136

A. Banerjee et al.

Proof of Concept as well as Production Systems, which function with this hand-

icap. US Defense, for instance, proposed such a system of UAV (Unmanned

Aerial Vehicle) drones [35].

6

Conclusion

Thus, in this chapter, we discussed Blockchain in IoT covering one important survey

on IoT and IIoT, proof of concepts of DLT. Then we move forward with issues

of identity management through Blockchain in IoT and IIoT. Then we discussed

blockchain and Interoperability issues in IoT with a case study of Polkadot protocol

with relay chain. Two major issues, transaction speed and multiple running nodes,

are also introduced in this chapter. In this chapter, we discussed transaction speed

and running nodes as open challenge. Hyper Ledger Indy also been discussed with

the example of onboard processing of drones. DID and SSID are also discussed

with the introduction to zero knowledge proof. Therefore, we can conclude that

blockchain is now effectively used in IoT for identity management, and it is very

much interoperable in the current industry.

References

1. Kuchin NV, Polyakov KO, Butakova NG (2020) Transaction protection in corporate networks

based on distributed ledger technology. 2020 IEEE conference of russian young researchers

in electrical and electronic engineering (EIConRus), St. Petersburg and Moscow, Russia, pp

2072–2076. https://doi.org/10.1109/EIConRus49466.2020.9039210

2. Bernabe JB, Canovas JL, Hernandez-Ramos JL, Moreno RT, Skarmeta A (2019) Privacy-

preserving solutions for Blockchain: review and challenges. In: IEEE Access. https://doi.org/

10.1109/ACCESS.2019.2950872

3. Khovratovich D, Law J (2020) Sovrin: digital identities in the blockchain era. In: White Paper

Sovrin. https://sovrin.org/library/sovrin-digital-identities-in-the-blockchain-era/

4. Liu Y, Lu Q, Paik H-Y, Xu X, Chen S, Zhu L (2020) Design pattern as a service for Blockchain-

based self-sovereign identity. IEEE Softw. 37(5): 30–36. https://doi.org/10.1109/MS.2020.299

2783

5. Kim B, Shin W, Hwang D-Y, Kim K-H (2021) Attribute-based access control (ABAC) with

decentralizedidentifierintheBlockchain-basedenergytransactionplatform.2021International

conference on information networking (ICOIN), Jeju Island, Korea (South), 2021, pp 845–848.

https://doi.org/10.1109/ICOIN50884.2021.9333894

6. Harikrishnan M, Lakshmy KV (2019) Secure digital service payments using zero knowledge

proof in distributed network. 2019 5th international conference on advanced computing &

communication systems (ICACCS), Coimbatore, India, 2019, pp 307–312. https://doi.org/10.

1109/ICACCS.2019.8728462

7. Shi P, Wang H, Yang S, Chen C, Yang W (2019) Blockchain-based trusted data sharing among

trusted stakeholders in IoT. Wley Publication. https://doi.org/10.1002/spe.2739

8. Burdges J et al (2020) Overview of Polkadot and its design considerations. In: White paper of

Web3 foundation, parity technologies. https://eprint.iacr.org/2020/641.pdf

9. Bhattacharya MP, Zavarsky P, Butakov S (2020) Enhancing the security and privacy of

self-sovereign identities on Hyperledger Indy Blockchain. 2020 international symposium on