Abstract
—the . This chapter discusses blockchain in IoT. It briefly introduces the birth of blockchain technology and its use in Bitcoin. In addition, it describes Bitcoin as an application of blockchain, and distinguishes blockchain as a key technology, one that has various use cases outside of Bitcoin. Next it dives into how blockchains work, and outlines the features of the technology; these features include consensus algorithms, cryptography, decentralization, transparency, trust and smart contracts. The chapter then introduces how blockchain may impact notable use cases in IoT including healthcare, energy management and supply chain management. It reviews the advantages and disadvantages of blockchain technology and highlights security considerations within blockchain and IoT.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
M. Swan, Blockchain: Blueprint for a New Economy (O'Reilly Media, Inc., 2015)
S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System. (2008), www.bitcoin.org
K. Christidis, M. Devetsikiotis, Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)
D. Chaum, Blind signatures for untraceable payments. in Advances in Cryptology-CRYPTO, (1983) pp. 199–203.
V. Gupta, A brief history of blockchain. Harv. Bus. Rev. (2017). hbr.org/2017/02/a-brief-history-of-blockchain
N. Szabo, Formalizing and securing relationships on public networks. First Monday 2(9) (1997). https://doi.org/10.5210/fm.v2i9.548
K. Croman, et al., On scaling decentralized blockchains. in Financial Cryptography and Data Security Lecture Notes in Computer Science (2016), pp. 106–125. https://doi.org/10.1007/978-3-662-53357-4_8
B. Dickson, Decentralizing IoT networks through blockchain. in TechCrunch, TechCrunch (2016). techcrunch.com/2016/06/28/decentralizing-iot-networks-through-blockchain/
I. Crigg, K. Griffith, A quick history of cryptocurrencies BBTC — before Bitcoin. in Bitcoin Magazine (2014). [Online]. Available: https://bitcoinmagazine.com/articles/quick-history-cryptocurrencies-bbtc-bitcoin-1397682630/
A.M. Antonopoulos, Mastering Bitcoin: Programming the Open Blockchain (Sebastopol, CA: O’Reilly Media Inc., 2017)
N. Kshetri, Can blockchain strengthen the internet of things? IT Professional 19(4), 68–72 (2017)
V. Nordahl, M. Rao, Blockchain cryptography. in My Blockchain Blog (2017). [Online]. Available: https://www.myblockchainblog.com/blog/blockchain-cryptography
K. Lewis, Blockchain: four blockchain use cases transforming business. in Internet of Things blog (2017). [Online]. Available: https://www.ibm.com/blogs/internet-of-things/iot-blockchain-use-cases/
N. Murty, S. Ananthasayanam, A. Singh, R. Malhotra, V. Vaid, A. Madan, Blockchain: The Next Innovation to Make our Cities smarter (PWC, 2018), pp. 22–30
A. Castor, A (short) guide to blockchain consensus protocols – coindesk. in CoinDesk (2017). [Online]. Available: https://www.coindesk.com/short-guide-blockchain-consensus-protocols/
Z. Witherspoon, A hitchhiker’s guide to consensus algorithms – hacker noon. in Hacker Noon (2018). [Online]. Available: https://hackernoon.com/a-hitchhikers-guide-to-consensus-algorithms-d81aae3eb0e3
C. Hammerschmidt, Consensus in blockchain systems. In short. – Chris Hammerschmidt – medium. in Medium (2017). [Online]. Available: https://medium.com/@chrshmmmr/consensus-in-blockchain-systems-in-short-691fc7d1fefe
D. Mingxiao, M. Xiaofeng, Z. Zhe, W. Xiangwei, C. Qijun, A review on consensus algorithm of blockchain. in 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (2017)
L. Lamport, R. Shostak, M. Pease, The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)
F. Tschorsch, B. Scheuermann, Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Commun. Surv. Tut. 18(3), 2084–2123 (2016)
A. Bahga, V. Madisetti, Blockchain platform for industrial internet of things. J. Softw. Eng. Appl. 09(10), 533–546 (2016)
Author information
Authors and Affiliations
Problems and Exercises
Problems and Exercises
-
1.
What is the double-spending problem in digital currencies?
-
2.
Describe what a “Merkle tree” is? How is it used in Bitcoin?
-
3.
In Sect. 10.3.2, we mention hash pointers and how they are key to immutability of the blockchain. Keeping that in mind, what are other features of blockchains that work with hash pointers to maintain immutability?
-
4.
What are they key characteristics provided by the blockchain? Explain what they are and why they are important for adoption in IoT solutions.
-
5.
What is a hash function and how does it work? What is the difference between a hash and a cryptographic hash function? Provide an example of how cryptographic hashes are used in a blockchain (any blockchain will suffice as an example).
-
6.
What is a hash collision? Does Bitcoin suffer from the probability of hash collisions?
-
7.
Consider a scenario where there a potential double-spend attempt by a malicious actor in Bitcoin. Explain how the blockchain works to reject such attempt and what the malicious actor would have to do in order to fool all other honest nodes.
-
8.
In table format, describe centralized, decentralized, and distributed network architectures.
-
9.
Perform a search and mention five companies that are currently working on blockchain + IoT solutions. Describe their solutions and how IoT and blockchain is being combined. Make sure to include at least one start-up and at least one established company.
-
10.
What type of records can be kept in a blockchain?
-
11.
In Sect. 10.4, we describe some consensus algorithms. Research consensus algorithms for blockchain and name an algorithm that we did not mention in this section. Is it good for IoT? Explain why or why not.
-
12.
What is elliptic curve cryptography and how does it benefit the use of keys within blockchain technology?
-
13.
Describe a Sybil attack and other types of attack vectors that could take place on a blockchain.
-
14.
Blockchains all start from a genesis block and then maintain a block height as the chain grows. Describe the importance of block heights as timestamps and lookups within Merkle trees.
-
15.
Describe the difference between permissioned, permissionless, and consortium blockchains. What type do you think best fits a blockchain involving IoT devices.
-
16.
What is the difference between a smart contract and multi-sig address?
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Davila, C., Tarnow, J. (2019). The Blockchain in IoT. In: Internet of Things From Hype to Reality. Springer, Cham. https://doi.org/10.1007/978-3-319-99516-8_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-99516-8_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99515-1
Online ISBN: 978-3-319-99516-8
eBook Packages: EngineeringEngineering (R0)