Application of Blockchain for Internet of Things: A Bibliometric Analysis

As a disruptive emerging technology, the Internet of things (IoT) has rapidly developed, but its privacy risks and security vulnerabilities are still key challenges. *e decentralized and distributed architecture of blockchain has the potential to satisfy IoT privacy and security requirements. *is gives birth to the new domain of blockchain for IoT (BIoT). BIoT will cause significant transformations across several industries, paving the way for new business models. Based on the Science Citation Index Expanded (SCIE) and Social Sciences Citation Index (SSCI) databases in Web of Science (WoS) Core Collection, this study aims to explore the research trends and cooperation in the field of BIoTusing the bibliometric method.*e results indicate that the publications in this field have increased significantly from 2016 to 2020, with China and the USA being the most productive and influential countries. Keyword co-occurrence analysis shows that the most important research topics are as follows: security issues, core technologies, application dimensions, and transaction processes. Text mining analysis indicates that future research directions for BloT will focus more on both computing paradigms and key applications. *is study will provide researchers with a greater understanding on the state of the art of BIoTand will serve as a reference for researchers engaging in this field to identify their own future research directions.


Introduction
Internet of things (IoT) applications have been rapidly increasing in recent years and are currently playing a key role in the development of society. In fact, through the connection of vehicles, household appliances, and other electronic devices to the Internet, IoT will create more comfortable living conditions for humans through many applications coming from various industrial domains such as smart home, smart healthcare, transportation, agriculture, retail, and wearable [1]. Cisco predicts that the share of machine-to-machine (M2M) connections will increase from 33% in 2018 to 50% in 2023, i.e., 14.7 billion connections, with connected home applications accounting for nearly half this share, while connected car applications will grow the fastest at a CAGR of 30% [2]. Currently, most IoT solutions rely on a centralized server-client paradigm, which involves connecting to cloud servers through the Internet [3].
However, centralized architectures are susceptible to the malicious manipulation of information by untrusted entities, which may in turn result in the exchange of tampered and forged information [4]. On the other hand, cloud services that store, forward, and process IoT data are vulnerable to network attacks such as false data injection, data tampering, and single node failures [5]. To sum up, the major concerns regarding the development of IoT are security and privacy. In [6], it is pointed out that blockchainbased decentralized architectures provide solutions to the problem of IoT application security.
Blockchain was originally invented as the underlying technology of bitcoin, but its potential applications have gone far beyond the scope of cryptocurrencies. e emergence of blockchain marks a breakthrough in decentralized technologies. Since trade on the Internet relies almost entirely on third-party financial institutions to handle electronic payments, the existence of financial intermediaries increases transaction costs, limits the minimum actual transaction size, and there exist many potential malicious activity possibilities, such as fraud [7]. As a distributed technology, blockchain is created to overcome the inherent weakness of this trust-based model, because it is an electronic payment system based on proof of encryption rather than trust. Blockchain allows peer-to-peer transactions through decentralized networks using data encryption, time stamps, tree structures, and consensus mechanisms without having to rely on third-parties [8]. It also provides public and full access to the history of transactions, allows access to all transactions that have occurred since the first transaction, and their occurrence can be verified by any entity at any time [3,9]. Blockchain technology is conducive to solving the problems of poor reliability, low security, high cost, and low efficiency in centralized organizations [10,11].
