Skip to main content

Advertisement

Log in

Integration of blockchain and Internet of Things: challenges and solutions

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

Blockchain-based Internet of Things (BIoT) is an emerging paradigm of Internet of Things (IoT) which utilizes the blockchain technology to provide security services to the IoT applications. In essence, the blockchain built-in security mechanism can provide services such as availability, authentication, authorization, confidentiality, and integrity to the IoT applications. While most of the IoT devices are inherently resource-constrained in terms of computational power and storage capacity, the downside for blockchain is a requirement of massive amount of energy and computational resources for its operation, which poses challenges to the realization of BIoT. This paper strives to explore the challenges associated with the integration of blockchain and IoT and review their solutions. First, a brief introduction of blockchain technology is presented, followed by characterization of blockchain-based IoT applications as per their heterogeneous traffic demand and Quality of Service (QoS) requirements. Next, challenges that limit the design, development, and deployment of BIoT applications are explained in detail such as energy efficiency, privacy, throughput, latency, fork problem, security, legal issues, smart contracts, storage, and network broadcast mechanism and their proposed solutions are discussed. Finally, future research directions of blockchain and IoT integration are indicated. This investigation will benefit the researchers and developers to identify and solve blockchain and IoT integration challenges in order to realize efficient BIoT applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

Not applicable.

Code availability

Not applicable.

References

  1. Gartner (2018) https://www.gartner.com/en/newsroom/press-releases/2018-11-07-gartner-identifies-top-10-strategic-iot-technologies-and-trends. Accessed 10 Jan 2020

  2. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Communication Surveys & Tutorials 17(4):2347–2376

    Article  Google Scholar 

  3. Springwise Editorial team (2018) IoT innovative report. Deloitte. https://www2.deloitte.com/content/dam/Deloitte/de/Documents/Innovation/Internet-of-Things-Innovation-Report-2018-Deloitte.pdf. Accessed 1 Jan 2020

  4. York K (2016) Dyn statement on 10/21/2016 DDoS attack. Dyn Blog, 2016. http://dyn.com/blog/dyn-statement-on-10212016-ddos-attack/. Accessed 8 Nov 2020

  5. Reyna A, Martín C, Chen J, Soler E, Díaz M (2018) On blockchain and its integration with IoT. Challenges and opportunities. Futur Gener Comput Syst 88:173–190

    Article  Google Scholar 

  6. Panarello A, Tapas N, Merlino G, Longo F, Puliafito A (2018) Blockchain and IoT integration: a systematic survey. Sensors 18(8):146–160

    Article  Google Scholar 

  7. Triantafillou P, Ntarmos N, Nikoletseas S, Spirakis P (2003) NanoPeer networks and P2P worlds. Proceedings of the 3rd international conference on peer-peer computing, Linkoping, Sweden, 40–46

  8. Ali M, Uzmi ZA (2004) CSN: a network protocol for serving dynamic queries in large-scale wireless sensor networks. Proceedings of the 2nd annual conference on communication networks and services research, Fredericton, NB, Canada, 165–174

  9. Krco S, Cleary D, Parker D (2005) P2P mobile sensor networks. Proceedings of the 38th annual Hawaii international conference on system sciences, Big Island, HI, USA, 324c

  10. Dinh TTA, Liu R, Zhang M, Chen G, Ooi BC, Wang J (2018) Untangling blockchain: a data processing view of blockchain systems. IEEE Transactions on Knowledge Data Engineering 30(7):1366–1385

    Article  Google Scholar 

  11. Gatteschi V, Lamberti F, Demartini C, Pranteda C, Santamaria V (2018) To blockchain or not to blockchain: that is the question. IT Professional 20(2):62–74

    Article  Google Scholar 

  12. Ben E, Brousmiche K, Levard H, Thea E (2017) Blockchain for enterprise: overview, opportunities and challenges. Proceedings of the international conference on wireless and mobile communications (ICWMC), Nice, France, 83–88

  13. Yli-Huumo J, Ko D, Choi S, Park S, Smolander K (2016) Where is current research on blockchain technology? - a systematic review. PLoS One 11(10):1–27

    Article  Google Scholar 

  14. Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Consulted 1(2012):28

    Google Scholar 

  15. Sharma PK, Chen MY, Park JH (2017) A software defined fog node based distributed blockchain cloud architecture for IoT. IEEE Access 6:115–124

    Article  Google Scholar 

  16. Sasson EB, Chiesa A, Garman C, Green M, Miers I, Tromer E, Virza M (2014) Zerocash: decentralized anonymous payments from bitcoin. Proceedings of IEEE symposium on security and privacy, San Jose, 459474

  17. Singh K, Heulot N, Hamida EB (2018) Towards anonymous, unlinkable, and confidential transactions in blockchain. Proceedings of 2018 IEEE iThings and IEEE GreenCom and IEEE CPSCom and IEEE SmartData, Halifax, 1642–1649

  18. Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum project, technical report. Accessed 8 November 2020

  19. Li Z, Kang J, Yu R, Ye D, Deng Q, Zhang Y (2018) Consortium blockchain for secure energy trading in industrial Internet of Things. IEEE Transactions on Industrial Informatics 14(8):36900–33700

    Google Scholar 

  20. Uddin MA, Stranieri A, Gondal I, Balasubramanian V (2018) Continuous patient monitoring with a patient centric agent: a block architecture. IEEE Access 6:32700–32726

    Article  Google Scholar 

  21. Isaja M, Soldatos J (2018) Distributed ledger technology for decentralization of manufacturing processes. Proceedings of the 1st IEEE industrial cyber-physical systems (ICPS), Saint Petersburg, 696–701

  22. Litecoins. Available: https://litecoin.com. Accessed 10 June 2020

  23. Lin IC, Liao TC (2017) A survey of blockchain security issues and challenges. International Journal of Network Security 19(55):653–659

    Google Scholar 

  24. Hyperledger-Fabric. https://www.hyperledger.org/projects/fabric. Accessed 10 June 2020

  25. Ripple. https://www.ripple.com. Accessed 10 June 2020

  26. Nguyen GT, Kim K (2018) A survey about consensus algorithms used in blockchain. Journal of Information Processing Systems 14(1):101–128

    Google Scholar 

  27. Schwarz K (2013) Cuckoo hashing. http://web.stanford.edu/class/cs166/lectures/13/Small13.pdf. Accessed April. 10, 2018

  28. King S (2013) Primecoin: cryptocurrency with prime number proof-of-work. http://primecoin.io/bin/primecoinpaper.pdf. Accessed 10 June 2020

  29. Eyal I, Sirer EG (2014). How to disincentivize large bitcoin mining pools. http://hackingdistributed.com/2014/06/18/how-to-disincentivize-large-bitcoin-mining-pools. Accessed 10 June 2020

  30. Miller A, Kosba A, Katz J, Shi E (2015) Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions. Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, New York, 680–691

  31. Eyal I, Gencer AE, Sirer EG, Renesse RV (2016) Bitcoin-NG: a scalable blockchain protocol. Proceedings of the 13th Usenix conference on networked systems design and implementation, Santa Clara, CA, USA. 45–59

  32. Sompolinsky Y, Zohar A (2013) Accelerating Bitcoin’s transaction processing: fast money grows on trees, not chains. Cryptology eprint archive report 2013/881; IACR, Lyon. https://eprint.iacr.org/2013/881.pdf. Accessed 20 June 2020

  33. Sompolinsky Y, Zohar A (2015) Secure high-rate transaction processing in bitcoin. Proceedings of the financial cryptography and data security. Springer, Heidelberg, 507–527

  34. DPOS description on Bitshares. http://docs.bitshares.org/bitshares/dpos.html. Accessed 30 July 2020

  35. Larimer D. Transactions as proof-of-stake. https://bravenewcoin.com/assets/Uploads/TransactionsAsProofOfStake10.pdf. Accessed 10 Aug 2020

