270
K. K. Mondal and D. Guha Roy
2
Related Work
This portion comprises two paragraphs. Section2.1 offers a description of DL
technology-incorporating IoT applications. Section2.2 gives a summary of current
SHA384 hash-based STS technique’s.
2.1
Distributed Ledger-Based Internet of Things Network
This section gives a provisional overview of research integrated with IoT technol-
ogy by blockchain/DL. The DL technology extends well beyond cryptocurrencies
[19]. Besides cryptocurrencies, in the development of intelligent agreements, Access
Control Systems [20], healthcare, e-business, applications [21], VANETS [22], smart
homes, intelligent cities [23], and so on, DL technology was also used. The Smart
Access Control System [20] from Blockchain intends a design for IoT device man-
agement. The resourceful link, the management center, on the recommendation of
the restricted IoT nodes [24], communicates with the Blockchain (i.e., sensor). An
operator node creates the intelligent deal. The research does not have a mecha-
nism for cutting boards and does not recommend any protection against quantum
threats. Lightchain [13] aims at multiple synergistic proofs (SMP), a slight consent
mechanism, and a UBOF, a ledger pruning mechanism. Lightchain [13] proposes
an SMP. However, no ordinance for binding transactions into an internal or exter-
nal exchange have been suggested or any protection upon quantum attacks. IOTA
[4] is an intelligent cryptocurrency that serves the economy of machine-to-machine
(M2M). In contrast to IOTEX, IOTA eliminates the costly technique’s of consent
(i.e., PoW). The Blockchain algorithm that IOTA uses is called the Tangle. A cutting
mechanism is implemented to keep the leader size from continuously increasing.
IOTA is using a secure signature system based on quantum technology (i.e., Win-
ternitz OTS+). DL’s intelligent house [23] concurrently uses two records, a regional
immutable (IL) ledger and a public Blockchain [25]. The study does not propose
any ledger cutting mechanism or quantity-attack protection. Lee and Lee suggested
a Blockchain-based clarification to update embedded IoT device’s firmware in a safe
manner [26]. Each request for firmware upgrade erases a current block in Blockchain.
The aimed leaflet has a computationally costly consensus mechanism and no leaflet
cutting device. Blockchain-based VANETs enable VANETs to be increased and
safety event messages disseminated efficiently [22]. The Blockchain [22] suggested
is a local Blockchain that stores road cases information for the particular geographi-
cal area. The introduced Blockchain uses a costly consent system based on PoW and
proposes no protection from quantum threats. An IoT-based E-business model was
introduced by Zhang et al. using Blockchain technology [21]. The model proposed
does not resolve the challenges of combining DL technology and IoT, such as the
growing size of the leads and a highly costly consensus process [27, 28]. The latest
Blockchain-based IoT purposes are summarized in Table1.