Similar to cryptocurrencies, many entities (nodes, gateways, and users) in an IoT system do not necessarily trust each other when performing transactions. As a distributed ledger technology, blockchain can fulfill the security requirements of IoT applications. Blockchain technology uses public-key cryptography to record transactions between multiple parties without central coordination. e peer-topeer networks established using blockchain can reduce the risks of single-point failures commonly faced by IoT applications [12,13]. Blockchain can also enrich IoT applications by keeping transaction records permanently in a verifiable way, and IoT information for which the blockchain provides trusted distributed authentication and authorization is integral and traceable. erefore, the use of blockchain can strengthen the reliability of IoT applications. Blockchains can use pseudonyms without the need for any identity information to preserve anonymity and privacy [14].
is is attractive for many IoT applications that need to maintain confidential identities and privacy. To sum up, blockchain-based IoT applications would represent a key revolution to solve security, privacy, and reliability problems related to the IoT paradigm.
With the increased focus on the field of blockchain for IoT (BIoT), a large number of studies have emerged. As an objective criterion for evaluating the research performance in a field, bibliometric analyses have become important tools for assessing scholarly quality and productivity [15,16]. e bibliometric analysis may examine an array of different objects and have been used in different disciplines [17][18][19][20]. Compared to other types of analyses, there are numerous advantages in using bibliometrics: (1) bibliometrics can be used to analyze the number of publications and citations to find influential authors, journals, institutions, and countries efficiently [21]. (2) With the aid of visualization techniques (e.g., VOSviewer software), bibliometrics can be used to analyze information more intuitively by constructing network connections of authors, journals, institutions, countries, and keywords [22]. (3) Bibliometrics can be used to find the research hotspots and foresee future research undertakings [23].
In recent years, bibliometric methods are being increasingly applied to the fields of blockchain and IoT. For example, Firdaus et al. [24] conducted a bibliometric analysis of the blockchain which exhibited the exploration of an in-depth research pattern in this area. Dabbagh et al. [25] conducted a bibliometric study of the blockchain literature with the aim of systematically analyzing all the blockchain research papers that have been indexed by WoS Core Collection. Muessigmann et al. [26] provided a structured bibliometric analysis of blockchain technology in logistics and supply chain management. Nobre and Tavares [27] performed a bibliometric literature review from the Scopus Database focusing on the application of big data/IoT on the context of circular economy. Bouzembrak et al. [28] reviewed the use of IoT technology in food safety using the bibliometric networks. However, there is still a lack of research on BIoT using bibliometric methods. For this reason, in this paper we apply bibliometric methods to sort out the scientific literature of the BIoT domain in recent years and explore publication and citation details, research hotspots, and collaborations among authors, institutions, and countries. More specifically, the present article intends to answer the following questions: which publications and issues in BIoT-related fields have received high attention? Which authors, institutions, countries, and journals significantly contribute to the research domain? Which authors, institutions, and countries are involved in collaborative works? Which journals are closely linked? Which keywords are the hot issues of BIoT research? What are the future research trends for BIoT?
In this study, we aim to provide a holistic vision of the research trends, the most concerned topic and existing research gaps in the field of BIoT. e key contributions of this article lie in two main areas: on the one hand, based on the keyword co-occurrence analysis, the study explores the hot issues in the BIoT field. On the other hand, the study predicts the future research trends in the BIoT field using text mining technology.
is study will provide researchers with a greater understanding of the research hotspots and trends, which will be helpful to the researchers for their future research planning. e remainder of the paper is arranged as follows. In Section 2, we describe the data sources and methods of the study. In Section 3, we demonstrate the results in detail. Section 4 presents hot issues, research trends, and limitations. Section 5 summarizes the key conclusions of the study.

