Blockchain and Edge Computing For IoT-5
Blockchain and Edge Computing For IoT-5
X, AUGUST 20XX 1
Abstract—Critical infrastructure systems are vital to underpin The industrial control system (ICS) is the heart of a critical
the functioning of a society and economy. Due to ever-increasing infrastructure [9], [10]. It is mainly responsible for supervi-
number of Internet-connected Internet-of-Things (IoTs) / Indus- sory control and data collection (SCADA), monitoring the
trial IoT (IIoT), and high volume of data generated and collected,
security and scalability are becoming burning concerns for processes and control flows of system information in industry.
critical infrastructures in industry 4.0. The blockchain technology The wide adoption of Internet-connected IoT devices has pre-
is essentially a distributed and secure ledger that records all sented a variety of challenging issues to critical infrastructures.
the transactions into a hierarchically expanding chain of blocks. First, ICS was originally designed mainly for a proprietary
Edge computing brings the cloud capabilities closer to the and closed infrastructure without considering too much about
computation tasks. The convergence of blockchain and edge
computing paradigms can overcome the existing security and security issues, as traditional critical infrastructures are sort
scalability issues. In this paper, we first introduce the IoT/IIoT of isolated and are not vulnerable to cyberattacks. With these
critical infrastructure in industry 4.0, and then we briefly present infrastructures being connected to the Internet through IoTs,
the blockchain and edge computing paradigms. After that, we a wide range of cyberattacks, including distributed denial-of-
show how the convergence of these two paradigms can enable service (DDoS), malware, breach attack, Brute force attack,
secure and scalable critical infrastructures. Then, we provide a
survey on state-of-the-art for security and privacy, and scalability Man-in-the-middle attack, SQL injection, and phishing, are
of IoT/IIoT critical infrastructures. A list of potential research threatening the operation of ICS to provision normal support
challenges and open issues in this area is also provided, which for services [11], [12], [13], [14]. In addition, ICS is in a
can be used as useful resources to guide future research. position for data acquisition in critical infrastructures. The
Index Terms—Blockchain, Edge Computing, Critical Infras- compromised ICS by cyber attackers may create potential risks
tructure, Industry 4.0, Internet of Things. for the leakage of data privacy [15], [16]. Second, scalability
is another challenge which ICS was not originally designed
to solve. Given the remarkable increase in the number of
I. I NTRODUCTION
IoT devices and the volume of data they are collecting and
Critical infrastructure systems have been used to underpin analysing, the traditional centralised manner for data collection
the functioning of a society and economy. They range from and analysis is becoming the bottleneck of ICSs [17]. A
traditionally-defined physical assets to a more broad definition decentralised way is inevitably needed to fulfill the emerging
of modern assets in the sectors of electricity, gas, water supply, requirements of ICSs in support of advanced critical infras-
agriculture, public health, transportation, security services, tructures in industry 4.0.
telecommunication, etc [1], [2]. This transition is largely due The emerging blockchain and edge computing paradigms
to the ever-increasing usage of Internet-of-Things (IoTs) and are promising technologies that can tackle the above challeng-
their significant support for critical infrastructure systems in ing issues, in terms of security and scalability considerations
the era of industry 4.0 [3], [4], [5], [6]. The international data of critical infrastructures. The blockchain technology has
corporation (IDC) has forecast that there will be an estimate of emerged as a novel secure computing paradigm without the
41.6 billion connected IoT devices, generating 79.4 zettabytes need of any centralised authority in a networked system [18],
(ZB) in 20251 . IoTs have become indispensable parts of criti- [19], [20], [21]. It is a distributed consensus scheme that
cal infrastructures in industry 4.0, creating intelligent services allows transactions to be securely stored and verified. In
such as smart grid and offering a range of advantages for cost terms of security and privacy, the blockchain is created and
savings and efficiencies [7], [8]. maintained securely through the use of asymmetric cryptog-
raphy with crowd computing in a peer-to-peer manner. The
This work was partially supported by the Engineering and Physical Sci-
ences Research Council of United Kingdom under Grant No. EP/R030863/1. zero-knowledge proof has been leveraged to increase privacy
(Corresponding authors: Y. Wu and H.-N. Dai) protection in the blockchain system [22]. Edge computing is a
Y. Wu is with the College of Engineering, Mathematics and Phys- decentralised computing infrastructure that brings computing
ical Sciences, University of Exeter, Exeter, EX4 4QF, U.K. e-mail:
[email protected] and storage capabilities closer to the location where it is
H.-N. Dai is with Faculty of Information Technology, Macau University of needed [23], [24], [25]. In terms of privacy protection, data
Science and Technology, Macau. email: [email protected] does not have to be transferred to the remote cloud for
H. Wang is with Department of Computer Science, Norwegian University
of Science and Technology, Gjøvik, Norway email: [email protected] computation and storage. Blockchain can therefore inevitably
1 https://www.idc.com/getdoc.jsp?containerId=prUS45213219 compensate the security concerns and enhance the privacy
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. X, AUGUST 20XX 2
Waste management
Transportation
Energy Public health
Manufacturing
Water management
TABLE I
A SUMMARY OF NATIONAL CRITICAL INFRASTRUCTURES IN DIFFERENT COUNTRIES .
Critical Infrastructures
Country Number of Sectors
The Same Infrastructures The Different Infrastructures
Chemicals, Civil Nuclear, Defence,
United Kingdom 13 Emergency Services, Space, Food
Financial Services, Chemicals, Dams, Information Technology,
Government Facilities, Commercial Facilities2 , Critical Manufacturing,
Communications, Energy, Health, Defence Industrial Base, Nuclear Reactors,
United States of America 16 Transportation Systems, and Water Materials and Waste, Food
Canada 10 Information and Communication Technology, Food
Australia 8 Food
Singapore 9 Infocomm, Media
protection of edge computing. The convergence of these two Section VII discusses potential challenges and open issues.
technologies is vital to provide necessary computation and Finally, Section VIII concludes this paper.
storage for IoTs, while guaranteeing the security and scala-
bility of critical infrastructures in industry 4.0 [26]. II. C RITICAL I NFRASTRUCTURES IN I NDUSTRY 4.0
Many research has been conducted to tackle security and Critical infrastructures refer to those vital assets, facilities,
privacy, and scalability issues of IoT based on blockchain and systems, sites, networks, information, people, processes, ei-
edge computing technologies. A systematic study of this area ther physical or virtual, that are necessary to underpin the
can take a further step to contribute to the research of IoT functioning of an economy and society3 , as shown in Fig. 1.
critical infrastructures in industry 4.0. With such a motivation, It also includes those functions, sites and organisations that
this paper introduces the critical infrastructure in industry are not critical to the maintenance of essential services upon
4.0 in Section II. Section III presents the technologies of which daily life depends, but that needs to be protected due
blockchain and edge computing, followed by how they can be to potential risks to the public (e.g., civil nuclear sites).
converged to provide necessary support for secure and scalable Different countries have their own definitions of national
critical infrastructures as in Section IV. Sections V and VI 2 This includes a wide range of sites that draw large crowds of people for
review and discuss state-of-the-art for security and privacy, shopping, business, entertainment, or lodging.
and scalability of IoT critical infrastructures, respectively. 3 https://www.cpni.gov.uk/critical-national-infrastructure-0
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. X, AUGUST 20XX 3
critical infrastructures. Table I shows a summary of critical To cope with the above issues, the proposed solutions for
infrastructures in United Kingdom, United States of America, critical infrastructures in industry 4.0 need to consider the
Canada, Australia, and Singapore. following factors:
Traditional critical infrastructures were quite isolated and • Security. Appropriate security mechanisms need to be in
were mainly vulnerable to physical attacks e.g., via an infected place to safeguard the IoT devices, the computing infras-
USB drive [27]. For example, the damage to the nuclear pro- tructure, the communication infrastructure, and various
gram of Iran by Stuxnet, a malicious computer worm, probably data running over these infrastructures.
via an infected USB drive, has caused significant damage to • Privacy. Many control and maintenance decisions are
industrial centrifuges used for enrichment of uranium4 . Due to learnt from data, e.g., fault prediction, detection and
digital transformation of industry 4.0 driven by smart factories, localisation are carried out based on many advanced data
big data and machine learning, critical infrastructures are analytics methods [34], [41]. The data usage needs to be
equipped with a dramatic increasing number of IoT devices, transparent, and sensitive data should not be transmitted
or industrial IoT (IIoT) in the context of industry 4.0 [28], outside its local network region.
[29], creating the so-called critical infrastructure with IoT or • Scalability. Data analytics methods rely on data collec-
IoT critical infrastructure. tion, storage and processing. The delay of these processes
Such a digital transformation of critical infrastructures is need to meet the stringent requirements of critical infras-
a double-edged sword. On the one hand, IoT critical infras- tructures and need to be scalable with the increase in the
tructures are in greater risks of being exposed of its internal size of the infrastructure.
structure, due to the connection to the Internet through massive
IoT devices via open standard protocols [30], [31], [32], [33].
III. B LOCKCHAIN AND E DGE C OMPUTING
On the other hand, it provides more useful information that
can be used for better maintenance of the system. For example, The emerging blockchain and edge computing technologies
Airbus launched a digital manufacturing initiative called the have exhibited excellent features that can cope with the above
“Factory of the Future”5 . Due to the complex process of issues mentioned in Section II. In this section, how the two
building a commercial airliner, many things that may go wrong technologies work and how they can handle these issues will
during the manufacturing process and may further endanger be presented.
passenger safety. To mitigate these potential risks, Airbus
equipped sensors in its machines. Through the collected data, A. Blockchain
a set of useful actions (e.g., anomaly prediction, detection and A blockchain is essentially a distributed and secure ledger
localisation) are performed for proactive maintenance [34], that records all the transactions into a hierarchically expanding
[35]. Faults can be repaired by engineers before escalating chain of blocks [42], [43], [44], [45], [46]. Each block in the
to a more serious error that may stop service provision. blockchain is linked to its previous block through the hash
According to the nature of how IoT critical infrastructures value of the parent block, except for the first block, usually
work, a number of components of the infrastructure are called the genesis block which does not have a parent block.
vulnerable to cyberattacks, including the following aspects: New blocks can be committed to a blockchain only upon
• Industry devices. There are a large number of already- their successful completion of the competition enforced by
deployed devices that are difficult to upgrade or patch, a consensus algorithm [47], [48]. Each block consists of the
making critical infrastructures inflexible for efficient han- following components (see Fig. 2):
dling of potential faults and attacks. In contrast, the new • Previous hash, which is the hash of the parent block.
IoT devices are connected to the Internet, and therefore, • Timestamp, recording the current time in seconds.
they are vulnerable to cyberattacks and can be easily • Nonce, starting from 0 and increasing for every hash
compromised [6], [36]. calculation.
• Communication infrastructure. IoT devices can now con- • Merkle Root, which is the hash of all the hashes of all
nect with other devices, including other IoT devices, com- the transactions in the block.
puting and storage devices, through open medium such • Transactions (Tx), which is the transactions executed
as cellular and Wi-Fi connections using open standard during a given period of time.
protocols [37]. The communication infrastructure itself
The blockchain technology possesses many features [42],
is also vulnerable to cyberattacks and the communication
[49], [50], [51] that are useful to tackle security, privacy and
may be eavesdropped [38].
scalability issues of critical infrastructures in industry 4.0,
• Computing infrastructure. Critical infrastructures were
including
using centralised cloud computing, where all the data
• Decentralisation. A blockchain validates a new block in
need to be transferred to the cloud data centre for process-
ing. This creates the potential risk of privacy leakage [39], a decentralised way without any centralised third-party
[40]. authority. In principle, every network user (node) can
participate in this validation. This trustfulness validation
4 https://www.europarl.europa.eu/RegData/etudes/BRIE/2019/642274/ process is essentially to complete a consensus procedure
EPRS BRI(2019)642274 EN.pdf via competition amongst all the involved users, and this
5 http://e-lass.eu/media/2018/02/TTG-ZAL.pdf can be achieved by consensus algorithms, such as proof
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. X, AUGUST 20XX 4
Timestamp Nonce
Timestamp Nonce
Timestamp Nonce
Tx_1
Tx_1
Tx_1
……
……
……
Previous Hash
Previous Hash
Previous Hash
Merkle Root
Merkle Root
Merkle Root
Genesis block …
Tx_2
Tx_2
Tx_2
Tx_n
Tx_n
Tx_n
Tx_3
Tx_3
Tx_3
Block_1 Block_2 Block_m
Network Operator A
Edge Computing
Network Operator B
Node (ECN)
Macro BS IoT Gateway
5G
Smart Home
Roadside Access
Point
Network Operator D
Offloading
Network Operator C
of work (PoW) [52], proof of stake (PoS) [53], proof of This preserves a certain level of user privacy [56].
burn (PoB) [53], Byzantine fault tolerance (BFT) [54], • Accountability/non-repudiation. Blockchain systems have
and practical BFT (PBFT) [55]. a digital signature scheme. Transaction initiator signs a
• Immutability. Each block in a blockchain has the hash message with her private key before issuing it out, and the
of its previous (parent) block. Any changes to the parent recipient of this signed message uses the sender’s public
block invalidates all the subsequent blocks. In addition, key to prove the validity of the message. The transaction
the Merkle root is the hash of all the hashes of all the initiator therefore cannot be denied its signed transaction.
transactions in the block. Any modification to any trans- • Automation. Blockchain systems allow smart con-
actions in a block, after the block has been successfully tracts [57], [58], where approved contractual clauses
committed into a blockchain, will result in a new Merkle are transformed into executable computer programs and
root. The falsification to any transactions can therefore are executed automatically when a certain condition is
be easily detected. satisfied. The execution of each contract statement will be
• Transparency. Every user of a blockchain system can recorded as an immutable transaction in the blockchain.
access and interact with the blockchain network.
• Pseudonymity. As blockchain addresses are allowed to B. Edge Computing
be anonymous, users cannot access identification infor- With the dramatic increase in the number of IoT/IIoT de-
mation of the users who have made those transactions. vices, centralised cloud computing is becoming more difficult
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. X, AUGUST 20XX 5
Blockchain Systems
to a computation task, in order to reduce network latency Edge Computing
AI Services
and save bandwidth resources towards the remote cloud data
centre [60], [61].
Edge computing nodes (ECNs) possess different functions IoT/IIoT Devices
Cloud server
Data analysis Monitoring Resource
scheduling
Fig. 5. Security and privacy solutions brought by the convergence of blockchain and edge computing.
V. S ECURITY AND P RIVACY OF II OT C RITICAL the decentralisation of blockchain systems can simplify the
I NFRASTRUCTURES IN I NDUSTRY 4.0 ID management process and lower the administration costs.
The integration of blockchain with edge computing has the Specifically, an IoT device can register, revoke and expire
potential to secure IIoT critical infrastructures and also protect its ID in the decentralised blockchain-based ID management
privacy-sensitive data in the infrastructure. Fig. 5 presents systems which can guarantee the trust without the necessity
an overview for the state-of-the-art of security and privacy of a third party. Meanwhile, the privacy/security risks of the
solutions brought by the convergence of blockchain and edge centralised systems can be eliminated or mitigated thanks
computing. In particular, the IoT device layer, blockchain edge to the temper-proof and non-repudiation characteristics of
layer and cloud computing layer correspond to the IoT/IIoT blockchains [68]. Moreover, the decentralisation brought by
devices, edge computing and cloud computing, respectively, blockchain can also help to reduce the SPF risk in the
as presented in Section IV. It is worth mentioning that the centralised systems. In addition, blockchains can also ensure
blockchain network layer plays a crucial role in connecting the anonymity of IoT devices since the generated addresses of
ECNs and cloud servers in the same plane via an overlay IoT devices can only be used to interact with each other in
network (i.e., the P2P network). We summarise the counter- the system.
measures to guarantee security and privacy in IIoT critical On the other hand, edge computing can also disburden
infrastructures in the communication, network and computing the centralised ID management systems by offloading tasks
layers, which are illustrated as follows. (e.g., registration, revoking and updating) to distributed ECNs.
Integration with blockchain can further improve the trans-
parency and security of ID management. All ID data stored in
A. Communication layer blockchain become traceable and immutable so as to improve
The integration of blockchain and edge computing can the overall security of IIoT. There are several proposals on IoT
protect the security and privacy for IIoT in identification ID management. For example, recent work [69] investigated
management and radio spectrum management. the usage of blockchain for Lithium-ion (Li-ion) battery man-
1) Identification management: The proliferation of diverse agement. Moreover, Guo et al. [70] adopted an integration of
IoT devices poses the challenges in identification (ID) man- blockchain and edge computing to achieve the trust of access
agement of IoT devices [67]. However, the incumbent ID control across diverse IoT systems.
management systems are not scalable with the explosion of 2) Spectrum management: We have experienced the radio
heterogeneous IoT devices. Meanwhile, the centralised IoT ID spectrum shortage due to the ever-growing demands on wire-
management can inevitably lead to low efficient bureaucratic less bandwidth driven by massive IoT devices and diverse IoT
processes, huge administrative costs, vulnerability to malicious applications [71], [72]. Blockchain also brings opportunities
attacks and susceptibility to single-point-failure (SPF) and in radio spectrum management for IoT devices. Blockchain is
privacy breaches. essentially a distributed database (a.k.a. a distributed ledger),
The advent of blockchain as well as edge computing which can record the usage of radio spectrum and enforce
technologies can potentially solve the above drawbacks of the effective spectrum access mechanisms. For example, the
the centralised ID management systems. On the one hand, work [73] investigated the adoption of blockchain as dis-
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. X, AUGUST 20XX 7
tributed spectrum database to achieve a fine-grained access feature of this system (mainly owing to distributed blockchain
control on radio spectrum, through which users may share nodes) can improve the scalability of the entire system. In
radio spectrum through appropriate settings of licenses in contrast to conventional network access control, blockchain-
blockchain. based network access control has the following advantages: 1)
Moreover, the built-in incentive and pricing mechanisms decentralization of network access control so as to improve
of blockchain can help to simplify the spectrum trading pro- the interoperability across the entire IoT system, 2) fine-
cess. The work [74] discussed the possibilities of leveraging grained access control can be achieved by the traceability of
blockchain for radio spectrum auction. Smart contracts running blockchain and ABE schemes.
on top of blockchain can also automate the spectrum auction The advances of blockchain-based smart contracts also
and trading. Meanwhile, a blockchain-based spectrum sharing foster the flexibility of network access control. In particular,
framework for 5G communications was proposed in [75]. In the work [80] presented a smart contract-based access control
particular, a smart contract regularising the terms for spectrum scheme to achieve flexible network access control. In this
sharing as well as the payments is given. The underlying scheme, there are three types of smart contracts for regis-
blockchain can also protect the privacy of trading parties. tration, judgement and multiple access control properties. An
3) Mobile services management: In 5G and beyond 5G implemented prototype also demonstrated the effectiveness of
communication systems, the management of massive services the proposed framework. Moreover, Islam and Madria [81]
subscribers is becoming a challenge due to the difficulty proposed an attribute-based network access control scheme
in coordinating the fragmented heterogeneous networks and based on smart contracts running on top of Hyperledger Fabric,
the growing administrative cost for handling various mobile which is a permissioned blockchain. Experiments on an IoT
services. Blockchain technology can potentially address these testbed were conducted to further verify the effectiveness of
emerging issues in mobile services management in 5G and the proposed scheme. In addition, in [82], the distributed
beyond 5G networks. trust in Internet-of-Vehicles (IoV) can be achieved through
As shown in Fig. 5, blockchain is essentially a middleware the consensus mechanism of blockchain.
to connect distributed mobile networks together. Consequently, 2) Network softwarisation: In order to cater for the growing
diverse communication networks can be integrated together demands of diverse IoT applications, the network softwari-
to offer a seamless mobile service to users. Moreover, the sation has drawn extensive attention recently [83]. Typical
built-in smart contracts on top of blockchain can also auto- network softwarisation technologies mainly include software-
mate the service subscription, suspension, modification and defined networks (SDN) [84], [85], network functions virtual-
termination, thereby reducing the administrative expenditure. isation (NFV) [86], [87] and network slicing [88], [89].
The study [76] presented a blockchain-based roaming man- The advent of SDN can fulfill the flexible and scalable
agement system for cellular networks, providing users with connections of massive IoTs while most of the existing SDN
an ubiquitous roaming service. Furthermore, the positioning solutions that are centralised are susceptible to SPF or mali-
accuracy is also a critical issue in mobile services, especially cious attacks. The introduction of blockchain can decentralise
for vehicular networks. The study [77] proposed a blockchain- SDN schemes thereby improving the reliability of SDN-based
based framework on collaborative positioning. Particularly, IoT systems. The recent study [90] presented a blockchain-
blockchain can ensure the data provenance of positioning data. based decentralised SDN solution, which can effectively solve
the handover authentication problem. Moreover, the work
of [91] also presented a blockchain-based SDN scheme for
B. Network layer the IoV scenario, in which blockchain was adopted to achieve
In the network layer, the incorporation of blockchain into decentralisation and trustworthiness of multiple network enti-
edge computing can protect the security in aspects of network ties and SDN was leveraged to guarantee the effectiveness of
access control and network softwarisation. We next illustrate network management.
the research advances in these two aspects in detail. Meanwhile, the provision of NFV technologies can facilitate
1) Network access control: One of the major obstacles in the diverse services for IoT applications while both security
IoT data sharing is the reciprocity absence across diverse IoT and trust among multiple virtualised network entities pose
systems. The introduction of blockchain to the IoT ecosystem a challenge in popularising NFV to IoT communities. The
can not only improve the interoperability [42] but also provide convergence of blockchain with NFV can potentially overcome
fine-grained access control of various components in IoT these challenges. The study presented in [92] investigated the
systems. The work [78] presented a blockchain-based access integration of blockchain with NFV to secure NFV orchestra-
control for IoT systems. In particular, a fine-grained access tion functions so as to achieve traceable and non-repudiated
control based on attribute-based encryption (ABE) can ensure services. Moreover, the work [93] harnessed the auditability
the permission attribute updating in time. As an example, and incentive mechanism of blockchain to design a reverse
the revoked users cannot access the on-chain data, which auction scheme to solve the competition of virtual network
nevertheless can be visible to authorised users. Moreover, functions (VNF) services providers.
