0% found this document useful (0 votes)
16 views

FILE CHUẨN Multi-Layer Blockchain-Based Security Architecture for Internet of Things

Uploaded by

Duc Mai
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

FILE CHUẨN Multi-Layer Blockchain-Based Security Architecture for Internet of Things

Uploaded by

Duc Mai
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

sensors

Article
Multi-Layer Blockchain-Based Security Architecture for
Internet of Things
Houshyar Honar Pajooh 1, * , Mohammad Rashid 1 , Fakhrul Alam 1 and Serge Demidenko 2

1 Department of Mechanical and Electrical Engineering, Massey University, Auckland 0632, New Zealand;
[email protected] (M.R.); [email protected] (F.A.)
2 School of Science and Technology, Sunway University, Selangor 47500, Malaysia;
[email protected]
* Correspondence: [email protected]

Abstract: The proliferation of smart devices in the Internet of Things (IoT) networks creates signifi-
cant security challenges for the communications between such devices. Blockchain is a decentralized
and distributed technology that can potentially tackle the security problems within the 5G-enabled
IoT networks. This paper proposes a Multi layer Blockchain Security model to protect IoT networks
while simplifying the implementation. The concept of clustering is utilized in order to facilitate the
multi-layer architecture. The K-unknown clusters are defined within the IoT network by applying
techniques that utillize a hybrid Evolutionary Computation Algorithm while using Simulated An-
nealing and Genetic Algorithms. The chosen cluster heads are responsible for local authentication
and authorization. Local private blockchain implementation facilitates communications between
the cluster heads and relevant base stations. Such a blockchain enhances credibility assurance and
security while also providing a network authentication mechanism. The open-source Hyperledger
Fabric Blockchain platform is deployed for the proposed model development. Base stations adopt
a global blockchain approach to communicate with each other securely. The simulation results
 demonstrate that the proposed clustering algorithm performs well when compared to the earlier

reported approaches. The proposed lightweight blockchain model is also shown to be better suited
Citation: Honar Pajooh, H.; Rashid, to balance network latency and throughput as compared to a traditional global blockchain.
M.; Alam, F.; Demidenko, S.
Multi-Layer Blockchain-Based Keywords: internet of things; blockchain; hyperledger fabric; evolutionary clustering; security;
Security Architecture for Internet of
scalability; authorization
Things. Sensors 2021, 21, 772.
https://
doi.org/10.3390/s21030772

1. Introduction
Received: 31 October 2020
Accepted: 20 January 2021 Ubiquitous interconnected objects can be deployed through the Internet of Things
Published: 24 January 2021 (IoT) infrastructure using cloud platforms in a centralized network [1]. A wide variety
of interconnected devices, including smart locks [2] and vehicles [3], can also implement
Publisher’s Note: MDPI stays neu- decentralized solutions by employing the blockchain technology in a decentralized peer-to-
tral with regard to jurisdictional clai- peer manner [4]. Both of the models are capable of dealing with the challenges of providing
ms in published maps and institutio- privacy and security for networked devices in the IoT environment. Nevertheless, the
nal affiliations. constraints of limited resources, centralized control, scalability, overhead, latency, and
throughput characterize the expected heterogeneity of IoT network devices [5].
In a centralized network structure, the server controls and enhances the performance
Copyright: © 2021 by the authors. Li-
of the devices [6]. However, centralized schemes have several drawbacks. The network
censee MDPI, Basel, Switzerland.
with a large number of smart devices normally generates a tremendous volume of data.
This article is an open access article
A cloud platform service-provider requires considerable network bandwidth as well as
distributed under the terms and con- high-performance with regards to efficiency and storage [7,8]. Furthermore, there is always
ditions of the Creative Commons At- a risk of the centralized network key components failure leading to a serious (or complete)
tribution (CC BY) license (https:// breakdown of the entire system [9,10]. The data that are collected by the central cloud
creativecommons.org/licenses/by/ storage often require further manipulation by a third-party. This potentially could lead
4.0/). to data leaks, thus compromising the end-user’s privacy [11]. The external computing

Sensors 2021, 21, 772. https://doi.org/10.3390/s21030772 https://www.mdpi.com/journal/sensors


Sensors 2021, 21, 772 2 of 26

resources coordination is another challenge for proving IoT security and performance in
the centralized systems [9]. Therefore, most current centralized systems fail to provide
entities with a guarantee of data reliability and privacy.
Most IoT devices are only able to communicate in short-range transmissions, due
to their low-power wireless transmitters and receivers. IoT networks can benefit from
utilizing the Multihop Cellular Network (MCN) concept [12] that facilitates significant
shortening in signal coverage. The essence of MCN leveraged by distributed, decentral-
ized blockchain technology can ensure the required high-security and credibility for the
IoT network by addressing the drawbacks of the centralization servers [13]. Besides, it
enhances the degree of trust between heterogeneous devices, and that can minimize the
cost of conventional data-sharing platforms [14]. The formation of a large-scale network
comprising of heterogeneous nodes is not as easy as traditional blockchain implementation
needs high-performance nodes. A self-protection mechanism is also required, due to the
distributed structure of IoT networks with a multitude of objects and devices [15].
The increased number of connected devices (in the order of million devices per sq
km), heterogeneity of devices and vendors, interoperability, a vast amount of collected data
and network traffic, requirements of large bandwidth capacity, communication latency,
and trust are the major challenges within the new era of the 5G-enabled IoT. [16]. The new
model of security should address the unique requirements of the 5G-enabled IoT and D2D
(Device-to-Device) communication devices such as scalability, low latency, energy concerns,
secure communication, and reliability. Blockchain technology, including bitcoin [17,18],
have been implemented for security enhancement for a long time. Their technical value
has been generally recognized. At the same time, their functionality support is still limited
to simple transactional data storage. Furthermore, the blockchain is a viable option for
supporting ultra-reliable low latency massive Machine Type Communication (mMTC) of
resource-constrained IoT devices under the 5G networks for improved security and privacy.
This paper discusses a multilayer architecture that is based on a new clustering model
suited for blockchain implementation to tackle the issues associated with implementation
complexity and elaborate on the mechanism for securing IoT communication. The new
network model that is based on multi-layer distributed blockchain can be regarded as an
organic combination of the blockchain technology and clustering techniques that effec-
tively utilize network clustering performance and capabilities, and significantly improve
the overall security and reliability of the IoT. An adapted clustering algorithm has been
developed to suit the IoT systems’ blockchain implementation by considering the network
performance metrics in defined cost functions. The IoT network clustering aims to reduce
the network load, enhance coverage, and minimize the energy (as reflected in the distance)
while leveraging the essence of MCNs. The multi-layer structure facilitates the detection
of compromised entities within the entire network in each layer. Each transaction in the
system needs to be verified by other participants by implementing a consensus algorithm.
Blockchain is continuously monitored by the entire network participants, maintaining a
copy of the blockchain ledger. Therefore, compromised nodes have no means of inserting
fraudulent blocks into the public ledger without immediately being noticed by others.
Thus, the multi-layer blockchain removes compromised entities from being a part of the
system. This makes it impossible to compromise the integrity of records in the blockchain.
Another crucial point is that the new multi-layer architecture allows for upgrading for
the existing central cloud server. This makes large-scale deployments possible. Besides, a
lightweight authorization and authentication process running in each cluster guarantees
secure access to the network resources through implementing smart contracts.
The rest of the paper is organized, as follows. In Section 2, a literature review on
the blockchain implementation in the IoT environment is introduced along with essential
information on the blockchain and IoT security. Section 3 details the framework architecture
and multi-layer system. Section 4 provides the proposed IoT blockchain framework
implementation and associated results. The proposed clustering algorithm is based on
the Genetic Algorithm (GA) and Simulated Annealing (SA) [19]. Section 5 illustrates the
Sensors 2021, 21, 772 3 of 26

challenges addressed by implementing the proposed system model. Finally, Section 6


draws a conclusion and presents future research directions.

2. Related Works
Fast-growing numbers of networked devices characterize modern IoT systems. Con-
sequently, the amount of generated data by the connected devices is also escalating. This
inevitably leads to security and privacy concerns. Security (along with computing and
communication issues associated with IoT devices) is mainly due to the limited memory
capacity and processing power of the devices [10].

2.1. Authentication and Authorization in IoT


Devices require authentication and authorization to enter the IoT system. These mea-
sures are considered as a critical juncture of network security [20]. Interconnected devices
within the IoT environment are required for establishing secure communication with the
aid of relevant authentication procedures. The authentication and authorization processes
of the interconnected nodes and devices are traditionally maintained by a central authority
in the IoT network based on the Public Key Infrastructure (PKI) [21]. Therefore, the process
increases the authority center’s workload significantly and it causes considerable delay due
to a large number of requests [22]. To this end, several new authentication models have
been proposed. The method that was proposed in [23] for the authentication and privacy
is built up upon IP-Sec and Transport Layer Security (TLS). However, such a mechanism is
not suitable for resource-constrained interconnected IoT devices due to the high demand
for computational resources.
Research [24] develops an access management mechanism that is based on blockchain
decentralized architecture in the IoT system. The proposed approach eliminates the central-
ized control server and implements the Proof of Concept (PoC) as a consensus algorithm.
The development of a secure access control mechanism for IoT is presented in [25] in
order to address the issues related to the distribution of access rights delegation. This
approach uses the blockchain Ethereum technology to validate the identity of the entity.
Research [26] proposes a framework with layers, intersect, and self-organization Blockchain
Structures (BCS) to verify IoT entities. Model efficiency and security performance are ana-
lyzed in terms of storage efficiency, response time, and verification. Paper [27] highlights
the concerns that are related to privacy and security of data authentication in IoT. The
blockchain technology has been seen as a potential fabric for eliminating the central server
concept, and distributed futures helps to address IoT challenges, such as device spoofing,
false authentication, and lower reliability in data sharing. The authors in [28] propose
a structure for security and authentication in IoT that is based on the blockchain. This
proposal addresses the single-point-failure issue.