Data and Methods
e data collected in this study are based on the retrieval of the SCIE and SSCI databases in WoS Core Collection. One of the basic tenets of this content selection for the WoS Core Collection is Garfield's Law of Concentration which postulates that a relatively small core of journals (10-20 percent) account for the bulk (80-90 percent) of what is cited by all published literature, and that these core journals are frequently cited across a wide range of disciplines [29]. erefore, we mainly analyze the most influential papers about the topic of the BIoT, which are based on the SCIE and SSCI databases. ese two databases cover more scientific and authoritative publications than others. For this study, we selected the "topic" search field, and the search terms were ("blockchain * " and "IoT") or ("blockchain * " and "Internet of things"). e literature searching covered "articles" and "reviews" published during 2016-2020. A total of 917 documents were obtained. Many papers did not include search terms in their title, abstract, and keywords, and these articles were inappropriate to be included in this study. erefore, we manually screened 917 documents, eliminating articles that did not contain the search terms in the title, abstract, and keywords, and finally obtained 802 documents.
Because no individual bibliometric indicator can account for all aspects of research performance, the collected data from the SCIE and SSCI databases were analyzed using several bibliometric indicators, including the total number of publications (TP), total citations (TC), the percentage of total publications (%/802), the average citations per paper (AC), and h-index.
e indicator TP provides information about the number of publications which is necessary for the analysis of productive authors, institutions, and countries. TC is a wellestablished, purely citation-based metric for measuring the quality of scientific papers. It helps to acknowledge and trace the original source and authorship of a concept or an idea. e AC indicator reflects average citations per paper, and it is useful in performance evaluation and comparative studies [30]. According to [31], the h-index can be defined as follows: A researcher has an h-index if they have at least h publications for which they have received at least h citations. erefore, the h-index combines TP and TC in one index [32].
As an important research topic in the field of bibliometrics, bibliometric mapping is a network visualization that reflects the development process and structural relationship of scientific knowledge using the dual attributes of "graph" and "genealogy" [33,34]. In recent years, it has become a commonly used method to explore the development of a certain field. Apart from elementary statistics and standard visualization graphs, we utilized the VOSviewer software to prepare a network visualization of the bibliographic coupling of authors, co-authorship of institutions and countries, co-citation of journals, and co-occurrence of keywords. VOSviewer is a software tool which has been developed for constructing graphs based on bibliographic data and visualizing bibliometric maps [35]. It also offers text mining functionality that can be used to construct and visualize cooccurrence networks of important terms extracted from a body of scientific literature [36].
VOSviewer constructs a bibliometric mapping based on a co-occurrence matrix. e construction of the bibliometric mapping consists of three steps: firstly, the similarity matrix is calculated based on the co-occurrence matrix. Secondly, the visualization technique is applied to the similarity matrix to construct a bibliometric mapping. Finally, it is the transformation, rotation, and mapping [35,37].
VOSviewer uses the strength of association to measure similarity. e similarity s ij between individual i and individual j can be expressed by the following formula: where c ij represents the number of co-occurrences of the individual i and the individual j, and w i and w j represent the number of respective occurrences of the individual i and the individual j. e core idea of the similarity visualization technique is to minimize the weighted square sum of the Euclidean distance. e higher the similarity between the two individuals, the higher the weight of the square sum. To avoid that all individuals are in the same position, a constraint is given that the average distance between two individuals is equal to one. We can represent the objective function and constraints as the following mathematical model: wherein x i � (x i1 , x i2 ) represents the position of the individual i in the two-dimensional map and ‖•‖ indicates the Euclidean norm. e optimization problem above has no unique global optimal solution. It needs to solve this problem in three steps: the first step is to transform the solution centered on the origin; the second step is to use the principal component analysis method to maximize the variance of the solution in the horizontal direction by rotation. irdly, if the median of x 11 , ..., x n1 is greater than 0, the solution is mapping to the vertical axis; if the median of x 12 , ..., x n2 is greater than 0, the solution is mapping to the horizontal axis.
ese three transformations ensure that the VOSviewer produces consistent results.
Items and links together constitute a network, where items are represented by nodes whose size signifies the weights of the items. e distance between two nodes approximately reflects the relatedness between two items; a shorter distance generally presents a stronger relation. Items may be grouped into clusters, whose nodes all bear the same color. Links can exist for any pair of items; a link reveals a relation between two items, and the stronger the link between two items, the thicker the line between two nodes that is used to display the link in the visualization. e link strength (LS) indicates the number of links of a node with other nodes. e total link strength (TLS) represents the sum of the link strengths of this node over all other nodes [23].