the work [79] presented a decentralised network management Network slicing accompanying by SDN and NFV tech-
system for IoT on top of blockchain. Even though the per- nologies can fulfill the diverse demands of various IoT ap-
formance improvement over the conventional IoT network plications via partitioning the entire physical network into
management systems is not significant, the decentralisation multiple segregated network planes. The work [94] presented
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. X, AUGUST 20XX 8
a blockchain-based broker mechanism for IoT devices in 5G tasks from IoT devices to ECNs. In addition, Jiao et al. [105]
networks, in which network resources can be securely leased to presented an auction model to analyse the trading procedure
end users in a privacy-protected manner. Moreover, the study between cloud/edge services vendors and blockchain miners.
presented in [95] showed that the introduction of blockchain Moreover, the work [106] presented an overview on using
to network slicing can further improve the reliability of the blockchain for cloud services exchange in a cloud market.
content sharing in information-centric networks (ICN) [96]. Furthermore, authors in [107] presented a cloud-edge orches-
3) Network services: The integration of network ac- tration framework to coordinate crowdsensing tasks in mobile
cess control and network softwarisation mechanisms with IoT scenarios. In this framework, a cloud server playing a role
blockchain can offer unified network services. On the one as a controller can gather sensing data from ECNs, which out-
hand, blockchain and smart contracts can enable the flexible source sensing tasks to mobile IoT devices to collect sensing
network access control. On the other hand, the combination of data. An auction mechanism was proposed to incentivise par-
blockchain with network softwarisation technologies can also ticipatory workers (i.e., IoT devices). Similarly, the work [108]
facilitate the network management. Consequently, the provi- presented a blockchain-based mobile crowdsensing system for
sion of secure and ubiquitous network services is envisioned IIoT. In contrast to conventional mobile crowdsensing systems,
for critical infrastructures. the decentralisation of blockchain can further enhance the
There are several representative network services based reliability and security of the system.
on blockchain. In [97], a blockchain-based network storage 2) Data caching and storage: The explosion of IoT data
service was presented. In particular, a blockchain-based data poses challenges in data management, especially in data stor-
auditing scheme integrated with the bi-linear pairing crypto- age and data analytics [118]. Cloud computing can offload
graphic mechanism was devised to ensure the data integrity. storage and processing burdens at IoT devices while it also
Meanwhile, Aujla et al. [98] presented a framework of inte- brings the challenges in data privacy and security protection.
grating SDN and blockchain to offer flexible network services. Edge computing can undertake storage and processing at
Particularly, blockchain-enabled SDN can mitigate the attacks ECNs in approximation to users, thereby improving context-
such as malware and denial-of-service (DoS) attacks. More- awareness and protecting data privacy.
over, the study [99] investigated the integration of blockchain The in-depth integration of blockchain and edge/cloud can
with ECNs to provide trusted edge services. Incentive schemes further preserve IoT data privacy and security. In particular,
that are embedded with smart contracts can incentivise ECNs the work [109] presented a blockchain-based data management
to contribute to edge services. system for IoT, in which both edge and cloud computing facil-
ities are integrated with blockchain to guarantee effective data
sharing. Harnessing the non-repudiation and anti-tampering
C. Computing layer characteristics of blockchain, Xu et al. [110] proposed a
The integration of blockchain and edge computing can blockchain-based data sharing system to support a diversity
solve the following security issues in the computing layer. We of edge applications. Experimental results further verified the
discuss the research advances as follows. effectiveness of the proposed scheme.
1) Edge and cloud orchestration: IoT data has typically There are other studies on investigating the adoption of
been uploaded to remote clouds for storage, analysis and blockchain in other edge computing scenarios. In particular,
interpretation [100]. However, cloud services have typically the work [111] investigated to leverage blockchain to achieve
been owned by untrustworthy third parties, which may misuse the trust of multiple ECNs, which can temporarily store pop-
IoT data or unintentionally disclose the privacy-sensitive data ular contents (a.k.a. caches) so as to improve user experience.
to others. Moreover, it may cause considerable end-to-end Blockchain can also be used in the video streaming scenario.
delay to upload IoT data to remote clouds. The advent of Liu et al. [112] presented a blockchain-based video streaming
edge computing [101] can overcome the drawbacks of cloud framework with edge computing. Meanwhile, a three-stage
computing through offloading computation and storage tasks Stackelberg game was used to investigate the interaction
to ECNs, which are close to users. Thus, edge computing can among the users, base stations and video providers. Moreover,
essentially complement with cloud computing to better serve the work [113] exploited the merits of blockchain such as anti-
IoT. tempering and decentralisation to achieve the fast repairing of
The effective edge and cloud orchestration is a necessity data storage nodes in IIoT environment.
for IoT ecosystem while it also poses a number of security 3) Pricing and incentive mechanisms in computing: The
and privacy challenges especially in the trustless and het- IIoT critical infrastructure consists of diverse computing facil-
erogeneous computing environment [102]. There are a few ities, such as IoT nodes, ECNs and cloud servers with different
studies to guarantee trust and security of edge and cloud computing capabilities and storage capacities. It is crucial to
orchestration enabled by blockchain. In particular, Xiong et motivate diverse computing nodes to participle in computing
al. [103] modeled the interactions among cloud servers, ECNs and storage tasks. In addition, many consensus algorithms of
and blockchain miners as a multi-leader multi-follower game, blockchain also require substantial computing contributions
which is essentially a computationally-complex problem while from some computing nodes (i.e., miners). Therefore, the
authors successfully solved the problem by an Alternating Di- pricing and incentive mechanisms become a challenge in the
rection Method of Multipliers (ADMM) approach. Meanwhile, IIoT critical infrastructure.
the study of [104] investigated to disburden blockchain mining Many recent studies aim at addressing this issue. Kang
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. X, AUGUST 20XX 9
TABLE II
S UMMARY OF SECURITY AND PRIVACY SOLUTIONS ENABLED BY BLOCKCHAIN AND EDGE COMPUTING
et al. [114] proposed a two-stage strategy to mitigate the servers and data storage servers which have strong comput-
collusion of blockchain miners. In particular, a contract theory ing/storage capabilities may store the entire blockchain and
was introduced to incentivise miners to contribute to the also be responsible for the computationally-intensive tasks
block verification. Meanwhile, the study [115] investigated the such as mining and executing machine learning/deep learning
incentive mechanisms in ECNs providing blockchain miners algorithms. However, ECNs and IoT devices may only store
with computing services. Particularly, a two-stage Stackelberg partial blockchains (e.g., hash values of the blockchain or
game model was used to analyse the interactions between a subset of blocks) due to the limited computing/storage
ECNs and miners. Moreover, the study [116] investigated a capabilities. It is a critical issue to ensure the consistency of
mechanism to promote the consensus propagation across the blockchain data across the entire network.
blockchain network. Furthermore, a credit-based approach was
devised in [117] to achieve the computing resource trading VI. S CALABILITY OF II OT C RITICAL I NFRASTRUCTURES
between ECNs and blockchain-enabled IoT nodes. IN I NDUSTRY 4.0
Camera
Industrial
Smart meter EV
diversified applications, and each application has its own range of use cases in critical infrastructures, e.g., industrial
ecosystem that uses the platform that may be ecosystem- manufacturing and a variety of other sectors. The network
specific7 . For example, the platforms and application program- economy models are crucial for the success of the ecosystem
ming interfaces (APIs) for transportation systems should be of these sectors. Existing solutions in this area seldom consider
different from those required for government facilities. Each network economy models, and thus they are not sustainable
country has many critical infrastructures covering a range and practical solutions. How to design a practical solution
of sectors, e.g., financial services, energy, health, etc (see for the convergence of edge computing and blockchain, by
more details in Table I). A robust edge computing framework considering network economy factors e.g. pricing mechanisms
solution should be able to provide standard northbound APIs of real-world applications, is still an open issue. Game theory
for application developers from different platforms and flexibly is a versatile tool that has been useful to make decisions related
deploy necessary functionalities, along with the advanced to network economy [25]. However, network environment is
networking technologies, e.g., SDN and NFV. It should also be becoming much more dynamic than ever, we must bring in
able to accommodate various southbound transmission proto- the tools (e.g., AI) that can capture the features of this ever-
cols between IoT/IIoT devices and the cloud. In addition, edge changing environment to help game theory do a better job.
cloud may belong to different operators. An efficient east-west
data transmission protocol may be needed for communication
B. Secure IIoT critical infrastructures
between different network operators. The design of these
protocols should be coupled with the stringent requirements 1) Security vulnerabilities of IIoT devices: The resource
of diversified IoT/IIoT applications and security guarantee limitations of IIoT devices have often been the root causes
mechanisms (e.g., blockchain) in critical infrastructures. of the security vulnerabilities. On the one hand, the limited
2) Integrated networking, computing, storage and power computational capability and battery capacity lead to the
resource allocation: Resource allocation is an important re- difficulty of deploying computationally-complicated encryp-
search topic in edge computing, which depends on many fac- tion algorithms at IIoT devices. Meanwhile, the failure of
tors, including energy consumption, power allocation in energy upgrading or patching IoT firmware also results in the IIoT
renewable networks [155], [156], computing capabilities at the devices being vulnerable to malicious attacks [157]. It is
IoT/IIoT devices, the edge and the cloud, the key components reported in [158] that blockchain-enabled smart contracts can
of emerging network architectures, wireless communications, automate the IoT firmware upgrading procedure through the
to name a few. Many studies only consider one or two of contract clauses (i.e., instructions) built-in IoT devices since
these factors. For example, most studies consider energy- the date of production. Moreover, the recent work [159] also
computing trade-off for computation offloading solutions. It presented a blockchain-based solution via monitoring software
is challenging to have an integrated networking, computing, status of IoT devices. Blockchain can store snapshots of IoT
storage and power resource allocation scheme that is useful software status to monitor and detect any malicious activities
for a practical use case. For example, how to incorporate the (e.g., a backdoor firmware upgrading).
in-network caching of ICN, which was designed to reduce 2) Security vulnerabilities of blockchain: Although
the delay for content retrieval, into the resource allocation blockchain has the advantages in security enhancement of
solutions of edge computing, is still an open issue. the IoT ecosystem, the intrinsic security vulnerabilities of
3) Decentralised network management: The convergence blockchain systems also prevent blockchain from being
of edge computing and blockchain is a decentralised network widely adopted in IIoT critical infrastructures. For example,
in nature. The traditional centralised or hierarchical network it is reported in [160] that the failure of properly-configuring
management would not work efficiently. In addition, the surge gas costs of Ethereum Virtual Machine (EVM) may lead to
in data volume that will come from the massive IoT/IIoT Ethereum suffering from DoS attacks. Moreover, blockchain-
devices enabled by 5G has made edge computing more based domain name system (BDNS) can be abused by
difficult to manage. Furthermore, edge computing has been cyberattackers to conduct intrusion attacks [161] due to the
coupled with advanced networking technologies, e.g., SDN, anonymity of BDNS. The recent progress in big data analytics
NFV and network slicing, for efficient service deployment on blockchain data brings the opportunities to remedy the
and network control. The complexity of edge computing due security vulnerabilities of blockchain. For example, the recent
to these factors, coupled with the introduction of blockchain, work [162] presented a framework to collect blockchain data
has made the network management a hard task. Decentralised and detect various attacks occurring on blockchain.
