Skip to main content

The Blockchain in IoT

  • Chapter
  • First Online:
Book cover Internet of Things From Hype to Reality

Abstract

—the . This chapter discusses blockchain in IoT. It briefly introduces the birth of blockchain technology and its use in Bitcoin. In addition, it describes Bitcoin as an application of blockchain, and distinguishes blockchain as a key technology, one that has various use cases outside of Bitcoin. Next it dives into how blockchains work, and outlines the features of the technology; these features include consensus algorithms, cryptography, decentralization, transparency, trust and smart contracts. The chapter then introduces how blockchain may impact notable use cases in IoT including healthcare, energy management and supply chain management. It reviews the advantages and disadvantages of blockchain technology and highlights security considerations within blockchain and IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Swan, Blockchain: Blueprint for a New Economy (O'Reilly Media, Inc., 2015)

    Google Scholar 

  2. S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System. (2008), www.bitcoin.org

    Google Scholar 

  3. K. Christidis, M. Devetsikiotis, Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)

    Article  Google Scholar 

  4. D. Chaum, Blind signatures for untraceable payments. in Advances in Cryptology-CRYPTO, (1983) pp. 199–203.

    Chapter  Google Scholar 

  5. V. Gupta, A brief history of blockchain. Harv. Bus. Rev. (2017). hbr.org/2017/02/a-brief-history-of-blockchain

  6. N. Szabo, Formalizing and securing relationships on public networks. First Monday 2(9) (1997). https://doi.org/10.5210/fm.v2i9.548

  7. K. Croman, et al., On scaling decentralized blockchains. in Financial Cryptography and Data Security Lecture Notes in Computer Science (2016), pp. 106–125. https://doi.org/10.1007/978-3-662-53357-4_8

    Chapter  Google Scholar 

  8. B. Dickson, Decentralizing IoT networks through blockchain. in TechCrunch, TechCrunch (2016). techcrunch.com/2016/06/28/decentralizing-iot-networks-through-blockchain/

  9. I. Crigg, K. Griffith, A quick history of cryptocurrencies BBTC — before Bitcoin. in Bitcoin Magazine (2014). [Online]. Available: https://bitcoinmagazine.com/articles/quick-history-cryptocurrencies-bbtc-bitcoin-1397682630/

  10. A.M. Antonopoulos, Mastering Bitcoin: Programming the Open Blockchain (Sebastopol, CA: O’Reilly Media Inc., 2017)

    Google Scholar 

  11. N. Kshetri, Can blockchain strengthen the internet of things? IT Professional 19(4), 68–72 (2017)

    Article  Google Scholar 

  12. V. Nordahl, M. Rao, Blockchain cryptography. in My Blockchain Blog (2017). [Online]. Available: https://www.myblockchainblog.com/blog/blockchain-cryptography

  13. K. Lewis, Blockchain: four blockchain use cases transforming business. in Internet of Things blog (2017). [Online]. Available: https://www.ibm.com/blogs/internet-of-things/iot-blockchain-use-cases/

  14. N. Murty, S. Ananthasayanam, A. Singh, R. Malhotra, V. Vaid, A. Madan, Blockchain: The Next Innovation to Make our Cities smarter (PWC, 2018), pp. 22–30

    Google Scholar 

  15. A. Castor, A (short) guide to blockchain consensus protocols – coindesk. in CoinDesk (2017). [Online]. Available: https://www.coindesk.com/short-guide-blockchain-consensus-protocols/

  16. Z. Witherspoon, A hitchhiker’s guide to consensus algorithms – hacker noon. in Hacker Noon (2018). [Online]. Available: https://hackernoon.com/a-hitchhikers-guide-to-consensus-algorithms-d81aae3eb0e3

  17. C. Hammerschmidt, Consensus in blockchain systems. In short. – Chris Hammerschmidt – medium. in Medium (2017). [Online]. Available: https://medium.com/@chrshmmmr/consensus-in-blockchain-systems-in-short-691fc7d1fefe

  18. D. Mingxiao, M. Xiaofeng, Z. Zhe, W. Xiangwei, C. Qijun, A review on consensus algorithm of blockchain. in 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (2017)

    Google Scholar 

  19. L. Lamport, R. Shostak, M. Pease, The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)

    Article  Google Scholar 

  20. F. Tschorsch, B. Scheuermann, Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Commun. Surv. Tut. 18(3), 2084–2123 (2016)

    Article  Google Scholar 

  21. A. Bahga, V. Madisetti, Blockchain platform for industrial internet of things. J. Softw. Eng. Appl. 09(10), 533–546 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Problems and Exercises

Problems and Exercises

  1. 1.

    What is the double-spending problem in digital currencies?

  2. 2.

    Describe what a “Merkle tree” is? How is it used in Bitcoin?

  3. 3.

    In Sect. 10.3.2, we mention hash pointers and how they are key to immutability of the blockchain. Keeping that in mind, what are other features of blockchains that work with hash pointers to maintain immutability?

  4. 4.

    What are they key characteristics provided by the blockchain? Explain what they are and why they are important for adoption in IoT solutions.

  5. 5.

    What is a hash function and how does it work? What is the difference between a hash and a cryptographic hash function? Provide an example of how cryptographic hashes are used in a blockchain (any blockchain will suffice as an example).

  6. 6.

    What is a hash collision? Does Bitcoin suffer from the probability of hash collisions?

  7. 7.

    Consider a scenario where there a potential double-spend attempt by a malicious actor in Bitcoin. Explain how the blockchain works to reject such attempt and what the malicious actor would have to do in order to fool all other honest nodes.

  8. 8.

    In table format, describe centralized, decentralized, and distributed network architectures.

  9. 9.

    Perform a search and mention five companies that are currently working on blockchain + IoT solutions. Describe their solutions and how IoT and blockchain is being combined. Make sure to include at least one start-up and at least one established company.

  10. 10.

    What type of records can be kept in a blockchain?

  11. 11.

    In Sect. 10.4, we describe some consensus algorithms. Research consensus algorithms for blockchain and name an algorithm that we did not mention in this section. Is it good for IoT? Explain why or why not.

  12. 12.

    What is elliptic curve cryptography and how does it benefit the use of keys within blockchain technology?

  13. 13.

    Describe a Sybil attack and other types of attack vectors that could take place on a blockchain.

  14. 14.

    Blockchains all start from a genesis block and then maintain a block height as the chain grows. Describe the importance of block heights as timestamps and lookups within Merkle trees.

  15. 15.

    Describe the difference between permissioned, permissionless, and consortium blockchains. What type do you think best fits a blockchain involving IoT devices.

  16. 16.

    What is the difference between a smart contract and multi-sig address?

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Davila, C., Tarnow, J. (2019). The Blockchain in IoT. In: Internet of Things From Hype to Reality. Springer, Cham. https://doi.org/10.1007/978-3-319-99516-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-99516-8_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-99515-1

  • Online ISBN: 978-3-319-99516-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics