Sensors 23 09031
Sensors 23 09031
Article
Governance of a Blockchain-Enabled IoT Ecosystem:
A Variable Geometry Approach
Ikram Ullah * and Paul J. M. Havinga
Pervasive Systems Group, Department of Computer Science, University of Twente Enschede, 7522 NB Enschede,
The Netherlands; p.j.m.havinga@utwente.nl
* Correspondence: i.ullah@utwente.nl
Abstract: The proliferation of Internet of Things (IoT) applications is rapidly expanding, generat-
ing increased interest in the incorporation of blockchain technology within the IoT ecosystem. IoT
applications enhance the efficiency of our daily lives, and when blockchain is integrated into the
IoT ecosystem (commonly referred to as a blockchain-IoT system), it introduces crucial elements,
like security, transparency, trust, and privacy, into IoT applications. Notably, potential domains
where blockchain can empower IoT applications include smart logistics, smart health, and smart
cities. However, a significant obstacle hindering the widespread adoption of blockchain-IoT systems
in mainstream applications is the absence of a dedicated governance framework. In the absence
of proper regulations and due to the inherently cryptic nature of blockchain technology, it can be
exploited for nefarious purposes, such as ransomware, money laundering, fraud, and more. Further-
more, both blockchain and the IoT are relatively new technologies, and the absence of well-defined
governance structures can erode confidence in their use. Consequently, to fully harness the potential
of integrating blockchain-IoT systems and ensure responsible utilization, governance plays a pivotal
role. The implementation of appropriate regulations and standardization is imperative to leverage
the innovative features of blockchain-IoT systems and prevent misuse for malicious activities. This re-
search focuses on elucidating the significance of blockchain within governance mechanisms, explores
governance tailored to blockchain, and proposes a robust governance framework for the blockchain-
enabled IoT ecosystem. Additionally, the practical application of our governance framework is
showcased through a case study in the realm of smart logistics. We anticipate that our proposed
governance framework will not only facilitate but also promote the integration of blockchain and the
IoT in various application domains, fostering a more secure and trustworthy IoT landscape.
Citation: Ullah, I.; Havinga, P.J.M.
Governance of a Blockchain-Enabled
Keywords: Internet of Things; blockchain; governance; European Union policy; EU policy; policy
IoT Ecosystem: A Variable Geometry
makers; International Organization for Standardization; ISO
Approach. Sensors 2023, 23, 9031.
https://doi.org/10.3390/s23229031
innovations are rapidly emerging within the IoT landscape. The quantity of interconnected
devices is expanding swiftly, with projections suggesting that by 2025, the total number
of connected devices could potentially soar to 100 billion [1,2]. The proliferation of IoT
devices could potentially result in exponential data growth [3]. Data are collected, stored,
and processed to support a variety of IoT services. The IoT infrastructure comprises di-
verse components, including sensors, actuators, RFID, Wireless Sensor Networks (WSNs),
cloud systems, and big data solutions. Cloud computing has the potential to significantly
enhance the success of the IoT due to its numerous advantages, such as easy implementa-
tion, cost-effectiveness, efficiency, and ability to handle large datasets. Cloud computing
proves particularly beneficial when the IoT generates substantial data and when sensors
are distributed across geographic locations [4]. The integration of the IoT, cloud, and big
data mechanisms serves as the foundation for numerous contemporary innovations [3].
Besides its wide-ranging applications, the IoT also faces several challenges [5]. IoT
solutions are still in the nascent stages of development, and in many instances, these so-
lutions are intricate. This complexity arises for several reasons, including issues related
to interoperability, communication, data volume, real-time data analysis, demanding de-
velopment cycles, and standardization [3,6,7]. The predominant concerns related to the
IoT encompass privacy, security, standards, governance, and ethics [3,8,9]. Furthermore,
additional challenges in the realm of the IoT are detailed in [10–12]. Beyond the IoT, numer-
ous challenges are linked with cloud computing, including concerns about confidentiality,
trust, privacy, integrity, and the unauthorized storage and processing of personal data.
Advancements in technology have made it easier for criminals to commit various forms of
cybercrime. Criminals have escalated their tactics, automated their attack methods, refined
mechanisms for extracting ransom payments in cryptocurrencies, and modernized their
business models, as evidenced by the use of different languages (such as German in the
case of the “WannaCry” ransomware targeting German rail systems).
technology has garnered substantial interest from investors, start-ups, venture capitalists,
and industries, with over USD 3 billion invested in blockchain start-ups in 2019 [23,24]. Be-
yond the business realm, government organizations, policymakers, scholars, and regulators
are also exploring the potential of blockchain technology [25–28]. To address the challenges
faced by the IoT, integration with blockchain technology presents a promising solution.
Blockchain can address IoT security, transparency, trust, and privacy concerns. Neverthe-
less, the integration of these novel technologies introduces its own set of challenges, with
one of the primary concerns being the lack of a dedicated governance structure. In this
paper, we put forth an efficient and appropriate governance framework for a blockchain-
enabled IoT ecosystem.
1.3. Governance
Governance is “a system of decision rights and accountabilities for information-related
processes, executed according to agreed-upon models which describe who can take what
actions with what information, and when, under what circumstances, using what meth-
ods” [29]. In the context of the IoT, security, privacy, and governance are intertwined;
governance is essential to establish trust, security, and privacy [3,9]. Governance aims
to define roles, policies, and responsibilities to achieve objectives such as interoperabil-
ity, liability, security, privacy, and trust. Although security, privacy, and governance are
closely related, they are not identical. Security mechanisms ensure data protection from
malicious purposes, whereas privacy mechanisms dictate how to collect, process, and
store users’ data. A governance framework encompasses policies and processes related
to various controls (e.g., security, privacy, business practices, and organizational controls)
in place. Through robust governance mechanisms, organizations can implement policies,
processes, accountabilities, and roles and make informed decisions to efficiently manage
corporate resources. Well-designed and implemented governance mechanisms are crucial
for addressing user and stakeholder concerns [30]. The World Bank’s governance con-
sists of mechanisms and institutions which “includes the process by which governments
(governing body) are selected, monitored and replaced; the capacity of the government to
effectively formulate and implement sound policies; and the respect of citizens and the
state for the institutions that govern economic and social interactions among them” [31].
With the evolution of emerging technologies, conventional governance mechanisms, which
constitute people, processes, and technologies, are evolving [32,33] into more rigorous
frameworks. The introduction of the General Data Protection Regulation (GDPR) [34] in
Europe has made governance even more indispensable [7], with the potential to facilitate
IoT development [4] and adoption. With the advent of distributed ledger technologies such
as blockchain and the inherently distributed nature of the IoT architecture, the concept
of governance has gained significance. However, it has also become more challenging,
as traditional centralized governance mechanisms are no longer applicable [35]. While
the technical aspects of the IoT are widely discussed, adequate legal frameworks are yet
to be established [36]. The European Commission has encouraged experts to explore the
potential features of governance [36], becoming the first international organization with
the goal of establishing a governance framework [8].
