Internet of Things IoT Security With Blockchain Technology a State-Of-The-Art Review- Read
Internet of Things IoT Security With Blockchain Technology a State-Of-The-Art Review- Read
ABSTRACT With the rapid enhancement in the design and development of the Internet of Things creates a
new research interest in the adaptation in industrial domains. It is due to the impact of distributed emerging
technology and topology of industrial Internet of Things and the security-related resource constraints
of industrial 5.0. This conducts new paradigm along with critical challenges to the existing information
preservation, node transactions and communication, transmission, trust and privacy, and security protection
related problems. These critical aspects pose serious limitations and issues for the industry to provide
industrial data integrity, information exchange reliability, provenance, and trustworthiness for the overall
activities and service delivery prospects. In addition, the intersection of blockchain and industrial IoT
has gained more consideration and research interest. However, there is an emerging limitation between
the inadequate performance of industrial IoT and connected nodes, and the high resource requirement of
permissioned private blockchain ledger has not yet been tackled with the complete solution. Due to the
introductions of NuCypher Re-Encryption infrastructure, hashing tree and allocation, and deployment of
blockchain proof-of-work required more computational power as well. This paper is divided into three
different folds; first, we studied various related literature of blockchain-enabling industrial Internet of
Things and its critical implementation challenging aspects along with the solution. Secondly, we proposed
a blockchain hyperledger sawtooth-enabled framework. This framework provides a secure and trusted
execution environment, in which service delivery mechanisms and protocols are designed with an acknowl-
edgment, including the immutable ledger storage security, along with the peer-to-peer network on-chain
and off-chain communication of industrial activities. Thirdly, we design pseudo-chain codes and consensus
protocols to provide smooth industrial node streamline transactions and broadcast content. The proposed
multiple proof-of-work investigated and simulated using Hyperledger Sawtooth-enabled docker for testing
to exchange information between connected devices of industrial Internet of Things within the limited usage
of resource constraints.
INDEX TERMS Blockchain, hyperledger technology, chain codes (smart contracts), Internet of Things
(IoT), nucypher re-encryption, Industrial Internet of Things (IIoT).
I. INTRODUCTION smart communication with different service automation that
The changeover in information technology because of the reduces the human affords [1]. It is also because of the
evaluation and development of the Internet of Things exponential growth of artificial intelligence (AI), distributed
(IoT). This digital connection establishes a node-to-node connectivity, and intelligent communication protocols, which
enabled dynamic data optimization and management in
The associate editor coordinating the review of this manuscript and industrial processes [2]. In the beginning, digitalization has
approving it for publication was Stefano Scanzio . been focused on the efficiency of operational industrial data
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
VOLUME 10, 2022 122679
A. A. Khan et al.: Internet of Things (IoT) Security With Blockchain Technology: A State-of-the-Art Review
permissioned modular infrastructure that handles events of all the IoT-related operations, including sensor-based data
nodes transaction execution and preserves individual logs on acquisition, streamlining business processes, automating task
immutable storage to enable a transparent process of IIoT execution, efficient business decision, and accessibility. How-
[20], [21]. However, the IIoT-enabled events are stored in ever, the process of IoT-enabling devices-based generated
chronological order in the chain-like structure that is con- data capturing, examining, analyzing, preserving, presenting,
nected with two different channels (on-chain and off-chain) in and reporting are designed for secure interpreting the chain-
a peer-to-peer (P2P) network. In addition, customizable chain of-analyzed records. This act ensures security and privacy for
codes are provided that allow for the management of dynamic the whole IoT-related transactions and stores detail of each
deliverance and automate control transactions to achieve event of execution in the form of data blocks in the immutable
decentralized autonomous execution. This immutable ledger storage (IPFS).
provides nonrepudiation information management, in which
this industrial information is hard to tamper with and forged B. RESEARCH OBJECTIVES AND CONTRIBUTIONS
and retain details in a protected manner in a data preservation
The critical objective of this study is to improve the process
container (InterPlanetary File Storage) [22].
of IoT-enabled devices data investigation, including data cap-
The blockchain enabling technologies have been envi-
ture, examination, analysis, preservation, presentation, and
sioned, utilized, and adopted for different industrial
documentation, that is used in the industrial environment
production units to achieve integrity, transparency, traceabil-
for the purpose of security measures. To perform a dynamic
ity, and provenance to enable secure industrial data analysis
structure deliverance and maintain a secure infrastructure
and storage [23]. Whereas most of the IIoT experts are
for IoT-based transactions to trace exactly what factors are
shifting towards blockchain and utilizing this technology as
involved in the distributed network or between computing
its decentralized nature, which provides strong protection
nodes that affect ecosystems execution. And so, an adequate
against a number of cyber-attacks [24]. The variety of attacks
process of analysis for it to mitigate the involving risk in the
is usually intended for client-server-based architecture and
events of IoT-nodes transactions execution and management
other relevant types of centralized systems [25], [26]. In fact,
throughout the lifecycle. However, the blockchain-enabling
the blockchain decentralized modular architecture enables
technology is attaining more acceptance and adaptation as
IIoT ecosystems to enhance the defense between distributed
it is being used to protect the process of IoT-based data
IoT nodes and their ability to deliver in a protected way
collection. It also provides a secure channel against malicious
using cryptographic encryption/NuCypher Re-Encryption
attacks and the intruders involved in the current sensors net-
algorithm. However, the technology is also able to deploy
work environment. These incidents are reported that help to
intrusion detection that provides prevention and restricts
interpret and create attributes of the security and privacy lacks
malicious attacks. Installation of firewalls, anti-disclosure
so it can be restricted in the future. Because of blockchain
tools, procedures, and protocols implementation ensure by
distributed ledger technology, the detailed report of vulner-
the platform that guarantees the security, privacy, and infor-
abilities is preserved in the immutable storage along with
mation immutability along with ledger transparency and
the depositions and related testimonies registration. The main
trustworthiness [27].
contributions of this paper are discussed as follows:
A. MOTIVATION • In this paper, we studied more than a hundred research
This paper addresses the current security and privacy articles based on the Internet of Things (IoT), indus-
challenges and limitations in the industrial IoT envi- trial data management, distributed network connectivity,
ronment. It also highlights the involving implementation communication protocols, blockchain, and hyperledger
and deployment-related issues while connecting two or technology. The main highlight of this study is to define
more nodes together. Interoperability is another challeng- privacy and security and related concerns in the current
ing prospect that is a concern in this paper and proposed deployment of IoT in the industrial environment. For
a solution in terms to design a consortium communica- instance, the review perspective is reported in accor-
tion channel, where both the private and public trans- dance with the shape of a systematic point-of-view.
actions take place over the protected Peer-to-Peer (P2P) • A novel and secure blockchain hyperledger-enabled
network, respectively. In this regard, a novel and secure framework is proposed for the industrial internet of
blockchain-enabled framework is proposed. This proposed things (IIoT) along with the process hierarchy of trans-
framework provides robust security while IoT-based trans- action executions.
actions initiate from the source to the destination (devices- • This paper presents different chain codes for the purpose
to-device) over the consortium network. Throughout the data to automate events of nodes transactions executions,
deliverance, the protection of individual data packages is pos- such as IoT-enabled industrial devices registration,
sible because of NuCypher Re-Encryption (batch-to-batch the process of data collection and examination, data
privacy). This collaborative approach of IoT-blockchain preservation, management, and organization, and man-
provides proper ledger integrity, transparency, provenance, aging distributed network transmission (on-chain and
traceability, trustworthiness, and assurance for performing off-chain) automatically, respectively.
