Often described as decentralized, peer-to-peer (P2P), transparent, trustless, and immutable, blockchain data api is a credible alternative to the traditional centralized client-server model.
A notable feature in blockchain is a "smart contract," which is a self-executing contract in which the terms or conditions of an agreement are written into code.
The inherent design of blockchain ensures the integrity and authenticity of data, providing a strong defense against data tampering in iot devices.
Efforts to strengthen security
Various blockchain data API-based strategies have been proposed for areas such as supply chain, identity and access management, and especially the Internet of Things.
However, some existing models fail to meet time constraints and are not optimized for iot devices with limited resources.
Instead, some studies have focused primarily on improving the response time of iot devices, ignoring security and privacy considerations.
A study by Machado and colleagues introduces a blockchain architecture divided into three parts: iot, fog, and cloud.
This structure emphasizes using proof-based protocols to establish trust between iot devices, enabling security measures such as data integrity and key management.
However, these studies do not directly address user privacy issues.
Another study explored the concept of "DroneChain," which protects data through a public blockchain data api, focusing on the data integrity of drones.
While this approach ensures the robustness and accountability of the system, it employs proof of work (PoW), which may not be suitable for real-time iot applications, especially drones. In addition, the model lacks the functionality to guarantee the overall security of the data source and the user.
Blockchain as a shield for iot devices
As technology advances, so does the sensitivity of systems to attacks such as denial of service (DoS) attacks.
With the proliferation of affordable iot devices, attackers can take control of multiple devices to launch powerful cyberattacks.
Software-defined networking (SDN), while revolutionary, can also be compromised through malware, making it vulnerable to a variety of attacks.
Some researchers advocate the use of blockchain data api to protect iot devices from these threats, citing its decentralized and tamper-proof nature.
However, it is worth noting that many solutions remain at the theoretical level and lack practical application.
Further research aims to address security vulnerabilities in different industries using blockchain. For example, to counteract potential manipulation in smart grid systems, one study proposes combining encrypted data transmission with blockchain.
Another study supports a proof of delivery system using blockchain, streamlining the logistics process.
The system proved resilient to common attacks such as MiTM and DoS but fell short in terms of user identity and data privacy management.
Distributed cloud architecture
In addition to addressing common security challenges such as data integrity, MiTM, and DoS, several research efforts have explored multifaceted solutions.
For example, a research paper by Sharma and his team describes a cost-effective, secure, and always-available blockchain data api technology for distributed cloud architectures that emphasizes security and reduces transmission latency.
However, there are some areas of oversight, including data privacy and key management.
A recurring theme in these studies is the widespread use of PoW as a consensus mechanism, which may not be the most efficient mechanism for real-time iot applications due to its energy-intensive nature.
In addition, a significant number of these solutions ignore important aspects such as user anonymity and comprehensive data integrity.
The challenges of implementing blockchain data api in iot
Delay and efficiency
While blockchain data api (BC) technology has been around for more than a decade, its true advantages have only recently been tapped.
Many initiatives are underway to integrate BC into areas such as logistics, food, smart grid, VANET, 5G, healthcare, and crowd sensing.
Still, popular solutions do not address the latency inherent in BC and are not suitable for iot devices with limited resources. The main consensus mechanism in BC is proof of Work (PoW).
Despite its widespread use, PoW is relatively slow (processing just seven transactions per second, compared to Visa's average of 2,000 per second) and isenergy-intensivee.
Computing, data processing, and storage
Running a BC requires a lot of computing resources, power, and memory, especially when crossing large peer-to-peer networks. As Song et al have highlighted, by May 2018, the size of the Bitcoin ledger exceeded 196 GB. These limitations have raised concerns about the scalability and transaction speed of iot devices.
yinjiaran
31 Blog posts