State of the Art in BIoT
Research. Using the above method, we retrieved 802 documents from the WoS Core Collection database from 2016 to 2020. e first article on BIoT was published in 2016. e annual change trends of TP are shown in Figure 1. It can be seen that the annual number of publications showed an overall upward trend in the period from 2016 to 2020. Out of a total of 802 publications, the breakdown for each year from 2016 to 2020 was 2, 6, 64, 236, and 494, respectively. After 2018, there was a remarkable increase in the number of BIoT studies. 2020 was the most productive year with 494 publications, i.e., 61.6% of the total 802 papers, indicating that the research on BIoT is attracting more and more scholars' attention and is becoming a hot research topic. Table 1 presents the title, author's name, year of publication, and number of total citations of the top 10 mostcited articles. Except for two articles from 2016 and 2019, all other papers were published in 2018. e top 10 articles from Table 1 discuss the state of the art of different themes of BIoT research. Highly cited articles may affect their respective research subdomains, thereby setting the scope of future research efforts. e article titled "Blockchains and Smart Contracts for the Internet of ings" [13] ranked first with 1003 total citations. In that article, K. Christidis and M. Devetsikiotis examine whether blockchains are suitable for Internet of ings (IoT) applications. e conclusion is that the blockchain-IoT combination can cause significant transformations across several industries. e paper written by M.A. Khan and K. Salah entitled "IoT security: review, blockchain solutions, and open challenges" [38] is the second influential work in Table 1. e article analyzes how blockchain can be a key enabler and solve many IoT security problems. e article written by Zheng et al. entitled "blockchain challenges and opportunities: a survey" [39] is the third in the list, cited 407 times. e authors believe that blockchain can help in improving the IoT sector such as e-business, safety, and privacy.

Analysis of Leading Authors.
A total of 2676 authors participated in BIoT research. Table 2  Highly cited authors are considered to be the world's most influential researchers, because they usually grasp the research hotspots and cutting-edge trends in certain subject areas. Table 3  Bibliographic coupling analysis is an important tool for establishing the connections among authors who cite the same publications [40]. e more often two researchers cite the same publications, the stronger their relatedness [41].       Figure 3 shows the ten most influential institutions and ranks them according to the number of total citations. e North Carolina State University, with 1003 citations, leads   Mathematical Problems in Engineering and one institution from Norway. It is worth noting that China is in the leading position in terms of institutional influence.
As an important aspect of bibliometric studies, co-authorship analysis aims to explore the level of research collaborative strength in a specific field [23]. Figure 4 depicts visualization of the institutions' co-authorship network, where the minimum number of documents for inclusion in the figure is 5. Among the 1073 institutions, 84 meet the threshold. e size of the circle represents the number of publications. e connection between the two institutions represents a cooperative relationship. Figure 4 clusters the institutions into ten groups coded with different colors. Beijing University of Posts and Telecommunications (TLS � 41) is at the center of cooperation and has the strongest co-authorship network, followed by the University of Electronic Science and Technology of China (TLS � 37) and King Saud University (TLS � 31). Considering the links between the two institutions, the strongest co-authorship collaboration exists between Temple University and Qatar University (LS � 8) followed by Temple University and University of Electronic Science and Technology of China (LS � 6) and by Chinese Academy of Sciences and University of Chinese Academy of Sciences (TLS � 6). e figure reveals that although institutions in geographic proximity are more closely linked, geographical advantage is not the main factor influencing interinstitutional cooperation as international academic exchanges become more frequent. Co-authorship collaboration among countries is shown in Figure 6, which displays countries with more than five articles. Of the 72 countries, 37 meet the inclusion criteria. is indicates that collaboration between countries can increase the amount of publications in comparison to publications from a single country. In addition, it is worth mentioning that the collaboration between China and the United States is the most intensive.