  36. Bentov ILC, Mizrahi A, Rosenfeld M (2014) Proof of activity: extending Bitcoin’s proof of work via proof of stake [extended abstract]. Proceedings of the 9th workshop on economics of networks, systems and computation, Austin, TX, USA, 34–37

  37. Schwartz D, Youngs N, Britto A (2014) The Ripple protocol consensus algorithm. Ripple Labs, San Francisco, CA, USA, White Paper

  38. Yin J, Wang C, Zhang Z, Liu J (2018) Revisiting the incentive mechanism of bitcoin-NG. In: Susilo W., Yang G. (eds) Information security and privacy. ACISP 2018. Lecture notes in computer science, vol 10946. Springer, Cham. https://doi.org/10.1007/978-3-319-93638-3_40

  39. Maayan GD (2020) The IoT rundown for 2020: stats, risks, and solutions. Security Today. https://securitytoday.com/Articles/2020/01/13/The-IoT-Rundown-for-2020.aspx?Page=2. Accessed 19 Jan 2020

  40. Zhu X, Badr Y, Pacheco J, Hariri S (2017) Autonomic identity framework for the Internet of Things. Proceedings of IEEE international conference on cloud and autonomic computing, ICCAC, Tucon, AZ, USA, 69–79

  41. Kenney JB (2011) Dedicated short-range communications (DSRC) standards in the United States. Proc IEEE 99(7):1162–1182

    Article  Google Scholar 

  42. Lei A, Cruickshank H, Cao Y, Asuquo P, Ogah CPA, Sun Z (2017) Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things Journal 4(6):1832–1843

    Article  Google Scholar 

  43. Lu Z, Liu W, Wang Q, Qu G, Liu Z (2018) A privacy-preserving trust model based on blockchain for VANETs. IEEE Access 6:45655–45664

    Article  Google Scholar 

  44. Li Z, Kang J, Yu R, Ye D, Deng Q, Zhang Y (2017) Consortium blockchain for secure energy trading in industrial Internet of Things. IEEE Transactions on Industrial Informatics 14(8):3690–3700

    Google Scholar 

  45. Nuss M, Puchta A, Kunz M (2018) Towards blockchain-based identity and access management for Internet of Things in enterprises. Proceedings of international conference on trust, privacy and security in digital business, Regensburg, Germany, 167–181

  46. Novo O (2018) Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things Journal 5(2):1184–1195

    Article  Google Scholar 

  47. Demuro J (2018) Here are the 10 sectors that blockchain will disrupt forever. TechRadar Pro. https://www.techradar.com/news/here-arethe-10-sectors-thatblockchain-will-disrupt-forever . Accessed 30 July 2020

  48. Hall J (2018) Can blockchain technology solve voting issues? Bitcoin Magazine. https://www.nasdaq.com/article/canblockchaintechnology-solve-voting-issues-cm931347. Accessed 8 Nov 2020

  49. Courtois NT, Bahack L (2014) On subversive miner strategies and block withholding attack in bitcoin digital currency arXiv e-prints, 1402.1718

  50. Tian F (2016) An agri-food supply chain traceability system for China based on RFID & blockchain technology. Proceeding of the 13th international conference on service systems and service management, (ICSSSM), Kunming, China, 1–6

  51. Wörner D, Bomhard TV (2014) When your sensor earns money: exchanging data for cash with Bitcoin. Proceedings of international joint conference on pervasive and ubiquitous computing, Seattle, WA, USA, 295–298

  52. Wilson D, Ateniese G (2015) From pretty good to great: enhancing PGP using Bitcoin and the blockchain. In: Qiu M., Xu S., Yung M., Zhang H. (eds) Network and system security. NSS 2015. Lecture notes in computer science, vol 9408. Springer, Cham https://doi.org/10.1007/978-3-319-25645-0_25

  53. Tanas C, Delgado-Segura S, Herrera-Joancomartí J (2016) An integrated reward and reputation mechanism for MCS preserving users’ privacy. Proceedings of the 10th international workshop on data privacy management and security assurance, 9481, 83–99