• The hyperledger sawtooth-enabled pre-defined consen- the technology is designed to redefine the industrial domain
sus is tuned in accordance with the limited range, which [34]. To make IIoT more efficient and reliable, various
means reducing the consumption of blockchain dis- experts present different proposed methods that create the
tributed resources in terms of computational energy, the current ecosystems better. And so, these previous publi-
bandwidth of network transmission, and storage. cations defined the level of improvement in the develop-
• At last, we evaluate, examine, and analyze various ment of industrial IoT [35], such as smart communication,
involving designed-related futuristic issues, challenges, distributed network, dynamic nodes transactions execution,
and limitations. And so, mentioned a few solutions that services deliverance, information preservation, security, and
make IoT-enabled industrial ecosystems more efficient privacy.
and reliable and provide effective performance in a dis- However, the number of features of intelligent indus-
tributed network environment. trial and manufacturing executions are listed as foll-
The remainder of this paper is organized as follows. ows [35]: (i) Digitalization, (ii) Intelligent automation,
In Section 2, various literature is discussed related to the (iii) Service-orientation, (iv) Smart connection and commu-
different industrial IoT-based devices and their security and nication, (v) Digital equipment, (vi) Collaborative network,
privacy protocols. And so, the role of blockchain-enabling (vii) Cost-efficient and flexibility preservation. These are the
technology and its associated impact on the recent reasons that enhance the performance of industrial and man-
developing environment is discussed. The application of ufacturing executions in industry 4.0, which directly affects
blockchain-enabled IIoT ledger protection and privacy the rate of productivity, and reduce human interventions with
are discussed in Section 3. In Section 4, a blockchain the use of artificial intelligence and cognitive automation
hyperledger-enabled novel and secure framework are pro- in the industry [36]. For instance, it is hard to say that the
posed for industrial IoT. The list of involving implementation industrial production units are fully capable to automate all
and deployment-related issues, challenges, and limitations the sectors’ transactions executions; there is a certain gap that
and their possible solutions are mentioned in Section 5. needs customize solutions to improve systems executions for
Finally, we conclude this research in Section 6. the sake of intelligent manufacturing and productivity.
The efficient communication that resists attacks is pro-
posed by Liu et al. [36], which described the use of federated
II. AN INTEGRATION OF INTERNET OF THINGS WITH learning in an industrial IoT environment. This collaborative
BLOCKCHAIN TECHNOLOGY technology significantly promotes the development of the
Internet of Things (IoT) technology has become one of the fourth industrial revolution (industry 4.0) [37]. Through this,
promising setups for industrial, production, supply chain, and the existing federated learning with IIoT faces two differ-
manufacturing ecosystems [28]. Various experts on IoT ana- ent types of critical issues, one is information privacy and
lyze the billion-dollar impact of internet things in the indus- security, and the other is communication overhead [38]. It is
trial environment [29]. Currently, an on-demand model of considered one of the costliest communication methods while
industrial, production and manufacturing running that lever- training a huge scale of multi-node modeling. However, there
ages internet of things, such as cloud-enabled industrial and are a lot of vulnerabilities involved that are recorded due to
manufacturing technology [30]. This model enables a number the weak security of federated learning, which leads to label
of ubiquitous, on-demand, convenient, client-server-based flipping and gradient leakage-based attacks [39], [40]. The
network access, a shared pool of resources, and dynamic process of training the general model is compromised directly
configuration, that required minimal management and effort by different adversaries.
from services providers [31]. However, in this paper, we also Thereby, there are several collaborative approaches pro-
provide detail of industrial IoT evaluation with the reason posed by various experts of IIoT; in this scenario, Zhou et al.
for adaptation of the distributed environment. Various related [41] presented a revolutionaries futuristic manufacturing and
literature is studied, in which several benefits of industrial IoT industrial setup by integrating the IoT and machine learning
are highlighted along with the privacy and security measures technologies into an industrial setting. With this development
of existing associative. and deployment, a massive network is handled, which sup-
ports a powerful data-driven structure to optimize the load
A. INDUSTRIAL INTERNET OF THINGS (IIoT) AND of the wireless network [42]. Recently, the quality-of-service
SMART INDUSTRIES requirements of the IIoT non-critical and critical aspects are
In general, intelligent industrial and manufacturing execu- another challenging problem that needs concern along with
tion is a concept of the Industrial Internet of Things (IIoT) the cross-layer issue in the current industrial IoT [42].
and the processes of smart service deliverance that drive a
new paradigm to facilitate the next generation of automation B. BLOCKCHAIN ENABLING TECHNOLOGY
[32], [33]. However, the concept of industrial and intelli- The distributed ledger technology enables stakeholders to
gent manufacturing utilizes a collection of distinct methods verify and validate, store, and synchronize the contents of
that correspond to new tendencies in the client-server-based information duplication with the secure and protected form
centralized network, where information is traveled. In fact, by connected participants [43]. This ledger technology has
provided various considerable benefits and incentives to detailed design of individual layers and their role in the
enterprises, such as enabling better services and efficient industrial environment are discussed as follows:
deliverance [44]. In addition, it also emphasizes various mod-
els and innovations of the IoT and AI revolutions. It has a 1) APPLICATION LAYER
direct impact on all manufacturing and industrial things and This layer is able to handle various running applications that
makes an opportunity to improve industrial processes and cre- need to control and monitor dynamically while IoT devices
ate trust in information exchanging and records management are connected. It is a layer that played an intermediate role
in day-to-day units. However, a few involving challenges between participating stakeholders and their interconnected
and limitations are highlighted in the domain of blockchain nodes [59]. In fact, the layer acts as a mediator to handle end-
enabling the industrial internet of things as follows (as to-end nodes and their transactions executions and networks,
discussed in Table 1): as shown in Figure 2. And so, it creates communication chan-
nels with the authorized automated software components that
III. BLOCKCHAIN-ENABLED SECURITY IN INDUSTRIAL are connected with the centralized database in accordance
IoT ENVIRONMENT with the existing client-server-based protocols.
