Skip to main content
Log in

A security framework to enhance IoT device identity and data access through blockchain consensus model

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

In today’s technology landscape, the Internet of Things (IoT) has gained significant momentum due to its wide-ranging applications across diverse devices. However, the integration of IoT faces several daunting challenges, with security emerging as a paramount concern. To address this, blockchain technology has emerged as a decentralized and foundational solution for mitigating these integration obstacles. This research introduces a reliable blockchain-based consensus PIoT (Proof of Internet of Things) specifically for IoT networks, aiming to overcome the attacks encountered during data communication. The proposed blockchain system excels in effectively identifying IoT devices, authenticating their legitimacy, and dynamically assigning addresses based on demand. Additionally, it offers secure communication capabilities among IoT devices, providing robust protection against various attacks. The performance of PIoT is superior than that of certain traditional techniques. As it comes to the efficient use of available time, PIoT displays improvements of 74.7 and 96.8%, respectively, as compared to LPBFT and hybrid blockchain. In addition to this, the level of consensus security offered by PIoT is 15% higher than that offered by DAC4SH. PIoT has impressive scalability in terms of time consumption, the fraction of successful consensus attempts, and transaction throughput even when the network size and the number of malicious nodes face exponential variations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Alfandi, O., et al.: A survey on boosting IoT security and privacy through blockchain: exploration, requirements, and open issues. Clust. Comput. 24, 37–55 (2021)

    Google Scholar 

  2. Jalasri, M., Lakshmanan, L.: Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm. Clust. Comput. 26(1), 823–836 (2023)

    Google Scholar 

  3. Qadri, Y.A., et al.: The limitations in the state-of-the-art counter-measures against the security threats in H-IoT. Clust Comput 23, 2047–2065 (2020)

    Google Scholar 

  4. Peng, K., et al.: Security challenges and opportunities for smart contracts in Internet of Things: a survey. IEEE Internet Things J. 8(15), 12004–12020 (2021)

    Google Scholar 

  5. Deng, L., et al.: Retracted article: mobile network intrusion detection for IoT system based on transfer learning algorithm. Clust. Comput. 22, 9889–9904 (2019)

    Google Scholar 

  6. Li, H., Han, D., Chang, C.-C.: DAC4SH: a novel data access control scheme for smart home using smart contracts. IEEE Sens. J. 23(6), 6178–6191 (2023)

    Google Scholar 

  7. Li, D., et al.: Information security model of block chain based on intrusion sensing in the IoT environment. Clust. Comput. 22, 451–468 (2019)

    Google Scholar 

  8. Ali, H.M., et al.: Planning a secure and reliable IoT-enabled FOG-assisted computing infrastructure for healthcare. Clust. Comput. 25(3), 2143–2161 (2022)

    Google Scholar 

  9. Alhowaide, A., Alsmadi, I., Tang, J.: Towards the design of real-time autonomous IoT NIDS. Clust. Comput. (2021). https://doi.org/10.1007/s10586-021-03231-5

    Article  Google Scholar 

  10. Liang, W., Ji, N.: Privacy challenges of IoT-based blockchain: a systematic review. Clust. Comput. 25(3), 2203–2221 (2022)

    Google Scholar 

  11. Janani, K., Ramamoorthy, S.: Threat analysis model to control IoT network routing attacks through deep learning approach. Connect. Sci. 34(1), 2714–2754 (2022)

    Google Scholar 

  12. Hegde, P., Maddikunta, P.K.R.: Secure PBFT consensus-based lightweight blockchain for healthcare application. Appl. Sci. 13(6), 3757 (2023)

    Google Scholar 

  13. Zaidi, S.Y., Abbas, et al.: An attribute-based access control for IoT using blockchain and smart contracts. Sustainability 13(19), 10556 (2021)

    Google Scholar 

  14. Chinnasamy, P., et al.: Ciphertext-policy attribute-based encryption for cloud storage: toward data privacy and authentication in AI-enabled IoT system. Mathematics 10(1), 68 (2021)

    Google Scholar 

  15. Peng, S., et al.: Blockchain data secure transmission method based on homomorphic encryption. Comput. Intell. Neurosci. 2022, 1–9 (2022)

    Google Scholar 

  16. Rasheed, A., et al.: Exploiting zero knowledge proof and blockchains towards the enforcement of anonymity, data integrity and privacy (ADIP) in the IoT. IEEE Trans. Emerg. Topics Comput. 10(3), 1476–1491 (2021)

    Google Scholar 

  17. Gabsi, S., et al.: Novel ECC-based RFID mutual authentication protocol for emerging IoT applications. IEEE access 9, 130895–130913 (2021)

    Google Scholar 

  18. Vangala, A., et al.: Smart contract-based blockchain-envisioned authentication scheme for smart farming. IEEE Internet Things J. 8(13), 10792–10806 (2021)

    Google Scholar 

  19. Sayeed, S., Marco-Gisbert, H.: Proof of adjourn (PoAj): a novel approach to mitigate blockchain attacks. Appl. Sci. 10(18), 6607 (2020)

    Google Scholar 

  20. Mohammed, M.H.S.: A hybrid framework for securing data transmission in Internet of Things (IoTs) environment using blockchain approach. In: 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS). IEEE (2021)

  21. Biswas, S., et al.: A scalable blockchain framework for secure transactions in IoT. IEEE Internet Things J. 6(3), 4650–4659 (2018)