2.2. Blockchain-Based Frameworks for IoT Security and Privacy


Researchers have been developing blockchain technology to address the privacy and
security challenges in the IoT as an alternative solution. The implementation of several
privacy preservation strategies in blockchain-based IoT systems is discussed in [29]. These
strategies include encryption, anonymization, private contract, mixing, and differential
privacy. The authors of the research [30] review the blockchain technology and applications
for IoT systems as well as a way the blockchain techniques can address the security
challenges within the IoT systems. The lack of a comprehensive standard architecture,
cloud server availability, capacity, susceptibility to manipulation, and cost limitations are
highlighted as the critical challenges with the blockchain technology implementation in
IoT [7,8].
Lightweight Scalable Blockchain (LSB) is presented in [31] in order to facilitate the
privacy and security of the IoT devices. An overlay network is proposed to achieve
decentralization and maintain end-to-end security and privacy with the blockchain-based
framework implementation run by devices with robust computation capabilities. A new
Sensors 2021, 21, 772 4 of 26

Proof of Block and Trade (PoBT) consensus algorithm is proposed in [32] in order to
address the challenges associated with integrating salable IoT networks and blockchain
technology. The research aim is to reduce the computation time for the validation of trades
and blocks. The work is also considered a ledger distribution mechanism to reduce the
memory requirements of IoT devices. The study that is presented in [5] suggests using LSB
to build the blockchain-based model on the modified consensus algorithm to minimize the
Proof of Work (PoW) deployment complexity. Hence, the author replaced the PoW with a
distributed trusted consensus algorithm. The proposal enhances the privacy and security of
IoT networks in a decentralized manner. The research in [33] proposes a blockchain-based
framework to address privacy, security, fault-tolerance, and autonomous behavior issues.
The framework helps to assess the possible blockchain implementation through a decision
structure for IoT and edge computing.
Data operations are performed in the blockchain system through smart contract
implementation, including data gathering, invoking, transfer, storage. A new context-
aware mechanism is proposed in [34] for blockchain-enabled IoT systems to facilitate the
on-chain data allocation. The authors define a fuzzy logic mechanism to control the data
and calculate the Rating of Allocation (RoA) value that is associated with each data request.
The efficiency of the proposed mechanism is investigated in the blockchain-based cloud
and fog architectures implementations.

2.3. Permissioned Blockchain in IoT


Hyperledger Fabric (HLF) [35], which is a distributed ledger technology, paves the way
to leverage a trustful environment without central authority dependency while delivering a
high degree of flexibility, scalability, and confidentiality. The consensus algorithm is an open
architecture in HLF. It provides a flexible environment for modifying the configuration
and increase the performance. A new authorization framework for an IoT network is
proposed in [36] based on the HLF framework. The work focuses on enhancing the
consensus algorithm by implementing the GA optimization. The aim is to attain the
best configuration with input transactions and success rates as input parameters to the
GA algorithm. The IoT data management and its traditional characteristics have been
considered in [37]. The research proposes a permissioned blockchain-based decentralized
trust management (BlockBDM) in order to address the security and trust problems of IoT
big data management.

2.4. Layer-Based IoT Blockchain


A platform for facilitating secure communications for smart cities is proposed in [38].
The presented solution deploys a layer-wise security structure by integrating smart devices
and blockchain technology. Paper [39] has proposed a multi-layer IoT blockchain-based
solution that is specifically modelled for use in the medical field. The solution addresses
computation and complexity issues of the blockchain implementation by converting IoT
networks into decentralized multi-layer structures. The research presented in [40] proposes
a hybrid network architecture for the smart city by leveraging the strength of emerging
Software Defined Networking (SDN) and blockchain technologies. In order to achieve
higher efficiency, the proposed architecture is divided into two parts: the core network and
edge network. This model inherits the strength of both the centralized and distributed
network architectures. In [41], the authors proposed a multi-level blockchain framework to
enhance privacy and data security in IoT applications. The multi-level model focuses on
improving the response time and resource utilization. The authors define mobile agents
to perform the hash function, implement encryption, deploy aggregation, and decryption.
The mobile agents are transferred between blockchain and IoT in order to accomplish
the required tasks. A two-tier hierarchical blockchain framework for IoT is proposed
in [42] for enhancing and measuring the scalability of a blockchain application in a IoT car
rental system.
Sensors 2021, 21, 772 5 of 26

Some of the previous works discuss the multi-layer based blockchain approach for the
integration of IoT and blockchain technology. The multi-layer based blockchain network
model is introduced in [43] in order to overcome the challenges of conventional centralized
network architecture. The proposed model reduces the difficulty of the blockchain deploy-
ment in IoT systems by dividing the network into a multi-level decentralized network.
Hybrid IoT [44] is a new hybrid blockchain platform for IoT. It is based on the implemen-
tation of PoW and Byzantine Fault Tolerance (BFT) consensus algorithms. The proposed
structure includes sub-blockchains and inter-blockchains. The BFT inter-connector plat-
form connects two PoW sub-blockchains. An integrated blockchain-IoT is proposed in [45]
in order to secure the digital system for healthcare. The work addresses the scalability
challenges in the IoT system.
In [46], the authors proposes a double-chain (alliance and private chain) model that
considers the IoT environment for the data-sharing-transaction application. In the multi-
layer model, the alliance chain processes the transactions. The transaction data record
in the blockchain ledger is performed by the private chain that is deployed within each
organization. The real blockchain system data is stored in an IPFS cluster server built
by the alliance stores. Paper [47] proposes a hierarchical resource allocation framework
based on the blockchain for edge computing. The presented model implements a smart
contract-based hierarchical auction mechanism for solving resource allocation challenges
for the IoT devices that are located beyond the coverage of Access Points. A blockchain-
based multi-layer hierarchical architecture proposed in [48] facilitates the monitoring and
managing of the Internet of Underwater Things (IoUT) on cloud data. Sensor nodes are
clustered and organized based on selected residual energy cluster heads. The cluster head
and node tracking are performed by using the Bloom filter. The gateways communicate
by deploying a standard secret key, separated from another secret key that is used by the
cluster head. Subsequently, the blockchain ledger stores the routed data. A fog layer smart
gateway merged into the IoUT blockchain addresses the transaction preparation challenges,
data routing to miners problems, and scalability issues [49]. The proposed model deploys
a lightweight consensus mechanism to add blocks in the blockchain where the IoUT data
are stored.
Unfortunately, the majority of the solutions proposed in the literature do not address
the problems that are associated with the implementation of the blockchain technology
in IoT systems, such as device authentication, low scalability, transaction delays, high
computational resources for mining, and device heterogeneity. In our previous work [50],
some of the challenges that are mentioned above are highlighted along with the discussion
on the adoption of the blockchain technology in the IoT context. This article expands the
implementation of the Lightweight Hyperledger Blockchain (LHB) technology and smart
contracts to enhance the performance of the blockchain-IoT combination.
The heterogeneous IoT network lifetime improvement is achievable by implementing
a clustering model along with a multi-layer structure. The clustering concept is the key
to achieving the multi-layer architecture, where the cluster heads form the multi-layer
structure. Clustering techniques for wireless networks and device-to-device (D2D) com-
munications systems have been widely reported in the literature. They offer reduced
energy consumption and higher throughput [51]. A self-clustering method is proposed in
this work in order to identify Cluster Head (CH) nodes. Genetic algorithms considering
various clustering factors, including geospatial ones (e.g., the distance between nodes, the
base-station distance to nodes) and total network energy, are proposed. A fitness function
simulating network changes and node movements within the network is optimized by
deploying the SA methodology.
In the multi-layer architecture, devices in each layer have different computational
capabilities and energy storage capacity. Consequently, different security strategies are
proposed for individual layers. Each design is based on the blockchain. Even so, the
blockchain implementation is modified to suit the devices of each particular layer. The key
contribution of this research is three-fold:
Sensors 2021, 21, 772 6 of 26

1. A novel, lightweight, private multi-layer model is proposed for reducing the complex-
ity of blockchain technology implementation while improving the network scalability.
The proposed model is tailored to meet the requirements of IoT devices by adopting
the blockchain technology to suit different layers of the IoT system. The simula-
tion study shows that the proposed Hyperledger Fabric-based method outperforms a
traditional blockchain solution, like the Ethereum, in terms of latency and throughput.
2. Clustering is one of the key steps of implementing the multi-layer architecture. There-
fore, a new network clustering method is presented. It is based on the evolutionary
computation that deploys multi-objective fitness functions that are relevant to hetero-
geneous IoT networks. The decentralized, fast, and self-clustering method divides
the IoT network into clusters while considering the node mobility. The simulation
results show that the proposed clustering algorithm outperforms existing solutions.
3. A novel method of authentication and authorization of IoT nodes is implemented in
order to provide security for IoT devices and protect device communications through
a multi-layer structure.

3. Multi-Layer Security Framework


The aim of the proposed network model is to provide a reliable trustful security mech-
anism for IoT networks while using the performance and capabilities of the cellular system.
The intelligent clustering and machine learning approach based on Swarm Intelligence
(SI) and Evolutionary Computation (EC) algorithms [19] is deployed in order to encode
the multi-layer structure. This proposal provides a framework to facilitate the lightweight
authentication and authorization of IoT networked devices (objects and nodes) based on
the blockchain technology.
The proposed multi-layer network model divides the entire cellular-enabled IoT
network into multiple tiers. Layer-1 consists of various clusters and IoT nodes. Layer-
2 includes sink nodes and controlling devices, such as cluster heads. Layer-3 contains
the base stations of a cellular network. All of the CHs, as cellular devices, have cellular
connectivity with the 5G BSs, and, thus, via the BSs/D2D capability, also with other CHs.
The BSs have the processing power (with appropriate servers and CPUs) to implement the
decentralized blockchain mechanism at Layer-3. Figure 1 shows the overall system model.
Blockchain implementation can potentially lead to additional overhead and scalability
issues [5]. The multi-layer network model, as shown in Figure 2, is proposed for minimizing
the overhead, reduce delays, and response time, create associated channels to collect
specific data, secure communication, and address the need for the network scalability. The
first layer contains devices and nodes with a diverse range of computational capabilities
and power resources. Locally registered devices use authentication and authorization
services through a local authorization program that is run by the cluster heads in the IoT
network. The second layer includes CH nodes, authority nodes, edge-computing nodes,
and gateways. CH nodes can securely communicate in the blockchain environment that
deploys a lightweight consensus. The local permissioned HLF blockchain is implemented
in this layer. The last layer consists of BSs in cellular networks. This higher layer, which
consists of resources with high computational power, can be arranged as a set of separate
structures under the HLF blockchain [52]. Robust asymmetric cryptography mechanism
deployment can be achieved in this layer. The security and privacy are guaranteed with
the implementation of the Global Blockchain and sophisticated security approaches to the
high-level layer (Layer 3).
Sensors 2021, 21, 772 7 of 26

Figure 1. Multi-Layer model for Internet of Things (IoT) network.

Figure 2. The network model based on a multi-layer structure that implements a local authorization
service in the infrastructure level, a local blockchain, and public chain in the remaining two layers.
Sensors 2021, 21, 772 8 of 26

3.1. LAYER-1
This level includes IoT objects, nodes, and devices, as well as network elements for
communications, network procedures, and protocols. Unsupervised hybrid clustering
algorithms, as described in Section 4, convert the entire IoT network into multiple clusters
and to form the layers. Each cluster is associated with a powerful device chosen as CH. IoT
devices and nodes are geographically distributed non-uniformly. The devices are authen-
ticated and authorized to the network through a local authorization and authentication
services to guarantee the privacy and security inside each cluster.
The intra-cluster security and privacy are facilitated by local CH nodes acting as edge
processing nodes, as shown in Figure 2. Such an approach can enhance the implementation
efficiency while also addressing the issues that are associated with globally centralized
cloud computing.
A lightweight session key is assigned to devices when they authenticate to associated
CH nodes and establish communications. The session key period validation is carried
out by the cluster heads in order to perform the authorization and authentication. The
registration services and authentication management, as well as authorization, are also
locally performed by the CH nodes to improve scalability and address device heterogeneity.
CH nodes maintain the addition of new devices to the network through a local registration
process. The cryptographic key distribution or session keys allow the node authentications.
Less power-hungry cryptography is provided by edge computing. Alternatively, CH
nodes for IoT devices with limited resources could provide long-term cached session keys
(cryptographic keys).
Lightweight session keys are assigned by CH nodes in order to maintain the authoriza-
tion of registered nodes as an authorization entity and authenticate them to the network.
Symmetric keys and lightweight cryptography are proposed to tackle the scalability chal-
lenges and the limitation of IoT devices with constrained resources. CH nodes perform the
following four tasks:
• a new node registration to the network as a new entity;
• session key (cryptographic key) distribution and assignment;
• communications management and initiation; and,
• secure communications management and establishment.
Symmetric key-wrapping encrypts the lightweight session keys, called the distribution
keys. Every single communication is protected with a session key. The session key is a
symmetric key that has a unique ID and a period of validity. The use of cryptographic keys
(credential management) for encryption, message authentication, and decryption is managed
by secure communication. Consequently, selected CH nodes are responsible for managing
cryptographic keys. Figure 3 illustrates the overview of the authorization procedure.

Figure 3. Local authorization service among IoT entity and Cluster Head (CH) nodes for secure
communication.

3.2. LAYER-2
The second layer connects all of the selected CH nodes under the serving Base Station
(BS) units. Cluster heads collect and forward data to the higher layer. All of the nodes in
Sensors 2021, 21, 772 9 of 26

the second layer run a private LBC in a distributed manner to achieve a consensus that
is based on the defined consensus algorithm [5]. BS and CH units generate and verify
blocks, handle communications with non-consensus devices and nodes within the same
layer, and broadcast blocks to each cluster. Trusted nodes provide interfaces to subordinate
and superior layers employing the blockchain protocol. The HLF blockchain platform is
proposed for this layer.
The proposed network model needs to consider secured CH communications while
addressing the resource-constrained and decentralized node distribution of the IoT network.
The blockchain mining process is computationally intensive and time-consuming. Hence, it
is not ideally suited for implementation in an IoT system. Therefore, the proposal suggests
a lightweight, private, decentralized blockchain-based method for data communications
built upon distributed consensus. It is important to consider the limitation (resource-
constraint) of devices in the IoT system. Thus, a lightweight cryptographic mechanism is
to be implemented.
In the proposed model, the interaction between CH nodes and other networked
elements are based on local permissioned HLF blockchain [53] platform. HLF is a private
permissioned blockchain and it is based on an execute-order-validate architecture. In this
architecture, the transaction execution (via smart contract) is separated from transaction
ordering in order to achieve better scalability and modular consensus implementations.
The main elements of the proposed model are organizations (base stations), IoT nodes
and objects, ordering clusters, and peers (including endorser and committer, membership
service providers (MSPs), and channels [54]), as shown in Figure 4.

Figure 4. The network architecture of the IoT-enabled cellular system combined with the blockchain
technology and smart contracts.

The peers maintain distributed ledger and execute transactions. A peer node can
be an endorser or committer or both. The orderers are responsible for ordering all of the
transactions in the network. In addition, orderers propose new blocks and seek consensus.
Ordering service is a collection of orderers. All peers are committers by default. Ordering
service sends the ordered state updates in the form of a block of transactions, and com-
mitters maintaining the ledger. The peer validates transactions of a new block, commits
the changes locally as a copy of ledger, and updates the blockchain by appending it on
the block. Peers also can be an endorser for endorsing transactions. An endorser executes
the smart contract (ChainCode in HLF) and appends the results with its cryptographic
signature (called endorsement) before sending it back to the client. In the proposed model,
CH nodes can take the endorsers or committer roles, based on predefined roles.
MSP carries out the authentication services in the Hyperledger network. MSP has
to verify the network nodes identity. The organizations are the logical representation of
Sensors 2021, 21, 772 10 of 26

the Hyperledger framework. They are responsible for the management of the network
members with the help of MSP. Channels facilitate the various connections within the
network between its different elements while using private or dedicated channels. The
committers perform the validation and update of the shared ledger.
The Hyperledger Blockchain is implemented through various transactions for data
collection and data transmission. Transactions are defined using smart contracts [54]. Base
stations in the high-level layers provide an organization for the blockchain implementation.
They are connected to CH and different nodes in the IoT system. The ordering cluster
handles the transactions and queue orders while providing a shared channel for differ-
ent peer-to-peer communications. Additionally, the ordering service performs messages
broadcasting, including transactions, and creating transaction blocks. IoT devices send
transactions to ordering clusters while using Ordering Service (OS) to make a block of
transactions. Defining the IoT nodes in the blockchain network to have an endorser or
committer role depends on various metrics, e.g., the network configuration. Aside from
validation tasks and updating the blockchain state, the committer node is responsible for
block addition to the blockchain ledger.
An IoT node becomes an endorser through submitting an endorsement request. This
request is sent to the endorser node for approval and consistency monitoring. The process
of consistency check proceeds with the smart contract execution. The endorser sends
back the response to the associated IoT node requests and grants a specific read and
writes access.
The transaction block creation is performed by ordering clusters through the OS.
The transaction blocks are distributed to all CH nodes. The blockchain system in this
level updates the ledger, and transactions are added to the ledger along with IoT node
specifications. A copy of the Blockchain ledger is shared with all of the peers in the network
after validation.

3.3. LAYER-3
This layer consists of a distributed networked collection of BS nodes acting as an
organization owner. Base stations manage devices, generate data, and process requests
in a cloud server manner. The trusted nodes in this layer have powerful computing re-
sources with less power and processor limitations. Consequently, more robust asymmetric
cryptography mechanisms are proposed for this level with the aid of the global blockchain.
The high-level layer consists of BS nodes that can perform independent mining tasks
without reliance on the central authentication servers. The nodes in this layer are computa-
tionally powerful while forming a distributed network topology. Therefore, deploying a
suitable global chain, such as the global Ethereum blockchain framework, along with more
sophisticated security techniques is feasible. The deployment of asymmetric cryptography,
such as Elliptic Curve Cryptography (ECC) [55], is an appropriate solution for this layer.
The blockchain-based system implementation enhances the level of privacy and security
while guaranteeing data integrity. The higher layers do not include any central node,
while the devices are data independent. The blockchain network records the transaction
exchange between the nodes of this layer. The cluster heads, base stations, and computing
edge nodes initiate the globally distributed trust relationship service mechanism among
other network members.
The peer-to-peer nature of the blockchain provides a suitable solution for a globally
distributed security framework between different network entities, such as BS nodes. The
communication among CH nodes and computing edge nodes is done through implement-
ing the blockchain-based communication with the use of certificates. Smart contracts
maintain the distribution of the certificates to perform a trustful communication within the
blockchain system among different nodes in this layer. CH nodes are required to sign the
certificates. The proposed blockchain-based model is enhancing the distributed trust be-
tween two CH nodes and related BS nodes when they collaborate for authorization of their
Sensors 2021, 21, 772 11 of 26

entities. It also enhances the trust, while an entity or IoT node establishes communication
with other nodes in separate clusters under each BS.
The blockchain-based system maintains smart contract execution in order to avoid
the requirement of using domain names and fixed addresses while the nodes establish the
communications. The fixed addresses and domain names are not needed for the cluster
heads in the proposed model for their communications with the edge devices as well as to
execute smart contracts.

4. Framework Implementation
4.1. Network Self-Clustering
Figure 5 shows the clustering approach for the IoT network. Figure 6 shows the flow
of the proposed network clustering algorithm. It can be seen that the clustering is done
with the utilization of metaheuristic algorithms [56]. Metaheuristic algorithms are based on
a close interaction between computational practices and optimization. The main advantage
of these methods is that they are unentrapped in local optimal points [57]. Therefore,
these approaches seek all over the entire search space. Furthermore, the control within
the metaheuristic algorithms is fully distributed among individuals (network nodes and
participants). These individuals communicate with each other in a localized manner. The
system response is robust, and the application for environment changes is fast [56–58].

Figure 5. Network clustering scheme for cellular IoT network.

GA is a population-based algorithm that is a subset of metaheuristic methods. It


shows a good global-based exploration performance for the search of a problem space [59].
Therefore, GA is proposed in this research for the heterogeneous IoT network clustering.
Furthermore, a good local-based exploration mechanism within the search space is required
in order to evaluate a single solution. While SA indicates very good performance in this
manner, a hybrid mechanism (built upon GA and SA) is chosen in this paper to optimize
the proposed IoT network clustering [60].
The clustering approach also reduces the latency and overhead in the IoT systems
via the overall minimization of communication distances among IoT objects and selected
cluster heads. With clustering, a lower number of nodes require long-distance transmissions
to BS nodes. Therefore, the total energy consumption for the entire system is reduced, while
the network coverage is enhanced [59–61]. The clustering-based approach helps to leverage
the blockchain technology application efficiency by reducing the deployment complexity.
The entire network is divided into non-overlapping clusters that are managed by the CH
nodes. Other cluster members communicate with the CH nodes for data transmission.
Sensors 2021, 21, 772 12 of 26

Figure 6. The flow of the Genetic Algorithm-GA-Simulated Annealing (GA-GA-SA) clustering algorithm.

The idea is to achieve the clustering through the deployment of the evolutionary
computation algorithms within the network. In the proposed model, critical network
attributes, such as the distance, network coverage, energy, and load, are the parameters
considered for the clustering of the nodes.
A hybrid algorithm (consisting of a Genetic Algorithm and Simulated Annealing) is
employed for the selection of a cluster head as well as for cluster optimization, as shown in
Figure 6. The proposed self-clustering approach allows for avoiding a uniform distribution
of nodes and clusters. This is done to model the heterogeneous nature of the IoT network.
The total number of clusters as well as the number of nodes that belong to each cluster
are not predefined. Besides, the proposed clustering enhances the flexibility of nodes
deployment in the IoT network. The nonuniform distribution of nodes in each cluster is
considered. Consequently, the lifetime of the entire network increases, while the energy
dissipation among the CH nodes is more uniform.

4.1.1. GA Phase: CH Selection with Genetic Algorithm


The most critical factor in the IoT network design is satisfying the energy constraint.
Longer network operation can be achieved through the shortening of communications and
transmission links as well as by reducing the power consumption. Shorter communication
links are achievable by grouping nodes into independent clusters. Such an approach
facilitates the aggregation and forwarding of data, because each cluster member needs to
exchange its information with the associated CH. The calculation of energy consumption
uses the first order radio communication model [62]. The radio energy dissipation for
transmitting or receiving a bit of data is equal to Eelec . Energy dissipation for transmitting
n bits of data from the transmitter to the receiver node at the distance l can be calculated,
as follows [63]:
Etx (n, l ) = Eelec × n + Eamp × n × l 2 , (1)
while the energy dissipation volume in a node to receive n bits of data is formulated as:

Erx (n) = Eelec × n, (2)

where, Eelec is the dissipation of radio energy and Eamp is transmission amplifier energy
dissipation.
Sensors 2021, 21, 772 13 of 26

Consequently, the total energy requirements to send and receive n data bits between
two nodes located at the distance l comprise two main elements. The first component is the
energy for amplifying data, transmission, and receiving. The second component includes
the energy for the data processing by the node. The current leakage is considered to be
negligible in low voltage and high-frequency systems. Equation (3) denotes Ell the total
energy loss for the distances that are shown in Figure 5.
mj L2j
" #
k
Ell = ∑∑ lij2 +
mj
, (3)
j =1 i =1

where, L j represents the distance between the cluster-head and computing edge node; the lij
represents the distance between a node and its related cluster head (Figure 5); k represents
a number of cluster heads; and, m represents the total number of nodes on the network.
Clustering is performed by considering the node residual energy, node distance from
the BS, number of CH nodes, and CH distance from the other cluster heads (intra- and
inter-cluster distances).
The cost function for the optimization problem considers the total transmission dis-
tance as a key metric that is to be minimized. Furthermore, the fitness function also takes
the number of cluster heads into account while optimizing the network load. The following
multi-objective cost function evaluates each individual node in the GAs algorithm:
Minimize:      
Edd CHi Load
cost( f 1 ) = ω1 + ω2 + ω3 , (4)
D m m
where, Edd is the sum of CH distances to all individual nodes and the sum of the computing
edge node distances to all CH nodes, CHi indicates the number of cluster heads, D is the
network scaling dimension, m is the total number of nodes, Load is the max network load,
and ω1 , ω2 , and ω3 are predefined constant weights.
The goal is to attain a fewer number of CH nodes and enhance the energy. The weights
ω1 to ω3 , with values between 0 and 1, represent the importance of the key metrics during
the optimization procedure. Their values are chosen according to the importance of cost
function factors [60]. GA minimizes the cost function at this stage. Figure 7 shows the
initial phase of the clustering algorithm.

Figure 7. GA algorithm pseudocode.


Sensors 2021, 21, 772 14 of 26

4.1.2. Optimization of Distance and Coverage by GA


The GA approach helps to achieve distance optimization through its self-organized
feature. The next GA starts with the final global solution of the first step GA as the initial
solution, as outlined in Figure 6. This step can effectively formulate the mobility of different
nodes. The proposed GA method also takes network coverage optimization into account.
The second GA phase enhances the GA solution of the first phase by a local search
strategy. Optimizing the distance between CH to a node, and the CH to the sink or edge
computing node results in the minimization of the total network energy dissipation. The
distance-based equation is deployed in order to cluster the nodes in multi groups in the
previous step and define the number of clusters through implementing the GA algorithm.
The initial population for the current stage is generated from the best solution of the last
phase. A multi-objective cost function is used in the GA optimization step. The distance is
optimized while maximizing the coverage:
Minimize:
cost( f 2 ) = ω4 ( Ell ) + ω5 (1 − Coverage), (5)
where, Ell is detailed in (3). Coverage shows the provided network coverage by nodes, ω4
and ω5 are predefined constant weights.

4.1.3. Network Changes Optimization Using SA


Simulated Annealing is a meta-heuristic algorithm that is chosen to perform the
network changes, including node addition to, moving in, and removing from the IoT
network. Generally, a random primary solution is required to start SA. However, in the
proposed hybrid GA-GA-SA approach (Figure 6), the initial solution for SA is selected
from the final GA global solution in the previous step. A local search strategy is deployed
to improve the network changes by the SA algorithm. A new solution (called Solutionnew )
is generated at every iteration of SA that is located in the current solution (Solutioncurrent )
neighborhood area. The case Costnew < Costcurrent means that the current solution is
replaced by the new solution. Otherwise, the new solution can be accepted. The same cost
function of the first GA (expression (4)) is considered for SA evaluation at each iteration.
Figure 8 shows the SA algorithm.

Figure 8. SA Algorithm pseudocode.


Sensors 2021, 21, 772 15 of 26

4.1.4. Clustering Results


In order to study the performance of the proposed clustering algorithms, a network
environment for the IoT devices was simulated, as shown in Figure 5. It included 100 nodes
randomly generated and distributed in a 2-D network. MATLAB 2018a was employed since
it offered a reliable environment for clustering algorithms, facilitated a straightforward
simulation of algorithms, so that the results could be ultimately compared. Table 1 provides
the GAs parameters deployed in this scenario.

Table 1. GAs Parameter Settings.

GAs Parameters Value


Population Size 30
Selection Type Proportional Selection
Recombination Percentage 0.1
Crossover Percentage 0.5
Crossover Type One-Point
Mutation Percentage 0.4
Mutation Rate 0.05
Generation Size 500

The GAs started from a specific number of individuals, termed population. Each
individual in proposed GA algorithms was elevated while using combined cost functions
presented in Equations (4) and (5). The network configuration changes were detected
by the SA section and then optimized the network accordingly. Table 2 provides the SA
parameters used in this scenario.

Table 2. SA Parameter Settings.

SA Parameters Value
Max Iter SA 1000
T initial 0.001
T final 0.000
Pchange Max 0.05
Pchange Min 0.02

In the simulation, the energy loss per bit for transmitter or receiver (Eelec ) was consid-
ered to be equal to 50 nJ/bit (Eelec = 50 nJ/bit), while the constant value for transmission
amplifier was Eamp = 0.1 nJ/bit/m2 which was in line with the reported work [64].
The proposed clustering algorithm was benchmarked against four following algo-
rithms reported in the literature: ASLPR [60], ERA [65], FSFLA [64], and GAPSO [50].
Application-Specific Low Power Routing (ASLPR) is based on evolutionary algorithms
adopted for Wireless Sensor Network (WSN) applications. It uses GA and SA for CH nodes
selection. Energy-aware Routing Algorithm (ERA) is for cluster-based WSNs. The residual
energy of the CH nodes and the intra-cluster distances is considered in ERA for cluster
formation. Fuzzy Shuffled Frog Leaping Algorithm (FSFLA) employs the memetic Shuffled
Frog Leaping Algorithm (SFLA) in order to optimize the Mamdani fuzzy rule-base table
based on the application specifications. This protocol deals with node energy and intra-
cluster distances as well as with network lifetime. Genetic Algorithm and Particle Swarm
Optimization (GAPSO) [50] is proposed in order to form clusters in the IoT environment.
All of the protocols were evaluated within the same simulated network environment. Each
algorithm at the end of its optimization resulted in a different number of clusters and
cluster heads.
The obtained simulation results indicate the effectiveness of the proposed clustering
model as well as the efficiency of the algorithm to minimize the distances and the total
network energy. Figure 9a illustrates the formed clusters for GA-GA-SA with the centrally
Sensors 2021, 21, 772 16 of 26

located base station with 100 nodes that were randomly distributed in a network coverage
area of 150 (m) × 150 (m). Figure 9b–d show that the proposed GA-GA-SA performs better
when compared to the other algorithms by lowering the network load, minimizing the
distances, and, therefore, increasing the network coverage.

4.2. Blockchain Implementation


4.2.1. Development Environment
We deployed simulation models in two different environments associated with each
level of the multi-layer network in order to demonstrate the feasibility and practicability
of the proposed blockchain framework. The first model implements the HLF blockchain
in Layer-2 encompassing IoT devices, CH nodes (peers), APIs, and an organization. The
global blockchain deployment simulator at Layer-3 is conducted to compare both Etherume
and HLF metrics implementations. The simulation model at Layer-3 uses a workstation as
the BS server running the blockchain applications.
The Layer-2 implementation environment was created in order tto study the efficiency
of the proposed blockchain framework of the multi-layer model, as illustrated in Figure 10.
It also shows the means of connection between various entities consisting of IoT devices,
IoT server, and blockchain network. The IBM Cloud was used to host development tools
and technologies for implementing the IoT devices. IBM Watson IoT Platform [66] was
chosen to host IoT devices and gateways. The Node-Red server provided communication
between the IoT devices and servers while using the Constrained Application Protocol
(CoAP). Physical nodes are simulated in the IBM IoT Watson platform and connected to
related Cloud foundry services on the IBM Cloud. The IoT server is organized using a
virtual environment that was integrated with various virtual nodes, and a lightweight
permissioned HLF blockchain framework is utilized to grant the security for Layer-2.
The HLF network within the experimental setup consists of four peers and an orderer
node running as docker images using docker containers [67]. The open-source HLF (v1.4)
blockchain framework was implemented and hosted by Linux foundations. The Ubuntu
Linux 18.4 LTS is the operating system hosted by Intel Core i7-3770 @ 3.4 GHz processor
and 16 GB memory. The docker environment is run by the docker engine (version 19.03.8).
The configuration of docker images and containers is provided by the docker-compose
(version 1.17.0) as the Integrated Development Environment (IDE).
A smart contract was installed and instantiated on peers nodes, and data storage
was allocated in order to write a block of transactions to the blockchain ledger. The
composer-playground is a web interface for designing and implementing smart contracts
and managing transactions and assets. The composer Command Line Interface (CLI)
provides an environment to deploy, implement, and execute smart contracts and related
definitions by the developers. The peers were set up to use the CouchDB for managing
the state data that can handle the complex queries against the transaction logs. The Chain
Code (CC) was modelled as JavaScript Object Notation (JSON). The client application can
invoke a CC to access the state database and perform various queries, such as put, get, and
delete, through APIs. Different blockchain functions were defined by deploying a REST
server to directly provide RESTful APIs that can be invoked while using a web client or a
virtual device. The user can invoke relevant APIs using GET or POST to submit various
transactions through HTTP requests. The REST server hosts the Fabric client application
to communicate with the HLF network through google Remote Procedures Calls (gRPC)
system deployment. All of the peers in the network have a copy replica of the ledger. The
ledger has two parts transaction log and all the recorded state changes. The state data
also consists of the key-value pairs that are version. All the state database changes are
recorded in time order in the ledger, and the blocks are cryptographically linked together.
The orderer node ensures ledger consistency by implementing the PBFT algorithm. The
HLF framework supports the Execute-Order-Validate and Commit transaction model.
Sensors 2021, 21, 772 17 of 26

Figure 9. Performance of the proposed clustering algorithm. (a): clustered network and CH positions. (b–d): benchmarked
performance in terms of load, distances, and coverage, respectively.

The Layer -3 simulation model was created while using a workstation as the BS
server running the blockchain applications. This environment facilitated measuring the
throughput and latency parameters of the Ethereum and Hyperledger private networks.
The networks were set up in similar conditions and provided with a virtually generated
workload. A distributed environment that includes the two blockchain networks was
considered for the experimental set up. The simulation models used a workstation with
Intel Core i7-3770 @ 3.4 GHz processor and 16 GB memory as the BS. For simplicity, the
Etherume network was deployed with just one mining node. The experimental results are
presented in Section 4.3.

4.2.2. Smart Contract for Modeling Transactions


The Hyperledger Composer [68] hosted the blockchain applications and facilitated
the design and implementation of smart contracts as well as blockchain applications. A
business network was deployed in the Hyperledger Composer through a set of open
development tools. The members of business networks were participants. They could
submit related transactions. The participants were the owners of IoT devices (CH and
related BS nodes) with the management and access abilities for their devices. Assets were
Sensors 2021, 21, 772 18 of 26

services, devices, properties, and goods that were registered and stored within the network.
In the reported study, the assets represented IoT devices, including sensors, actuators, or
IoT nodes. Each device could be identified through the device ID, device type, device name,
device owner, timestamp, event, and value. The presented nodes, including CH ones, were
modeled as a different type of assets in the simulation. Transactions represented a logical
process within the smart contracts. The implemented model stored the data checksum,
data pointers, operations, and ownership of data in the blockchain ledger, while the actual
data were held in a separate cloud-server or off-chain storage system. Smart contracts
interacted with assets and participants. Besides, a smart contract could set various rules
and conditions to perform multiple actions, such as read, create, update, or delete, within
the blockchain network. The logical transaction operations were defined in smart contracts
as transaction process functions. Smart contracts also included the queries definitions
written in a bespoke query language to extract data from the blockchain network. The
communication between the blockchain network, IoT device, and the web application was
performed by REST APIs that were generated by the composer-rest-server.

Figure 10. The implementation structure of the blockchain IoT framework.

4.3. Performance Evaluation


The primary objective of a blockchain application is to maintain a number of sub-
mitted transactions by the participants. The submitted transactions then proceed to the
verification and ordering process, which results in a block generation and storing the
transaction outcome on the blockchain ledger. The following metrics are presented by
Hyperledger Performance and Scale Working Group [69] to measure the blockchain appli-
cation performance:
• Transaction Throughput, i.e., the total number of committed transactions by the
blockchain System Under Test (SUT) in a given time period in seconds.
• Transaction Latency, i.e., the amount of time that is taken for a transaction to be stored
on the blockchain ledger.
The system was tested to evaluate the performance of the proposed model in terms of
both the latency and throughput. The results were benchmarked against the parameters
reported in the literature with the aim of demonstrating the efficiency of the designed
framework. The evaluation was conducted while using the Hyperledger Caliper [70] to
facilitate the specific blockchain configuration by the administrator.
Sensors 2021, 21, 772 19 of 26

In the proposed model, the latency represents the time that is required by CHs to verify
new blocks. The block size is an essential factor that affects both node and network latency.
The latency is measured by the time that the system requires to reach consensus after the
node starts to detect the new block validations. The analysis of the system was conducted
with a set of transactions, such as Open, Transfer, and Query. The results were provided
for Hyperledger Fabric (proposed blockchain for Layer 2) and Ethereum (standard global
blockchain). Table 3 presents the simulation results for evaluating latency and throughput
for three different transaction types within HLF implementation. The average latency
decreases by implementing a multi-layer model. In this model, only a portion of the nodes
(i.e., CHs) is contributing to new blocks validation. Table 3 also presents the Ethereum
implementation results. It can be seen that the proposed lightweight HLF blockchain is
superior when compared to the Ethereum as a global blockchain technology.

Table 3. Hyperledger and Ethereum performance metric summary (H: Hyperledger Fabric, E: Ethereum).

Name Send Rate (TPS) Max Latency (s) Min Latency (s) Avg Latency (s) Throughput (TPS)
Blockchain H E H E H E H E H E
Open 20.2 22.7 0.38 7.05 0.04 2.12 0.18 4.58 20.1 10
Query 10 10.2 0.07 0.02 0.01 0.01 0.01 0.01 10 10.2
Transfer 10 10.7 0.38 7.13 0.06 2.07 0.19 4.63 10 6.7

Despite security and privacy, latency and throughput are essential performance met-
rics when selecting an appropriate blockchain platform for IoT applications. The resource
allocation for the blockchain network must be done in order to meet the latency require-
ments (for a given input load). A further experiment was conducted to analyze the SUT
behavior consisted of multiple rounds of benchmarks with different transaction sending
rates. The sending rates varied from 20 to 500 Transactions per Second (TPS), and 1000
transactions were generated for each benchmark to measure the maximum, average, and
minimum transaction latency and throughput. Figure 11 presents the maximum, average,
and minimum transaction latency for each round of experiments. The minimum latency
remained below 1 s during the experiments, while the maximum latency proliferated as
the send rate reached the 100 TPS. Figure 12 illustrates the transaction throughput results
for varying transaction sending rate. The throughput remained around 100% while the
sending rate was up to 110 transactions per second. A significant drop in the throughput
was observed as the sending rate increased to 110 TPS, which was the maximum usable
sending rate for the SUT.
This experiment only considered an individual client in the blockchain network to
generate all the transactions. As expected, the performance of the blockchain network
highly depends on the underlying hardware. The HLF provides a three-stage revolutionary
architecture known as execute-order-validate, in which every stage depends on previously
executed transactions.
Our experiments revealed that the proposed HLF-based blockchain model for IoT
application could process up to 110 transactions per second while maintaining a 100%
transaction throughput and an average latency of 500 milliseconds, with a maximum of
110 TPS, with throughout that is very close to 100%. A send rate of 100 TPS is sustainable,
as the actual throughput is around 100%. However, increasing the send rate to 100 and
200 TPS only yields to a marginal throughput decrease. This lead to the conclusion that our
setup can sustain a send rate of about 110 TPS. Therefore, our proposed architecture could
support real-time provisioning of multiple 5G-enabled IoT applications without imposing
any considerable latency to the process.
The maximum latency grows to nearly 15 s as the number of input transactions
increases. This is due to resource restrictions of the containers that are allocated to the peer
nodes. The minimum latency remains almost constant, as there are no high loads imposed
Sensors 2021, 21, 772 20 of 26

on the peer nodes at the beginning. Additionally, the blockchain configuration (e.g., the
block size, the number of channels, ordering service, users, endorsing nodes) influences
the latency. It can be observed that, in all cases, all of the transactions are successfully
completed, i.e., no loss of transactions occurs.

Figure 11. Latency vs. transaction sending rate.

Figure 12. Throughput vs. transaction sending rate.

5. Security Analysis of the Framework


The proposed secured IoT multi-layer model that is based on Hyperledger Blockchain
technology offers an overall superiority over the previous works reported in the literature,
as illustrated by the metrics comparison that is given in Table 4.

Table 4. Security challenge comparison of blockchain applications in IoT systems.

Security Challenges
Implemented Implemented
Ref IoT Application Framework Heterogeneity Authentication Scalability Consensus Blockchain
Privacy and Flexibility
[38] Smart Grids, Smart Cities Yes Yes PoW Private
[71] Microgrids, Smart Grids, Vehicle-to-Grids Yes PoW Consortium
[72] Microgrids, Smart Grid Yes PoC Private
[73] Big Data, eHealth Yes Yes PoW Public
[74] Industrial IoT Yes Yes PoW Private
[75] Smart Factory, Supply Chain Yes PoS Consortium
[76] Industrial IoT, Energy Harvesting networks Yes Yes PoW Consortium
[77] eHealth Yes PoW Public
[78] Mobile edge computing, eHealth Yes Yes PoC Permissioned
[79] Cloud computing, V2X Yes Yes PoS Consortium
[80] Vehicular Edge Computing Yes Yes PoW Consortium
PBFT,
proposed 5G MBS Yes Yes Yes Yes Consortium
PoC
Sensors 2021, 21, 772 21 of 26

5.1. Framework Privacy


Contracts between different entities are recorded in the blockchain system. Therefore,
privacy disclosure assessment is required. The identity of an object is encrypted, and the
IoT address is recorded in the blockchain as the pseudonym of the entity. The domain
name and fixed address for communication are not required, and the blockchain maintains
tasks through running smart contracts, as discussed above. In the IoT network, IP address
of an object is encrypted and recorded in the blockchain thus leading to the anonymity of
the object. The contract context privacy is guaranteed by the Hash Code of the real context
within the blockchain network while minimizing the risk of a privacy leak.

5.2. Heterogeneity and Flexibility


The proposed framework accommodates various configurations for system security
in different scenarios. These include the IoT objects with limited resources, the security
of sensitive information, high-risk, and broadcasting. The security configuration options
can vary, due to the strength of cryptography techniques and characteristics of key life-
times (strong crypto, short and long key lifetimes, and lightweight cryptography), key
distribution mechanisms, the selection of different session keys, such as encryption and au-
thentication, cached session keys, including of one, multiple, and unlimited keys, different
owners of keys, and the stability of the fundamental protocols (TCP and UDP). Besides,
a certain degree of flexibility is achievable by granting an option to a node or entity to
connect or leave the system freely. Changes in the network are recorded in the blockchain
through the distributed consensus process.

5.3. Authentication
The process of authentication is implemented in two parts: (1) local authentication and
authorization process in the infrastructure layer and (2) rights to objects by smart contracts.
The node requirements and respective rights are recorded in the blockchain that was
implemented in different segments. The block summary consists of a contract summary.
It is accessible at any time. The non-repudiation nature of this summary guarantees the
interests of the object.
The multi-layer approach through the network clustering divides the entire IoT net-
work into different tiers, as presented in Figure 2. This includes the local authentication
services and globally distributed blockchain-based framework, while separating the ex-
ternal authority. Therefore, the effect of a local authentication service failure or attack
to the network is limited to the compromised nodes, while the impact on the network
is significantly reduced.

5.4. Scalability
The framework tackles the following scalability challenges: (1) high data traffic and (2)
a massive number of IoT objects and devices. The multi-layer structure facilitates multiple
cluster implementation and fulfills the scalability issues. Two different CH nodes can
establish different secure communications on a client-server basis. CH establishes secure
communication with the entities within the same cluster in order to avoid the overhead
incrementation. When networked CH nodes start communicating within a framework
that is based on the blockchain, the exchange of cryptographic keys is necessary before
beginning the client-server communication by which further overhead is reduced.

6. Conclusions
This paper proposes a multi-layer security model for IoT devices functioning under
multi-hop cellular networks based on distributed technology of the blockchain. The
developed model provides a feasible solution to establish the decentralized application
of the blockchain technology for the security of the cellular-enabled IoT network. The
hybrid self-clustering EC algorithm, utilizing GA and SA, is developed to fragment the IoT
network into clusters in order to provide the multi-layer structure and enhance the network
Sensors 2021, 21, 772 22 of 26

lifetime. Detailed system implementation is discussed, and the way the blockchain-based
model can help to improve the IoT system authentication and authorization is elaborated.
The model proposes the open-source HLF blockchain for deployment and verification. The
multi-layer model enhances network security, lowers the processing load, and reduces
network load and latency. The proposed implementation enhances the efficiency of the
communications via the peer-to-peer nature of the blockchain communication and maps it
to the device-to-device communication in cellular systems with improved integrity and
security. The proposed solution tackles the IoT security challenges, including framework
privacy, authentication, heterogenicity, and flexibility, as well as network scalability. The
proposed hybrid clustering algorithm has been compared with four existing protocols. The
simulations study demonstrates that the proposed algorithm outperforms the competitors
in terms of various performance metrics, including network load, network coverage, and
distances. The performance of the proposed multi-layer blockchain-based framework was
evaluated. It was found that the lightweight blockchain was more effective than the global
blockchain Ethereum.
The focus of our future work will be on the deployment of a practical scalable test-
bed configured as MBS framework of IoT devices to study, analyze, and compare the
performance in the real world environment.

Author Contributions: Conceptualization, H.H.P. and M.R.; methodology, H.H.P. and M.R.; software,
H.H.P.; validation, H.H.P., M.R. and F.A.; formal analysis, H.H.P.; investigation, H.H.P.; writing—
original draft preparation, H.H.P., M.R. and F.A; writing—review and editing, H.H.P., M.R., F.A. and
S.D.; supervision, M.R., F.A. and S.D.; project administration, M.R. All authors have read and agreed
to the published version of the manuscript.
Funding: This research received no external funding.
Data Availability Statement: The data presented in this study are available on request from the
corresponding author.
Conflicts of Interest: The authors declare no conflict of interest.

Abbreviations
The following abbreviations are used in this manuscript:

ASLPR Application-Specific Low Power Routing


BCS Blockchain Structures
BS Base Station
CC ChainCode
CH Cluster Head
CLI Command Line Interface
CoAP Constrained Application Protocol
D2D Device-to-Device
EC Evolutionary Computation
ECC Elliptic Curve Cryptography
ERA Energy-aware Routing Algorithm
FSFLA Fuzzy Shuffled Frog Leaping Algorithm
GA Genetic Algorithm
GAPSO Genetic Algorithm and Particle Swarm Optimization
gPRC google Remote Procedures Calls
HLF Hyperledger Fabric
IDE Integrated Development Environment
IoT Internet of Things
LSB Lightweight Scalable Blockchain
LHB Lightweight Hyperledger Blockchain
LTS Long Term Support
MCNs Multihop Cellular Networks
MSP Membership Service Providers
Sensors 2021, 21, 772 23 of 26

OS Ordering Service
PKI Public Key Infrastructure
PoBT Proof of Block and Trade
PoC Proof of Concept
PoW Proof of Work
RoA Rating of Allocation
SA Simulated Annealing
SDK Software Development Kit
SDN Software Defined Networking
SFLA Shuffled Frog Leaping Algorithm
SI Swarm Intelligence
SUT System Under the Test
TLS Transport Layer Security
TSP Transactions Per Second

References
1. Familiar, B. Microservices, IoT, and Azure; Springer: Berlin/Heidelberg, Germany, 2015.
2. Amoozadeh, M.; Raghuramu, A.; Chuah, C.N.; Ghosal, D.; Zhang, H.M.; Rowe, J.; Levitt, K. Security vulnerabilities of connected
vehicle streams and their impact on cooperative driving. IEEE Commun. Mag. 2015, 53, 126–132. [CrossRef]
3. Ho, G.; Leung, D.; Mishra, P.; Hosseini, A.; Song, D.; Wagner, D. Smart locks: Lessons for securing commodity internet of
things devices. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, Xi’an, China,
30 May–3 June 2016; ACM: New York, NY, USA, 2016; pp. 461–472.
4. Kshetri, N. Can blockchain strengthen the internet of things? IT Prof. 2017, 19, 68–72. [CrossRef]
5. Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. LSB: A Lightweight Scalable Blockchain for IoT security and anonymity.
J. Parallel Distrib. Comput. 2019, 134, 180–197. [CrossRef]
6. Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018,
82, 395–411. [CrossRef]
7. Karajeh, H.; Maqableh, M.; Masa’deh, R. Privacy and Security Issues of Cloud Computing Environment. In Proceedings of the
23rd IBIMA Conference Vision: 2020, Valencia, Spain, 13–14 May 2014; pp. 1–15.
8. Guerbouj, S.S.E.; Gharsellaoui, H.; Bouamama, S. A Comprehensive Survey on Privacy and Security Issues in Cloud Computing,
Internet of Things and Cloud of Things. Int. J. Serv. Sci. Manag. Eng. Technol. 2019, 10, 32–44.
9. Ferrag, M.A.; Derdour, M.; Mukherjee, M.; Derhab, A.; Maglaras, L.; Janicke, H. Blockchain Technologies for the Internet of
Things: Research Issues and Challenges. IEEE Internet Things J. 2019, 6, 2188–2204. [CrossRef]
10. Yang, Y.; Wu, L.; Yin, G.; Li, L.; Zhao, H. A Survey on Security and Privacy Issues in Internet-of-Things. IEEE Internet Things J.
2017, 4, 1250–1258. [CrossRef]
11. Mistry, I.; Tanwar, S.; Tyagi, S.; Kumar, N. Blockchain for 5G-enabled IoT for industrial automation: A systematic review,
solutions, and challenges. Mech. Syst. Signal Process. 2020, 135, 106382. [CrossRef]
12. Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies,
Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [CrossRef]
13. Wang, S.; Ouyang, L.; Yuan, Y.; Ni, X.; Han, X.; Wang, F. Blockchain-Enabled Smart Contracts: Architecture, Applications, and
Future Trends. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 2266–2277. [CrossRef]
14. Moin, S.; Karim, A.; Safdar, Z.; Safdar, K.; Ahmed, E.; Imran, M. Securing IoTs in distributed blockchain: Analysis, requirements
and open issues. Future Gener. Comput. Syst. 2019, 100, 325–343. [CrossRef]
15. Granjal, J.; Monteiro, E.; Silva, J.S. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues.
IEEE Commun. Surv. Tutor. 2015, 17, 1294–1312. [CrossRef]
16. Li, S.; Da Xu, L.; Zhao, S. 5G Internet of Things: A survey. J. Ind. Inf. Integr. 2018, 10, 1–9. [CrossRef]
17. Lao, L.; Li, Z.; Hou, S.; Xiao, B.; Guo, S.; Yang, Y. A survey of IoT applications in blockchain systems: Architecture, consensus,
and traffic modeling. ACM Comput. Surv. 2020, 53, 1–32. [CrossRef]
18. Decker, C.; Seidel, J.; Wattenhofer, R. Bitcoin meets strong consistency. In Proceedings of the 17th International Conference on
Distributed Computing and Networking, Singapore, 4–7 January 2016; pp. 1–10.
19. Du, K.L.; Swamy, M. Search and optimization by metaheuristics. In Techniques and Algorithms Inspired by Nature; Birkhauser:
Basel, Switzerland, 2016.
20. Zhang, Z.; Cho, M.C.Y.; Wang, C.; Hsu, C.; Chen, C.; Shieh, S. IoT Security: Ongoing Challenges and Research Opportunities.
In Proceedings of the 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, Matsue, Japan,
17–19 November 2014; pp. 230–234. [CrossRef]
21. Cooper, D.; Santesson, S.; Farrell, S.; Boeyen, S.; Housley, R.; Polk, W.T. Internet X.509 Public Key Infrastructure Certificate and
Certificate Revocation List (CRL) Profile. RFC 2008, 5280, 1–151.
22. Oriwoh, E.; Conrad, M. ‘Things’ in the Internet of Things: towards a definition. Int. J. Internet Things 2015, 4, 1–5.
Sensors 2021, 21, 772 24 of 26

23. Ukil, A.; Bandyopadhyay, S.; Pal, A. Iot-privacy: To be private or not to be private. In Proceedings of the 2014 IEEE Conference
on Computer Communications Workshops (INFOCOM WKSHPS 2014), Toronto, ON, Canada, 27 April–2 May 2014; pp. 123–124.
24. Novo, O. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT. IEEE Internet Things J. 2018, 5, 1184–1195.
[CrossRef]
25. Pal, S.; Rabehaja, T.; Hill, A.; Hitchens, M.; Varadharajan, V. On the integration of blockchain to the internet of things for enabling
access right delegation. IEEE Internet Things J. 2019, 7, 2630–2639. [CrossRef]
26. Qu, C.; Tao, M.; Zhang, J.; Hong, X.; Yuan, R. Blockchain based credibility verification method for IoT entities. Secur. Commun.
Netw. 2018, 2018. [CrossRef]
27. Kumar, N.M.; Mallick, P.K. Blockchain technology for security issues and challenges in IoT. Procedia Comput. Sci. 2018,
132, 1815–1823. [CrossRef]
28. Li, D.; Peng, W.; Deng, W.; Gai, F. A Blockchain-Based Authentication and Security Mechanism for IoT. In Proceedings of the
2018 27th International Conference on Computer Communication and Networks (ICCCN), Hangzhou, China, 30 July–2 August
2018; pp. 1–6. [CrossRef]
29. Hassan, M.U.; Rehmani, M.H.; Chen, J. Privacy preservation in blockchain based IoT systems: Integration issues, prospects,
challenges, and future research directions. Future Gener. Comput. Syst. 2019, 97, 512–529. [CrossRef]
30. Dai, H.; Zheng, Z.; Zhang, Y. Blockchain for Internet of Things: A Survey. IEEE Internet Things J. 2019, 6, 8076–8094. [CrossRef]
31. Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. Blockchain for IoT security and privacy: The case study of a smart home.
In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom
Workshops), Big Island, HI, USA, 13–17 March 2017; pp. 618–623.
32. Biswas, S.; Sharif, K.; Li, F.; Maharjan, S.; Mohanty, S.P.; Wang, Y. PoBT: A lightweight consensus algorithm for scalable IoT
business blockchain. IEEE Internet Things J. 2019, 7, 2343–2355. [CrossRef]
33. Pahl, C.; El Ioini, N.; Helmer, S. A Decision Framework for Blockchain Platforms for IoT and Edge Computing. In Proceedings of
the International Conference on Internet of Things, Big Data and Security, Funchal, Portugal, 19–21 March 2018.
34. Yánez, W.; Mahmud, R.; Bahsoon, R.; Zhang, Y.; Buyya, R. Data Allocation Mechanism for Internet-of-Things Systems with
Blockchain. IEEE Internet Things J. 2020, 7, 3509–3522. [CrossRef]
35. Fabric, W.T.H. Available online: http://hyperledger-fabric.readthedocs.io/en/release-1.4/ (accessed on 15 October 2020).
36. Klaokliang, N.; Teawtim, P.; Aimtongkham, P.; So-In, C.; Niruntasukrat, A. A Novel IoT Authorization Architecture on
Hyperledger Fabric with Optimal Consensus Using Genetic Algorithm. In Proceedings of the 2018 Seventh ICT International
Student Project Conference (ICT-ISPC), Nakhon Pathom, Thailand, 11–13 July 2018; pp. 1–5. [CrossRef]
37. Zhaofeng, M.; Lingyun, W.; Xiaochang, W.; Zhen, W.; Weizhe, Z. Blockchain-Enabled Decentralized Trust Management and
Secure Usage Control of IoT Big Data. IEEE Internet Things J. 2019, 7, 4000–4015. [CrossRef]
38. Biswas, K.; Muthukkumarasamy, V. Securing Smart Cities Using Blockchain Technology. In Proceedings of the 2016 IEEE
18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference
on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Sydney, Australia,
12–14 December 2016; pp. 1392–1393. [CrossRef]
39. Chendeb, N.; Khaled, N.; Agoulmine, N. Integrating Blockchain with IoT for a Secure Healthcare Digital System. In Proceedings
of the 8th International Workshop on ADVANCEs in ICT Infrastructures and Services (ADVANCE 2020), Cancun, Mexico,
27–29 January 2020; pp. 1–8.
40. Sharma, P.K.; Park, J.H. Blockchain based hybrid network architecture for the smart city. Future Gener. Comput. Syst. 2018,
86, 650–655. [CrossRef]
41. Mbarek, B.; Jabeur, N.; Pitner, T. Mbs: Multilevel blockchain system for IoT. Pers. Ubiquitous Comput. 2019, 1–8. [CrossRef]
42. Oktian, Y.E.; Lee, S.G.; Lee, H.J. Hierarchical multi-blockchain architecture for scalable internet of things environment. Electronics
2020, 9, 1050. [CrossRef]
43. Li, C.; Zhang, L.J. A blockchain based new secure multi-layer network model for Internet of Things. In Proceedings of the 2017
IEEE International Congress on Internet of Things (ICIOT). IEEE, Honolulu, HI, USA, 25–30 June 2017; pp. 33–41.
44. Sagirlar, G.; Carminati, B.; Ferrari, E.; Sheehan, J.D.; Ragnoli, E. Hybrid-iot: Hybrid blockchain architecture for internet of
things-pow sub-blockchains. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE
Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart
Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1007–1016.
45. Badr, S.; Gomaa, I.; Abd-Elrahman, E. Multi-tier blockchain framework for IoT-EHRs systems. Procedia Comput. Sci. 2018, 141,
159–166. [CrossRef]
46. Xuan, S.; Zhang, Y.; Tang, H.; Chung, I.; Wang, W.; Yang, W. Hierarchically Authorized Transactions for Massive Internet-of-Things
Data Sharing Based on Multilayer Blockchain. Appl. Sci. 2019, 9, 5159. [CrossRef]
47. Lin, H.; Yang, Z.; Hong, Z.; Li, S.; Chen, W. Smart Contract-based Hierarchical Auction Mechanism for Edge Computing in
Blockchain-empowered IoT. In Proceedings of the 2020 IEEE 21st International Symposium on “A World of Wireless, Mobile and
Multimedia Networks” (WoWMoM), Cork, Ireland, 31 August–3 September 2020; pp. 147–156.
48. Uddin, M.A.; Stranieri, A.; Gondal, I.; Balasurbramanian, V. A Lightweight Blockchain Based Framework for Underwater IoT.
Electronics 2019, 8, 1552. [CrossRef]
Sensors 2021, 21, 772 25 of 26