The rapid enhancement in the current industrial IoT makes
the system more efficient and reliable; apart from this, intel- 2) SUPPORT LAYER
ligent and self-adaptive devices of the internet of things are A support/middleware layer is used in the central server archi-
gathering attention towards itself in this recent era. The main tecture ‘‘a three-level traditional setup’’ is enough to protect
purpose is to provide an accurate collective environment to as the detail is directly passed to the internet layer (respon-
capture a large amount of data, efficient processing, exam- sible for data transmission among intelligent devices) [60],
ination, and information exchanging between participating [61]. At the same time, it establishes breaches for the purpose
stakeholders [51], [52]. However, the process of industrial to tackle various types of malicious attacks. To reduce the
self-adaptation is unsecure; there are various gaps that affect rate of attacks, the middleware layer supports the previous
(the operating system) and slow down the manufacturing three-level architecture to handle a number of implicit flaws
and production executions, such as a delay due to mali- involved in the industrial environment and protect against
cious attacks, dependencies in the layered hierarchy, ledger malicious attacks. However, the working of the middleware
preservation-related problems [53]. And so, most of the layer is defined as the industrial data collected from the
conventional privacy and security algorithms (for example, perception layer, which is authenticated with the private key
traditional cryptography) are not up to mark to prevent indus- cryptography. And so, it is transmitted to the internet layer,
trial actions. respectively. Recently, some attacks are needed the concern
In this manner, various experts of IIoT and enterprises of experts in the domain of industrial security, which directly
managements are shifting towards distributed environment affect the production systems, such as distributed denial of
and adopts blockchain hyperledger technologies. It leads service (DDoS), phishing, unauthorized access, and mali-
to build smart, intelligent, and secure industrial processes cious insiders.
and structures for robust productivity. In industrial things,
blockchain hyperledger technology provides a secure, effi- 3) PERCEPTION LAYER
cient, trustworthy, reliable, and sustainable platform that The perception layer is integrated with the physical and
manages authentication by introducing blocks of chain in sensor devices [62]. The main objective of this layer is to pro-
a chronological order, which consumes less computational vide IoT devices registration details (identity) and connected
energy along with preservation [54], [55]. network records. After that, it collects data (homogeneous
nature) and sends it to the client-server environment for fur-
A. THE CURRENT ARCHITECTURE OF IIoT ther processing, as shown in Figure 2. However, this layer is
more sensitive and most probabilistic to be attacked because
Currently, there is no single technology and reserved proto-
of weak layered protocols. This list of related attacks is as
cols, procedure, and standards to design, create, and establish
follows [63]:
the secure Internet of Things architecture. Indeed, it is the
platform that needs concerns, most importantly, on the IoT • Eavesdropping
with industrial infrastructure and related applications used • Tampering and forgery of ledger
recently. IIoT is a collaborative system with smart, inter- • Node capturing
dependent, interconnected nodes of heterogeneous nature, • Replay and time attacks, etc.
wireless sensors, transaction processors, actuators, network
connectives, and transceivers in the existing environment. 4) SECURE BUSINESS LAYER
However, these integrated technologies and their working This layer is used for managing secure enterprise-related
operations are categorized into four different layers [56], [57], transactions according to the defined business rules [64], [65].
[58]. Each has some preliminaries to establish a connection, The contracts/rules are designed for secure IIoT transactions
interaction, and communication between IoT devices. The execution, which is also applied to manage and handle the
overall IoT system, as shown in Figure 2. In the industrial manufacturing, and production. Recently, the technology is
environment, these contracts are deployed to tackle traf- expected to project an increase up to 540% in the coming
fic of business applications, models of profit and analysis, next couple of years; and so, to almost 20+ million sensor
and personal information of participated stakeholders related points installed [66], [67]. Apart from this, it helps to develop
problems. wireless connectivity for efficient communication, power
management, large miniaturization, and embedded comput-
B. ROLE OF WIRELESS SENSOR NETWORKS IN INDUSTRY, ing systems that lead the technology for most demanding in
VULNERABILITY, AND SECURITY PATCHES every aspect of smart factories [67], [68]. One more reason
In an industrial environment, wireless sensor networks for the growth is that the technology is accepted in a reliable
have gained ground almost in every unit of industrial, manner; most of the industrial uses are shifted towards, that
FIGURE 4. The proposed industrial iot with blockchain hyperledger sawtooth-enabled privacy preservation and security solution.
TABLE 2. Pseudo-contract: A conceptual chain code, consensus TABLE 2. (Continued.) Pseudo-contract: A conceptual chain code,
protocols, and executions. consensus protocols, and executions.
TABLE 3. Comparative analysis with other states of the art Hyperledger (1).
TABLE 4. Comparative analysis with other states of the art Hyperledger (2).
smart production units, manufacturing systems, supply chain efficient platform and their standard approach with improved
management, and monitoring ecosystems. However, by this quality of finishing results [94].
adaptation, the solution can provide a more efficient and
effective industrial environment that supports and manage C. DISTRIBUTED PRESERVATION AND PRIVACY ISSUES
a secure service deliverance of industrial things-enabled The significant objective of this solution is to proper
transactions in a better manner in the distributed network use of blockchain-enabling technology in the industrial
infrastructure [92]. A single node of this designed plat- environment for the purpose to protect personal information-
form, and various distinct nodes of other chains direct inter- connected participants, overall industrial transactions, data
act, communicate, exchange, and manage transactions in a scheduling and processing, computation management, and
secure preservation channel, and conduct meaningful nodes organization, and gratifying individual types of records [94],
activities in the industrial environment. The existing legacy [95]. All the records are stored on the blockchain distributed
of industry, the process of production and services deliv- immutable storage along with the process of memory sched-
erance, and the current network structure create a lack of ule (in terms of static, and dynamic). For the data manage-
cross-chaining and intercommunication. Till now, it is hard ment and preservation, there are two channels are derived
to adopt and deploy platform interoperability between the to maintain inner and outer layer transactions properly and
devices and the industry due to the distribution and unsecure concurrently, such as on-chain and off-chain communication.
connectivity. The on-chain communication executes internal transactions,
while the off-chain handles all the transactions and preserva-
tion explicitly. In the industrial ecosystems, the information
B. LACK OF INDUSTRIAL STANDARDIZATION of different units, such as production, supply chain, etc.
In this context, the IIoT ecosystem analysis every perspective is more sensitive and confidential. To protect communica-
of industrial things involved in the domain. There is a various tion channels while the data is exchanged, for example,
range of data generation and processing that contributes to a production records, processing information, supply chain,
lack of standardization in every channel of IoT because no and data sharing details, record management, organization,
standard protocols are established and yet not to be presented optimization, and computation; these issues consider one
[92], [93]. However, the process layer of IIoT from data of the challenging aspects in the current IIoT. In this sce-
generation, capturing, and examination to documenting indi- nario, the individual information must check against and ana-
vidual records are less reliable. As a result, the unavoidable lyzed before being preserved in the distributed storage [96].
distort consequences are provided, with minimal quality and In addition, the most critical prospect is to structure preserved
consistency along with the increased rate of resource con- records in the blockchain network. The unexceptional trans-
straints consumption. To standardize the process of execution action in this distributed network makes more costly services
of IIoT, the blockchain hyperledger technology enforces an deliverance that directly affects the market cost.
