ArticlePublisher preview available

Towards Secure and Efficient Data Aggregation in Blockchain‐Driven IoT Environments: A Comprehensive and Systematic Study

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract and Figures

The rapid evolution of the Internet of Things (IoT) has revolutionized various sectors, fostering seamless intercommunication and real‐time monitoring. Central to this transformation is integrating blockchain technology, which ensures data integrity and security in IoT networks. This paper provides a meticulous exploration of data aggregation techniques within the context of blockchain‐based IoT systems. The study categorizes data aggregation algorithms into Privacy‐Preserving, Machine Learning‐Based, Hierarchical, Real‐Time, and Custom Aggregation Algorithms, each tailored to specific IoT requirements. Privacy‐Preserving Aggregation Algorithms focus on safeguarding sensitive data through encryption and secure protocols. Machine Learning‐Based Aggregation adapts dynamically to data patterns, offering predictive insights and real‐time adaptability. Hierarchical Aggregation organizes devices into a structured hierarchy, optimizing data processing. Real‐Time Aggregation processes data instantly, ensuring low latency for time‐sensitive applications. Custom Aggregation Algorithms are bespoke solutions tailored to unique application demands, emphasizing efficiency and security. Through a comparative analysis of these techniques, this paper explores their advantages, disadvantages, and applicability, addressing the challenges and suggesting future research directions. The integration of blockchain‐based data aggregation techniques not only enhances IoT network efficiency but also ensures the longevity and security of modern technological infrastructures. This study builds upon prior research in the field of IoT and blockchain technology by extending the exploration of data aggregation techniques and their implications for network efficiency and security. SLR method has been used to investigate each one in terms of influential properties such as the main idea, advantages, disadvantages, and strategies. The results indicate most of the articles were published in 2021 and 2022. Moreover, some important parameters such as privacy and security, latency, data processing, energy consumption, complexity, and reliability were involved in these investigations.
This content is subject to copyright. Terms and conditions apply.
Transactions on Emerging Telecommunications Technologies
SURVEY ARTICLE
Towards Secure and Efficient Data Aggregation in
Blockchain-Driven IoT Environments: A Comprehensive
and Systematic Study
Xujun Tong1| Marzieh Hamzei2| Nima Jafari3
1Public Basic College, Anhui Medical College, HeFei, China | 2Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran |
3Future Technology Research Center, National Yunlin University of Science and Technology, Douliou, Yunlin, Taiwan
Correspondence: Xujun Tong (tongxujun@ahyz.edu.cn) | Nima Jafari (jnnima@yuntech.edu.tw)
Received: 30 November 2023 | Revised: 28 October 2024 | Accepted: 17 December 2024
Funding: This study was supported by Anhui Province Key Teaching and Research Project: Computer Application Basic Course Ideological and Political
Demonstration Course, No. 2020szsfkc0506; Anhui Province Natural Research Project: “Design and Practical Application Research of Artificial Intelligence
Based Post Internship Management System” (Project No. ZR2021B002); Anhui Province Quality Engineering Project: “Integrated Practice Research of Major +
Course in Nursing (Xinjiang) Medical Computer Culture Basic Course from the Perspective of Curriculum Ideology and Politics” (Project No. 2022jyxm790),
Information Technology Provincial Course Ideological and Political Demonstration Course (Project No. 2022kcsz150), Provincial Public Virtual Simulation
Training Base (Project No. 2022xnfzjd012).
Keywords: blockchain | custom aggregation algorithms | data aggregation | data aggregation algorithm | hierarchical aggregation | Internet of Things
(IoT) | machine learning-based | privacy-preserving algorithms | real-time aggregation
ABSTRACT
The rapid evolution of the Internet of Things (IoT) has revolutionized various sectors, fostering seamless intercommunication
and real-time monitoring. Central to this transformation is integrating blockchain technology, which ensures data integrity
and security in IoT networks. This paper provides a meticulous exploration of data aggregation techniques within the con-
text of blockchain-based IoT systems. The study categorizes data aggregation algorithms into Privacy-Preserving, Machine
Learning-Based, Hierarchical, Real-Time, and Custom Aggregation Algorithms, each tailored to specific IoT requirements.
Privacy-Preserving Aggregation Algorithms focus on safeguarding sensitive data through encryption and secure protocols.
Machine Learning-Based Aggregation adapts dynamically to data patterns, offering predictive insights and real-time adaptability.
Hierarchical Aggregation organizes devices into a structured hierarchy, optimizing data processing. Real-Time Aggregation pro-
cesses data instantly, ensuring low latency for time-sensitive applications. Custom Aggregation Algorithms are bespoke solutions
tailored to unique application demands, emphasizing efficiency and security. Through a comparative analysis of these techniques,
this paper explores their advantages, disadvantages, and applicability, addressing the challenges and suggesting future research
directions. The integration of blockchain-based data aggregation techniques not only enhances IoT network efficiency but also
ensures the longevity and security of modern technological infrastructures. This study builds upon prior research in the field of
IoT and blockchain technology by extending the exploration of data aggregation techniques and their implications for network
efficiency and security. SLR method has been used to investigate each one in terms of influential properties such as the main idea,
advantages, disadvantages, and strategies. The results indicate most of the articles were published in 2021 and 2022. Moreover,
some important parameters such as privacy and security, latency, data processing, energy consumption, complexity, and reliability
were involved in these investigations.
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
© 2025 John Wiley & Sons Ltd.
Transactions on Emerging Telecommunications Technologies, 2025; 36:e70061 1of22
https://doi.org/10.1002/ett.70061
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
The Internet of Things (IoT) represents a cutting-edge technical domain, encompassing billions of intelligent objects capable of bridging the physical and virtual worlds across various locations. IoT services are responsible for delivering essential functionalities. In this dynamic and interconnected IoT landscape, providing high-quality services is paramount to enhancing user experiences and optimizing system efficiency. Service composition techniques come into play to address user requests in IoT applications, allowing various IoT services to collaborate seamlessly. Considering the resource limitations of IoT devices, they often leverage cloud infrastructures to overcome technological constraints, benefiting from unlimited resources and capabilities. Moreover, the emergence of fog computing has gained prominence, facilitating IoT application processing in edge networks closer to IoT sensors and effectively reducing delays inherent in cloud data centers. In this context, our study proposes a cloud-/fog-based service composition for IoT, introducing a novel fuzzy-based hybrid algorithm. This algorithm ingeniously combines Ant Colony Optimization (ACO) and Artificial Bee Colony (ABC) optimization algorithms, taking into account energy consumption and Quality of Service (QoS) factors during the service selection process. By leveraging this fuzzy-based hybrid algorithm, our approach aims to revolutionize service composition in IoT environments by empowering intelligent decision-making capabilities and ensuring optimal user satisfaction. Our experimental results demonstrate the effectiveness of the proposed strategy in successfully fulfilling service composition requests by identifying suitable services. When compared to recently introduced methods, our hybrid approach yields significant benefits. On average, it reduces energy consumption by 17.11%, enhances availability and reliability by 8.27% and 4.52%, respectively, and improves the average cost by 21.56%.
Article
Full-text available
Users’ security is one of the most important issues in Internet of Things (IoT) due to the high number of IoT devices involved in different applications. Security threats are evolving at a rapid pace that make the current security and privacy measures unsuitable. Therefore, several researchers have been attracted by this domain with the aim of proposing either new or improved solutions to address the problem of security in IoT. Blockchain technology is a relatively new invention in modern IoT applications to solve the security issue. It is based on the use of a public immutable ledger called a blockchain. After conducting a verification process, several parts on a network encode transactions into this ledger. Moreover, Machine learning (ML) algorithms have been used as emerging solutions to improve IoT security. Reinforcement learning (RL) is the most popular machine learning technique proposed to secure IoT systems. Unlike other ML methods, RL can observe, learn and interact with the environment even if it has minimum information about the considered parameters. Various researches have been proposed to treat security problem in IoT based on either RL technique or Blockchain technology or a combination of both techniques. Therefore, we believe there is a need for a comprehensive survey on works proposed in recent years that address security issues using these techniques. In this paper, we provide a summary of research efforts made in the past few years, from 2018 to 2021, addressing security issues using RL and blockchain techniques in the IoT domain.
