All Authorea-powered sites will be offline 6am-10am EDT Tuesday 11 June
for Essential Maintenance. We apologise for any inconvenience.

The success of blockchain as the underlying technology for cryptocurrencies has opened up possibilities for its use in other application domains as well. The main advantages of blockchain for its potential use in other areas are its inherent security mechanisms and immunity to data manipulation attacks. A blockchain relies on a consensus method for agreeing on any new data. Most of the consensus methods which are currently used for the blockchain of different cryptocurrencies require high computational power and thus are not suitable for resource-constrained systems. In this article, we survey the various blockchain-based consensus methods that are applicable to resource-constrained IoT devices and networks. In a typical IoT network, there exist several devices with limited computational and communication capabilities. Most often, these devices cannot perform intensive computations and are starved for bandwidth. Therefore, we discuss the possible measures that can be taken to reduce the computational power and convergence time for the underlying consensus methods. We also talk about some of the alternatives to the public blockchain, such as private blockchain and tangle, along with their potential adoption for IoT networks. Furthermore, we review the existing consensus methods that have been implemented and explore the possibility of utilizing them to realize a blockchainbased IoT network. Some of the open research challenges including AI-enabled blockchains are also put forward.
As Internet of Things (IoT) and Cyber-Physical systems become more ubiquitous in our daily lives, it necessitates the capability to measure the trustworthiness of the aggregate data from such systems to make fair decisions. However, the interpretation of trustworthiness is contextual and varies according to the risk tolerance attitude of the concerned application. In addition, there exist varying levels of uncertainty associated with an evidence upon which a trust model is built. Hence, the data integrity scoring mechanisms require some provisions to adapt to different risk attitudes and uncertainties. In this paper, we propose a prospect theoretic framework for data integrity scoring that quantifies the trustworthiness of the collected data from IoT devices in the presence of adversaries who try to manipulate the data. In our proposed method, we consider an imperfect anomaly monitoring mechanism that tracks the transmitted data from each device and classifies the outcome (trustworthiness of data) as not compromised, compromised, or undecided. These outcomes are conceptualized as a multinomial hypothesis of a Bayesian inference model with three parameters. These parameters are then used for calculating a utility value via prospect theory to evaluate the reliability of the aggregate data at an IoT hub. In addition, to take into account different risk attitudes, we propose two types of fusion rule at IoT hub– optimistic and conservative. Furthermore, we put forward asymmetric weighted moving average (AWMA) scheme to measure the trustworthiness of aggregate data in presence of On-Off attacks. The proposed framework is validated using extensive simulation experiments for both uniform and On-Off attacks. We show how trust scores vary under a variety of system factors like attack magnitude and inaccurate detection. In addition, we measure the trustworthiness of the aggregate data using the well-known expected utility theory and compare the results with that obtained by prospect theory. The simulation results reveal that prospect theory quantifies trustworthiness of the aggregate data better than expected utility theory.