  54. Biswas K, Muthukkumarasamy V (2016) Securing smart cities using blockchain technology. Proceedings of IEEE 14th international conference on smart city, Sydney, NSW, Australia, 1392–1393

  55. Bocek T, Rodrigues BB, Strasser T, Stiller B (2017) Blockchains everywhere - a use-case of blockchains in the pharma supply-chain. Proceedings of IFIP/IEEE symposium on integrated network and service management (IM), Lisbon, Portugal, 772–777

  56. Shae Z, Tsai JJP (2017) On the design of a blockchain platform for clinical trial and precision medicine. Proceedings of IEEE 37th international conference on distributed computing systems (ICDCS), Atlanta, GA, USA, 1972–1980

  57. Salahuddin MA, Al-Fuqaha A, Guizani M, Shuaib K, Sallabi F (2017) Softwarization of Internet of Things infrastructure for secure and smart healthcare. Computer 50(7):74–79

    Article  Google Scholar 

  58. Siddiqi M, All ST, Sivaraman V (2017) Secure lightweight context-driven data logging for body worn sensing devices. Proceedings of 5th international symposium on digital forensics and security (ISDFS), Tirgu Mures, Romania, 1–6

  59. Han D, Kim H, Jang J (2017) Blockchain based smart door lock system. Proceedings of the 8th international conference on information and communication technology convergence (ICTC), Jeju Island, South Korea, 1165–1167

  60. Kshetri N (2017) Can blockchain strengthen the Internet of Things? IT Professional 19(4):68–72

    Article  Google Scholar 

  61. Ahram T, Sargolzaei A, Sargolzaei S, Daniels J, Amaba B (2017) Blockchain technology innovations. Proceedings of IEEE technology & engineering management conference (TEMSCON), Santa Clara, CA, USA, 137–141

  62. Samaniego M, Deters R (2017) Internet of smart things-IoST: using blockchain and CLIPS to make things autonomous. Proceedings of IEEE international conference on cognitive computing, (ICCC), Honolulu, HI, USA, 9–16

  63. Zhang, Y. & Wen, J. (2015). An IoT electric business model based on the protocol of Bitcoin. Proceedings of 18th international conference on intelligence in next generation networks, Paris, France, 184-191

  64. Ka_e YR, Mahmud K, Morsalin S, Town GE (2016) Towards an internet of energy. Proceedings of IEEE international conference on power system technology (POWERCON), Wollongong, NSW, Australia, 1–6

  65. Blanco-Novoa O, Fernández-Caramés TM, Fraga-Lamas P, Castedo L (2017) An electricity-price aware open-source smart socket for the internet of energy. Sensors 17(3):643

    Article  Google Scholar 

  66. Fernández-Caramés TM (2015) An intelligent power outlet system for the smart home of the Internet of Things. International Journal of Distributed Sensor Networks 11(11):214805

    Article  Google Scholar 

  67. Wright A, Filippi PD (2015) Decentralized blockchain technology and the rise of Lex Cryptographia. https://ssrn.com/abstract=2580664. Accessed 20 Dec 2020

  68. Kshetri N (2017) Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunication Policy 41(10):1027–1038

    Article  Google Scholar 

  69. Wilkinson S, Boshevski T, Brandoff J, Buterin V (2014) Storj a peer-to-peer cloud storage network. White paper. https://storj.io/storj.pdf. Accessed: 20 June 2020

  70. Ateniese G, Goodrich MT, Lekakis V, Papamanthou C, Paraskevas E, Tamassia R (2017) Accountable storage. Proceedings of international conference on applied cryptography and network security, Kanazawa, Japan, 623–644

  71. Zhang P, Helvik BE (2012) Towards green P2P: analysis of energy consumption in P2P and approaches to control. Proceedings of international conference on high performance computing and simulation (HPCS), Madrid, Spain, 336–342

  72. Miyake S, Bandai M (2013) Energy-efficient mobile P2P communications based on context awareness. Proceedings of IEEE 27th international conference on advanced information networking and applications (AINA), Barcelona, Spain, 918–923