network management is definitely a trend, but how to design 3) Integration of AI to secure IIoT critical infrastructures:
an efficient solution that considers the above factors and can Massive data has been generated from the entire IIoT critical
be interworked/integrated with the management framework infrastructures from the communication layer to the computing
of emerging networking technologies, e.g., management and layer. Big data analytics (BDA) on IIoT critical infrastruc-
orchestration (MANO) in NFV, is still a challenging issue. tures can classify abnormal behaviours, detect and recognise
4) Network economy: The convergence of edge computing intrusions as well as malicious attacks [163]. Meanwhile,
and blockchain plays an important role in enabling a wide BDA on the operational data of IIoT critical infrastructures
can also help to identify the performance bottlenecks and
7 https://www.ericsson.com/491e83/assets/local/reports-papers/ericsson- make proactive actions (like tuning performance metrics).
technology-review/docs/2020/next-generation-cloud-edge-ecosystems.pdf Moreover, BDA on blockchain can be beneficial to pinpoint
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. X, AUGUST 20XX 13
vulnerabilities of blockchain as analysed above. However, the edge/cloud computing facilities to enhance the scalability of
heterogeneity and diversity of IIoT critical infrastructure data IIoT ecosystem. In addition, the introduction of blockchain to
also pose the challenges in data analytics [164]. The recent IIoT critical infrastructures can improve the interoperability
advances in AI have brought opportunities to address the above (i.e., reciprocal operations) among different IIoT systems.
issues. Moreover, the massive data generated in IIoT can be used to
First, the integration of AI with cloud computing can identify the performance bottlenecks or abnormal activities so
process massive IoT data and extract valuable information. as to improve the scalability of IIoT [181]. In the future, the
Second, AI can empower ECNs and IoT devices with in- fusion of AI with the above technologies can further improve
telligence [165], [166]. Due to the resource limitation, IoT the scalability and elasticity of IIoT ecosystems.
devices may possess the limited intelligence. The intelligence 2) Scalability of blockchain: The scalability of blockchain
bestowed to ECNs by AI that is named as edge intelligence in itself is a big open problem, which prevents the adoption of
can serve an important complement to IoT devices [167]. this technology in many real-world application domains. There
For example, the work [168] proposed an amalgamation of is still no tangible scalable solution for IoT applications. IOTA
blockchain with edge computing, in which a deep reinforce- Tangle, being the largest and most successful one, is still far
ment learning (DRL) [169] was proposed to achieve the from satisfactory, with several critical vulnerabilities, includ-
dynamic resource scheduling. Meanwhile, authors in [170] ing being not deterministic, relying on a central coordinator
adopted a DRL method to allocate both computing resources to avoid security attacks, and being susceptible to the parasite
and blockchain operations in an adaptive manner. Moreover, chain attack. The direction in coupling multiple chains, in
the work [171] presented a DRL method to optimize network graph structures, with hierarchical consensus protocols seems
slicing in 5G networks. Furthermore, deep learning approaches promising, but obviously calls for large amount of research
can help to identify these malicious attacks through analysing efforts.
the activity reports and suggest relevant countermeasures. 3) Coordination across disciplines: The momentum and
For example, the work [172] showed that deep learning can interest shown in scalability from different communities (e.g.,
analyse the network traffic to identify the attacks. database, network, and high performance computing), while
4) Data privacy preservation: In addition to cloud servers, contributing good knowledge and insights in this important
both IIoT devices and ECNs are vulnerable to privacy leakage issue, expose the fragmented and un-coordinated nature of
risks. On the one hand, it is shown in a recent work [173] that these efforts from different angles. The layered architecture
user privacy during the spectrum auction can be breached. On with the convergence of blockchain, IIoT, and edge/cloud
the other hand, the privacy leakage risks exist when raw data computing is a strong push towards coordinated research
collected from IIoT devices is sent to untrustworthy ECNs, efforts, by linking the strengths from different communities,
which can be hijacked or misused by attackers. Consequently, for scalable and secure solutions. This convergence opens up
data stored at ECNS can be stolen or misused. many research opportunities. A good coordination between
Recent advances in differential privacy [174], homomorphic the blockchain layer and cloud/edge computing and/or IIoT
encryption [175] and federated learning [176], [177] bring devices in the architecture (as shown in Fig. 4) has the
the opportunities in offering privacy protection in IIoT critical potential of lifting the scalability of blockchain, and in general
infrastructures [178]. In particular, the work [174] presented a the critical infrastructure applications to a new level.
joint framework of blockchain, differential privacy and feder-
ated learning to protect data privacy in IIoT. Feng et al. [175] VIII. C ONCLUSION
presented a privacy preservation method based on tucker Critical infrastructures, also known as national critical in-
decomposition on top of blockchain for IIoT. The authors frastructures in the United Kingdom, are becoming vulnerable
in [176] proposed using federated learning to train machine to cyberattacks due to wide adoption of Internet-connected
learning models locally, which can be finally aggregated into IoT/IIoT devices in industry 4.0. Security and scalability are
a global model while the data privacy can be preserved. therefore becoming burning concerns for this “modern” critical
Besides federated learning and cryptographic algorithms, infrastructures. In this paper, we introduced a layered architec-
the advent of recent machine learning and deep learning ture for IoT/IIoT critical infrastructures with the convergence
technologies can also potentially address the privacy concern. of blockchain and edge computing. The state-of-the-art of
For example, Alkadi et al. [179] presented a blockchain- security and privacy solutions, and scalability solutions, for
based framework with deep learning approaches to identify the IoT/IIoT infrastructures were reviewed and discussed. Despite
intrusion attacks while preserving data privacy. Moreover, the numerous efforts have done, there are still many on-going
work [180] introduced a privacy-aware deep learning method, challenges and open issues that need to be considered to ensure
which allows the collaboration of multiple nodes to train deep the success of critical infrastructures in era of industry 4.0.
neural networks while preserving data privacy. We then provided a range of potential research challenges and
open issues at the end of this paper to guide the future research
C. Scalable critical infrastructures in this area.
1) Scalability of IIoT: The scalability of IIoT is influenced
by the heterogeneity of IIoT devices and the diversity of R EFERENCES
IIoT networks. Recent studies have demonstrated the effec- [1] T. Wang, M. Z. A. Bhuiyan, G. Wang, M. A. Rahman, J. Wu, and
tiveness of the integration of SDN, NFV, network slicing and J. Cao, “Big data reduction for a smart city’s critical infrastructural
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. X, AUGUST 20XX 14
health monitoring,” IEEE Communications Magazine, vol. 56, no. 3, [23] S. Deng, H. Zhao, W. Fang, J. Yin, S. Dustdar, and A. Y. Zomaya,
pp. 128–133, 2018. “Edge intelligence: The confluence of edge computing and artificial
[2] M. Chen, Y. Jiang, N. Guizani, J. Zhou, G. Tao, J. Yin, and K. Hwang, intelligence,” IEEE Internet of Things Journal, pp. 1–1, 2020.
“Living with i-fabric: Smart living powered by intelligent fabric and [24] L. U. Khan, I. Yaqoob, N. H. Tran, S. M. A. Kazmi, T. N. Dang, and
deep analytics,” IEEE Network, pp. 1–8, 2020. C. S. Hong, “Edge computing enabled smart cities: A comprehensive
[3] A. Petropulu, K. I. Diamantaras, Z. Han, D. Niyato, and S. Zonouz, survey,” IEEE Internet of Things Journal, pp. 1–1, 2020.
“Contactless monitoring of critical infrastructure [from the guest ed- [25] J. Zhang, Y. Wu, G. Min, F. Hao, and L. Cui, “Balancing energy
itors],” IEEE Signal Processing Magazine, vol. 36, no. 2, pp. 19–21, consumption and reputation gain of uav scheduling in edge computing,”
2019. IEEE Transactions on Cognitive Communications and Networking, pp.
[4] L. Russell, R. Goubran, F. Kwamena, and F. Knoefel, “Agile iot 1–1, doi: 10.1109/TCCN.2020.3004592, 2020.
for critical infrastructure resilience: Cross-modal sensing as part of [26] H. Liu, P. Zhang, G. Pu, T. Yang, S. Maharjan, and Y. Zhang,
a situational awareness approach,” IEEE Internet of Things Journal, “Blockchain empowered cooperative authentication with data trace-
vol. 5, no. 6, pp. 4454–4465, 2018. ability in vehicular edge computing,” IEEE Transactions on Vehicular
[5] J. M. Mcginthy and A. J. Michaels, “Secure industrial internet of things Technology, pp. 1–1, 2020.
critical infrastructure node design,” IEEE Internet of Things Journal, [27] J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in
vol. 6, no. 5, pp. 8021–8037, 2019. cybersecurity,” Journal of Computer and System Sciences, vol. 80,
[6] I. Stellios, P. Kotzanikolaou, M. Psarakis, C. Alcaraz, and J. Lopez, “A no. 5, pp. 973 – 993, 2014, special Issue on Dependable and
survey of iot-enabled cyberattacks: Assessing attack paths to critical Secure Computing. [Online]. Available: http://www.sciencedirect.com/
infrastructures and services,” IEEE Communications Surveys Tutorials, science/article/pii/S0022000014000178
vol. 20, no. 4, pp. 3453–3495, 2018. [28] D. Georgakopoulos, P. P. Jayaraman, M. Fazia, M. Villari, and
[7] Y. Wu, H. Huang, C.-X. Wang, and Y. Pan, 5G-enabled internet of R. Ranjan, “Internet of things and edge cloud computing roadmap for
things. CRC Press, 2019. manufacturing,” IEEE Cloud Computing, vol. 3, no. 4, pp. 66–73, 2016.
[8] Y. Wu, F. Hu, G. Min, and A. Zomaya, Big Data and Computational [29] H. Yang, A. Alphones, W. Zhong, C. Chen, and X. Xie, “Learning-
Intelligence in Networking. CRC Press, 2017. based energy-efficient resource management by heterogeneous rf/vlc
for ultra-reliable low-latency industrial iot networks,” IEEE Transac-
[9] R. Beerens, S. C. N. Thissen, W. C. M. Pancras, T. M. P. Gommans,
tions on Industrial Informatics, pp. 1–1, 2019.
N. van de Wouw, and W. P. M. H. Heemels, “Control allocation for an
industrial high-precision transportation and positioning system,” IEEE [30] D. Ma, G. Lan, M. Hassan, W. Hu, and S. K. Das, “Sensing, computing,
Transactions on Control Systems Technology, pp. 1–8, 2019. and communications for energy harvesting iots: A survey,” IEEE
Communications Surveys Tutorials, pp. 1–1, 2019.
[10] X. Jiang, Z. Pang, M. Luvisotto, R. Candell, D. Dzung, and C. Fis-
[31] C. K. Wu, K. F. Tsang, Y. Liu, H. Zhu, H. Wang, and Y. Wei,
chione, “Delay optimization for industrial wireless control systems
“Critical internet of things: An interworking solution to improve service
based on channel characterization,” IEEE Transactions on Industrial
reliability,” IEEE Communications Magazine, vol. 58, no. 1, pp. 74–79,
Informatics, pp. 1–1, 2020.
2020.
[11] F. Pan, Z. Pang, M. Luvisotto, M. Xiao, and H. Wen, “Physical-
[32] J. R. Foerster, X. Costa-Perez, and R. V. Prasad, “Communications for
layer security for industrial wireless control systems: Basics and future
iot: Connectivity and networking,” IEEE Internet of Things Magazine,
directions,” IEEE Industrial Electronics Magazine, vol. 12, no. 4, pp.
vol. 3, no. 1, pp. 6–7, 2020.
18–27, 2018.
[33] C. Luo, J. Ji, Q. Wang, X. Chen, and P. Li, “Channel state information
[12] R. Paes, D. C. Mazur, B. K. Venne, and J. Ostrzenski, “A guide to prediction for 5G wireless communications: A deep learning approach,”
securing industrial control networks: Integrating it and ot systems,” IEEE Trans. Netw. Sci. and Eng., vol. PP, no. 99, pp. 1–1, Jun. 2018.
IEEE Industry Applications Magazine, vol. 26, no. 2, pp. 47–53, 2020.
[34] Y. Zuo, Y. Wu, G. Min, C. Huang, and K. Pei, “An intelligent anomaly
[13] C. Shen, C. Liu, H. Tan, Z. Wang, D. Xu, and X. Su, “Hybrid- detection scheme for micro-services architectures with temporal and
augmented device fingerprinting for intrusion detection in industrial spatial data analysis,” IEEE Transactions on Cognitive Communications
control system networks,” IEEE Wireless Communications, vol. 25, and Networking, pp. 1–1, 2020.
no. 6, pp. 26–31, 2018. [35] C. Huang, Y. Wu, Y. Zuo, K. Pei, and G. Min, “Towards
[14] Y. Qin, Q. Zhang, C. Zhou, and N. Xiong, “A risk-based dynamic experienced anomaly detector through reinforcement learning,” in
decision-making approach for cybersecurity protection in industrial AAAI Conference on Artificial Intelligence, 2018. [Online]. Available:
control systems,” IEEE Transactions on Systems, Man, and Cybernet- https://www.aaai.org/ocs/index.php/AAAI/AAAI18/paper/view/16048
ics: Systems, pp. 1–8, 2018. [36] G. Falco, C. Caldera, and H. Shrobe, “Iiot cybersecurity risk modeling
[15] M. Hassan, A. Gumaei, S. Huda, and A. Almogren, “Increasing the for scada systems,” IEEE Internet of Things Journal, vol. 5, no. 6, pp.
trustworthiness in the industrial iot networks through a reliable cyber- 4486–4495, 2018.
attack detection model,” IEEE Transactions on Industrial Informatics, [37] Z. Zhou, J. Gong, Y. He, and Y. Zhang, “Software defined machine-to-
pp. 1–1, 2020. machine communication for smart energy management,” IEEE Com-
[16] M. Li, D. Hu, C. Lal, M. Conti, and Z. Zhang, “Blockchain-enabled munications Magazine, vol. 55, no. 10, pp. 52–60, 2017.
secure energy trading with verifiable fairness in industrial internet of [38] Y. Yang, Y. Chen, W. Wang, and G. Yang, “Securing channel state
things,” IEEE Transactions on Industrial Informatics, pp. 1–1, 2020. information in multiuser mimo with limited feedback,” IEEE Transac-
[17] Y. Zhang, Z. Zheng, H. . Dai, and D. Svetinovic, “Guest editorial: tions on Wireless Communications, pp. 1–1, 2020.
Special section on “blockchain for industrial internet of things” in ieee [39] S. R. Pokhrel, Y. Qu, and L. Gao, “Qos-aware personalized privacy with
transactions on industrial informatics,” IEEE Transactions on Industrial multipath tcp for industrial iot: Analysis and design,” IEEE Internet of
Informatics, vol. 15, no. 6, pp. 3514–3515, 2019. Things Journal, pp. 1–1, 2020.
[18] D. Puthal, N. Malik, S. P. Mohanty, E. Kougianos, and C. Yang, “The [40] T. Hoang, A. A. Yavuz, and J. Guajardo Merchan, “A secure searchable
blockchain as a decentralized security framework [future directions],” encryption framework for privacy-critical cloud storage services,” IEEE
IEEE Consumer Electronics Magazine, vol. 7, no. 2, pp. 18–21, 2018. Transactions on Services Computing, pp. 1–1, 2019.
[19] M. Zhaofeng, W. Lingyun, W. Xiaochang, W. Zhen, and Z. Weizhe, [41] C. Huang, G. Min, Y. Wu, Y. Ying, K. Pei, and Z. Xiang, “Time
“Blockchain-enabled decentralized trust management and secure usage series anomaly detection for trustworthy services in cloud computing
control of iot big data,” IEEE Internet of Things Journal, pp. 1–1, 2019. systems,” IEEE Transactions on Big Data, pp. 1–1, 2017.
[20] B. Yin, Y. Wu, T. Hu, J. Dong, and Z. Jiang, “An efficient collaboration [42] H.-N. Dai, Z. Zheng, and Y. Zhang, “Blockchain for internet of things:
and incentive mechanism for internet of vehicles (iov) with secured A survey,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8076–
information exchange based on blockchains,” IEEE Internet of Things 8094, 2019.
Journal, vol. 7, no. 3, pp. 1582–1593, 2020. [43] J. Xie, H. Tang, T. Huang, F. R. Yu, R. Xie, J. Liu, and Y. Liu, “A survey
[21] Y. Wu, H.-N. Dai, H. Wang, and K.-K. R. Choo, “Blockchain-based of blockchain technology applied to smart cities: Research issues and
privacy preservation for 5g-enabled drone communications,” IEEE challenges,” IEEE Communications Surveys Tutorials, vol. 21, no. 3,
Network, 2020. pp. 2794–2830, 2019.
[22] D. Gabay, K. Akkaya, and M. Cebe, “Privacy-preserving authentication [44] M. Wu, K. Wang, X. Cai, S. Guo, M. Guo, and C. Rong, “A
scheme for connected electric vehicles using blockchain and zero comprehensive survey of blockchain: From theory to iot applications
knowledge proofs,” IEEE Transactions on Vehicular Technology, pp. and beyond,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8114–
1–1, 2020. 8154, 2019.
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. X, AUGUST 20XX 15
[45] K.-K. R. Choo, Z. Yan, and W. Meng, “Editorial: Blockchain in indus- Situation Awareness of Smart Cities,” IEEE Network, vol. 34, no. 2,
trial iot applications: Security and privacy advances, challenges, and pp. 202–209, 2020.
opportunities,” IEEE Transactions on Industrial Informatics, vol. 16, [68] W. Viriyasitavat, L. D. Xu, Z. Bi, and D. Hoonsopon, “Blockchain
no. 6, pp. 4119–4121, 2020. technology for applications in internet of things—mapping from system
[46] L. Cheng, J. Liu, G. Xu, Z. Zhang, H. Wang, H. Dai, Y. Wu, and design perspective,” IEEE Internet of Things Journal, vol. 6, no. 5, pp.
W. Wang, “Sctsc: A semicentralized traffic signal control mode with 8155–8168, 2019.
attribute-based blockchain in iovs,” IEEE Transactions on Computa- [69] T. Kim, J. Ochoa, T. Faika, A. Mantooth, J. Di, Q. Li, and Y. Lee, “An
tional Social Systems, vol. 6, no. 6, pp. 1373–1385, 2019. overview of cyber-physical security of battery management systems
[47] H. Pourbabak, Q. H. Alsafasfeh, and W. Su, “A distributed consensus- and adoption of blockchain technology,” IEEE Journal of Emerging
based algorithm for optimal power flow in dc distribution grids,” IEEE and Selected Topics in Power Electronics, pp. 1–1, 2020.
Transactions on Power Systems, pp. 1–1, 2020. [70] S. Guo, X. Hu, S. Guo, X. Qiu, and F. Qi, “Blockchain meets edge
[48] Y. Xiao, N. Zhang, W. Lou, and Y. T. Hou, “A survey of distributed computing: A distributed and trusted authentication system,” IEEE
consensus protocols for blockchain networks,” IEEE Communications Transactions on Industrial Informatics, vol. 16, no. 3, pp. 1972–1983,
Surveys Tutorials, pp. 1–1, 2020. 2020.
[49] R. Zhang, R. Xue, and L. Liu, “Security and privacy on blockchain,” [71] G. Min, Y. Wu, and A. Y. Al-Dubai, “Performance modelling and
ACM Comput. Surv., vol. 52, no. 3, Jul. 2019. [Online]. Available: analysis of cognitive mesh networks,” IEEE Transactions on Commu-
https://doi.org/10.1145/3316481 nications, vol. 60, no. 6, pp. 1474–1478, 2012.
[50] J. Xie, F. R. Yu, T. Huang, R. Xie, J. Liu, and Y. Liu, “A survey on [72] Y. Wu, G. Min, and A. Y. Al-Dubai, “A new analytical model for
the scalability of blockchain systems,” IEEE Network, vol. 33, no. 5, multi-hop cognitive radio networks,” IEEE Transactions on Wireless
pp. 166–173, 2019. Communications, vol. 11, no. 5, pp. 1643–1648, 2012.
[51] T. Salman, M. Zolanvari, A. Erbad, R. Jain, and M. Samaka, “Security [73] M. B. H. Weiss, K. Werbach, D. C. Sicker, and C. E. C. Bastidas,
services using blockchains: A state of the art survey,” IEEE Commu- “On the application of blockchains to spectrum management,” IEEE
nications Surveys Tutorials, vol. 21, no. 1, pp. 858–880, 2019. Transactions on Cognitive Communications and Networking, vol. 5,
[52] G. Ramezan and C. S. Leung, “An analysis of proof-of-work based no. 2, pp. 193–205, 2019.
blockchains under an adaptive double-spend attack,” IEEE Transactions [74] Y.-C. Liang, Blockchain for Dynamic Spectrum Management. Singa-
on Industrial Informatics, pp. 1–1, 2020. pore: Springer Singapore, 2020, pp. 121–146.
[53] S. N. G. Gourisetti, M. Mylrea, and H. Patangia, “Evaluation and [75] Z. Zhou, X. Chen, Y. Zhang, and S. Mumtaz, “Blockchain-empowered
demonstration of blockchain applicability framework,” IEEE Transac- secure spectrum sharing for 5g heterogeneous networks,” IEEE Net-
tions on Engineering Management, pp. 1–15, 2019. work, vol. 34, no. 1, pp. 24–31, 2020.
