The deployment of Internet of Things (IoT) results in an enlarged attack surface that requires end-to-end security mitigation. IoT applications range from mission-critical predicaments (e.g., Smart Grid, Intelligent Transportation Systems, video surveillance, e-health) to business-oriented applications (e.g., banking, logistics, insurance, and contract law). There is a need for comprehensive support of security in the IoT, especially for mission-critical applications, but also for the down-stream business applications. A number of security techniques and approaches have been proposed and/or utilized. Blockchain mechanisms (BCMs) play a role in securing many IoT-oriented applications by becoming part of a security mosaic, in the context of a defenses-in-depth/Castle Approach. A blockchain is a database that stores all processed transactions – or data – in chronological order, in a set of computer memories that are tamperproof to adversaries. These transactions are then shared by all participating users.