  73. Liao CC, Cheng SM, Domb M (2017) On designing energy efficient Wi-Fi P2P connections for Internet of Things. Proceedings of IEEE 85th vehicular technology conference. (VTC Spring), Sydney, 1–5

  74. Ball M, Rosen A, Sabin M, Vasudevan PN. Proofs of useful work. https://eprint.iacr.org/2017/203.pdf. Accessed 20 Dec 2020

  75. Vukoli¢ M (2015) The quest for scalable blockchain fabric: proof-of-work vs. BFT replication. http://www.vukolic.com/iNetSec_2015.pdf. Accessed 10 June 2020

  76. Bruce JD (2014) The mini-blockchain scheme. White paper https://www.weusecoins.com/assets/pdf/library/The%20Mini-Blockchain%20Scheme.pdf. Accessed 20 June 2020

  77. X11official documentation for Dash. https://dashpay.atlassian.net/wiki/spaces/DOC/pages/1146918/X11 . Accessed 10 Feb 2020

  78. Original Scrypt function for Tarsnap. http://www.tarsnap.com/scrypt.html. Accessed 10 February 2020

  79. Aumasson JP, Henzen L, Meier W, Phan RCW (2008) SHA-3 proposal BLAKE. http://www.131002.net/blake/blake.pdf. Accessed 15 April 2019

  80. Kravitz DW, Cooper J (2017) Securing user identity and transactions symbiotically: IoT meets blockchain. Proceedings of global IoT summit (GIoTS), Geneva, 1–6

  81. Greenspan G (2015) Multichain private blockchain. White paper. https://www.multichain.com/download/MultiChain-White-Paper.pdf. Accessed 20 November 2019

  82. Zcash. https://z.cash. Accessed 20 Nov 2020

  83. Zerocoin. http://zerocoin.org. Accessed 20 Nov 2020

  84. Zerocash. http://zerocashproject.org. 20 November 2020

  85. Schukat M, Flood P. Zero-knowledge proofs in M2M communication. Proceedings of the 25th IET Irish signals & systems conference 2014 and 2014 China-Ireland international conference on information and communications technologies (ISSC 2014/CIICT 2014), Limerick, 269–273

  86. Peng K (2012) Attack against a batch zero-knowledge proof system. IET Inf Secur 6(1):1–5

    Article  Google Scholar 

  87. Monero’s. https://getmonero.org. Accessed 20 Nov 2020

  88. Bytecoin’s. https://bytecoin.org. Accessed 20 Nov 2020

  89. CryptoNote’s. https://cryptonote.org. Accessed 20 Nov 2020

  90. Moore C, O’Neill M, O’Sullivan E, Doroz Y, Sunar B (2014) Practical homomorphic encryption: a survey. Proceedings of IEEE international symposium on circuits and systems, (ISCAS), Melbourne, 2792–2795

  91. Hayouni H, Hamdi M (2016) Secure data aggregation with homomorphic primitives in wireless sensor networks: a critical survey and open research issues. Proceedings of IEEE 13th international conference on networking, sensing and control (ICNSC), Mexico City

  92. França BF (2015) Homomorphic mini-blockchain scheme. http://cryptonite.info/files/HMBC.pdf. Accessed 10 June 2020

  93. Lukianov D (2015) Compact confidential transactions for Bitcoin. http://voxelsoft.com/dev/cct.pdf. Accessed 20 June 2020

  94. VISA claims about the number of transactions handled by VisaNet. https://usa.visa.com/runyour-business/small-business-tools/retail.html. Accessed 20 June 2020

  95. Popov S (2017) The Tangle. https://iota.org/IOTA_Whitepaper.pdf. Accessed 15 Dec 2020

  96. Johansen HD, Renesse RV, Vigfusson Y, Johansen D (2015) Fireflies: a secure and scalable membership and gossip service. ACM Trans Comput Syst 33(2)

  97. Park WS, Hwang DY, Kim KH (2018) A TOTP-based two factor authentication scheme for hyperledger fabric blockchain. Proceedings of tenth international conference on ubiquitous and future networks (ICUFN), Prague, 817–819