• IIoTReg() = Industrial Internet of Things-enabled [15] B. Jiang, J. Li, G. Yue, and H. Song, ‘‘Differential privacy for
devices registration industrial Internet of Things: Opportunities, applications, and
challenges,’’ IEEE Internet Things J., vol. 8, no. 13, pp. 10430–10451,
• Manu&ProAddRec() = Add New Records of Manufac- Jul. 2021.
turing and Productions of IIoT [16] A. Corallo, M. Lazoi, M. Lezzi, and A. Luperto, ‘‘Cybersecurity
• updateRec() = Update Records awareness in the context of the industrial Internet of Things: A
systematic literature review,’’ Comput. Ind., vol. 137, May 2022,
• QoS = Quality of Service Art. no. 103614.
• 5G = Fifth generation network/Internet [17] X. Cai, S. Geng, J. Zhang, D. Wu, Z. Cui, W. Zhang, and
• DDoS = Distributed Denial of Service J. Chen, ‘‘A sharding scheme-based many-objective optimization algo-
rithm for enhancing security in blockchain-enabled industrial Internet
• LAN = Local Area Network of Things,’’ IEEE Trans. Ind. Informat., vol. 17, no. 11, pp. 7650–7658,
• Industry 4.0 = The Fourth Industrial Revolution Nov. 2021.
• PoW = Proof-of-Work [18] B. Sujitha, V. S. Parvathy, E. L. Lydia, P. Rani, Z. Polkowski, and
K. Shankar, ‘‘Optimal deep learning based image compression technique
• IoPS = Internet of Production System for data transmission on industrial Internet of Things applications,’’
Trans. Emerg. Telecommun. Technol., vol. 32, Apr. 2020, Art. no. e3976.
REFERENCES [19] N. Malik, K. Alkhatib, Y. Sun, E. Knight, and Y. Jararweh, ‘‘A compre-
hensive review of blockchain applications in industrial Internet of Things
[1] J. Wang, M. K. Lim, C. Wang, and M.-L. Tseng, ‘‘The evolution of the and supply chain systems,’’ Appl. Stochastic Models Bus. Ind., vol. 37,
Internet of Things (IoT) over the past 20 years,’’ Comput. Ind. Eng., no. 3, pp. 391–412, May 2021.
vol. 155, May 2021, Art. no. 107174. [20] A. A. Khan, A. A. Laghari, A. A. Shaikh, S. Bourouis, A. M. Mamlouk,
[2] A. A. Laghari, K. Wu, R. A. Laghari, M. Ali, and A. A. Khan, ‘‘A review and H. Alshazly, ‘‘Educational blockchain: A secure degree attestation
and state of art of Internet of Things (IoT),’’ Arch. Comput. Methods Eng., and verification traceability architecture for higher education commis-
vol. 29, pp. 1395–1413, Jul. 2021. sion,’’ Appl. Sci., vol. 11, no. 22, Nov. 2021, Art. no. 10917.
[3] P. K. Malik, R. Sharma, R. Singh, A. Gehlot, S. C. Satapathy, [21] R. Kumar, F. K. Lakshmana, S. Kadry, and S. Rho, ‘‘A survey on
W. S. Alnumay, D. Pelusi, U. Ghosh, and J. Nayak, ‘‘Industrial Internet blockchain for industrial Internet of Things,’’ Alexandria Eng. J., vol. 61,
of Things and its applications in industry 4.0: State of the art,’’ Comput. no. 8, pp. 6001–6022, 2022.
Commun., vol. 166, pp. 125–139, Jan. 2021. [22] A. A. Khan, Z. A. Shaikh, L. Belinskaja, L. Baitenova, Y. Vlasova,
[4] R. Huo, S. Zeng, Z. Wang, J. Shang, W. Chen, T. Huang, S. Wang, Z. Gerzelieva, A. A. Laghari, A. A. Abro, and S. Barykin, ‘‘A blockchain
F. R. Yu, and Y. Liu, ‘‘A comprehensive survey on blockchain in indus- and Metaheuristic-enabled distributed architecture for smart agricultural
trial Internet of Things: Motivations, research progresses, and future analysis and ledger preservation solution: A collaborative approach,’’
challenges,’’ IEEE Commun. Surveys Tuts., vol. 24, no. 1, pp. 88–122, Appl. Sci., vol. 12, no. 3, p. 1487, Jan. 2022.
1st Quart., 2022. [23] Q. Zhang, Y. Li, R. Wang, L. Liu, Y. Tan, and J. Hu, ‘‘Data security
[5] S. Latif, Z. Idrees, J. Ahmad, L. Zheng, and Z. Zou, ‘‘A blockchain-based sharing model based on privacy protection for blockchain-enabled indus-
architecture for secure and trustworthy operations in the industrial Inter- trial Internet of Things,’’ Int. J. Intell. Syst., vol. 36, no. 1, pp. 94–111,
net of Things,’’ J. Ind. Inf. Integr., vol. 21, Mar. 2021, Art. no. 100190. Jan. 2021.
[6] A. A. Khan, A. A. Shaikh, Z. A. Shaikh, A. A. Laghari, and S. Karim, [24] M. Sharma, S. Pant, D. K. Sharma, K. D. Gupta, V. Vashishth, and
‘‘IPM-model: AI and Metaheuristic-enabled face recognition using image A. Chhabra, ‘‘Enabling security for the industrial Internet of Things using
partial matching for multimedia forensics investigation with genetic deep learning, blockchain, and coalitions,’’ Trans. Emerg. Telecommun.
algorithm,’’ Multimedia Tools Appl., vol. 81, no. 17, pp. 23533–23549, Technol., vol. 32, no. 7, 2021, Art. no. e4137.
Jul. 2022. [25] A. A. Khan, Z. A. Shaikh, A. A. Laghari, S. Bourouis, A. A. Wagan, and
[7] D. G. S. Pivoto, L. F. F. de Almeida, R. da Rosa Righi, G. A. A. A. Ali, ‘‘Blockchain-aware distributed dynamic monitoring: A
J. J. P. C. Rodrigues, A. B. Lugli, and A. M. Alberti, ‘‘Cyber-physical smart contract for fog-based drone management in land surface changes,’’
systems architectures for industrial Internet of Things applications in Atmosphere, vol. 12, no. 11, p. 1525, Nov. 2021.
industry 4.0: A literature review,’’ J. Manuf. Syst., vol. 58, pp. 176–192, [26] R. Saha, G. Kumar, M. Conti, T. Devgun, T.-H. Kim, M. Alazab, and
Jan. 2021. R. Thomas, ‘‘DHACS: Smart contract-based decentralized hybrid access
[8] Y. Guo, Z. Zhao, K. He, S. Lai, J. Xia, and L. Fan, ‘‘Efficient and flex- control for industrial Internet-of-Things,’’ IEEE Trans. Ind. Informat.,
ible management for industrial Internet of Things: A federated learning vol. 18, no. 5, pp. 3452–3461, May 2022.
approach,’’ Comput. Netw., vol. 192, Jun. 2021, Art. no. 108122. [27] Y. P. Tsang, C. H. Wu, W. H. Ip, and W.-L. Shiau, ‘‘Exploring the intel-
[9] R. A. Khalil, N. Saeed, M. Masood, Y. M. Fard, M.-S. Alouini, and lectual cores of the blockchain–Internet of Things (BIoT),’’ J. Enterprise
T. Y. Al-Naffouri, ‘‘Deep learning in the industrial Internet of Things: Inf. Manage., vol. 34, no. 5, pp. 1287–1317, Nov. 2021.
Potentials, challenges, and emerging applications,’’ IEEE Internet Things [28] M. A. Khan and K. A. Abuhasel, ‘‘Advanced metameric dimension frame-
J., vol. 8, no. 14, pp. 11016–11040, Jul. 2021. work for heterogeneous industrial Internet of Things,’’ Comput. Intell.,
[10] A. A. Khan, A. A. Laghari, and S. A. Awan, ‘‘Machine learning in vol. 37, no. 3, pp. 1367–1387, Aug. 2021.
computer vision: A review,’’ EAI Trans. Scalable Inf. Syst., vol. 8, no. 32, [29] I. U. Din, A. Bano, K. A. Awan, A. Almogren, A. Altameem, and
p. e4, 2021. M. Guizani, ‘‘LightTrust: Lightweight trust management for edge devices
[11] W. Mao, Z. Zhao, Z. Chang, G. Min, and W. Gao, ‘‘Energy- in industrial Internet of Things,’’ IEEE Internet Things J., early access,
efficient industrial Internet of Things: Overview and open issues,’’ May 18, 2021, doi: 10.1109/JIOT.2021.3081422.
IEEE Trans. Ind. Informat., vol. 17, no. 11, pp. 7225–7237, [30] D. C. Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, D. Niyato,
Nov. 2021. and H. V. Poor, ‘‘Federated learning for industrial Internet of Things in
[12] X. Wang, S. Garg, H. Lin, J. Hu, G. Kaddoum, M. J. Piran, and future industries,’’ IEEE Wireless Commun., vol. 28, no. 6, pp. 192–199,
M. S. Hossain, ‘‘Toward accurate anomaly detection in industrial Internet Dec. 2021.
of Things using hierarchical federated learning,’’ IEEE Internet Things J., [31] L. C. Souza, E. R. Neto, E. S. Lima, and A. C. S. Junior, ‘‘Optically-
vol. 9, no. 10, pp. 7110–7119, May 2022. powered wireless sensor nodes towards industrial Internet of Things,’’
[13] G. Rathee, F. Ahmad, R. Sandhu, C. A. Kerrache, and M. A. Azad, Sensors, vol. 22, no. 1, p. 57, Dec. 2021.
‘‘On the design and implementation of a secure blockchain-based hybrid [32] R. G. Lins and S. N. Givigi, ‘‘Cooperative robotics and machine learning
framework for industrial Internet-of-Things,’’ Inf. Process. Manage., for smart manufacturing: Platform design and trends within the context
vol. 58, no. 3, May 2021, Art. no. 102526. of industrial Internet of Things,’’ IEEE Access, vol. 9, pp. 95444–95455,
[14] J. Franco, A. Aris, B. Canberk, and A. S. Uluagac, ‘‘A survey of honeypots 2021.
and honeynets for Internet of Things, industrial Internet of Things, and [33] J. Bader and A. L. Michala, ‘‘Searchable encryption with access control in
cyber-physical systems,’’ IEEE Commun. Surveys Tuts., vol. 23, no. 4, industrial Internet of Things (IIoT),’’ Wireless Commun. Mobile Comput.,
pp. 2351–2383, 4th Quart., 2021. vol. 2021, pp. 1–10, May 2021.
[34] A. Hazra, M. Adhikari, T. Amgoth, and S. N. Srirama, ‘‘A comprehensive [54] S. F. Tan and A. Samsudin, ‘‘Recent technologies, security countermea-
survey on interoperability for IIoT: Taxonomy, standards, and future sure and ongoing challenges of industrial Internet of Things (IIoT): A
directions,’’ ACM Comput. Surv., vol. 55, no. 1, pp. 1–35, Jan. 2023. survey,’’ Sensors, vol. 21, no. 19, p. 6647, Oct. 2021.
[35] S. Latif, M. Driss, W. Boulila, Z. E. Huma, S. S. Jamal, Z. Idrees, and [55] Y. Lin, Z. Gao, W. Shi, Q. Wang, H. Li, M. Wang, Y. Yang, and L. Rui,
J. Ahmad, ‘‘Deep learning for the industrial Internet of Things (IIoT): A ‘‘A novel architecture combining Oracle with decentralized learning
comprehensive survey of techniques, implementation frameworks, poten- for IIoT,’’ IEEE Internet Things J., early access, Feb. 11, 2022, doi:
tial applications, and future directions,’’ Sensors, vol. 21, no. 22, p. 7518, 10.1109/JIOT.2022.3150789.
Nov. 2021. [56] L. Arnold, J. Jöhnk, F. Vogt, and N. Urbach, ‘‘IIoT platforms’ archi-
[36] Y. Liu, R. Zhao, J. Kang, A. Yassine, D. Niyato, and J. Peng, ‘‘Towards tectural features—A taxonomy and five prevalent archetypes,’’ Electron.
communication-efficient and attack-resistant federated edge learning for Markets, vol. 32, no. 2, pp. 927–944, Jun. 2022.
industrial Internet of Things,’’ ACM Trans. Internet Technol., vol. 22, [57] K. Lin, X. Xu, and H. Gao, ‘‘TSCRNN: A novel classification scheme of
no. 3, pp. 1–22, Aug. 2022. encrypted traffic based on flow spatiotemporal features for efficient man-
[37] K. Mao, G. Srivastava, R. M. Parizi, and M. S. Khan, ‘‘Multi-source agement of IIoT,’’ Comput. Netw., vol. 190, May 2021, Art. no. 107974.
fusion for weak target images in the industrial Internet of Things,’’ [58] D. Stefanescu, P. Galán-García, L. Montalvillo, J. Unzilla, and A. Urbi-
Comput. Commun., vol. 173, pp. 150–159, May 2021. eta, ‘‘Towards a holistic DLT architecture for IIoT: Improved DAG for
[38] X. Chen, J. Hu, Z. Chen, B. Lin, N. Xiong, and G. Min, ‘‘A reinforcement production lines,’’ in International Congress on Blockchain and Applica-
learning-empowered feedback control system for industrial Internet of tions. Cham, Switzerland: Springer, 2021, pp. 179–188.
