Internet erased or altered which can use in

Internet of Things(IoT) are needed by people, but they are easily to hack and compromise because of their limitation of computing, storage and network capabilities. In order to prevent the safety of IoT devices, scholars and organizations classified the security level of IoT, and analyzed and complemented different vulnerabilities and intrusion technologies. What’s more, the 3 papers talk about the protocols, standards and algorithms which used in blockchain can help they compensate the loophole of the IoT devices. These articles analyze the specific problems of the blockchain and solve the defects of IoT devices, they also further talk about the advantages of blockchain by compare with traditional business model and cloud model, such as decentralization, distribution and tracking the ownership of IoT devices. As the blockchain is still in the primary step, the article analyzes the challenges what blockchain and IoT devices need to face and mention what they can provide specific applications for different industries in the future.

Literature Review:

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

The articles mentioned that block chain is a “decentralized, distributed and shared” database, which can make up for the defects of IoT equipment in managing, controlling and securing area 2. Since everyone (miner) can participate in recording transactions that data can never be erased or altered which can use in IoT devices 2.

Blockchain can Strength the IoT by solving address allocation requirements, identity and ownership of IoT devices. Furthermore, blockchain can tracking every point which in the supply chain and maintain the integrity of data 3.

Blockchain allow trustless network work together because of cryptography and smart contracts 1. The article analyzes the operation of blockchain and define the smart contract radically.