  98. Maxwell G (2013) https://bitcointalk.org/index.php?topic=314467#msg3371194. Accessed 20 Sept 2020

  99. Lee CH, Kim KH (2018) Implementation of IoT system using block chain with authentication and data protection. Proceedings of international conference on information networking (ICOIN), Chiang Mai, 936–940

  100. Zhou Z, Xie M, Zhu T, Xu W, Yi P, Huang Z, Zhang Q, Xiao S (2014) EEP2P: an energy-efficient and economy-efficient P2P network protocol. Proceedings of international green computing conference, Dallas, 1–6

  101. Sharifi L, Rameshan N, Freitag F, Veiga L (2014) Energy efficiency dilemma: P2P-cloud vs. mega-datacenter. Proceedings of IEEE 6th international conference on cloud computing technology and science, Singapore, 611–619

  102. Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker GM, Savage S (2016) A fistful of bitcoins: characterizing payments among men with no names. Commun ACM 59(4):86–93

    Article  Google Scholar 

  103. Möser M, Böhme R, Breuker D (2013) An inquiry into money laundering tools in the Bitcoin ecosystem. Proceedings of APWG eCrime researchers summit, San Francisco, 1–14

  104. Qin B, Huang J, Wang Q, Luo X, Liang B, Shi W (2020) Cecoin: a decentralized PKI mitigating MitM attacks. Futur Gener Comput Syst 107:805–815

    Article  Google Scholar 

  105. Courtois NT, Emirdag P, Nagy DA (2014) Could Bitcoin transactions be 100× faster?. Proceedings of 11th international conference on security and cryptography, (SECRYPT), Vienna, 1–6

  106. Croman K, Decker C, Eyal I, Gencer AE, Juels A, Kosba AE, Miller A, Saxena P, Shi E, Sirer EG, Song D, Wattenhofer R (2016) On scaling decentralized blockchains. Proceedings of international conference on financial cryptography and data security, Berlin, 106–125

  107. Dorri A, Kanhere SS, Jurdak R (2017) Towards an optimized blockchain for IoT. Proceedings of IEEE/ACM international conference on Internet-of-Things design and implementation (IoTDI), Pittsburg, 173–178

  108. Gervais A, Karame GO, Wüst K, Glykantzis V, Ritzdorf H, Capkun S (2016) On the security and performance of proof of work blockchains. Proc. 2016 ACM SIGSAC conference on computer and communications security, Vienna, 3–16

  109. Minsky Y, Trachtenberg A, Zippel R (2003) Set reconciliation with nearly optimal communication complexity. IEEE Trans Inf Theory 49(9)

  110. Renesse RV, Dumitriu D, Gough V, Thomas C (2008) Efficient reconciliation and flow control for anti-entropy protocols. Proceedings of LADIS: large scale distributed systems and middleware, New York, 1–7

  111. Karlsson K, Jiang W, Wicker S, Adams D, Ma E, Renesse RV, Weatherspoon H (2018) Vegvisir: a partition-tolerant blockchain for the Internet-of-Things. Proceedings of IEEE 38th international conference on distributed computing systems (ICDCS), Vienna, 1150–1158

Download references

Author information

Authors and Affiliations

Authors

Contributions

S. Zafar, K. M. Bhatti, and M. Shabbir conceived the idea. K. M. Bhatti and M. Shabbir prepared the preliminary draft of the manuscript. S. Zafar drafted the final version of the manuscript and critically revised the work. F. Hashmat and A. H. Akbar contributed to summarize the research findings, challenges, and future directions. All authors contributed to the literature search and data analysis.

Corresponding author

Correspondence to S. Zafar.

Ethics declarations

Conflict of interest

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zafar, S., Bhatti, K.M., Shabbir, M. et al. Integration of blockchain and Internet of Things: challenges and solutions. Ann. Telecommun. 77, 13–32 (2022). https://doi.org/10.1007/s12243-021-00858-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-021-00858-8

Keywords

Navigation