Article
Full-text available
The Internet of Things (IoT) has brought about a new era of connected devices and systems, with applications ranging from healthcare to transportation. However, the reliability and security of these systems are critical concerns that must be addressed to ensure their safe and effective operation. This paper presents a survey of formal verification and validation (FV&V) techniques for IoT systems, with a focus on the challenges and open issues in this field. We provide an overview of formal methods and testing techniques for the IoT and discuss the state explosion problem and techniques to address it. We also examined the use of AI in software testing and describe examples of tools that use AI in this context. Finally, we discuss the challenges and open issues in FV&V for the IoT and present possible future directions for research. This survey paper aimed to provide a comprehensive understanding of the current state of FV&V techniques for IoT systems and to highlight areas for further research and development.
Article
Full-text available
The Internet of Vehicles (IoV) is a network that connects vehicles and their environment: in-built devices, pedestrians, and infrastructure through the Internet using heterogeneous access technologies. During communication between vehicles, roadside units, and control rooms, data confidentiality and privacy are critical issues that require effective measures. Several works have been proposed for securing IoV environments based on vehicles-to-infrastructure authentication; However, some schemes have security vulnerabilities, while others have shown efficiency issues. Due to its decentralization, stability, and transaction tracking capabilities, Blockchain as an emerging technology presents a potential solution for IoV security. This article provides an in-depth examination of the benefits of blockchain for a 5G-based IoV environment. In particular, we propose and evaluate a novel blockchain-based secure data exchange (BSDCE-IoV) scheme based on Elliptic Curve Cryptography algorithm. Our solution is designed to eliminate several potential attacks that pose a threat to the IoV environment. Deep examination using the Real-or-Random oracle model and Scyther tool, in addition to the informal security analysis, validates the scheme regarding security and privacy. The Multi-precision Integer and Rational Arithmetic Cryptographic Library (MIRACL) assesses the computational and communication overhead. Computational and communicative overheads were also evaluated using the Multi-precision Integer and Rational Arithmetic Cryptographic Library (MIRACL). BSDCE-IoV shows higher performance in terms of security, functionality, and time delay than a number of recent selective work in IoV security.
Article
Artificial intelligence of things (AIoT) has brought new promises of efficiency in our daily lives by integrating AI with the IoT. However, owing to limited resources (e.g., computational power), it is difficult to implement modern technology (e.g., AI) and improve its performance (i.e., the IoT). Moreover, cyberthreats and privacy challenges can hinder the success of the IoT. This situation is aggravated by network scarcity (i.e., limited network connectivity). This article presents a digital twin-based data aggregation scheme in which data are collected using federated learning by operating a drone and stored securely in the blockchain. Before data sharing, differential privacy is realized to enhance privacy. A multirole training scheme is proposed, along with a duplex model verification architecture using a Hampel filter and performance check. To validate the specifications, an authentication scheme was implemented by combining a cuckoo filter and timeframe check. A case study to construct an experimental environment using real hardware is discussed. Different experiments were conducted in this environment and the feasibility of the proposed scheme was validated from the outcomes.