Figure 2 illustrates the core principles essential for fostering and guaranteeing an inclu-
sive governance framework. These principles encompass democracy and ethics, confidence,
collaboration, innovation, well-being, and economic prosperity. The ultimate aim of gover-
nance is to realize these pivotal aspects in the context of the modern world. Governance
policies should be anchored in the foundational pillars of democracy and the principles of
ethics. Transparency and disclosure are regarded as the core characteristics of a governance
framework [37]. Embracing change, particularly when adopting new technologies, can be
challenging due to the inherent lack of confidence and concerns about data security among
users. Achieving consensus is often hampered by competition among stakeholders or a
lack of trust [38]. Confidence in new technologies is crucial, as it can lead to success and
ultimately, the large-scale adoption of technology and, consequently, collaboration among
Sensors 2023, 23, 9031 4 of 33
many partners and stakeholders. In new technologies where personal data are involved,
there are many consumer concerns such as “fear of unknown” [30]. Governance plays a
pivotal role in facilitating the future development [4], adoption, and endorsement of novel
technologies. An effective governance framework must encompass policies that address
the concerns of users and stakeholders, ensuring their confidence is maintained through the
implementation of mechanisms and policies that guarantee confidentiality, integrity, and
availability. User confidence in new technologies is instrumental in driving mass adoption
and catalyzing innovation.
Governance serves as a catalyst for collaboration among diverse partners and in-
dustries. While individual technologies can bring benefits, the integration of various
technologies can yield the most exquisite innovations, enhancing efficiency across various
application domains. Partners can collaborate to construct a shared technological infras-
tructure, with each partner contributing dedicated knowledge, expertise, and resources,
ultimately generating value. Governance policies play a pivotal role in assuring that these
applications not only enhance the quality of life [30] but also reduce environmental impacts
(e.g., through recycling physical objects) and enhance environmental sustainability by
extending the lifetime of the technology.
The remainder of this paper is structured as follows. In Section 2, we delve into the
IoT architecture and reference models. Section 3 offers a brief introduction to the technical
aspects of blockchain. Section 4 provides an overview of related works, while Section 5
introduces our proposed governance framework. Lastly, Section 6 presents an evaluation
of the proposed framework.
3. Blockchain
Blockchain, which is a peer-to-peer network, is an alternative to centralized network
architectures. Existing centralized networks rely heavily on intermediaries, and these
intermediaries pose significant risks such as data tampering. Interference by third parties
or intermediaries can lead to various potential breaches [64,65]. Therefore, a decentralized
blockchain technology, without trusted intermediaries, is required for secure and trustless
networks. Blockchain comprises “blocks” consisting of transactions, and these “blocks”
are cryptographically linked to form a “chain”. A block’s data field mainly consists of
the block number, hash of the block data, size of the block, transactions, time stamp, hash
of the previous block, and a nonce. Peers verify blocks using cryptographic hashes [64].
Genesis (initial state of the chain) is the first block of the blockchain network. Other blocks
are added based on the underlying consensus algorithm. Blocks are chained together by
referencing a previous block’s hash. Since blocks reference previous blocks, if a block is
changed, the hash value will change and thus all the succeeding hashes will change [66].
The way blockchain works totally depends on the application domain or requirements;
Sensors 2023, 23, 9031 9 of 33
solve this conflict, the longest chain is regarded as the valid chain and the peers embrace
it [66]. Furthermore, technologies are regularly updated to improve performance or add
new features. The updating of a blockchain protocol is also called a fork. There are two
types of forks: soft and hard forks. Soft forks are changes in blockchain protocols that are
backward compatible, whereas hard forks are changes that are not backward compatible.
As mentioned earlier, forks are normally formed when multiple miners solve the block at
the same time or there are conflicts in the ledger. However, there are various mechanisms
for resolving such forks.
Some of the well-known consensus algorithms are the proof-of-work (PoW), proof-of-
stake (PoS), and practical byzantine fault-tolerance (PBFT) algorithms. These algorithms
work significantly differently from each other. Each of these algorithms has both pros and
cons. In the proof-of-work (PoW) consensus mechanism, nodes solve computationally
complex puzzles in order to add the next block. To solve the puzzle, miners generate
hash values that must meet certain requirements. Various hashing algorithms are used
in mining [68], such as SHA-256 [69], scrypt [70], and Blake-256 [71]. Bitcoin uses the
PoW consensus mechanism [66]. PoW is known to be computationally the most intensive
consensus mechanism. Miners perform computationally intensive PoW operations in order
to add the next block to the chain. All other nodes can easily verify that the computations
performed are correct and then add the block to the chain. Miners are rewarded for
their computations. In private blockchain networks, a computationally intensive PoW
mechanism is not necessary since there are fewer chances of Sybil attacks [68]. PoW can
prevent blockchain networks, to some extent, from denial-of-service attacks [66]. PoS is
another consensus mechanism where a block is added to the chain based on the balance
(stake) of the peer. Peers with high balances have more chances to add the next block. The
advantage of PoS is that it is not computationally intensive. It can be used in permissionless
blockchain networks. It is implemented in Ethereum Casper and Krypton [66]. The main
disadvantage of this mechanism is that it is vulnerable to a 51% attack, and peers with
high stakes can control the network [66]. In the PBFT consensus mechanism, it is assumed
that consensus can be reached as long as n = 3 f + 1 correctly working nodes are present
in the network, where f represents faulty nodes and fewer than 1/3 of the nodes are
faulty [72]. And, 2 f + 1 network nodes are required for consensus on the block. PBFT is an
energy-efficient consensus algorithm and is suitable for private (permissioned) blockchain
networks. PBFT is implemented in Hyperledger Fabric [73]. The limitation of PBFT is that
it is not suitable for large-scale networks. To improve the performance of PBFT, various
variations have been proposed. Other consensus mechanisms include the delegate-proof-
of-stake (DPoS) [74], proof-of-elapsed-time (PoET) [75], lease-proof-of-stake (LPoS) [76],
proof-of-capacity (PoC) [76], and proof-of-interaction (PoI) [76] mechanisms.
Two types of record-keeping models are popular in today’s blockchain networks. The
first method is the unspent transaction output (UTXO) model [77] and the second method is
the account-based model [77]. The UTXO model is employed by Bitcoin, whereas Ethereum
uses the account-based model [77]. A blockchain that supports the UTXO model is uniquely
suited for the transfer and tracking of digital tokenized assets, whereas a blockchain that
supports the account-based model is aimed at running arbitrary logic and establishing verifi-
able multi-step processes (smart contracts) [68]. Over the course of time, various applications
based on blockchain have been developed. Bitcoin is a standard and well-known application
of blockchain. The motive behind blockchain technology extends far beyond cryptocurrency
applications [78]. Legislators in various US states are using blockchain for different purposes
such as secure records storage and smart contracts [79–81]. Track-and-trace mechanisms are
very important in IoT applications, particularly in smart logistics. Blockchain technology can
provide a trusted infrastructure for tracking and tracing both physical objects and informa-
tion [78]. Other characteristics of blockchain applications are the immutability of information,
transparent sharing of information, and automated business processes [78]. Many different
types of blockchain frameworks have been developed for various purposes [25], such as
Bitcoin [82], Ethereum [83], Ripple [84], Hyperledger [73], BigchainDB [85], Corda [86], Quo-
Sensors 2023, 23, 9031 11 of 33
rum [87], Tezos [88], Multichain [89], Hashgraph [90], IOTA [91], and R3 [92]. The various
classifications of blockchain are presented in [38,93].
