238
S. Das et al.
industries for vast applications ranging from smart homes and cities to smart agri-
culture and healthcare amongst many others. Portable IoT sensory devices such as
fitness trackers and IoT wearables are very common these days. Autonomous vehi-
cles like self-driving cars take advantage of IoT to connect to the internet to share
information from the sensors connected to cars to traffic sensors and sensors in
parking areas. IoT devices typically have limited computational power, less storage
space, but generate large amounts of data continuously. Recently, IoT is employed in
the industrial sector to enhance the working system, like government and financial
services, and so on to improve analysis and management systems [4]. These recent
developments in IoT have led to the rise of the industrial Internet of Things (IIoT)
which can completely change the landscape upon global adoption [5]. Though IoT
provides rewarding benefits, the network faces various privacy and reliability risks
[6]. Among the challenges, the security of the bulk amount of sensed IIoT data and
privacy preservation are the most critical issues [7]. With IIoT implementations,
there is a need to focus on the security of industrial data. Security remains an issue
of high priority where many can stumble when integrating IIoT into their operations.
In general, IIoT devices face risks to a great extent mainly because the devices lack
the required security incorporated to counter the threats faced [8]. Along with the
technical issues, users play a huge role in the vulnerability of these devices. Some
notable reasons for the vulnerability of smart devices are [9]:
• The hardware and computational ability of IoT devices are fairly limited. As
such, they are only able to perform the definite tasks permitted by the limited
infrastructure.
• These tasks include handling sizable amounts of data from various sources.
Unfortunately, the lack of inbuilt security measures leaves these data open to
attacks.
• The nature of the devices and technologies used in IoT networks for the transmis-
sion of data is heterogeneous. Hence, it is unviable to maintain unified standard
protocols or methods for the protection of the data [10].
• Apart from these, many of the devices used in IoT networks often have
several individual vulnerabilities that compromise the security of the entire IoT
ecosystem.
• The lack of general awareness for data security amongst users exposes the
vulnerabilities to potential attackers.
The security loopholes make way for cybercrimes. These cracks become a cyber-
criminals’ foothold to launch various attacks. It is very vital to secure such crucial
sensed data. The emergence of blockchain technology demonstrates encouraging
possibilities to enhance the security of IoT systems. The immutable, decentralized
and anonymous technology is transforming industries by enabling trustful transac-
tions. Thus, it improves system security by decreasing system risks, reducing the
severity of financial frauds, and diminishing operational costs. To overcome the