49. Saputro, M.Y.A.; Sari, R.F. Securing IoT network using lightweight multi-fog (LMF) blockchain model. In Proceedings of the
2019 6th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), Bandung, Indonesia,
18–20 September 2019; pp. 183–188.
50. Rashid, M.A.; Pajooh, H.H. A Security Framework for IoT Authentication and Authorization Based on Blockchain Technology.
In Proceedings of the 2019 18th IEEE International Conference On Trust, Security and Privacy in Computing and Communica-
tions/13th IEEE International Conference on Big Data Science And Engineering (TrustCom/BigDataSE), Rotorua, New Zealand,
5–8 August 2019; pp. 264–271. [CrossRef]
51. Aslam, S.; Alam, F.; Hasan, S.F.; Rashid, M.A. Performance Analysis of Clustering Algorithms for Content-Sharing Based D2D
Enabled 5G Networks. In Proceedings of the International Telecommunication Networks and Applications Conference 2019
(ITNAC2019), Auckland, New Zealand, 27–29 November 2019.
52. Foundation, L. Hyperledger White paper. Hyperledger 2016, v2.0.0, 1–19.
53. De Angelis, S.; Aniello, L.; Baldoni, R.; Lombardi, F.; Margheri, A.; Sassone, V. PBFT vs. proof-of-authority: Applying the CAP
theorem to permissioned blockchain. In Proceedings of the Italian Conference on Cyber Security, Milan, Italy, 6–9 February 2018.
54. Cachin, C. Architecture of the hyperledger blockchain fabric. In Proceedings of the Workshop on Distributed Cryptocurrencies
and Consensus Ledgers, Chicago, IL, USA, 25–29 July 2016; Volume 310.
55. Joglekar, J.; Bhutani, S.; Patel, N.; Soman, P. Lightweight Elliptical Curve Cryptography (ECC) for Data Integrity and User
Authentication in Smart Transportation IoT System. In Sustainable Communication Networks and Application; Karrupusamy, P.,
Chen, J., Shi, Y., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 270–278.
56. Altay, E.V.; Alatas, B. Performance Comparisons of Socially Inspired Metaheuristic Algorithms on Unconstrained Global
Optimization. In Advances in Computer Communication and Computational Sciences; Springer: Singapore, 2019; pp. 163–175.
57. García, J.; Crawford, B.; Soto, R.; Astorga, G. A clustering algorithm applied to the binarization of Swarm intelligence continuous
metaheuristics. Swarm Evol. Comput. 2019, 44, 646–664. [CrossRef]
58. Sabet, S.; Shokouhifar, M.; Farokhi, F. A comparison between swarm intelligence algorithms for routing problems. Electr. Comput.
Eng. Int. J. 2016, 5, 17–33.
59. Elhoseny, M.; Yuan, X.; Yu, Z.; Mao, C.; El-Minir, H.K.; Riad, A.M. Balancing Energy Consumption in Heterogeneous Wireless
Sensor Networks Using Genetic Algorithm. IEEE Commun. Lett. 2015, 19, 2194–2197. [CrossRef]
60. Shokouhifar, M.; Jalali, A. A new evolutionary based application specific routing protocol for clustered wireless sensor networks.
AEU-Int. J. Electron. Commun. 2015, 69, 432–441. [CrossRef]
61. Eleburuike, I.O.; Adekunle, S.S. Energy Efficient Wireless Sensor Network Using Hierarchical Routing Technique; Blekinge Institute of
Technology: Karlskrona, Sweden, 2010.
62. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor
networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000.
[CrossRef]
63. Guru, S.M.; Hsu, A.; Halgamuge, S.; Fernando, S. An Extended Growing Self-Organizing Map for Selection of Clusters in Sensor
Networks. Int. J. Distrib. Sens. Netw. 2005, 1, 227–243. [CrossRef]
64. Fanian, F.; Rafsanjani, M.K. Memetic fuzzy clustering protocol for wireless sensor networks: Shuffled frog leaping algorithm.
Appl. Soft Comput. 2018, 71, 568–590. [CrossRef]
65. Amgoth, T.; Jana, P.K. Energy-aware routing algorithm for wireless sensor networks. Comput. Electr. Eng. 2015, 41, 357–367.
[CrossRef]
66. Nykyri, M.; Kuisma, M.; Kärkkäinen, T.J.; Hallikas, J.; Jäppinen, J.; Korpinen, K.; Silventoinen, P. IoT Demonstration Platform
for Education and Research. In Proceedings of the 2019 IEEE 17th International Conference on Industrial Informatics (INDIN),
Helsinki, Finland, 22–25 July 2019; Volume 1, pp. 1155–1162. [CrossRef]
67. Docker, I. Docker. 2017. Available online: https://www.docker.com/what-docker (accessed on 30 September 2020).
68. Composer, H. Hyperledger Composer Documentation. Linux Found. 2018. Available online: https://hyperledger.github.io/
composer/latest/introduction/introduction.html (accessed on 1 September 2020).
69. Performance, H.; Group, S.W. Hyperledger Blockchain Performance Metrics. White paper. 2018; Volume 1. Available online: https:
//www.hyperledger.org/wpcontent/uploads/2018/10/HL_Whitepaper_Metrics_PDF_V1 (accessed on 30 September 2020).
70. Caliper, H. Hyperledger Caliper Architecture. Electronic Article. 2019. Available online: https://hyperledger.github.io/caliper/
docs/2_Architecture (accessed on 15 September 2020).
71. Kokoris-Kogias, L.; Gasser, L.; Khoffi, I.; Jovanovic, P.; Gailly, N.; Ford, B. Managing identities using blockchains and CoSi.
In Proceedings of the 9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2016), Darmstadt, Germany,
19–22 May 2016.
72. Aitzhan, N.Z.; Svetinovic, D. Security and privacy in decentralized energy trading through multi-signatures, blockchain and
anonymous messaging streams. IEEE Trans. Dependable Secur. Comput. 2016, 15, 840–852. [CrossRef]
73. Wang, K.; Shao, Y.; Shu, L.; Zhu, C.; Zhang, Y. Mobile big data fault-tolerant processing for ehealth networks. IEEE Netw. 2016,
30, 36–42. [CrossRef]
74. Wan, J.; Li, J.; Imran, M.; Li, D. A blockchain-based solution for enhancing security and privacy in smart factory. IEEE Trans. Ind.
Informatics 2019, 15, 3652–3660. [CrossRef]
75. Lu, Q.; Xu, X. Adaptable blockchain-based systems: A case study for product traceability. IEEE Softw. 2017, 34, 21–27. [CrossRef]
Sensors 2021, 21, 772 26 of 26

76. Li, Z.; Kang, J.; Yu, R.; Ye, D.; Deng, Q.; Zhang, Y. Consortium blockchain for secure energy trading in industrial internet of things.
IEEE Trans. Ind. Informatics 2017, 14, 3690–3700. [CrossRef]
77. Esposito, C.; Santis, A.; Tortora, G.; Chang, H.; Choo, K. Blockchain: A panacea for healthcare cloud-based data security and
privacy? IEEE Cloud Comput. 2018, 5, 31–37. [CrossRef]
78. Rahman, M.A.; Hossain, M.S.; Loukas, G.; Hassanain, E.; Rahman, S.S.; Alhamid, M.F.; Guizani, M. Blockchain-based mobile
edge computing framework for secure therapy applications. IEEE Access 2018, 6, 72469–72478. [CrossRef]
79. Liu, H.; Zhang, Y.; Yang, T. Blockchain-enabled security in electric vehicles cloud and edge computing. IEEE Netw. 2018, 32, 78–83.
[CrossRef]
80. Kang, J.; Yu, R.; Huang, X.; Wu, M.; Maharjan, S.; Xie, S.; Zhang, Y. Blockchain for secure and efficient data sharing in vehicular
edge computing and networks. IEEE Internet Things J. 2018, 6, 4660–4670. [CrossRef]

You might also like