4. Related Works
Various analyses and sentiments can be found in the literature regarding blockchain-
IoT integration and governance. Since governance by blockchain and governance for
blockchain are two different terms, in this section, we present the related works concerning
Sensors 2023, 23, 9031 13 of 33
IoT governance, the role of blockchain as a governance mechanism, and governance for
blockchain.
advantage of off-chain governance is that it allows for both formal and informal decisions
in more flexible processes [78]. Through effective governance for blockchain, the long-term
sustainability of blockchain technology can be achieved. According to the EU blockchain
observatory and forum, it is important to specify who is responsible for future blockchain
changes required over time and how to enforce these changes [78]. Due to the lack of an
absolute governance mechanism, there have been many disputes and scandals [78,107]. As
mentioned in [54,108], there is a lack of significant research in the direction of blockchain
governance. Furthermore, it is not yet obvious or clearly manifested how to execute critical
resolutions and enforce decrees in the blockchain [109].
5. Blockchain-IoT Governance
The aim of this research is to develop a decentralized, automated, and shared-value
governance mechanism for blockchain-enabled IoT ecosystems, as well as utilize novel
characteristics of blockchain for governance to fulfill governance requirements. Numerous
governance requirements have been proposed. These requirements are discussed in the
context of smart logistics as a use case, as shown in Figure 7, where every partner in the
consortium can transparently verify, monitor, and configure the governance module. The
proposed methodology delivers an umbrella framework for agreements in multi-party
collaborations and ensures the fulfillment of the objectives of each partner. We propose
a variable geometry approach for collaboration among partners and fulfillment of the
governance requirements. In this section, we discuss the variable geometry governance
approach, the proposed governance requirements for blockchain-enabled IoT ecosystems,
and the mechanisms for fulfilling these requirements.
Table 1. The table shows the governance requirements that can be implmented off-chain and on-chain.
For simplicity and clarity, we follow a two-layer (on-chain and off-chain) governance.
5.2.1. Purpose
At the time of consortium (collaboration) formation, the purposes for the adoption of
a blockchain-IoT system need to be determined. Purposes can be subdivided into three
categories; problems, vision, and roles. For instance, what problems can a blockchain-IoT
system potentially solve, will a blockchain-IoT system be able to effectively solve these
problems, and what value will the system return or generate. After initial agreements about
the value a blockchain-IoT system can add to the consortium, a formal organization can be
formed with all the partners, who agree on the initial goals of the project. A dedicated team
is required to decide upon the intellectual property rights. The roles, which include actors
and their responsibilities, are determined, such as who supports which values and who
Sensors 2023, 23, 9031 18 of 33
contributes what. The private and public sectors have different roles and responsibilities.
The role of each actor or partner needs to be clearly identified and agreed upon. It is
important that each partner interrelate and coordinate with all the other partners [78].
Roles might include international, national, and regional actors. Clear policies regarding
participation in the blockchain network, for instance, who can execute transactions and
which nodes are allowed to read the ledger (data) and identify validators (miners) [78]. The
agreements are clearly compiled in order to avoid future conflicts. The over-regulation of
the technical environment should be avoided, as it can cause unnecessary burdens [8] and
potentially lead to limitations on technical innovation. This requirement can be determined
during off-chain development and implemented during on-chain development. On-chain
policies are required regarding user authorization, access to data, and achieving and
maintaining transparent consent among users. This requirement is typically included in
the common agreement of the variable geometry approach.
5.2.2. Ethics
As per the EU Commission, there are mainly six ethical issues: social justice and
(digital) divides, trust, blurring of contexts (private vs. public), non-neutrality, agency
(social contract between people and objects), autonomy (informed consent vs. obfuscation
of functionality) [113], and corporate social responsibility in enterprises [8]. Therefore, it
is important to raise ethical awareness among people who are part of the blockchain-IoT
consortium to ensure consent and fairness and avoid the introduction of backdoors and
the exploitation of users. This is especially important for developers, auditors, regulators,
and stakeholders. Some of the ethical considerations that should be included in ethical
policies are personal identity, autonomy of individuals, user consent, fairness, and social
justice [8]. The development of adequate policies to enforce ethical aspects in the design
and development of IoT solutions [8] and blockchain technology is vital. Awareness among
citizens leads to the integration of ethics in technologies to some extent. All partners should
agree to uphold ethics. The distinctive features of blockchain can be utilized to adhere
to ethical principles. The ethical mechanisms mentioned above should be decided and
agreed upon during off-chain development and implemented and verified during on-chain
development. This requirement could be included in the common agreement of the variable
geometry approach.
5.2.3. Transparency
Transparency is an integral part of ethics and should be embraced when developing
governance policies [8]. Principles regarding transparency are crucial for gaining solid
adoption since blockchain-IoT technology is still in its infancy. The framework should
elaborate on which data to use, how to obtain user consent, how to process and store data,
why to collect and use data, who controls the data, data deletion, and how to ensure data
transparency to establish trust with users. The framework should include policies that are
legitimate and fair, upholding the democratic principles of society. Blockchain offers all
these features of transparency. Various existing technological impediments (i.e., transparent
tracking, validation, and recording) can be addressed by using blockchain. Transparency
can be achieved through the immutability, traceability, and consensus characteristics of
blockchain. The choice of consensus mechanism can affect the security and balance of the
blockchain [78]. There should be consequences for any wrongdoing by any entity. The
consequences should be clear for the accountability bodies to impose and apply them fairly.
Transparency requirements can be developed during on-chain development and could be
included in the common agreement.
5.2.4. Audit
An audit is a process for continuously monitoring the purpose and scope of controls,
such as analyzing whether controls are functioning as required and whether they are
Sensors 2023, 23, 9031 19 of 33
applied to systems or processes that are part of the scope. The purpose of an audit is
to eradicate any fault, risk, or vulnerability in the controls. Some auditing features are
as follows:
• Accuracy : Assesses the controls.
• Completeness: Are the controls adequate, are there gaps, and are the controls applied
thoroughly.
• Timeliness: The controls are executed on time.
• Resilience: The controls are resilient to failures and there are backups if the primary
controls fail.
• Consistency: The primary and secondary controls are correctly in place.
An audit can be performed both on-chain and off-chain. Off-chain auditing is con-
ducted to monitor an individual partner’s contributions and commitments. In on-chain
auditing, technical tools and mechanisms are put in place to monitor performance. Au-
tomated audit mechanisms based on blockchain could be implemented in order to audit
common agreements, as well as private agreements (channels).