    Google Scholar 

  22. Rathee, G., et al.: A secure IoT sensors communication in industry 4.0 using blockchain technology. J. Ambient Intell. Human. Comput. 12, 533–545 (2021)

    Google Scholar 

  23. Ramesh, S., Govindarasu, M.: An efficient framework for privacy-preserving computations on encrypted IoT data. IEEE Internet Things J. 7(9), 8700–8708 (2020)

    Google Scholar 

  24. Gong, L., Alghazzawi, D.M., Cheng, Li.: BCoT sentry: a blockchain-based identity authentication framework for IoT devices. Information 12(5), 203 (2021)

    Google Scholar 

  25. Wan, Ji., et al.: AnonymousFox: an efficient and scalable blockchain consensus algorithm. IEEE Internet Things J. 9(23), 24236–24252 (2022)

    Google Scholar 

  26. Liao, D., et al.: Achieving IoT data security based blockchain. Peer-to-Peer Netw. Appl. 14, 1–14 (2021)

    Google Scholar 

  27. Li, T., et al.: Blockchain-based privacy-preserving and rewarding private data sharing for IoT. IEEE Internet Things J. 9(16), 15138–15149 (2022)

    Google Scholar 

  28. Jiang, W., Lin, Z., Tao, J.: An access control scheme for distributed Internet of Things based on adaptive trust evaluation and blockchain. High-Confid. Comput. 3(1), 100104 (2023)

    Google Scholar 

  29. Sabrina, F., Li, N., Sohail, S.: A blockchain based secure IoT system using device identity management. Sensors 22(19), 7535 (2022)

    Google Scholar 

  30. Khashan, O.A., Khafajah, N.M.: Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems. J. King Saud Univ. Comput. Inf. Sci. 35(2), 726–739 (2023)

    Google Scholar 

  31. Awan, S.M., et al.: A blockchain-inspired attribute-based zero-trust access control model for IoT. Information 14(2), 129 (2023)

    MathSciNet  Google Scholar 

  32. Patil, A.S., et al.: Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts. Comput. Secur 97, 101958 (2020)

    Google Scholar 

  33. Ibrahim, R.F., Al-Haija, Q.A., Ahmad, A.: DDoS attack prevention for internet of thing devices using ethereum blockchain technology. Sensors 22(18), 6806 (2022)

    Google Scholar 

  34. Ai, Z., Yin, A.: Controlled and authenticated quantum dialogue protocol based on Grover’s algorithm. Int. J. Theor. Phys. 61(11), 261 (2022)

    MathSciNet  Google Scholar 

  35. Ai, Z., Cui, W.: A proof-of-transactions blockchain consensus protocol for large-scale IoT. IEEE Internet Things J. 9(11), 7931–7943 (2021)

    Google Scholar 

  36. Vishwakarma, L., Das, D.: SCAB-IoTA: secure communication and authentication for IoT applications using blockchain. J. Parallel Distrib. Comput. 154, 94–105 (2021)

    Google Scholar 

  37. Zhang, X., Xue, M., Miao, X.: A consensus algorithm based on risk assessment model for permissioned blockchain. Wirel. Commun. Mob. Comput. 2022, 1–21 (2022)

    Google Scholar 

  38. Fernando, P., et al.: Proof of sense: a novel consensus mechanism for spectrum misuse detection. IEEE Trans. Ind. Inf. 18(12), 9206–9216 (2022)

    Google Scholar 

  39. Zhou, Q., et al.: Vulnerability analysis of smart contract for blockchain-based IoT applications: a machine learning approach. IEEE Internet Things J. 9(24), 24695–24707 (2022)

    Google Scholar 

  40. Wu, N., Lei, Xu., Zhu, L.: A blockchain based access control scheme with hidden policy and attribute. Future Gener. Comput. Syst. 141, 186–196 (2023)

    Google Scholar 

  41. Laghari, A.A., et al.: Lightweight-biov: blockchain distributed ledger technology (bdlt) for internet of vehicles (iovs). Electronics 12(3), 677 (2023)

    Google Scholar 

  42. Khan, A.A., et al.: Data security in healthcare industrial Internet of Things with blockchain. IEEE Sens. J. (2023). https://doi.org/10.1109/JSEN.2023.3273851

    Article  Google Scholar 

  43. Janani, K., Ramamoorthy, S.: Defending IoT security infrastructure with the 6G network, and blockchain and intelligent learning models for the future research roadmap. In: Global, I.G.I. (ed.) Challenges and Risks Involved in Deploying 6G and NextGen Networks, pp. 177–203. Hershey (2022)

    Google Scholar 

  44. Khan, A.U., et al.: A blockchain scheme for authentication, data sharing and nonrepudiation to secure internet of wireless sensor things. Clust. Comput. 26(2), 945–960 (2023)

    Google Scholar 

  45. Khezr, S., Yassine, A., Benlamri, R.: Towards a secure and dependable IoT data monetization using blockchain and fog computing. Clust. Comput. 26(2), 1551–1564 (2023)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

Author A and B both are having a equal contribution

Corresponding author

Correspondence to Ramamoorthy Sriramulu.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Janani, K., Ramamoorthy, S. A security framework to enhance IoT device identity and data access through blockchain consensus model. Cluster Comput 27, 2877–2900 (2024). https://doi.org/10.1007/s10586-023-04113-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-023-04113-8

Keywords

Navigation