[54] T. Distler, C. Cachin, and R. Kapitza, “Resource-efficient byzantine [76] A. Refaey, K. Hammad, S. Magierowski, and E. Hossain, “A
fault tolerance,” IEEE Transactions on Computers, vol. 65, no. 9, pp. Blockchain Policy and Charging Control Framework for Roaming in
2807–2819, 2016. Cellular Networks,” IEEE Network, vol. 34, no. 3, pp. 170–177, 2020.
[77] C. Li, Y. Fu, F. R. Yu, T. H. Luan, and Y. Zhang, “Vehicle Position Cor-
[55] S. Gao, T. Yu, J. Zhu, and W. Cai, “T-pbft: An eigentrust-based
rection: A Vehicular Blockchain Networks-Based GPS Error Sharing
practical byzantine fault tolerance consensus algorithm,” China Com-
Framework,” IEEE Transactions on Intelligent Transportation Systems,
munications, vol. 16, no. 12, pp. 111–123, 2019.
pp. 1–15, 2020.
[56] T. Liu, J. Ge, Y. Wu, B. Dai, L. Li, Z. Yao, J. Wen, and H. Shi, “A new
[78] G. Yu, X. Zha, X. Wang, W. Ni, K. Yu, P. Yu, J. A. Zhang, R. P. Liu,
bitcoin address association method using a two-level learner model,”
and Y. J. Guo, “Enabling attribute revocation for fine-grained access
in Algorithms and Architectures for Parallel Processing, S. Wen,
control in blockchain-iot systems,” IEEE Transactions on Engineering
A. Zomaya, and L. T. Yang, Eds. Cham: Springer International
Management, pp. 1–18, 2020.
Publishing, 2020, pp. 349–364.
[79] O. Novo, “Scalable Access Management in IoT Using Blockchain:
[57] W. Zou, D. Lo, P. S. Kochhar, X. D. Le, X. Xia, Y. Feng, Z. Chen, and
A Performance Evaluation,” IEEE Internet of Things Journal, vol. 6,
B. Xu, “Smart contract development: Challenges and opportunities,”
no. 3, pp. 4694–4701, 2019.
IEEE Transactions on Software Engineering, pp. 1–1, 2019.
[80] Y. Zhang, S. Kasahara, Y. Shen, X. Jiang, and J. Wan, “Smart contract-
[58] Y. Liu, F. R. Yu, X. Li, H. Ji, and V. C. M. Leung, “Blockchain and based access control for the internet of things,” IEEE Internet of Things
machine learning for communications and networking systems,” IEEE Journal, vol. 6, no. 2, pp. 1594–1605, 2019.
Communications Surveys Tutorials, pp. 1–1, 2020. [81] M. A. Islam and S. Madria, “A Permissioned Blockchain Based Access
[59] O. Osanaiye, S. Chen, Z. Yan, R. Lu, K. R. Choo, and M. Dlodlo, Control System for IOT,” in 2019 IEEE International Conference on
“From cloud to fog computing: A review and a conceptual live vm Blockchain (Blockchain), 2019, pp. 469–476.
migration framework,” IEEE Access, vol. 5, pp. 8284–8300, 2017. [82] Z. Yang, K. Yang, L. Lei, K. Zheng, and V. C. M. Leung, “Blockchain-
[60] Z. Zhao, G. Min, W. Gao, Y. Wu, H. Duan, and Q. Ni, “Deploying based decentralized trust management in vehicular networks,” IEEE
edge computing nodes for large-scale iot: A diversity aware approach,” Internet of Things Journal, vol. 6, no. 2, pp. 1495–1505, 2019.
IEEE Internet of Things Journal, vol. 5, no. 5, pp. 3606–3614, 2018. [83] A. A. Barakabitze, A. Ahmad, R. Mijumbi, and A. Hines, “5G
[61] L. Cui, D. Su, Y. Zhou, L. Zhang, Y. Wu, and S. Chen, “Edge network slicing using SDN and NFV: A survey of taxonomy,
learning for surveillance video uploading sharing in public transport architectures and future challenges,” Computer Networks, vol. 167,
systems,” IEEE Transactions on Intelligent Transportation Systems, p. 106984, 2020. [Online]. Available: http://www.sciencedirect.com/
doi: 10.1109/TITS.2020.3008420, 2020. science/article/pii/S1389128619304773
[62] M. Chen, Y. Miao, H. Gharavi, L. Hu, and I. Humar, “Intelligent traffic [84] W. Miao, G. Min, Y. Wu, H. Wang, and J. Hu, “Performance modelling
adaptive resource allocation for edge computing-based 5g networks,” and analysis of software-defined networking under bursty multimedia
IEEE Transactions on Cognitive Communications and Networking, traffic,” ACM Trans. Multimedia Comput. Commun. Appl., vol. 12,
vol. 6, no. 2, pp. 499–508, 2020. no. 5s, Sep. 2016. [Online]. Available: https://doi.org/10.1145/2983637
[63] S. Guo, Y. Dai, S. Guo, X. Qiu, and F. Qi, “Blockchain meets edge [85] G. Wang, Y. Zhao, J. Huang, and Y. Wu, “An effective approach to
computing stackelberg game and double auction based task offlfloading controller placement in software defined wide area networks,” IEEE
for mobile blockchain,” IEEE Transactions on Vehicular Technology, Transactions on Network and Service Management, vol. 15, no. 1, pp.
pp. 1–1, 2020. 344–355, 2018.
[64] B. Yin, H. Yin, Y. Wu, and Z. Jiang, “Fdc: A secure federated deep [86] X. Cheng, Y. Wu, G. Min, and A. Y. Zomaya, “Network function
learning mechanism for data collaborations in the internet of things,” virtualization in dynamic networks: A stochastic perspective,” IEEE
IEEE Internet of Things Journal, vol. 7, no. 7, pp. 6348–6359, 2020. Journal on Selected Areas in Communications, vol. 36, no. 10, pp.
[65] Y. Cheng, J. Zhang, L. Yang, C. Zhu, and H. Zhu, “Distributed 2218–2232, 2018.
green offloading and power optimization in virtualized small cell [87] W. Miao, G. Min, Y. Wu, H. Huang, Z. Zhao, H. Wang, and C. Luo,
networks with mobile edge computing,” IEEE Transactions on Green “Stochastic performance analysis of network function virtualization in
Communications and Networking, vol. 4, no. 1, pp. 69–82, 2020. future internet,” IEEE Journal on Selected Areas in Communications,
[66] D. Liu, Z. Yan, W. Ding, and M. Atiquzzaman, “A survey on secure vol. 37, no. 3, pp. 613–626, 2019.
data analytics in edge computing,” IEEE Internet of Things Journal, [88] X. Cheng, Y. Wu, G. Min, A. Y. Zomaya, and X. Fang, “Safeguard
vol. 6, no. 3, pp. 4946–4967, 2019. network slicing in 5g: A learning augmented optimization approach,”
[67] B. Hamdaoui, M. Alkalbani, T. Znati, and A. Rayes, “Unleashing the IEEE Journal on Selected Areas in Communications, vol. 38, no. 7,
Power of Participatory IoT with Blockchains for Increased Safety and pp. 1600–1613, 2020.
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. X, AUGUST 20XX 16
[89] H. Wang, Y. Wu, G. Min, J. Xu, and P. Tang, “Data-driven dynamic [109] Z. Xiong, Y. Zhang, N. C. Luong, D. Niyato, P. Wang, and N. Guizani,
resource scheduling for network slicing: A deep reinforcement learning “The Best of Both Worlds: A General Architecture for Data Man-
approach,” Information Sciences, vol. 498, pp. 106 – 116, 2019. agement in Blockchain-enabled Internet-of-Things,” IEEE Network,
[Online]. Available: http://www.sciencedirect.com/science/article/pii/ vol. 34, no. 1, pp. 166–173, 2020.
S0020025519303986 [110] C. Xu, K. Wang, P. Li, S. Guo, J. Luo, B. Ye, and M. Guo, “Making big
[90] C. Wang, Y. Zhang, X. Chen, K. Liang, and Z. Wang, “Sdn-based data open in edges: A resource-efficient blockchain-based approach,”
handover authentication scheme for mobile edge computing in cyber- IEEE Transactions on Parallel and Distributed Systems, vol. 30, no. 4,
physical systems,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. pp. 870–882, 2019.
8692–8701, 2019. [111] Q. Xu, Z. Su, and Q. Yang, “Blockchain-based trustworthy edge
[91] J. Gao, K. O. O. Agyekum, E. B. Sifah, K. N. Acheampong, Q. Xia, caching scheme for mobile cyber-physical system,” IEEE Internet of
X. Du, M. Guizani, and H. Xia, “A Blockchain-SDN enabled Internet Things Journal, vol. 7, no. 2, pp. 1098–1110, 2020.
of Vehicles Environment for Fog Computing and 5G Networks,” IEEE [112] Y. Liu, F. R. Yu, X. Li, H. Ji, and V. C. M. Leung, “Decentralized
Internet of Things Journal, pp. 1–1, 2019. resource allocation for video transcoding and delivery in blockchain-
[92] G. A. F. Rebello, I. D. Alvarenga, I. J. Sanz, and O. C. M. B. Duarte, based system with mobile edge computing,” IEEE Transactions on
“BSec-NFVO: A Blockchain-Based Security for Network Function Vehicular Technology, vol. 68, no. 11, pp. 11 169–11 185, 2019.
Virtualization Orchestration,” in ICC 2019 - 2019 IEEE International [113] W. Liang, Y. Fan, K. Li, D. Zhang, and J. Gaudiot, “Secure data storage
Conference on Communications (ICC), May 2019, pp. 1–6. and recovery in industrial blockchain network environments,” IEEE
[93] M. F. Franco, E. J. Scheid, L. Z. Granville, and B. Stiller, “BRAIN: Transactions on Industrial Informatics, pp. 1–1, 2020.
blockchain-based reverse auction for infrastructure supply in virtual [114] J. Kang, Z. Xiong, D. Niyato, D. Ye, D. I. Kim, and J. Zhao,
network functions-as-a-service,” in 2019 IFIP Networking Conference “Toward Secure Blockchain-Enabled Internet of Vehicles: Optimizing
(IFIP Networking), 2019, pp. 1–9. Consensus Management Using Reputation and Contract Theory,” IEEE
[94] B. Nour, A. Ksentini, N. Herbaut, P. A. Frangoudis, and H. Moungla, Transactions on Vehicular Technology, vol. 68, no. 3, pp. 2906–2920,
“A Blockchain-Based Network Slice Broker for 5G Services,” IEEE 2019.
