing to the use of some filters for selecting the original papers, some complete works may be excluded. Besides, inspecting the total investigations on the security topic in BC and the IoT-based smart cities is infeasible. Albeit, the authors attempt to introduce a complete inspection of the security challenges in BC and the IoT-based smart cities. BC includes significant progress and innovation in the IoT-based smart cities’ security domain as new technology. Still, it contains some deficiencies as well. Investigators actively encounter the challenges and bring up persistent innovation and inspection of related technologies in the vision of the issues available in diverse application scenarios. Practical implications The use of BC technology in finding a solution for the security issues of the IoT-based smart cities is a research hotspot. There is numerable literature with data and theoretical support despite the suggestion of numerous relevant opinions. Therefore, this paper offers insights into how findings may guide practitioners and researchers in developing appropriate security systems dependent upon the features of IoT-based smart city systems and BC. This paper may also stimulate further investigation on the challenge of security in BC and IoT-based smart cities. The outcomes will be of great value for scholars and may supply sights into future investigation grounds in the present field. Originality/value As the authors state according to their knowledge, it is the first work using security challenges on BC and IoT-based smart cities. The literature review shows that few papers discuss how solving security issues in the IoT-based smart cities can benefit from the BC. The investigation suggests a literature review on the topic, recommending some thoughts on using security tools in the IoT-based smart cities. The present investigation helps organizations plan to integrate IoT and BC to detect the areas to focus. It also assists in better resource planning for the successful execution of smart technologies in their supply chains.


2021 ◽  
Author(s):  
Matthias Hunger ◽  
Kristina Bardenheuer ◽  
Alun Passey ◽  
René Schade ◽  
Ruchika Sharma ◽  
...  

2021 ◽  
pp. 135-147
Author(s):  
Nour Ahmed Ghoniem ◽  
Samiha Hesham ◽  
Sandra Fares ◽  
Mariam Hesham ◽  
Lobna Shaheen ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document