Article
Offloading assists in overcoming the resource constraints of specific elements, making it one of the primary technical enablers of the Internet of Things (IoT). IoT devices with low battery capacities can use the edge to offload some of the operations, which can significantly reduce latency and lengthen battery lifetime. Due to their restricted battery capacity, deep learning (DL) techniques are more energy-intensive to utilize in IoT devices. Because many IoT devices lack such modules, numerous research employed energy harvester modules that are not available to IoT devices in real-world circumstances. Using the Markov Decision Process (MDP), we describe the offloading problem in this study. Next, to facilitate partial offloading in IoT devices, we develop a Deep Reinforcement learning (DRL) method that can efficiently learn the policy by adjusting to network dynamics. Convolutional Neural Network (CNN) is then offered and implemented on Mobile Edge Computing (MEC) devices to expedite learning. These two techniques operate together to offer the proper offloading approach throughout the length of the system's operation. Moreover, transfer learning was employed to initialize the Q-table values, which increased the system's effectiveness. The simulation in this article, which employed Cooja and TensorFlow, revealed that the strategy outperformed five benchmarks in terms of latency by 4.1%, IoT device efficiency by 2.9%, energy utilization by 3.6%, and job failure rate by 2.6% on average.
Article
Federated learning (FL) has been proposed as an emerging paradigm to perform privacy-preserving distributed machine learning in the Internet of Things (IoT). However, the communication overhead caused by partial model aggregations will increase the model training latency. In this paper, a multi-layer blockchain-enabled hierarchical federated learning (HFL) network is proposed for low-latency model training while ensuring data security. Meanwhile, we theoretically analyze the bottleneck of the model accuracy with the total data distance due to the imbalanced data distribution. Moreover, the mathematical expression of the model error with respect to IoT devices (IDs) association and local data distribution is provided, then the upper bound of the model error is represented by the total data distance. To further improve the learning performance, the distance-aware hierarchical federated learning (DAHFL) algorithm is investigated, which optimizes ID association strategy based on dual-distance, and allocates computing and communication resources alternatively. Finally, the working process of the blockchain-enabled HFL system is exhibited by the blockchain simulation platform and the efficiency of the proposed DAHFL algorithm is demonstrated by the simulation results.
Article
With the rapid increase in the number of connected and autonomous vehicles, there is a growing concern about the potential road accidents and collisions caused by malicious vehicles. A reputation system can help to mitigate these concerns and allow users to have safe journeys by providing a way to identify and estimate the behaviour of individual vehicles and to take appropriate actions in case of any malicious behaviour. Centralised reputation systems are widely used for reputation aggregation, but this setup requires Peer trust and could be a single point of attack. The alternative to a centralised system is the decentralised reputation system for IoV, in which the reputation information is collected and maintained by the vehicles rather than a central authority. There are several key considerations when designing a secure reputation aggregation system for the IoV. These include: i) It should ensure that vehicle feedback about other vehicles is kept private; ii) vehicles' interaction networks and positions should be protected; and iii) computations should be decentralised and not resource-intensive. Adopting a decentralised reputation system within IoV using blockchain can enhance security and privacy and mitigate many security concerns. In this article, we proposed a blockchain-based reputation system which ensures the privacy of participants and provides secure and resilient reputation computation. The reputation value reflects the aggregate trustworthiness of vehicles and this is computed via feedback provided by the vehicles in a decentralized way. We analysed the security and privacy of the proposed system and provided the computation and communication performance.
Article
Privacy-preserving aggregation protocol is an essential building block in privacy-enhanced federated learning (FL), which enables the server to obtain the sum of users’ locally trained models while keeping local training data private. However, most of the work on privacy-preserving aggregation provides privacy guarantees for only one communication round in FL. In fact, as FL usually involves long-term training, i.e., multiple rounds, it may lead to more information leakages due to the dynamic user participation over rounds. In this connection, we propose a long-term privacy-preserving aggregation (LTPA) protocol providing both single-round and multi-round privacy guarantees. Specifically, we first introduce our batch-partitioning-dropping-updating (BPDU) strategy that enables any user-dynamic FL system to provide multi-round privacy guarantees. Then we present our LTPA construction which integrates our proposed BPDU strategy with the state-of-the-art privacy-preserving aggregation protocol. Furthermore, we investigate the impact of LTPA parameter settings on the trade-off between privacy guarantee, protocol efficiency, and FL convergence performance from both theoretical and experimental perspectives. Experimental results show that LTPA provides similar complexity to that of the state-of-the-art, i.e., an additional cost of around only 1.04X for a 100,000-user FL system, with an additional long-term privacy guarantee.