Things,’’ IEEE Trans. Ind. Informat., vol. 18, no. 4, pp. 2724–2733, [59] V. C. S. Rao, P. Kumarswamy, M. S. B. Phridviraj, S. Venkatramulu, and
Apr. 2022. V. S. Rao, ‘‘5G enabled industrial Internet of Things (IIoT) architecture
[39] A. A. Khan, A. A. Laghari, A. A. Shaikh, M. A. Dootio, V. V. Estrela, and for smart manufacturing,’’ in Data Engineering and Communication
R. T. Lopes, ‘‘A blockchain security module for brain-computer interface Technology. Singapore: Springer, 2021, pp. 193–201.
(BCI) with multimedia life cycle framework (MLCF),’’ Neurosci. Infor- [60] Y. Zhao, M. Prabhu, R. R. Ahmed, and A. K. Sahu, ‘‘Research trends
mat., vol. 2, no. 1, Mar. 2022, Art. no. 100030. and performance of IIoT communication network-architectural layers of
[40] A. Alharbi, W. Alosaimi, H. Alyami, H. T. Rauf, and R. Damaševičius, petrochemical industry 4.0 for coping with circular economy,’’ Wireless
‘‘Botnet attack detection using local global best bat algorithm for indus- Commun. Mobile Comput., vol. 2021, pp. 1–32, Apr. 2021.
trial Internet of Things,’’ Electronics, vol. 10, no. 11, p. 1341, Jun. 2021. [61] S. Sen and L. Song, ‘‘An IIoT-based networked industrial control system
[41] H. Zhou, C. She, Y. Deng, M. Dohler, and A. Nallanathan, ‘‘Machine architecture to secure industrial applications,’’ in Proc. IEEE Ind. Elec-
learning for massive industrial Internet of Things,’’ IEEE Wireless Com- tron. Appl. Conf. (IEACon), Nov. 2021, pp. 280–285.
mun., vol. 28, no. 4, pp. 81–87, Aug. 2021. [62] A. Makkar, T. W. Kim, A. K. Singh, J. Kang, and J. H. Park, ‘‘SecureI-
IoT environment: Federated learning empowered approach for securing
[42] L. Ma, X. Wang, X. Wang, L. Wang, Y. Shi, and M. Huang, ‘‘TCDA:
IIoT from data breach,’’ IEEE Trans. Ind. Informat., vol. 18, no. 9,
Truthful combinatorial double auctions for mobile edge computing in
pp. 6406–6414, Sep. 2022.
industrial Internet of Things,’’ IEEE Trans. Mobile Comput., vol. 21,
no. 11, pp. 4125–4138, Nov. 2022. [63] F. Banaie and M. Hashemzadeh, ‘‘Complementing IIoT services through
AI: Feasibility and suitability,’’ in AI-Enabled Threat Detection and
[43] M. K. Lim, Y. Li, C. Wang, and M.-L. Tseng, ‘‘A literature review of
Security Analysis for Industrial IoT. Cham, Switzerland: Springer, 2021,
blockchain technology applications in supply chains: A comprehensive
pp. 7–19.
analysis of themes, methodologies and industries,’’ Comput. Ind. Eng.,
[64] S. Mantravadi, C. Møller, C. Li, and R. Schnyder, ‘‘Design choices
vol. 154, Apr. 2021, Art. no. 107133.
for next-generation IIoT-connected MES/MOM: An empirical study on
[44] A. A. Khan, Z. A. Shaikh, L. Baitenova, L. Mutaliyeva, N. Moiseev,
smart factories,’’ Robot. Comput.-Integr. Manuf., vol. 73, Feb. 2022,
A. Mikhaylov, A. A. Laghari, S. A. Idris, and H. Alshazly, ‘‘QoS-ledger:
Art. no. 102225.
Smart contracts and Metaheuristic for secure quality-of-service and cost-
[65] P. Goswami, A. Mukherjee, M. Maiti, S. K. S. Tyagi, and L. Yang,
efficient scheduling of medical-data processing,’’ Electronics, vol. 10,
‘‘A neural-network-based optimal resource allocation method for secure
no. 24, p. 3083, Dec. 2021.
IIoT network,’’ IEEE Internet Things J., vol. 9, no. 4, pp. 2538–2544,
[45] K. Yu, L. Tan, M. Aloqaily, H. Yang, and Y. Jararweh, ‘‘Blockchain- Feb. 2022.
enhanced data sharing with traceable and direct revocation in IIoT,’’ IEEE
[66] A. Singh, S. Sharma, and J. Singh, ‘‘Nature-inspired algorithms for
Trans. Ind. Informat., vol. 17, no. 11, pp. 7669–7678, Nov. 2021.
wireless sensor networks: A comprehensive survey,’’ Comput. Sci. Rev.,
[46] G. Wang, ‘‘Sok: Applying blockchain technology in industrial Internet of vol. 39, Feb. 2021, Art. no. 100342.
Things,’’ Cryptol. ePrint Arch., to be published. [67] Y. Li, Q. Cheng, and W. Shi, ‘‘Security analysis of a lightweight identity-
[47] R. Sharma, ‘‘Blockchain for industrial Internet of Things (IIoT),’’ in based two-party authenticated key agreement protocol for IIoT environ-
Blockchain and AI Technology in the Industrial Internet of Things. Her- ments,’’ Secur. Commun. Netw., vol. 2021, pp. 1–6, Feb. 2021.
shey, PA, USA: IGI Global, 2021, pp. 32–47. [68] T. Yang, ‘‘Multiple fixed target location algorithms in large-scale MIMO
[48] S. Iqbal, R. M. Noor, A. W. Malik, and A. U. Rahman, ‘‘Blockchain- wireless sensor networks for IIoT,’’ IETE J. Res., pp. 1–10, 2022.
enabled adaptive-learning-based resource-sharing framework for IIoT [69] S. Messaoud, S. Bouaafia, A. Bradai, M. A. Hajjaji, A. Mtibaa, and
environment,’’ IEEE Internet Things J., vol. 8, no. 19, pp. 14746–14755, M. Atri, ‘‘Network slicing for industrial IoT and industrial wireless
Oct. 2021. sensor network: Deep federated learning approach and its implementation
[49] T. Liu, J. Liu, J. Wang, D. Zhai, Y. Liu, and X. He, ‘‘Anonymous storage challenges,’’ 2022.
and verification model of IIoT based on blockchain: Anonymous storage [70] A. N. Far, M. B. Hossein, A. K. Das, M. Fotouhi, S. M. Pournaghi, and
and verification model of IIoT production status based on blockchain,’’ M.-A. Doostari, ‘‘LAPTAS: Lightweight anonymous privacy-preserving
in Proc. 4th Int. Conf. Blockchain Technol. Appl., 2021, pp. 144–150. three-factor authentication scheme for WSN-based IIoT,’’ Wireless Netw.,
[50] P. Zhang, H. Sun, J. Situ, C. Jiang, and D. Xie, ‘‘Federated transfer vol. 27, no. 2, pp. 1389–1412, 2021.
learning for IIoT devices with low computing power based on blockchain [71] M. Ibrahim, M. T. Abdullah, A. Abdullah, and T. Perumal, ‘‘The impact of
and edge computing,’’ IEEE Access, vol. 9, pp. 98630–98638, 2021. memory-efficient bots on IoT-WSN botnet propagation,’’ Wireless Pers.
[51] S. Goyal, N. Sharma, I. Kaushik, and B. Bhushan, ‘‘Industrial revolution: Commun., vol. 119, no. 3, pp. 2093–2105, Aug. 2021.
Blockchain as a wave for industry 4.0 and IIoT,’’ Blockchain Appl. Secure [72] S. Singh and H. S. Saini, ‘‘PCTBC: Power control tree-based cluster
IoT Frameworks, Technol. Shaping Future vol. 1, p. 108, Jul. 2021. approach for sybil attack in wireless sensor networks,’’ J. Circuits, Syst.
[52] U. Majeed, L. U. Khan, I. Yaqoob, S. M. A. Kazmi, K. Salah, and Comput., vol. 30, no. 7, Jun. 2021, Art. no. 2150129.
C. S. Hong, ‘‘Blockchain for IoT-based smart cities: Recent advances, [73] K. Prathapchandran and T. Janani, ‘‘A trust aware security mechanism to
requirements, and future challenges,’’ J. Netw. Comput. Appl., vol. 181, detect sinkhole attack in RPL-based IoT environment using random forest
May 2021, Art. no. 103007. – RFTRUST,’’ Comput. Netw., vol. 198, Oct. 2021, Art. no. 108413.
[53] H. Khujamatov, E. Reypnazarov, D. Khasanov, and N. Akhmedov, ‘‘IoT, [74] P. S. Chatterjee, ‘‘Detection of node cloning attack in WSN to secure IoT-
IIoT, and cyber-physical systems integration,’’ in Emergence of Cyber based application: A systematic survey,’’ in IoT Applications, Security
Physical System and IoT in Smart Automation and Robotics. Cham, Threats, and Countermeasures. Boca Raton, FL, USA: CRC Press, 2021,
Switzerland: Springer, 2021, pp. 31–50. pp. 247–260.
[75] Yadav, Ashok, and Arun Kumar, ‘‘Intrusion detection and prevention [97] D. Job and V. Paul, ‘‘Challenges, security mechanisms, and research
using RNN in WSN,’’ in Inventive Computation and Information Tech- areas in IoT and IioT,’’ in Internet of Things and Its Applications. Cham,
nologies. Singapore: Springer, 2022, pp. 531–539. Switzerland: Springer, 2022, pp. 523–538.
[76] T. A. S. Srinivas and S. S. Manivannan, ‘‘Black hole and selective [98] S. R. Shakya and S. Jha, ‘‘Challenges in industrial Internet of Things
forwarding attack detection and prevention in IoT in health care sector: (IIoT),’’ in Industrial Internet of Things. Boca Raton, FL, USA: CRC
Hybrid meta-heuristic-based shortest path routing,’’ J. Ambient Intell. Press, 2022, pp. 19–39.
Smart Environ., vol. 13, no. 2, pp. 133–156, Mar. 2021. [99] Z. A. Shaikh, A. A. Khan, L. Baitenova, G. Zambinova, N. Yegina,
[77] K. Gulati, R. S. Kumar Boddu, D. Kapila, S. L. Bangare, N. Chandnani, N. Ivolgina, A. A. Laghari, and S. E. Barykin, ‘‘Blockchain hyper-
and G. Saravanan, ‘‘A review paper on wireless sensor network techniques ledger with non-linear machine learning: A novel and secure educational
in Internet of Things (IoT),’’ Mater. Today, Proc., vol. 51, pp. 161–165, accreditation registration and distributed ledger preservation architec-
2022. ture,’’ Appl. Sci., vol. 12, no. 5, p. 2534, Feb. 2022.
[78] S. Sharma and A. Kaur, ‘‘Survey on wireless sensor network, its appli- [100] A. Aoun, A. Ilinca, M. Ghandour, and H. Ibrahim, ‘‘A review of
cations and issues,’’ J. Phys., Conf. Ser., vol. 1969, no. 1, Jul. 2021, industry 4.0 characteristics and challenges, with potential improvements
Art. no. 012042. using blockchain technology,’’ Comput. Ind. Eng., vol. 162, Dec. 2021,
[79] I. Naydenova, Z. Kovacheva, and K. Kaloyanova, ‘‘Data quality: Enter- Art. no. 107746.
prise Initiatives’ issues and WSN challenges,’’ Sensors Transducers, [101] W. Zhou, M. Liu, C. Chen, and Z. Luo, ‘‘A research on the develop-
vol. 251, no. 4, pp. 37–46, 2021. ment and application of blockchain technology in industrial Internet of
[80] A. Miglani and N. Kumar, ‘‘Blockchain management and machine learn- Things,’’ in Proc. Comput., Commun. IoT Appl. (ComComAp), Nov. 2021,
ing adaptation for IoT environment in 5G and beyond networks: A pp. 83–88.
systematic review,’’ Comput. Commun., vol. 178, pp. 37–63, Oct. 2021. [102] R. Sethi, B. Bhushan, N. Sharma, R. Kumar, and I. Kaushik, ‘‘Appli-
[81] H. Wang, D. He, J. Yu, N. N. Xiong, and B. Wu, ‘‘RDIC: A blockchain- cability of industrial IoT in diversified sectors: Evolution, applications
based remote data integrity checking scheme for IoT in 5G networks,’’ and challenges,’’ in Multimedia Technologies in the Internet of Things
J. Parallel Distrib. Comput., vol. 152, pp. 1–10, Jun. 2021. Environment. Singapore: Springer, 2021, pp. 45–67.
[82] S. Rathore, J. H. Park, and H. Chang, ‘‘Deep learning and blockchain- [103] S. K. Dwivedi, P. Roy, C. Karda, S. Agrawal, and R. Amin,
empowered security framework for intelligent 5G-enabled IoT,’’ IEEE ‘‘Blockchain-based Internet of Things and industrial IoT: A com-
Access, vol. 9, pp. 90075–90083, 2021. prehensive survey,’’ Secur. Commun. Netw., vol. 2021, pp. 1–21,
[83] A. D. Dwivedi, R. Singh, K. Kaushik, R. R. Mukkamala, and Aug. 2021.
W. S. Alnumay, ‘‘Blockchain and artificial intelligence for 5G-enabled [104] S. Lee, M. Kim, J. Lee, R.-H. Hsu, and T. Q. S. Quek, ‘‘Is blockchain
Internet of Things: Challenges, opportunities, and solutions,’’ Trans. suitable for data freshness? An age-of-information perspective,’’ IEEE
Emerg. Telecommun. Technol., 2021, Art. no. e4329. Netw., vol. 35, no. 2, pp. 96–103, Mar. 2021.