5.2.5. Interoperability
As per the Internet Engineering Task Force (IETF) definition, the Internet is “a large,
heterogeneous collection of interconnected systems that can be used for communication
of many different types between any interested parties connected to it” [52]. The Internet
consists of the “core Internet”, that is, Internet service provider (ISP) networks, and the
“edge Internet”, which comprises private and corporate networks [52], proprietary and
off-the-shelf software, and frameworks. For collaboration and cooperation, interoperability
(platform-independent solutions) across various partners, architectures, and domains is
vital. For instance, an existing single market such as the European Union has invested
significantly in fostering interoperability at various levels [114] in order to have a uniform
digital identification in the union. Policies have been adopted in the European Interoper-
ability Framework (EIF) and European Interoperability Reference Architecture (EIRA) to
incorporate interoperability [114]. The framework should include mechanisms for inter-
operability both at the network and architecture levels and, more importantly, because of
the data exchange that occurs nationally and internationally among the partners. Inter-
operability can be applied to various aspects such as legal, organizational, semantic, and
technical [114]. Efficient and effective interoperability policies can facilitate interactions
among partners [114]. Key stakeholders are involved in decisions regarding which network
architectures and technological strategies to use in order to maintain interoperability. Ensur-
ing interoperability among IoT ecosystems and with systems that are outside the blockchain
network perpetuates the scalability of diverse networks. Interoperability guarantees that
existing systems are adaptable to new innovations [8]. One of the main IoT challenges
is the heterogeneity of IoT devices. Different IoT devices have varying compatibilities,
support different protocols, and have different computational capabilities, which makes
interoperability very complex. One way to overcome this is to embrace or incorporate
existing standards and governances (IETF, ICANN, Internet, RIRs, ISOC, IEEE, IGF, W3C,
cloud governance, IoT reference architectures like Industrial Internet Reference Architec-
ture (IIRA), Internet of Things Architecture (IoT-A), and IEEE P2413) into the framework
in order to leverage their advantages. At the organizational level, the framework should
incorporate mechanisms for forming good relations with other national and international
bodies. Interoperability requirements can be implemented during off-chain (organizational
and legal level) and on-chain development. This requirement could be included in the
common and private agreements of the variable geometry approach.
5.2.6. Architecture
There are three main types of architecture: centralized, decentralized, and distributed.
There are pros and cons associated with each of these architectures. For instance, in a
Sensors 2023, 23, 9031 20 of 33
5.2.7. Security
Security is one of the crucial governance requirements for various reasons. Mech-
anisms should be developed to ensure confidentiality, integrity, and availability. The
framework should incorporate strategies to ensure security at every level of the infras-
tructure (devices, networks, integration, and physical). Mechanisms should be put in
place for continuous security hardening. Security requirements can be further categorized
into sub-requirements such as physical security, end-to-end security, security best prac-
tices, security risk assessment, real-time intrusion detection and prevention, enhanced
identification and authentication, and security audits. Various security mechanisms have
been proposed in the literature. Almeida et al. [1] recommended four principles be incor-
porated when deploying IoT applications in order to secure users’ data and build trust
in the IoT. These are notice and choice, data minimization, access to personal data, and
accountability. IoT devices are required to adhere to reasonable security requirements; for
instance, the inclusion of mechanisms for encryption, authentication, and access control
to ensure that user identification cannot be traced back. Various anonymity mechanisms
such as ZCash anonymity and monero anonymity [78] have been proposed. Most of these
security requirements can be achieved through blockchain technology. Security require-
ments can be implemented mainly during on-chain development. However, in cases where
physical security is required, it can be implemented during off-chain development. This
requirement could be included in the common and private agreements of the variable
geometry approach.
5.2.8. Privacy
Various definitions and types of Personal Identifiable Information (PII) and Sensi-
tive Personal Information (SPI) are present in the literature [115,116]. Centralized servers
owned by third parties have the capability to access, monitor, and manipulate users’ data
since digital technologies can be used to discriminate or track users’ behavior. Therefore,
ensuring privacy can increase confidence in the technology and ultimately the business’s
growth. Since ensuring privacy is one of the key challenges in governance frameworks,
service providers should take care of human integrity, identity, and privacy when providing
services [8]. Individuals should have full authority and control over their data (personal,
financial, commercial, etc.). The framework should formulate policies regarding the se-
curity of data against unauthorized access, limit data collection and data dissemination,
and determine who has authorized access to the data. Perhaps the governance framework
should ensure compliance with existing European data protection laws such as the data pro-
tection directive (95/46/EC) [117], ePrivacy directive (2002/58/EC)(2009/136/EC) [118],
and General Data Protection Regulation (GDPR) [34]. The GDPR [34] presented six require-
ments regarding user data processing, including lawfulness, fairness and transparency,
purpose limitations, data minimization, accuracy, storage limitations, integrity, and con-
fidentiality [119]. These laws ensure the protection of users’ rights, protection of users’
Sensors 2023, 23, 9031 21 of 33
and future policies and, consequently, strategies are determined. Performance metrics
are established in order to keep track of success in the form of customer satisfaction and
return on investment (ROI) and plan future improvements accordingly. Performance mea-
surements include various key performance indicators (KPI) to evaluate the operations of
service delivery [125]. Performance metrics can be used to contemplate the framework’s
capabilities, effectiveness, and fruition [125]. Various criteria such as return on investment
(ROI) and total cost of ownership (TCO) are used to evaluate projects’ performance; how-
ever, these two are not the only metrics [125]. For instance, Grembergen and Haes [126]
presented a balanced scorecard approach to measure performance. In this approach, vari-
ous perspectives and objectives were demonstrated. Various types of performance metrics
were discussed in [125], including process metrics, service metrics, enterprise goals, and
sample metrics. Therefore, stakeholders can use a more comprehensive cost-benefit anal-
ysis performance measurement approach that is based on quantitative and qualitative
indicators [125]. Performance measurement requirements can be implemented during
off-chain development and included in the common and private agreements (channels).
5.2.11. Cost
To maximize profit, partners require a suitable business model, along with fair pricing
strategies, to avoid conflicts and ensure that the price is suitable for the blockchain-IoT
ecosystem. Pricing mechanisms include rules regarding charging users or stakeholders
for services. The cost model or pricing strategy plays an important role in collaboration,
as it is used to identify the business interests of partners, and a fair pricing model can
potentially attract a large number of users. Various pricing mechanisms and policies
have been discussed in the literature [127,128]. Each pricing strategy has advantages and
disadvantages. However, certain cost models are a good match for an IoT-blockchain
system; for instance, models that are affordable, flexible, and predictable. Deciding on
cost models is always challenging since there are various partners involved and there
are various types of cost models. Some of the challenges of pricing are unpredictability,
fairness, and making pricing enticing to users. Because different partners or users might
have different usage patterns, different services might cost different amounts, and some
users might choose only selected services. Some of the well-known pricing models are
the pay-per-use and pay-per-device models. In the pay-per-use model, users pay for the
service according to the amount of usage of the service. Such a payment model is efficient
and straightforward since the user pays only for the duration or amount they require. This
model can be based on the duration of usage, data flow, or power usage. In the pay-per-
device model, users pay per device service. For instance, a fixed amount per month per
IoT device. Other possible strategies are storage as a service (SaaS), software as a service
(SaaS), monthly or yearly support costs, and up-front charges. Cost requirements can be
determined during off-chain development, implemented in on-chain development, and
included in the common and private agreements (channels).
5.2.12. Scalability
As mentioned earlier, blockchain for the IoT enhances the trust and security of the
IoT. However, as the number of IoT devices is increasing at a very fast pace, the lack of
blockchain scalability and compatibility capabilities can be an obstacle. The transaction rate
of blockchain-based technologies is significantly slower compared to existing digital transac-
tion systems [129,130]. For instance, the number of Ethereum transactions per second (TPS)
is 15–20, and the average transaction confirmation time is 2 min. The number of Bitcoin
transactions per second is 3–7 and the average transaction confirmation time is 25 min [129].