Networking Letters, vol. 1, no. 3, pp. 99–102, 2019. [115] Z. Chang, W. Guo, X. Guo, Z. Zhou, and T. Ristaniemi, “Incentive
[95] V. Ortega, F. Bouchmal, and J. F. Monserrat, “Trusted 5G Vehicular Mechanism for Edge Computing-based Blockchain,” IEEE Transac-
Networks: Blockchains and Content-Centric Networking,” IEEE Vehic- tions on Industrial Informatics, pp. 1–1, 2020.
ular Technology Magazine, vol. 13, no. 2, pp. 121–127, June 2018. [116] J. Kang, Z. Xiong, D. Niyato, P. Wang, D. Ye, and D. I. Kim, “Incen-
[96] J. Ge, S. Wang, Y. Wu, H. Tang, and Y. E, “Performance tivizing Consensus Propagation in Proof-of-Stake Based Consortium
improvement for source mobility in named data networking based on Blockchain Networks,” IEEE Wireless Communications Letters, vol. 8,
global–local fib updates,” Peer-to-Peer Networking and Applications, no. 1, pp. 157–160, 2019.
vol. 9, no. 4, pp. 670–680, Jul 2016. [Online]. Available: [117] Z. Li, Z. Yang, S. Xie, W. Chen, and K. Liu, “Credit-Based Payments
https://doi.org/10.1007/s12083-015-0353-z for Fast Computing Resource Trading in Edge-Assisted Internet of
[97] Y. Xu, C. Zhang, G. Wang, Z. Qin, and Q. Zeng, “A Blockchain- Things,” IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6606–
enabled Deduplicatable Data Auditing Mechanism for Network Storage 6617, 2019.
Services,” IEEE Transactions on Emerging Topics in Computing, pp. [118] H.-N. Dai, R. C.-W. Wong, H. Wang, Z. Zheng, and A. V. Vasilakos,
1–1, 2020. “Big data analytics for large-scale wireless networks: Challenges and
opportunities,” ACM Computing Surveys (CSUR), vol. 52, no. 5, pp.
[98] G. S. Aujla, M. Singh, A. Bose, N. Kumar, G. Han, and R. Buyya,
1–36, 2019.
“BlockSDN: Blockchain-as-a-Service for Software Defined Network-
[119] Y. Liu, H.-N. Dai, Q. Wang, M. K. Shukla, and M. Imran,
ing in Smart City Applications,” IEEE Network, vol. 34, no. 2, pp.
“Unmanned aerial vehicle for internet of everything: Opportunities
83–91, 2020.
and challenges,” Computer Communications, vol. 155, pp. 66 –
[99] B. Wu, K. Xu, Q. Li, S. Ren, Z. Liu, and Z. Zhang, “Toward
83, 2020. [Online]. Available: http://www.sciencedirect.com/science/
Blockchain-Powered Trusted Collaborative Services for Edge-Centric
article/pii/S0140366419318754
Networks,” IEEE Network, vol. 34, no. 2, pp. 30–36, 2020.
[120] M. Raza, N. Aslam, H. Le-Minh, S. Hussain, Y. Cao, and N. M. Khan,
[100] H. Ko, J. Lee, and S. Pack, “Spatial and Temporal Computation “A critical analysis of research potential, challenges, and future direc-
Offloading Decision Algorithm in Edge Cloud-Enabled Heterogeneous tives in industrial wireless sensor networks,” IEEE Communications
Networks,” IEEE Access, vol. 6, pp. 18 920–18 932, 2018. Surveys Tutorials, vol. 20, no. 1, pp. 39–95, 2018.
[101] T. Taleb, K. Samdanis, B. Mada, H. Flinck, S. Dutta, and D. Sabella, [121] R. Rondón, A. Mahmood, S. Grimaldi, and M. Gidlund, “Under-
“On multi-access edge computing: A survey of the emerging 5g standing the performance of bluetooth mesh: Reliability, delay, and
network edge cloud architecture and orchestration,” IEEE Communi- scalability analysis,” IEEE Internet of Things Journal, vol. 7, no. 3,
cations Surveys & Tutorials, vol. 19, no. 3, pp. 1657–1681, 2017. pp. 2089–2101, 2020.
[102] R. Yang, F. R. Yu, P. Si, Z. Yang, and Y. Zhang, “Integrated blockchain [122] J. Haxhibeqiri, I. Moerman, and J. Hoebeke, “Low Overhead Schedul-
and edge computing systems: A survey, some research issues and ing of LoRa Transmissions for Improved Scalability,” IEEE Internet of
challenges,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, Things Journal, vol. 6, no. 2, pp. 3097–3109, 2019.
pp. 1508–1532, 2019. [123] H. Xie, Z. Yan, Z. Yao, and M. Atiquzzaman, “Data collection for
[103] Z. Xiong, J. Kang, D. Niyato, P. Wang, and H. V. Poor, “Cloud/edge security measurement in wireless sensor networks: A survey,” IEEE
computing service management in blockchain networks: Multi-leader Internet of Things Journal, vol. 6, no. 2, pp. 2205–2224, 2019.
multi-follower game-based admm for pricing,” IEEE Transactions on [124] M. M. Rabbani, J. Vliegen, J. Winderickx, M. Conti, and N. Mentens,
Services Computing, vol. 13, no. 2, pp. 356–367, 2020. “SHeLA: Scalable Heterogeneous Layered Attestation,” IEEE Internet
[104] W. Chen, Z. Zhang, Z. Hong, C. Chen, J. Wu, S. Maharjan, Z. Zheng, of Things Journal, vol. 6, no. 6, pp. 10 240–10 250, 2019.
and Y. Zhang, “Cooperative and distributed computation offloading for [125] M. A. Togou, D. A. Chekired, L. Khoukhi, and G. Muntean, “A
blockchain-empowered industrial internet of things,” IEEE Internet of hierarchical distributed control plane for path computation scalability in
Things Journal, vol. 6, no. 5, pp. 8433–8446, 2019. large scale software-defined networks,” IEEE Transactions on Network
[105] Y. Jiao, P. Wang, D. Niyato, and K. Suankaewmanee, “Auction mecha- and Service Management, vol. 16, no. 3, pp. 1019–1031, 2019.
nisms in cloud/fog computing resource allocation for public blockchain [126] F. P. Lin and Z. Tsai, “Hierarchical Edge-Cloud SDN Controller System
networks,” IEEE Transactions on Parallel and Distributed Systems, With Optimal Adaptive Resource Allocation for Load-Balancing,”
vol. 30, no. 9, pp. 1975–1989, 2019. IEEE Systems Journal, vol. 14, no. 1, pp. 265–276, 2020.
[106] S. Xie, Z. Zheng, W. Chen, J. Wu, H.-N. Dai, and M. Imran, [127] D. A. Chekired, M. A. Togou, L. Khoukhi, and A. Ksentini, “5G-
“Blockchain for cloud exchange: A survey,” Computers & Electrical Slicing-Enabled Scalable SDN Core Network: Toward an Ultra-Low
Engineering, vol. 81, p. 106526, 2020. Latency of Autonomous Driving Service,” IEEE Journal on Selected
[107] Q. Xu, Z. Su, M. Dai, and S. Yu, “APIS: Privacy-Preserving Incentive Areas in Communications, vol. 37, no. 8, pp. 1769–1782, 2019.
for Sensing Task Allocation in Cloud and Edge-Cooperation Mobile [128] R. Wen, G. Feng, J. Tang, T. Q. S. Quek, G. Wang, W. Tan, and
Internet of Things with SDN,” IEEE Internet of Things Journal, pp. S. Qin, “On robustness of network slicing for next-generation mobile
1–1, 2019. networks,” IEEE Transactions on Communications, vol. 67, no. 1, pp.
[108] J. Huang, L. Kong, H. Dai, W. Ding, L. Cheng, G. Chen, X. Jin, 430–444, 2019.
and P. Zeng, “Blockchain based mobile crowd sensing in industrial [129] J. Pan, J. Wang, A. Hester, I. Alqerm, Y. Liu, and Y. Zhao, “EdgeChain:
systems,” IEEE Transactions on Industrial Informatics, pp. 1–1, 2020. An Edge-IoT Framework and Prototype Based on Blockchain and
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. X, AUGUST 20XX 17
Smart Contracts,” IEEE Internet of Things Journal, vol. 6, no. 3, pp. blockchain networks,” IEEE Internet of Things Journal, vol. 6, no. 3,
4719–4732, June 2019. pp. 4585–4600, 2018.
[130] Y. Liu, K. Wang, K. Qian, M. Du, and S. Guo, “Tornado: En- [152] H. Yao, T. Mai, J. Wang, Z. Ji, C. Jiang, and Y. Qian, “Resource trading
abling blockchain in heterogeneous internet of things through a space- in blockchain-based industrial internet of things,” IEEE Transactions
structured approach,” IEEE Internet of Things Journal, vol. 7, no. 2, on Industrial Informatics, vol. 15, no. 6, pp. 3602–3609, 2019.
pp. 1273–1286, 2020. [153] Z. Xiong, Y. Zhang, D. Niyato, P. Wang, and Z. Han, “When mobile
[131] S. Biswas, K. Sharif, F. Li, B. Nour, and Y. Wang, “A Scalable blockchain meets edge computing,” IEEE Communications Magazine,
Blockchain Framework for Secure Transactions in IoT,” IEEE Internet vol. 56, no. 8, pp. 33–39, 2018.
of Things Journal, vol. 6, no. 3, pp. 4650–4659, 2019. [154] L. Wu, L. Li, X. Li, Y. Yu, L. Zhang, M. Pan, and Z. Han, “Resource
[132] K. Croman, C. Decker, I. Eyal, A. E. Gencer, A. Juels, A. Kosba, allocation in blockchain system based on mobile edge computing
A. Miller, P. Saxena, E. Shi, E. G. Sirer et al., “On scaling decentralized networks,” in 2019 11th International Conference on Wireless Com-
blockchains,” in International conference on financial cryptography munications and Signal Processing (WCSP). IEEE, 2019, pp. 1–6.
and data security. Springer, 2016, pp. 106–125. [155] C. Luo, S. Guo, S. Guo, L. T. Yang, G. Min, and X. Xie, “Green
[133] T. T. A. Dinh, R. Liu, M. Zhang, G. Chen, B. C. Ooi, and J. Wang, “Un- communication in energy renewable wireless mesh networks: Routing,
tangling blockchain: A data processing view of blockchain systems,” rate control, and power allocation,” IEEE Trans. Paral. and Distr. Syst.,
IEEE Transactions on Knowledge and Data Engineering, vol. 30, no. 7, vol. 25, no. 12, pp. 3211–3220, Dec. 2014.
pp. 1366–1385, 2018. [156] C. Luo, G. Min, F. R. Yu, Y. Zhang, L. T. Yang, and V. C. M. Leung,
[134] S. Popov, “The tangle, IOTA whitepaper,” IOTA, Tech. Rep.[Online]. “Joint relay scheduling, channel access, and power allocation for green
Available: https://iota. org/IOTA Whitepaper.pdf, Tech. Rep., 2018. cognitive radio communications,” IEEE J. Sel. Areas in Comm., vol. 33,
[135] A. Cullen, P. Ferraro, C. King, and R. Shorten, “On the resilience no. 5, pp. 922–932, May 2015.
of dag-based distributed ledgers in iot applications,” IEEE Internet of [157] G. Xu, W. Wang, L. Jiao, X. Li, K. Liang, X. Zheng, W. Lian, H. Xian,
Things Journal, 2020. and H. Gao, “SoProtector: Safeguard Privacy for Native SO Files in
[136] Á. Garcı́a-Pérez and M. A. Schett, “Deconstructing stellar consensus,” Evolving Mobile IoT Applications,” IEEE Internet of Things Journal,
in 23rd International Conference on Principles of Distributed Systems vol. 7, no. 4, pp. 2539–2552, 2020.
(OPODIS 2019), 2020. [158] Z. Zheng, S. Xie, H.-N. Dai, W. Chen, X. Chen, J. Weng, and M. Imran,
[137] F. Armknecht, G. O. Karame, A. Mandal, F. Youssef, and E. Zenner, “An overview on smart contracts: Challenges, advances and platforms,”
“Ripple: Overview and outlook,” in International Conference on Trust Future Generation Computer Systems, vol. 105, pp. 475–491, 2020.
and Trustworthy Computing. Springer, 2015, pp. 163–180. [159] S. He, W. Ren, T. Zhu, and K. R. Choo, “BoSMoS: A Blockchain-
[138] M. J. Amiri, D. Agrawal, and A. E. Abbadi, “Caper: a cross-application Based Status Monitoring System for Defending Against Unauthorized
permissioned blockchain,” Proceedings of the VLDB Endowment, Software Updating in Industrial Internet of Things,” IEEE Internet of
vol. 12, no. 11, pp. 1385–1398, 2019. Things Journal, vol. 7, no. 2, pp. 948–959, Feb. 2020.
[139] M. Herlihy, “Atomic cross-chain swaps,” in Proceedings of the 2018 [160] T. Chen, X. Li, Y. Wang, J. Chen, Z. Li, X. Luo, M. H. Au,
ACM symposium on principles of distributed computing (PODC 2018), and X. Zhang, “An adaptive gas cost mechanism for ethereum to
2018, pp. 245–254. defend against under-priced dos attacks,” in International Conference
[140] A. Back, M. Corallo, L. Dashjr, M. Friedenbach, G. Maxwell, on Information Security Practice and Experience. Springer, 2017, pp.
A. Miller, A. Poelstra, J. Timón, and P. Wuille, “Enabling 3–24.
blockchain innovations with pegged sidechains,” URL: http:// www. [161] Z. Huang, J. Huang, and T. Zang, “Leopard: Understanding the Threat
opensciencereview. com/ papers/ 123/ enablingblockchain-innovations- of Blockchain Domain Name Based Malware,” in Passive and Active
with-pegged-sidechains, vol. 72, 2014. Measurement, A. Sperotto, A. Dainotti, and B. Stiller, Eds. Cham:
[141] G. Wood, “Polkadot: Vision for a heterogeneous multi-chain Springer International Publishing, 2020, pp. 55–70.
framework,” [Online]. Available: https://www.win.tue.nl/∼mholende/ [162] T. Chen et al., “SODA: A Generic Online Detection Framework for
seminar/references/ethereum polkadot.pdf, Tech. Rep., 2016. Smart Contracts,” in The Network and Distributed System Security
[142] S. Li, H. Xiao, H. Wang, T. Wang, J. Qiao, and S. Liu, “Blockchain Symposium (NDSS), 2020, pp. 1–17.
dividing based on node community clustering in intelligent manufac- [163] M. Chen, Y. Cao, R. Wang, Y. Li, D. Wu, and Z. Liu, “Deepfocus:
turing cps,” in 2019 IEEE International Conference on Blockchain Deep encoding brainwaves and emotions with multi-scenario behavior
(Blockchain 2019). IEEE, 2019, pp. 124–131. analytics for human attention enhancement,” IEEE Network, vol. 33,
[143] J. Hellings and M. Sadoghi, “Coordination-free byzantine replication no. 6, pp. 70–77, 2019.
with minimal communication costs,” in 23rd International Conference [164] X. Wang, L. T. Yang, Y. Wang, L. Ren, and M. J. Deen, “Adtt: A
on Database Theory (ICDT 2020), 2020. highly-efficient distributed tensor-train decomposition method for iiot
[144] H. Dang, T. T. A. Dinh, D. Loghin, E.-C. Chang, Q. Lin, and B. C. Ooi, big data,” IEEE Transactions on Industrial Informatics, pp. 1–1, DOI:
“Towards scaling blockchain systems via sharding,” in Proceedings of 10.1109/TII.2020.2967768, 2020.
the 2019 International Conference on Management of Data, 2019, pp. [165] R. Wang, M. Chen, N. Guizani, Y. Li, H. Gharavi, and K. Hwang,
123–140. “Deepnetqoe: Self-adaptive qoe optimization framework of deep net-
[145] A. Sharma, F. M. Schuhknecht, D. Agrawal, and J. Dittrich, “Blurring works,” IEEE Network, 2020.
the lines between blockchains and database systems: the case of hy- [166] J. Kang, Z. Xiong, D. Niyato, S. Xie, and J. Zhang, “Incentive Mecha-
perledger fabric,” in Proceedings of the 2019 International Conference nism for Reliable Federated Learning: A Joint Optimization Approach
on Management of Data, 2019, pp. 105–122. to Combining Reputation and Contract Theory,” IEEE Internet of
[146] L. Lao, Z. Li, S. Hou, B. Xiao, S. Guo, and Y. Yang, “A survey of iot Things Journal, vol. 6, no. 6, pp. 10 700–10 714, 2019.
applications in blockchain systems: Architecture, consensus, and traffic [167] Z. Zhou, X. Chen, E. Li, L. Zeng, K. Luo, and J. Zhang, “Edge
modeling,” ACM Computing Surveys (CSUR), vol. 53, no. 1, pp. 1–32, Intelligence: Paving the Last Mile of Artificial Intelligence With Edge
2020. Computing,” Proceedings of the IEEE, vol. 107, no. 8, pp. 1738–1762,
[147] F. M. Benčić and I. P. Žarko, “Distributed ledger technology: 2019.
Blockchain compared to directed acyclic graph,” in 2018 IEEE 38th [168] K. Zhang, Y. Zhu, S. Maharjan, and Y. Zhang, “Edge Intelligence
International Conference on Distributed Computing Systems (ICDCS). and Blockchain Empowered 5G Beyond for the Industrial Internet of
IEEE, 2018, pp. 1569–1570. Things,” IEEE Network, vol. 33, no. 5, pp. 12–19, 2019.
[148] M. Castro, B. Liskov et al., “Practical byzantine fault tolerance,” in [169] Z. Yan, J. Ge, Y. Wu, L. Li, and T. Li, “Automatic virtual network em-
OSDI, vol. 99, no. 1999, 1999, pp. 173–186. bedding: A deep reinforcement learning approach with graph convolu-
[149] Y. Sun, L. Zhang, G. Feng, B. Yang, B. Cao, and M. A. Imran, tional networks,” IEEE Journal on Selected Areas in Communications,
“Blockchain-enabled wireless internet of things: Performance analysis vol. 38, no. 6, pp. 1040–1057, 2020.
and optimal communication node deployment,” IEEE Internet of Things [170] J. Luo, Q. Chen, F. R. Yu, and L. Tang, “Blockchain-enabled software-
Journal, vol. 6, no. 3, pp. 5791–5802, 2019. defined industrial internet of things with deep reinforcement learning,”
[150] Y. Liu, K. Wang, K. Qian, M. Du, and S. Guo, “Tornado: En- IEEE Internet of Things Journal, pp. 1–1, 2020.
abling blockchain in heterogeneous internet of things through a space- [171] Z. Xiong, Y. Zhang, D. Niyato, R. Deng, P. Wang, and L. Wang, “Deep
structured approach,” IEEE Internet of Things Journal, 2019. Reinforcement Learning for Mobile 5G and Beyond: Fundamentals,
[151] Z. Xiong, S. Feng, W. Wang, D. Niyato, P. Wang, and Applications, and Challenges,” IEEE Vehicular Technology Magazine,
Z. Han, “Cloud/fog computing resource management and pricing for vol. 14, no. 2, pp. 44–52, 2019.
JOURNAL OF LATEX CLASS FILES, VOL. XX, NO. X, AUGUST 20XX 18
[172] Y. Chen, Y. Zhang, S. Maharjan, M. Alam, and T. Wu, “Deep Learning Hao Wang [Member, IEEE] is an Associate Pro-
for Secure Mobile Edge Computing in Cyber-Physical Transportation fessor in the Department of Computer Science in
Systems,” IEEE Network, vol. 33, no. 4, pp. 36–41, 2019. Norwegian University of Science and Technology,
[173] Y. Chen, Z. Ma, Q. Wang, J. Huang, X. Tian, and Q. Zhang, “Privacy- Norway. He has a Ph.D. degree (2006) and a
preserving spectrum auction design: Challenges, solutions, and research B.Eng. degree (2000), both in computer science
directions,” IEEE Wireless Communications, vol. 26, no. 5, pp. 142– and engineering, from South China University of
150, 2019. Technology, China. His research interests include
[174] P. C. Mahawaga Arachchige, P. Bertok, I. Khalil, D. Liu, S. Camtepe, big data analytics, industrial internet of things, high
and M. Atiquzzaman, “A trustworthy privacy preserving framework performance computing, and safety-critical systems.
for machine learning in industrial iot systems,” IEEE Transactions on He served as a TPC co-chair for IEEE DataCom
Industrial Informatics, pp. 1–1, 2020. 2015, IEEE CIT 2017, ES 2017, and IEEE CPSCom
[175] J. Feng, L. T. Yang, R. Zhang, and B. S. Gavuna, “Privacy Preserving 2020, and a senior TPC member for CIKM 2019. He is the Chair for Sub-TC
Tucker Train Decomposition over Blockchain-Based Encrypted Indus- on Healthcare of IEEE Industrial Electronics Society Technical Committee on
trial IoT Data,” IEEE Transactions on Industrial Informatics, pp. 1–1, Industrial Informatics.
2020.
[176] Y. Zhan, P. Li, Z. Qu, D. Zeng, and S. Guo, “A Learning-based
Incentive Mechanism for Federated Learning,” IEEE Internet of Things
Journal, pp. 1–1, 2020.
[177] J. Kang, Z. Xiong, D. Niyato, Y. Zou, Y. Zhang, and M. Guizani,
“Reliable federated learning for mobile networks,” IEEE Wireless
Communications, vol. 27, no. 2, pp. 72–80, 2020.
[178] M. Chen and Y. Hao, “Label-less learning for emotion cognition,” IEEE
Transactions on Neural Networks and Learning Systems, pp. 1–11,
2019.
[179] O. Alkadi, N. Moustafa, B. Turnbull, and K. R. Choo, “A Deep
Blockchain Framework-enabled Collaborative Intrusion Detection for
Protecting IoT and Cloud Networks,” IEEE Internet of Things Journal,
pp. 1–1, 2020.
[180] X. Liu, H. Li, G. Xu, S. Liu, Z. Liu, and R. Lu, “PADL: Privacy-aware
and Asynchronous Deep Learning for IoT Applications,” IEEE Internet
of Things Journal, pp. 1–1, 2020.
[181] F. Estrada-Solano, O. M. Caicedo, and N. L. S. Da Fonseca, “NELLY:
Flow Detection Using Incremental Learning at the Server Side of SDN-
Based Data Centers,” IEEE Transactions on Industrial Informatics,
vol. 16, no. 2, pp. 1362–1372, 2020.