136
A. Banerjee et al.
Proof of Concept as well as Production Systems, which function with this hand-
icap. US Defense, for instance, proposed such a system of UAV (Unmanned
Aerial Vehicle) drones [35].
6
Conclusion
Thus, in this chapter, we discussed Blockchain in IoT covering one important survey
on IoT and IIoT, proof of concepts of DLT. Then we move forward with issues
of identity management through Blockchain in IoT and IIoT. Then we discussed
blockchain and Interoperability issues in IoT with a case study of Polkadot protocol
with relay chain. Two major issues, transaction speed and multiple running nodes,
are also introduced in this chapter. In this chapter, we discussed transaction speed
and running nodes as open challenge. Hyper Ledger Indy also been discussed with
the example of onboard processing of drones. DID and SSID are also discussed
with the introduction to zero knowledge proof. Therefore, we can conclude that
blockchain is now effectively used in IoT for identity management, and it is very
much interoperable in the current industry.
References
1. Kuchin NV, Polyakov KO, Butakova NG (2020) Transaction protection in corporate networks
based on distributed ledger technology. 2020 IEEE conference of russian young researchers
in electrical and electronic engineering (EIConRus), St. Petersburg and Moscow, Russia, pp
2072–2076. https://doi.org/10.1109/EIConRus49466.2020.9039210
2. Bernabe JB, Canovas JL, Hernandez-Ramos JL, Moreno RT, Skarmeta A (2019) Privacy-
preserving solutions for Blockchain: review and challenges. In: IEEE Access. https://doi.org/
10.1109/ACCESS.2019.2950872
3. Khovratovich D, Law J (2020) Sovrin: digital identities in the blockchain era. In: White Paper
Sovrin. https://sovrin.org/library/sovrin-digital-identities-in-the-blockchain-era/
4. Liu Y, Lu Q, Paik H-Y, Xu X, Chen S, Zhu L (2020) Design pattern as a service for Blockchain-
based self-sovereign identity. IEEE Softw. 37(5): 30–36. https://doi.org/10.1109/MS.2020.299
2783
5. Kim B, Shin W, Hwang D-Y, Kim K-H (2021) Attribute-based access control (ABAC) with
decentralizedidentifierintheBlockchain-basedenergytransactionplatform.2021International
conference on information networking (ICOIN), Jeju Island, Korea (South), 2021, pp 845–848.
https://doi.org/10.1109/ICOIN50884.2021.9333894
6. Harikrishnan M, Lakshmy KV (2019) Secure digital service payments using zero knowledge
proof in distributed network. 2019 5th international conference on advanced computing &
communication systems (ICACCS), Coimbatore, India, 2019, pp 307–312. https://doi.org/10.
1109/ICACCS.2019.8728462
7. Shi P, Wang H, Yang S, Chen C, Yang W (2019) Blockchain-based trusted data sharing among
trusted stakeholders in IoT. Wley Publication. https://doi.org/10.1002/spe.2739
8. Burdges J et al (2020) Overview of Polkadot and its design considerations. In: White paper of
Web3 foundation, parity technologies. https://eprint.iacr.org/2020/641.pdf
9. Bhattacharya MP, Zavarsky P, Butakov S (2020) Enhancing the security and privacy of
self-sovereign identities on Hyperledger Indy Blockchain. 2020 international symposium on