The lack of efficient scalability mechanisms can impact real-time transaction validations
and adversely impact the large-scale adoption of blockchain. Therefore, the integration of
blockchain and the IoT requires efficient mechanisms to enhance scalability. Regulations
are required regarding the size and duration of data storage, transaction validation time,
compatibility, and interoperability. Various mechanisms have been proposed in the litera-
Sensors 2023, 23, 9031 23 of 33
ture to improve blockchain scalability. For instance, Hazari and Mahmoud [129] proposed a
parallel proof-of-work mechanism to improve blockchain scalability. Boyen et al. [131] pro-
posed a similar parallel mining mechanism in order to execute transactions swiftly. Other
mechanisms for improving scalability include enhancing network latency, reducing transac-
tion queuing, enhancing compatibility between private and public blockchains, enhancing
compatibility between the IoT and blockchain, and simplifying the complexity of smart
contracts. Scalability requirements can be implemented during on-chain development and
included in the common and private agreements (channels).
5.2.13. Automation
Blockchain and automation are highly related. With the increase in the number of IoT
devices and consequently, the increase in complexity, automation mechanisms are required
to improve efficiency and speed without compromising transparency and traceability.
Blockchain is deployed in many application domains, such as supply chains, trust building,
and workflow management, to achieve automation. Blockchain features a distributed
architecture and automated execution of transactions without the interference of third
parties when certain conditions are met (smart contracts), which is highly beneficial, as
these features avoid the threats associated with centralized architectures and third-party
interference. Efficient mechanisms for the automated execution of transactions are required
to improve productivity and performance, save costs, and avoid errors. Smart contracts
can play an important role in the automation of various tasks in many diverse application
domains. Scalability requirements can be implmented during on-chain development
andincluded in the common and private agreements (channels).
5.2.14. Sustainability
The Internet is typically managed by various organizations such as the Internet En-
gineering Task Force (IETF), Internet Research Task Force (IRTF), Internet Engineering
Steering Group ((IESG), Internet Corporation for Assigned Names and Numbers (ICANN),
Internet Architecture Board (IAB), and World Wide Web Consortium (W3C). Each of these
organizations has varying responsibilities and purposes. The modern world is heavily
dependent on Internet sustainability and it is a critical resource for the mankind [52]. There-
fore, international law is required for the protection of this critical resource [52]. Blockchain
technology has the potential to provide long-term sustainable services and infrastructures
such as automated compliance checks and integration with the IoT [132], meeting the goals
of the 2015 Paris climate agreement [133] and eliminating corruption as per the United
Nations Environment Programme (UNEP) 2030 goals [134]. However, blockchain is mainly
dependent on heavy computational operations that require significant power, which is
highly concerning for sustainability. Blockchain applications that consume a high amount
of energy are not environmentally sustainable [133]. The governance should consider the
long-term environmental and economic sustainability of the blockchain technology by
reducing energy consumption while not compromising security. The blockchain frame-
work should be capable of effectively evolving in order to adapt, change, and interact with
environmental requirements. Sustainable blockchain mechanisms have been mentioned
in the literature [135]. Sustainability requirements can be implemented during on-chain
development and included in the common and private agreements (channels).
5.2.15. Support
Since users are an integral part of a business, support requirements play an important
role in the success of the business. It is possible to retain and attract more customers
through user-friendly customer support mechanisms. The framework should adopt differ-
ent strategies and methodologies regarding measuring and valuing customer satisfaction
and meeting users’ expectations. There are various types of support including organi-
zational support, technical support, and legal support, which includes legal obligations
and legal compliance. Support can be remote, physical, or in the form of documentation.
Sensors 2023, 23, 9031 24 of 33
Regular evaluations should be carried out regarding customer satisfaction with services,
and policies and strategies should be developed accordingly. Various customer satisfaction
and monitoring strategies were demonstrated in [136]. Support requirements can be imple-
mented during off-chain and on-chain development and included in the common and private
agreements (channels).
partners should be developed, and interoperability among the partners at the technical,
legal, and organizational levels should be ensured, which can attract more potential partners
and consumers. The consortium should implement novel security and privacy mechanisms,
and in order to fully leverage the blockchain features, a distributed architecture should
be implemented. A distributed architecture has many applications and includes security,
transparency, trust, privacy, availability, and inbuilt capabilities for coping with errors
and faults. Furthermore, existing privacy-preserving mechanisms and standards should
be adopted. The smart logistics consortium should develop fair and economical cost
strategies that are beneficial to each partner. Furthermore, services, user satisfaction,
and economic gains should be regularly evaluated, and services and strategies should
be updated accordingly to attract and retain customers. So, in conclusion, following
these requirements would transform traditional logistics into efficient and profitable smart
logistics (Table 2, Figures 9 and 10).
Figure 9. Framework. Governance specifies how roles are assigned and how updates are executed.
Sensors 2023, 23, 9031 27 of 33
7. Conclusions
In this research, we have presented a governance framework for blockchain-enabled
IoT applications, comprising various essential requirements. Furthermore, we have demon-
strated that most of these requirements can be met through blockchain technology due
to its unique characteristics, thereby enhancing the security and reliability of the IoT. The
IoT generates a tremendous amount of data, and its growth has resulted in increased
architectural complexity, leading to various security threats. Data processing methods
are becoming increasingly automated and intelligent, enabling the precise learning and
prediction of distinct human behaviors. With recent advancements in various industries,
products have become smarter, more efficient, and safer. However, they have also be-
come more intrusive. According to European data protection regulations, IoT devices
can be directly linked to individuals through wearable devices, quantified self-tracking
devices, and robotics with sensors used in home automation. One of the main challenges
is the lack of a dedicated governance mechanism. Without a governance framework, any
technology can potentially become dubious and invasive. Compliance frameworks are
implemented to safeguard sensitive data, ensure accountability, and more. Governance
encompasses policies, roles, and the enforcement of the rule of law. Through governance
and legal frameworks, it becomes possible to regulate both the commercial and technical
Sensors 2023, 23, 9031 28 of 33
aspects of the technology, facilitate further development, attract investors, and improve
collaboration, ultimately gaining consumers’ trust in the technology. Existing governance
frameworks often lack the fundamental requirements of IoT and blockchain technologies.
There are numerous underlying governance challenges that need to be addressed. For
instance, in IoT governance, the challenges include legitimacy, transparency, accountability,
anti-competitive behavior, varying organization sizes, heterogeneity, ethics, privacy, secu-
rity, competition, and the resolution of complex disputes among partners. As mentioned
earlier, blockchain can be used to mitigate most of these IoT challenges. For example,
unlike traditional logistics, smart logistics has brought much-needed efficiency. However,
smart logistics is far from perfect and still encounters many challenges. One potential
approach to overcoming these challenges is to adopt blockchain technology. Therefore,
efforts are required to promote blockchain technology within the IoT ecosystem. Blockchain
allows for transparent obligations within agreements and clear consensus mechanisms to
verify adherence to governance standards. The proposed framework comprises 15 require-
ments for a blockchain-enabled IoT ecosystem. Each of these requirements was briefly
studied. Arguments were presented to underscore the importance of each requirement,
and mechanisms were detailed for achieving them. These requirements were designed to
address the numerous challenges and work involved in making the blockchain-IoT system
a mainstream technology. We have researched these requirements while taking into account
the economic, social, and environmental incentives and interests of every partner within
the blockchain-IoT consortium. Our proposed governance mechanism also considers the
need for a distributed IoT ecosystem. Furthermore, we advocate for a variable geometry
approach in implementing the requirements to promote flexibility, allowing partners the
freedom to opt out of agreements that are not relevant to their interests. Finally, we have
evaluated the framework through a smart logistics use case.