Analysis of Popular Journals.
A total of 164 journals are pertinent to the field of BIoT research. Table 5 depicts the basic information of the top 10 most productive journals. Among them, IEEE Access (110) had the greatest number of publications, accounting for 13.71%. It was followed by IEEE Internet of ings Journal (74) and Sensors (65), accounting for 9.23% and 8.1%, respectively. IEEE Access had not only published most articles but also had the largest number of total citations (2578). However, from the perspective of average citation, Future Generation Computer Systems had the highest number of average citations (36.71), followed by IEEE Transactions on Industrial Informatics (25.84) and IEEE Access (23.44). In terms of the h-index, IEEE Access again led Table 5     Mathematical Problems in Engineering followed by IEEE Transactions on Industrial Informatics (16). We now turn to the analysis of co-citation network of journals. Co-citation of journals occurs when two documents of two different journals are cited from the same third publication [42]. e more often two journals are cited in the same document, the stronger their relatedness. In this study, the co-citation analysis of journals with a minimum of 50 citations is considered. Only 100 journals out of 13320 cocited sources meet this criterion. As shown in Figure 7, the journals are grouped into 4 clusters using 4 colors. IEEE Access tops Figure 6 with 62676 total link strengths, followed by IEEE Internet of ings Journal (TLS � 43272) and Lecture Notes in Computer Science (TLS � 29719). According to the journal collaboration network, the most frequent interactions are between IEEE Access and IEEE Internet of ings Journal (LS � 6736) followed by IEEE Access and Future Generation Computer Systems (LS � 3737), and by IEEE Access and IEEE Communications Surveys and Tutorials (LS � 3372).

Security Issues.
Since a typical IoT deployment contains heterogeneous devices with embedded sensors through interconnected networks, it inherits the drawbacks of conventional computer networks related to security vulnerabilities and privacy risks [38]. As a decentralized and distributed ledger technology, blockchain can satisfy the security requirements and promote the development of secure IoT applications, such as anonymous authentication, audit capability, and confidentiality. It highlights the scalability capacity that comes with smart contracts [10,11]. Within the blockchain network, smart contracts stored on the blockchain have a unique address, and users trigger a smart contract by sending a transaction to this address. e contractual clauses are then executed independently and automatically. Blockchain can secure communications between devices validated through smart contracts [43]. Smart contracts will enrich the IoT by providing a secure and reliable processing engine which records and manages all their interactions. With smart contracts, blockchain has the potential to improve the security of IoT applications.
One of the key challenges for IoT applications is privacy, mainly due to the large scale and distributed nature of IoT networks. e blockchain can alleviate the problem through advanced cryptography technologies [44]. As an important part of blockchain technology, consensus mechanisms are not only responsible for the integrity of the information contained in the blockchain but also help defend against double-spending attacks [10]. On the other hand,  blockchain-based identity authentication and access control techniques can be leveraged to enhance IoT security. For example, the blockchain is applied to implement permitted access control for devices in the IoT to securely track data management and prevent malicious access [45]. Blockchains can provide trusted distributed authentication and stronger defense against attacks from IoT applications, as the management of certificate data is done on the blockchain, so it is not possible for an attacker to inject fake signatures into the record [5,12].

Core Technologies.
e increase in the number of IoT devices has resulted in a large number of IoT terminals. erefore, a significant portion of computing power at terminals based on blockchain technology would inevitably be consumed. Cloud computing allows for centralized data processing, where the big data generated by distributed sensors are transmitted to a cloud computing data center through the network. ese data are centrally processed and stored, leveraging the computational power of the cloud platform. Using cloud computing and big data, blockchain-   (37), peer-to-peer computing (25), computer architecture (18), machine learning (17), artificial intelligence (17), consensus algorithm (10), computational modelling (9) Application dimensions Industrial Internet of things (59 occurrences), smart city (31), industry 4.0 (30 occurrences), healthcare (17), supply chain (14), smart grid (11), 5 g (10), smart home (6), energy trading (6), Internet of vehicles (6) Transaction processes Smart contract (99), bitcoin (24), Ethereum (21), protocols (15), cryptocurrency (10), servers (10), task analysis (9) based cloud platforms for IoT device management can adopt more efficient cryptographic algorithms and leverage distributed capabilities to ensure low latency and high throughput in data management [46]. Furthermore, blockchain technology as a distributed ledger and the decentralized edge computing model has also revolutionized the IoT by adding a new layer between cloud computing and IoT devices. Edge computing brings the cloud capabilities closer to the computation tasks. e convergence of blockchain and edge computing paradigms can overcome the security and scalability issues of IoT [47]. e diversification and the rapid increase of IoT devices lead to many identity authentication tasks, causing the users to wait too long. With the development of cloud computing, edge computing, and fog computing, among others, these technologies can not only achieve effective identity authentication but also guarantee the security and reliability of data information. For example, edge computing can improve the capability of data caching and computing. Based on edge computing, the delay-tolerant computing tasks can be offloaded to a closer edge computing server, and then more computing tasks can be selectively accommodated and executed on the local device, edge computing server, or cloud computing server according to the current network states and network environments [48]. Compared with the traditional IoT architecture, this can reduce the end-to-end delay between IoT devices and computing resources, thereby facilitating IoT service provisioning.