[84] C. Feng, B. Liu, Z. Guo, K. Yu, Z. Qin, and K.-K.-R. Choo, ‘‘Blockchain- [105] Y. Zuo, ‘‘Making smart manufacturing smarter—A survey on blockchain
based cross-domain authentication for intelligent 5G-enabled Internet of technology in industry 4.0,’’ Enterprise Inf. Syst., vol. 15, no. 10,
Drones,’’ IEEE Internet Things J., vol. 9, no. 8, pp. 6224–6238, Apr. 2022. pp. 1323–1353, Nov. 2021.
[85] S. Kaushik, ‘‘Blockchain and 5G-enabled Internet of Things: Background [106] Y. Tian, T. Li, J. Xiong, M. Z. A. Bhuiyan, J. Ma, and C. Peng,
and preliminaries,’’ in Blockchain for 5G-Enabled IoT. Cham, Switzer- ‘‘A blockchain-based machine learning framework for edge services
land: Springer, 2021, pp. 3–31. in IIoT,’’ IEEE Trans. Ind. Informat., vol. 18, no. 3, pp. 1918–1929,
[86] C.-L. Chen, J. Yang, W.-J. Tsaur, W. Weng, C.-M. Wu, and X. Wei, Mar. 2022.
‘‘Enterprise data sharing with privacy-preserved based on hyperledger [107] Z. Fang, J. Wang, Y. Ren, Z. Han, H. V. Poor, and L. Hanzo, ‘‘Age
fabric blockchain in IIOT’s application,’’ Sensors, vol. 22, no. 3, p. 1146, of information in energy harvesting aided massive multiple access net-
Feb. 2022. works,’’ IEEE J. Sel. Areas Commun., vol. 40, no. 5, pp. 1441–1456,
[87] M. A. Ferrag and L. Shu, ‘‘The performance evaluation of blockchain- May 2022.
based security and privacy systems for the Internet of Things: A tutorial,’’
IEEE Internet Things J., vol. 8, no. 24, pp. 17236–17260, Dec. 2021.
[88] A. Banerjee, B. Dutta, T. Mandal, R. Chakraborty, and R. Mondal,
‘‘Blockchain in IoT and beyond: Case studies on interoperability and ABDULLAH AYUB KHAN received the Ph.D.
privacy,’’ in Blockchain based Internet Things. Springer, Singapore, 2022, degree from the Department of Computer Science,
pp. 113–138.
Sindh Madressatul Islam University, Karachi.
[89] P. W. Khan and Y.-C. Byun, ‘‘Secure transactions management using
He has published around 40 research articles in
blockchain as a service software for the Internet of Things,’’ in Software
Engineering in IoT, Big Data, Cloud and Mobile Computing. Cham,
well-reputed journals/publishers (such as IEEE
Switzerland: Springer, 2021, pp. 117–128. ACCESS, IEEE TRANSACTIONS, MDPI, Elsevier,
[90] R. Kumar, R. Sindhwani, and P. L. Singh, ‘‘IIoT implementation chal- Spring, Wiley, and Hindawi) in the domain of dig-
lenges: Analysis and mitigation by blockchain,’’ J. Global Operations ital forensics, cyber security, blockchain, hyper-
Strategic Sourcing, vol. 15, no. 3, pp. 363–379, Aug. 2022. ledger technology, cloud computing, and artificial
[91] N. Jha and D. Prashar, ‘‘Using blockchain in resolving the challenges intelligence.
faced by IIoT,’’ in Industrial Internet of Things. Boca Raton, FL, USA:
CRC Press, 2022, pp. 189–216.
[92] M. Kaur, M. Z. Khan, S. Gupta, and A. Alsaeedi, ‘‘Adoption of blockchain
with 5G networks for industrial IoT: Recent advances, challenges, and ASIF ALI LAGHARI received the B.S. and
potential solutions,’’ IEEE Access, vol. 10, pp. 981–997, 2022. master’s degrees in information technology from
[93] S. M. Umran, S. Lu, Z. A. Abduljabbar, J. Zhu, and J. Wu, ‘‘Secure data the Quaid-e-Awam University of Engineering Sci-
of industrial Internet of Things in a cement factory based on a blockchain ence and Technology Nawabshah, Pakistan, in
technology,’’ Appl. Sci., vol. 11, no. 14, p. 6376, Jul. 2021. 2007 and 2014, respectively. From 2007 to 2008,
[94] L. K. Ramasamy and S. Kadry, ‘‘Combination of blockchain and IIOT,’’
he was a Lecturer at the Computer and Information
in Blockchain in the Industrial Internet of Things, 2021.
Science Department, Digital Institute of Informa-
[95] A. A. Khan, A. A. Laghari, D.-S. Liu, A. A. Shaikh, D.-D. Ma,
tion Technology, Pakistan. In 2015, he joined the
C.-Y. Wang, and A. A. Wagan, ‘‘EPS-ledger: Blockchain hyperledger
sawtooth-enabled distributed power systems chain of operation and con- School of the Computer Science and Technology,
trol node privacy and security,’’ Electronics, vol. 10, no. 19, p. 2395, Harbin Institute of Technology, where he was a
Sep. 2021. Ph.D. Student. He is currently an Assistant Professor at Sindh Madressatul
[96] S. Najjar-Ghabel, S. Yousefi, and H. Karimipour, ‘‘Blockchain applica- Islam University, Karachi, Pakistan. He has published more than 60 tech-
tions in the industrial Internet of Things,’’ in AI-Enabled Threat Detection nical articles in scientific journals and conference proceedings. His current
and Security Analysis for Industrial IoT. Cham, Switzerland: Springer, research interests include machine learning, computer networks, cloud com-
2021, pp. 41–76. puting, the IoT, fog computing, and multimedia QoE management.
ZAFFAR AHMED SHAIKH received the Ph.D. SEBASTIAN KOT is currently an Associate Pro-
degree in computer sciences from IBA-Karachi, fessor of management and supply chain manage-
Pakistan. He has completed the Doctoral ment at the Faculty of Management, Czestochowa
Research work at EPFL (Switzerland). He is an University of Technology. He has over 20 years of
HEC-approved Ph.D. Supervisor in the field of teaching, research, and managerial experience in
physical sciences. He has published more than higher education. He is also the Extraordinary Pro-
45 research articles in reputed journals and confer- fessor at the North-West University and University
ences. He contributes to reviewing manuscripts of of Johannesburg, South Africa. He is a Founder
high-impact journals for more than ten years. His and the Co-Editor of PJMS. He is a member of
current research interests include AI, big data, data SB: Advanced Logistics Systems; Supply Chain
sciences, educational technology, e-learning, e-governance, expert systems, Management Journal.
food processing, green technology, ICT policy and planning, the IoT,
learning environments (theories, models, and frameworks), metals, MOOCs,
OERs, pharmacoinformatics, social software, solar energy, sustainability,
and TEL.