8. Future Work
We have discussed the requirements, challenges, and potential enhancements from a
broad perspective. Future research should delve deeper into each of these requirements
and propose concrete mechanisms to address them. Additionally, conducting a survey
involving multiple companies to evaluate the framework and gather recommendations for
refining existing requirements or introducing new ones would be beneficial.
Author Contributions: I.U. researched, implemented, and tested the findings. I.U. wrote the paper.
P.J.M.H. supervised this research. All authors have read and agreed to the published version of the
manuscript.
Funding: This work has been partially supported by the EFRO and the OP Oost program in the
context of the Countdown project.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Almeida, V.A.F.; Doneda, D.; Monteiro, M. Governance Challenges for the Internet of Things. IEEE Internet Comput. 2015, 19,
56–59. https://doi.org/10.1109/MIC.2015.86.
2. Ullah, I.; Meratnia, N.; Havinga, P.J.M. Entropy as a Service: A Lightweight Random Number Generator for Decentralized IoT
Applications. In Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops
(PerCom Workshops), Austin, TX, USA, 23–27 March 2020; pp. 1–6. https://doi.org/10.1109/PerComWorkshops48775.2020.9156205.
3. Al-Ruithe, M.; Mthunzi, S.; Benkhelifa, E. Data governance for security in IoT & cloud converged environments. In Proceedings
of the 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 29
November–2 December 2016; pp. 1–8. https://doi.org/10.1109/AICCSA.2016.7945737.
Sensors 2023, 23, 9031 29 of 33
4. Copie, A.; Fortis, T.; Munteanu, V.I.; Negru, V. From Cloud Governance to IoT Governance. In Proceedings of the 2013 27th
International Conference on Advanced Information Networking and Applications Workshops, Barcelona, Spain, 25–28 March
2013; pp. 1229–1234. https://doi.org/10.1109/WAINA.2013.169.
5. Ullah, I.; Meratnia, N.; Havinga, P.J.M. iMAC: Implicit Message Authentication Code for IoT Devices. In Proceedings
of the 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 2–16 June 2020; pp. 1–6.
https://doi.org/10.1109/WF-IoT48130.2020.9221331.
6. Gerber, A.; Kansal, S. Defining Your IoT Governance Practices. 7 August 2017. Available online: https://developer.ibm.com/
technologies/iot/articles/iot-governance-01/ (accessed on 3 November 2023)..
7. Kazmi, A.; Serrano, M.; Lenis, A. Smart Governance of Heterogeneous Internet of Things for Smart Cities. In Proceedings
of the 2018 12th International Conference on Sensing Technology (ICST), Limerick, Ireland, 4–6 December 2018; pp. 58–64,
https://doi.org/10.1109/ICSensT.2018.8603657.
8. de Bossey, C. Report of the Working Group on Internet Governance, June 2005. p. 4. Available online: http://www.wgig.org/
docs/WGIGREPORT.pdf (accessed on 3 November 2023).
9. Weber, R. Governance of the Internet of Things—From Infancy to First Attempts of Implementation? Laws 2016, 5, 28.
https://doi.org/10.3390/laws5030028.
10. Roman, R.; Zhou, J.; Lopez, J. On the features and challenges of security and privacy in distributed internet of things. Comput.
Netw. 2013, 57, 2266–2279.
11. Jing, Q.; Vasilakos, A.V.; Wan, J.; Lu, J.; Qiu, D. Security of the internet of things: Perspectives and challenges. Wirel. Netw. 2014,
20, 2481–2501.
12. Yan, Z.; Zhang, P.; Vasilakos, A.V. A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 2014, 42, 120–134.
13. Atzori, M. Blockchain Technology and Decentralized Governance: Is the State Still Necessary? University College of London: London,
UK, 2016. https://doi.org/10.2139/ssrn.2709713.
14. Tasca, P.; Tessone, C. Taxonomy of Blockchain Technologies. Principles of Identification and Classification (Unpublished
Manuscript). 2018. Available online: https://papers.ssrn.com/abstract=2977811 (accessed on 3 November 2023).
15. Ahmad, R.W.; Salah, K.; Jayaraman, R.; Yaqoob, I.; Ellahham, S.; Omar, M. The role of blockchain technology in telehealth and
telemedicine. Int. J. Med. Informatics 2021, 148, 104399. ISSN 1386-5056. https://doi.org/10.1016/j.ijmedinf.2021.104399.
16. Auer, S.; Nagler, S.; Mazumdar, S.; Mukkamala, R.R. Towards blockchain-IoT based shared mobility: Car-sharing and leasing as a
case study. J. Netw. Comput. Appl. 2022, 200, 103316. ISSN 1084-8045. https://doi.org/10.1016/j.jnca.2021.103316.
17. Ahmed, I.; Zhang, Y.; Jeon, G.; Lin, W.; Khosravi, M.R.; Qi, L. A blockchain-and artificial intelligence-enabled smart IoT framework
for sustainable city. Int. J. Intell. Syst. 37 2022, 37, 6493–6507.
18. Omar, I.A.; Debe, M.; Jayaraman, R.; Salah, K.; Omar, M.; Arshad, J. Blockchain-based Supply Chain Traceability for COVID-19
personal protective equipment, Comput. Ind. Eng. 2022, 167, 107995. ISSN 0360-8352. https://doi.org/10.1016/j.cie.2022.107995.
19. Ahmad, S.; Saxena, C. Internet of Things and Blockchain Technologies in the Insurance Sector. In Proceedings of the 2022 3rd
International Conference on Computing, Analytics and Networks (ICAN), Rajpura, Punjab, India, 18–19 November 2022; pp. 1–6.
https://doi.org/10.1109/ICAN56228.2022.10007267.
20. Cole, R.; Stevenson, M.; Aitken, J. Blockchain technology: Implications for operations and supply chain management. Supply
Chain Manag. 2019, 24, 469–483. https://doi.org/10.1108/SCM-09-2018-0309.
21. IBM (2018a) AIG, IBM, Standard Chartered Deliver First Multinational Insurance Policy Powered by Blockchain. Available online:
https://www-03.ibm.com/press/us/en/pressrelease/52607.wss (accessed on 25 March 2020).
22. Nayak, N.; Nguyen, D.T. Blockchain, AI and robotics: How Future Tech Will Simplify Federal Procurement. 2018. Available
online: https://www.federaltimes.com/acquisition/2018/03/23/blockchain-ai-and-robotics-how-future-tech-will-simplify-
federal-procurement/ (accessed on 25 March 2020).
23. Lumineau, F.; Wang, W.; Schilke, O. Blockchain Governance—A New Way of Organizing Collaborations? Organ. Sci. 2021, 32,
257–525. https://doi.org/10.1287/orsc.2020.1379.
24. CBInsights (2020) Investment to Blockchain Startups Slips in 2019. Available online: https://www.cbinsights.com/research/
blockchain-investment-trends-2019/ (accessed on 25 March 2020).
25. van Pelt, R.; Jansen, S.; Baars, D.; Overbeek, S. Defining Blockchain Governance: A Framework for Analysis and Comparison. Inf.
Syst. Manag. 2021, 38, 21–41, https://doi.org/10.1080/10580530.2020.1720046.