Application Dimensions.
By providing a secure open communication platform, BIoT can offer many possible applications for smart cities such as smart home, smart management, and smart gadgets [49]. Smart cities can improve the efficiency of resource utilization, optimize city management and services, and make city life easier by exploiting data collection sensors to transmit information. One smart city BIoT application is detailed in [50], where the use of blockchain technology is analyzed in different smart city business models. e energy sector can also benefit from the application of BIoT. In [51], a prototype implementation using the Ethereum platform, a smart energy grid capable of timely adjustment of the energy demand by enacting the expected energy flexibility levels and validating all demand response protocols is analyzed. In [52], a decentralized privacy-preserving healthcare blockchain application for IoT is proposed.
e results showed that IoT application data and transactions are more secure and anonymous over a blockchain-based network. In [53], various mechanisms were illustrated whereby blockchain helps achieve the key supply chain management objectives such as cost, quality, speed, dependability, risk reduction, sustainability, and flexibility. In addition, there are some other application scenarios of BIoT, e.g., industry 4.0 [54], 5G [55], Internet of vehicles [56], global value chains [57], Stock Trade [58], and smart grid [59].

Transaction Processes.
Blockchain can accelerate the creation of services and data marketplaces for the IoT ecosystem, where transactions between peers can be carried out without the need for trusted parties. Bitcoin, the first cryptocurrency, is also the most popular application that runs on top of the blockchain platform. In general, the bitcoin blockchain provides a secure payment mechanism to carry out monetary transactions in a fast, cheap, and reliable manner. However, its poor scalability limits its use [3]. Ethereum is currently the most popular blockchain-based platform built for creating smart contracts. It focuses more on running programming codes and a consensus-based virtual machine (Ethereum Virtual Machine). Different from transactions in the bitcoin blockchain, which tracks the transfer of ownership of cryptocurrencies, the Ethereum blockchain performs state transitions under an accountbased system which consists of two types of accounts, externally owned accounts controlled by private keys and contract accounts controlled by codes in contracts [4,60]. More importantly, the Ethereum blockchain implements smart contracts, which are computerized transaction protocols that execute the terms of the contract. IoT devices can leverage these capabilities to carry out autonomous transactions through smart contracts. e inclusion of smart contracts makes the potential space for Ethereum blockchain in IoT immense and endless [61]. Note that similar smartcontract blockchain platforms have recently emerged, such as Hyperledger [62], BigchainDB [63], Stellar [64], and Tendermint [65].

