262
S. Das et al.
for mining a single block in the IIoT network when compared to the Bitcoin model.
It can be inferred from this observation that our proposed model is more than 100
times faster than Bitcoin for IIoT applications while maintaining a higher standard of
security due to its inherent crypto agile design. This proves that our novel architecture
of blockchain is significantly more efficient for usage in IIoT ecosystems.
9
Future Research Direction
Possible Research Areas:
• Further research on the pseudonymous nature of blockchain data and its possible
implications from a privacy point of view is important.
• Proper device identification protocols without compromising privacy and security
is a necessary research direction.
• The creation of proper lightweight cryptographic hash algorithms for use in IoT
is necessary for the further development of IIoT-based blockchain architectures.
• Studying the effect of cryptanalytic attacks on IIoT-based blockchain models will
further improve the security of these models.
• Fifth-generation communication technology (5G) in blockchain-enabled IIoT can
provide new potential for IIoT.
Possible Workarounds of Security Vulnerabilities in IoT:
• Proper contingency methods and protocols to counter probable attacks in IIoT.
• Developing exclusive networks for usage in IIoT environments.
• Development of industry-standard protocols for management and security of IoT
data with proper blockchain support as well as direct cloud integration.
• Efficient secure processing methods for maintaining the large amount of data
produced in IIoT using blockchain.
• Developing AI-based preventive measures to detect possible intrusion in IIoT
ecosystems.
• Creating DDoS and anomalous data detection systems.
• Lightweight methods to shield vulnerable IIoT devices from possible hardware-
based exploits.
• Development of authorization schemes for anonymous, secure classification of
devices in IIoT.
• Development of encryption methods suitable for IIoT to maintain integrity as well
as the confidentiality of data during transfers within the network.
• Making existing IIoT methods natively compatible with blockchain.
Security-related Issues in IIoT:
• Designing efficient IIoT data communication systems to minimize feedback and
transfer latency as well as decrease probable computation overhead on resource-
constrained devices.