270

K. K. Mondal and D. Guha Roy

2

Related Work

This portion comprises two paragraphs. Section2.1 offers a description of DL

technology-incorporating IoT applications. Section2.2 gives a summary of current

SHA384 hash-based STS technique’s.

2.1

Distributed Ledger-Based Internet of Things Network

This section gives a provisional overview of research integrated with IoT technol-

ogy by blockchain/DL. The DL technology extends well beyond cryptocurrencies

[19]. Besides cryptocurrencies, in the development of intelligent agreements, Access

Control Systems [20], healthcare, e-business, applications [21], VANETS [22], smart

homes, intelligent cities [23], and so on, DL technology was also used. The Smart

Access Control System [20] from Blockchain intends a design for IoT device man-

agement. The resourceful link, the management center, on the recommendation of

the restricted IoT nodes [24], communicates with the Blockchain (i.e., sensor). An

operator node creates the intelligent deal. The research does not have a mecha-

nism for cutting boards and does not recommend any protection against quantum

threats. Lightchain [13] aims at multiple synergistic proofs (SMP), a slight consent

mechanism, and a UBOF, a ledger pruning mechanism. Lightchain [13] proposes

an SMP. However, no ordinance for binding transactions into an internal or exter-

nal exchange have been suggested or any protection upon quantum attacks. IOTA

[4] is an intelligent cryptocurrency that serves the economy of machine-to-machine

(M2M). In contrast to IOTEX, IOTA eliminates the costly technique’s of consent

(i.e., PoW). The Blockchain algorithm that IOTA uses is called the Tangle. A cutting

mechanism is implemented to keep the leader size from continuously increasing.

IOTA is using a secure signature system based on quantum technology (i.e., Win-

ternitz OTS+). DL’s intelligent house [23] concurrently uses two records, a regional

immutable (IL) ledger and a public Blockchain [25]. The study does not propose

any ledger cutting mechanism or quantity-attack protection. Lee and Lee suggested

a Blockchain-based clarification to update embedded IoT device’s firmware in a safe

manner [26]. Each request for firmware upgrade erases a current block in Blockchain.

The aimed leaflet has a computationally costly consensus mechanism and no leaflet

cutting device. Blockchain-based VANETs enable VANETs to be increased and

safety event messages disseminated efficiently [22]. The Blockchain [22] suggested

is a local Blockchain that stores road cases information for the particular geographi-

cal area. The introduced Blockchain uses a costly consent system based on PoW and

proposes no protection from quantum threats. An IoT-based E-business model was

introduced by Zhang et al. using Blockchain technology [21]. The model proposed

does not resolve the challenges of combining DL technology and IoT, such as the

growing size of the leads and a highly costly consensus process [27, 28]. The latest

Blockchain-based IoT purposes are summarized in Table1.