Research Trends.
A bibliometric analysis can provide an indication of potential research trends and identify possible fields of future progress and engagement. e purpose of this section is to highlight some priorities for further research using text mining analysis to better understand the research trends in the field of BIoT. e text mining functionality of VOSviewer offers support for creating term maps based on a corpus of documents. A term map is a two-dimensional map in which terms are located in such a way that the distance between two terms indicates the relatedness of the terms, which in turn is determined through the co-occurrences in documents [66]. Figure 9 presents an overlay visualization term map using terms extracted from the title and abstracts of a corpus of academic publications in the field of BIoT. A full counting method has been chosen, and the minimum number of occurrences of a term is set to 35. Of the 16309 terms, 143 meet this threshold. For each of the 143 terms, a relevance score is calculated. Based on this score, the 86 most relevant terms are selected.
In Figure 9, the color of a term is determined by the score of the term, where by default the colors range from blue (lowest score) to green to yellow (highest score). As can be seen, prominent terms in this area include "edge computing," "algorithm," "cost," "block," "protocol," "performance," "simulation result," "big data," "artificial intelligence," "iiot," "communication," "feasibility," "traceability," "transparency," and so on. erefore, it is likely that future research directions for BloT will focus more on both computing paradigms and key applications.
In terms of computing paradigms, traditional cloud computing is unable to meet the real-time and efficient data processing requirements due to the situations of limited bandwidth and increased network latency. For these reasons, in recent years, cloud computing has evolved towards more complex edge computing and fog computing. Edge computing pertains to data processing at the edge of the network close to the data source. It has gained considerable popularity in academic and industrial circles because of its ability to provide low latency, high bandwidth, and location awareness support for latencysensitive applications [67]. Extensive simulation results with different parameters show that edge computing has more advantages and effectiveness compared with cloud computing [48]. Fog computing, which seamlessly integrates edge devices and cloud resources, is a distributed paradigm that provides cloud-like services to the network edge. It can significantly alleviate the traffic in the core network and potentially accelerate big data processing. Fog computing solves the requirements of widely distributed applications that require low latency [68,69]. As discussed, future research will focus more on the performance of fog and edge computing in BIoT applications. Despite the promising benefits and the exciting future of edge and fog computing, there are significant challenges in security and privacy, system integration, and resource management [70]. ese challenges will also trigger more research on related topics.
Regarding corresponding BIoT-based applications, future research directions are likely to concentrate on the topics of artificial intelligence, big data, communication, and industrial IoT (IIoT), etc. e convergence of blockchain and artificial intelligence in the IoT network will be an important area of future research and is revolutionizing the smart city network architecture to build sustainable ecosystems [71]. It has the potential to provide real-time costefficient solutions for several applications such as healthcare, smart grid surveillance, smart city monitoring, and border surveillance [72]. As IoT applications become sophisticated, IoT big data management in a centralized architecture begins to suffer from single points of failure, poor scalability, high latency, and privacy issues. e blockchain can provide a continued integrity service for IoT big data management by identity, tamper-proof, fault-tolerant, confidentiality, etc. [73].
Another key BIoT application is related to communication domains. e blockchain is providing new insights and addressing some of the main challenges of many communication areas. For example, the blockchain can establish connections to various 5G networks and assist 5G networks to select the quickest access node for every user [74]. ere is clear evidence that BIoTapplications will play a major role in regard to IIoT in the future. As many researchers have observed, BIoT can revolutionize most of the current and future industrial applications in different sectors through the provision of a decentralized architecture [75]. In particular, the integration of blockchain with the IIoT will be a key enabler for many future technologies [76]. In the future, industrial BIoT applications will be an active field of research and hold important technical promise.

Limitations.
Although the findings of this study are helpful for researchers to understand the current progress, hot spots, and future directions in the field of BIoT-related research, some limitations should be addressed. One limitation lies on the retrieval scope (SSCI and SCIE databases in WoS Core Collection), resulting in some important conference papers not being included. Other databases can be added in the future to verify the robustness of this study. Another limitation is that it included only articles written in English, which may lead to an underestimation regarding some important literature published in other languages.

Conclusions
In this article, we explore the recent progress in the field of BIoT-related research based on bibliometric analysis of publications in 2016-2020. Statistical results show a significant increase in the number of annual BIoT-related publications, peaking in 2020. China and the USA are the most productive and influential countries with the most publications, the highest citations, and the most cooperative countries. e keywords co-occurrence analysis indicates that hot issues around BIoT research can be categorized into four areas: security issues, core technologies, application dimensions, and transaction processes. According to the text mining analysis, the future research direction of BloT will focus more on computing paradigms and key applications. However, the results obtained can help researchers to delve deeper into the specific areas of this theme and offer the possibility of expanding collaboration for future researchers.

Data Availability
e data used to support the findings of the study are available within the article.

Conflicts of Interest
e authors declare that they have no conflicts of interest.