26. Hacker, P. Corporate governance for complex cryptocurrencies? A framework for stability and decision making in blockchain-
based organizations. In Regulating Blockchain: Techno-Social and Legal Challenges; Hacker, P., Lianos, I., Dimitropoulos, G., Eich, S.,
Eds.; Oxford University Press: Oxford, UK, 2017; pp. 40–166.
27. Rennock, M.; Cohn, A.; Butcher, J. Blockchain Technology and Regulatory Investigations (Tech. Rep.). Steptoe Johnson LLP. 2018.
Available online: https://www.steptoe.com/images/content/1/7/v2/171967/LIT-FebMar18-Feature-Blockchain.pdf (accessed
on 3 November 2023).
28. Beck, R.; Müller-Bloch, C.; King, J.L. Governance in the blockchain economy: A framework and research agenda. J. Assoc. Inf.
Syst. 2018, 19, 1020–1034. https://doi.org/10.17705/1jais.
29. Phanse, K. Data governance using SAP MDM-part 1. 2008. Available online: https://archive.sap.com/kmuuid2/60022998-5d17-
2b10-dbaa-8e3ab357fa55/Data%20Governance%20using%20SAP%20Mast\er%20Data%20Management%20-%20Part%201.pdf
(accessed on 3 November 2023).
Sensors 2023, 23, 9031 30 of 33
30. Furness, A. Internet of Things (IoT) European Research Cluster Activity Chain. International Framework for IoT Structure and
Governance. (CASAGRAS2 Deliverable 4.1—A Specification of Rules and Procedures for Governance). 27 September 2011.
Available online: https://docbox.etsi.org/zArchive/TISPAN/Open/IoT/20111028IERC-IoT-STD-Poznan/CASAGRAS2%2
0Establishing%20an%20International%20Framework%20for%20Structure%20&%20Governance%20v2.pdf (accessed on 4 March
2022).
31. Worldwide Governance Indicators. Available online: https://datacatalog.worldbank.org/dataset/worldwide-governance-
indicators (accessed on 18 January 2021).
32. A Conceptual Framework for Data Governance in IoT-Enabled Digital IS Ecosystems. Available online: https://www.scitepr\ess.
org/Papers/2019/79243/79243.pdf (accessed on 23 January 2021).
33. Merkus, J. Data Governance Maturity Model. MSc Master’s Thesis, Open Universiteit Nederland, Valkenburgerweg, The
Netherland, 2015.
34. General Data Protection Regulation (GDPR). 2018. Available online: https://gdpr-info.eu/ (accessed on 3 November 2023).
35. Friedman, T.; Judah, S. Data Risks in the Internet of Things Demand Extensive Information Governance. 30 June 2016. Available
online: https://www.gartner.com/en/documents/3362117/data-risks-in-the-internet-of-things-demand-extensive-in (accessed
on 7 March 2022).
36. Weber, R.H. Internet of things—Governance quo vadis? Comput. Law Secur. Rev. 2013, 29, 341–347. ISSN 0267-3649.
https://doi.org/10.1016/j.clsr.2013.05.010.
37. Esposito De Falco, S.; Cucari, N.; Canuti, E.; Modena, S. Corporate governance and blockchain: Some preliminary results
by a survey. In Proceedings of the Corporate Governance: Search for the Advanced Practices, Rome, Italy, 28 February 2019.
https://doi.org/10.22495/cpr19p3.
38. Rafael, Z.; Geetha, P.; Gianluca, M.; Gerhard, S. Examining Gentle Rivalry: Decision-Making in Blockchain Systems. In Proceedings
of the 52nd Hawaii International Conference on System Sciences (HICSS 2019), Maui, Hawaii, 8–13 January 2019.
39. Williamson, O.E. Markets and Hierarchies: Analysis and Antitrust Implications: A Study in the Economics of Internal Organization; Social
Science Research Network: Rochester, NY, USA, 1975; SSRN Scholarly Paper ID 1496220.
40. Powell, W.W. Neither Market Nor Hierarchy. Res. Organ. Behav. 1990, 12, 295–336.
41. Fukuyama, F. What Is Governance? Governance 2013, 26, 347–368. https://doi.org/10.1111/gove.12035.
42. Ch, G.D.S.; Hervas, C.; Estevez, E.; Marrone, L. High-Level IoT Governance Model Proposal for Digitized Ecosystems. In
Proceedings of the 2019 International Conference on Information Systems and Software Technologies (ICI2ST), Quito, Ecuador,
13–15 November 2019, pp. 79–84. https://doi.org/10.1109/ICI2ST.2019.00018.
43. Kooiman, J. Social-Political Governance. Public Manag. Int. J. Res. Theory 1999, 1, 67–92, https://doi.org/10.1080/14719037800000005.
44. Joint Task Force Transformation Initiative. SP 800-53 Rev. 4. April 2013. Available online: https://csrc.nist.gov/publications/
detail/sp/800-53/rev-4/final (accessed on 3 November 2023).
45. Kate O’Flaherty. Marriott Faces $123 Million Fine For 2018 Mega-Breach. 2019. Available online: https://www.forbes.com/sites\
/kateoflahertyuk/2019/07/09/mar\riott-faces-gdpr-fine-of-123-million/ (accessed on 3 November 2023).
46. Barnaby Lewis. ISO/IEC 27000-Key international Standard for Information Security Revised. Available online: https://www.iso.
org/news/ref2266.html (accessed on 3 November 2023).
47. ISO/IEC 30141:2018(en) Internet of Things (loT)—Reference Architecture. Available online: https://www.iso.org/obp/ui/fr\/#
iso:std:iso-iec:30141:ed-1:v1:en (accessed on 3 November 2023).
48. ISO/IEC 27001:2022 Information Security, Cybersecurity and Privacy Protection Information Security Management Systems
Requirements. 2022 Available online: https://www.iso.org/standard/27001 (accessed on 3 November 2023).
49. ISO/IEC 27018:2019. Information Technology-Security Techniques-Code of Practice for Protection of Personally Identifiable
Information (PII) in Public Clouds Acting as PII Processors. Available online: https://www.iso.org/standard/76559.html
(accessed on 3 November 2023).
50. ISO/IEC 27017:2015. Information Technology—Security Techniques—Code of Practice for Information Security Controls Based
on ISO/IEC 27002 for Cloud Services. Available online: https://www.iso.org/standard/43757.html (accessed on 3 November
2023).
51. Royal Netherlands Standardization Institute. NEN Netherlands. Available online: https://www.iso.org/member/2027.html
(accessed on 3 November 2023).
52. Harald T. Alvestrand. Internet Engineering Task Force (IETF—Mission statement— RFC3935, 2004). Available online: https:
//rfc-editor.org/rfc/rfc3935.txt (accessed on 3 November 2023).
53. Kleinwachter, W. Final Report of the EU IOT Task Force on IOT Governance. Summary. Brussels, 14 November 2012. Available
online: http://ec.europa.eu/information_society/newsroom/cf/dae/doc\ument.cfm?doc_id=1748 (accessed on 3 November
2023).
54. van Deventer, O.; Brewster, C.; Everts, M. Governance and Business Models of Blockchain Technologies and Networks (Tech. Rep.
No. 776936). TNO. 2017. Available online: https://repository.tudelft.nl/view/tno/uuid:a593f6d3-6c67-4fb1-908b-4ac7662b9b7f
(accessed on 3 November 2023).
55. Naden, C. Reference Framework for the Internet of Things. 2018. Available online: https://www.iso.org/news/ref2340.html
(accessed on 3 November 2023).
56. Dai, H.N.; Zheng, Z.; Zhang, Y. Blockchain for Internet of Things: A Survey. IEEE Internet Things J. 2019, 6, 8076–8094.
Sensors 2023, 23, 9031 31 of 33
57. Zhu, L.; Gai, K.; Li, M. Blockchain Technology in Internet of Things; Springer: Cham, Switzerland, 2019 . https://doi.org/10.1007/978-
3-030-21766-2.
58. Kumar, N.M.; Mallick, P.K. The Internet of Things: Insights into the building blocks, component interactions, and architecture
layers. Procedia Comput. Sci. 2018, 132, 109–117. ISSN 1877-0509. https://doi.org/10.1016/j.procs.2018.05.170.
59. Burhan, M.; Rehman, R.A.; Kim, B.-S.; Khan, B. IoT Elements, Layered Architectures and Security Issues: A Comprehensive
Survey. Sensors 2018, 18, 2796 . https://doi.org/10.3390/s18092796.
60. Hany, A.; Gary, W. IoT Security, Privacy, Safety and Ethics. In Digital Twin Technologies and Smart Cities; Springer Nature: Cham,
Switzerland, 2019; pp.1–27. https://doi.org/10.1007/978-3-030-18732-3_8.
61. Xu, J. J. Are blockchains immune to all malicious attacks? Financ. Innov. 2016, 2, 25. https://doi.org/10.1186/S40854-016-0046-5
62. Ullah, I.; de Roode, G.; Meratnia, N.; Havinga, P. Threat Modeling—How to Visualize Attacks on IOTA? Sensors 2021, 21, 1834.
https://doi.org/10.3390/s21051834.
63. Brady, M.A.; Ullah, I.; Havinga, P.J.M. DOSing Distributed Ledger Technology: IOTA. In Proceedings of the 2021 IEEE
5th International Conference on Cryptography, Security and Privacy (CSP), Zhuhai, China, 8–10 January 2021; pp. 55–61.
https://doi.org/10.1109/CSP51677.2021.9357600.
64. Nofer, M.; Gomber, P.; Hinz, O.; Schiereck, D. Blockchain. Bus Inf. Syst. Eng. 2017, 59, 183–187. https://doi.org/10.1007/s12599-
017-0467-3.
65. Zyskind, G.; Nathan, O.; Pentl, A. Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy
Workshops (SPW); IEEE: Piscataway, NJ, USA, 2015; pp. 180–184.
66. Yaga, D.; Mell, P.; Roby, N.; Scarfone, K. Blockchain Technology Overview; National Institute of Standards and Technology:
Gaithersburg, MD, USA, 2018. http://dx.doi.org/10.6028/NIST.IR.8202.
67. Swanson, T. Consensus-as-a-Service: A Brief Report on the Emergence of Permissioned, Distributed Ledger Systems. 2015.
Available online: http://www.ofnumbers.com/wp-content/uploads/2015/04/Permissioned-distributed-ledgers.pdf (accessed
on 3 November 2023).
68. Christidis, K.; Devetsikiotis, M. Blockchains and Smart Contracts for the Internet of Things. Special Section on the Plethora of
Research in Internet of Things (IoT). IEEE Access 2016, 4, 2292–2303. https://doi.org/10.1109/ACCESS.2016.2566339.
69. Announcing the Secure Hash Standard. Federal Information Processing Standards Publication 180-2 2002. Available online:
http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf (accessed on 3 November 2023).
70. Percival, C. Tarsnap—The Scrypt Key Derivation Function and Encryption Utility. Available online: http://www.tarsnap.com/
scrypt.html (accessed on 15 March 2016).
71. Aumasson, J.-P.; Henzen, L.; Meier, W.; Phan, R.C.W. SHA-3 Proposal BLAKE. Available online: https://131002.net/blake/blake.
pdf (accessed on 16 December 2010).
72. Sukhwani, H.; Martínez, J.M.; Chang, X.; Trivedi, K.S.; Rindos, A. Performance Modeling of PBFT Consensus Process for
Permissioned Blockchain Network (Hyperledger Fabric). In Proceedings of the 2017 IEEE 36th Symposium on Reliable Distributed
Systems (SRDS), Hong Kong, China, 26–29 September 2017; pp. 253–255. https://doi.org/10.1109/SRDS.2017.36.
73. Hyperledger. Available online: https://www.hyperledger.org/ (accessed on 3 November 2023).
74. Skh Saad, S.M.; Raja Mohd Radzi, R.Z. Comparative Review of the Blockchain Consensus Algorithm Between Proof of Stake
(POS) and Delegated Proof of Stake (DPOS). Int. J. Innov. Comput. 2020, 10 . https://doi.org/10.11113/ijic.v10n2.272
75. Chen, L.; Xu, L.; Shah, N.; Gao, Z.; Lu, Y.; Shi, W. On Security Analysis of Proof-of-Elapsed-Time (PoET). In Stabilization, Safety,
and Security of Distributed Systems; Spirakis P., Tsigas P., Eds.; SSS 2017. Lecture Notes in Computer Science; Springer: Cham,
Switzerland, 2017; Volume 10616. https://doi.org/10.1007/978-3-319-69084-1_19
76. Zhang, C.; Wu, C.; Wang, X. Overview of Blockchain Consensus Mechanism. In Proceedings of the 2020 2nd International
Conference on Big Data Engineering (BDE 2020), Shanghai, China, 29–31 May 2020; Association for Computing Machinery: New
York, NY, USA, 2020; pp. 7–12. https://doi.org/10.1145/3404512.3404522.
77. Sun, F. UTXO vs Account/Balance Model. Available online: https://medium.com/@sunflora98/utxo-vs-ac\count-balance-
model-5e6470f4e0cf (accessed on 9 August 2018).
78. Governance of and with Blockchain. a Thematic Report Prepared by the European Union Blockchain Observatory & Forum.
Available online: https://www.eublockchainforum.eu/sites/default/files/reports/\report_governance_v1.0_0.pdf (accessed on
3 November 2023).
79. Van der Elst, C.; Lafarre, A. Blockchain and Smart Contracting for the Shareholder Community. Eur. Bus. Organ. Law Rev. 2019,
20. https://doi.org/10.1007/s40804-019-00136-0.
80. Arizona Revised Statutes Title 44-Trade and Commerce § 44-7061 Signatures and Records Secured through Blockchain Technology;
Smart Contracts; Ownership of Information; Definitions. 2017. Available online: https://law.justia.com/codes/arizona/2017
/title-44/section-44-7061/ (accessed on 3 November 2023).
81. Blockchain Enabling-Vermont Laws. 12 V.S.A. § 1913 (2017). Available online: https://legislature.vermont.gov/statutes/section/
12/081/01913 (accessed on 3 November 2023).
82. Satoshi, N. Bitcoin: A Peer-to-Peer Electronic Cash System. Decentralized Bus. Rev. 2008, 21260. Available online: https:
//assets.pubpub.org/d8wct41f/31611263538139.pdf (accessed on 3 November 2023)..
83. Ethereum. Available online: https://ethereum.org/ (accessed on 3 November 2023).
84. XRP: The Best Digital Asset for Global Payments. Available online: https://ripple.com/xrp/ (accessed on 3 November 2023).
Sensors 2023, 23, 9031 32 of 33
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.