This work is licensed under a Creative Commons Attribution 3.0 License.
For more information, see http://creativecommons.org/licenses/by/3.0/.
This article has been accepted for publication in
a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2924045,
IEEE Access
Vikas Hassija et al.: A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
and in terms of throughput in permissionless networks.
Various consensus algorithms are being designed to
support high throughput along with a large number of
nodes or users.
•
Fog layer can be made more intelligent using various
ML and AI techniques. Fog layer must be able to decide
the duration for which the data in the fog should be
retained and when the data should be discarded or
shifted to the cloud for prolonged storage.
•
More efficient and reliable consensus mechanisms can
be designed to reach consensus among the nodes along
with preventing rampant use of computation power.
The current consensus algorithms are highly resource
hungry and less efficient.
•
The tamper-proof feature of blockchain is ending up
into a collection of a lot of garbage data and addresses.
There is a lot of invalid data that is never deleted like
the addresses of the destructed smart contracts. This
affects the performance of the overall application and
better ways need to be designed to efficiently handle the
garbage data in the blockchain.
•
Data analysis in near real-time and in the proximity
of the IoT node is crucial for successful deployment
of IoT applications. Various ML-based algorithms can
be designed to analyze the data in the node itself to
prevent the data transit for analysis. This can further
enhance the security of the application by preventing
data movement.
Chia sẻ với bạn bè của bạn: