Securing the Internet of Things (IoT): Developing a Decentralized Blockchain-Based Framework for Device Authentication and Data Integrity

Authors

  • Deepak Bishop Heber College, Trichy. Author

DOI:

https://doi.org/10.63282/3050-922X.ICRCEDA25-126

Keywords:

Internet of Things (IoT), Blockchain Technology, Device Authentication, Data Integrity, Decentralized Framework, Homomorphic Encryption, Security, Privacy, Scalability, Efficiency

Abstract

The rapid proliferation of Internet of Things (IoT) devices has heightened concerns regarding device authentication and data integrity within IoT ecosystems. Traditional centralized security mechanisms often fall short in addressing these challenges due to scalability and trust issues. This paper proposes a decentralized blockchain-based framework to enhance device authentication and ensure data integrity in IoT networks. Leveraging blockchain's immutable ledger and consensus mechanisms, the framework provides secure and transparent device registration, authentication processes, and tamper-proof data storage. The integration of homomorphic encryption further bolsters data privacy by enabling secure data processing. Through simulation and analysis, the proposed framework demonstrates improved security, scalability, and efficiency, offering a robust solution to the pressing security concerns in IoT environments

References

[1] Dorri, A., Kanhere, S. S., & Jurdak, R. (2017). Blockchain in internet of things: Challenges and solutions. Computer Communications, 120, 10–29.

[2] Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the Internet of Things. IEEE Access, 4, 2292–2303.

[3] Zhang, Y., Kasahara, S., Shen, Y., Jiang, X., & Wan, J. (2018). Smart contract-based access control for the Internet of Things. IEEE Internet of Things Journal, 6(2), 1594–1605.

[4] Reyna, A., Martín, C., Chen, J., Soler, E., & Díaz, M. (2018). On blockchain and its integration with IoT. Challenges and opportunities. Future Generation Computer Systems, 88, 173–190.

[5] Sharma, P. K., & Park, J. H. (2018). Blockchain based hybrid network architecture for the smart city. Future Generation Computer Systems, 86, 650–655.

[6] Ali, A., Vecchio, M., & Giaffreda, R. (2017). Application of lightweight blockchain for IoT data integrity. Proceedings of the 2017 IEEE International Conference on Communications (ICC), 1–6.

[7] Al-Bassam, M. (2018). SCPKI: A smart contract-based PKI and identity system. Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts (BCC '18), 35–40.

[8] Yang, Z., & Li, H. (2020). A blockchain-based authentication and trust management scheme for IoT. Journal of Network and Computer Applications, 123, 1–11.

[9] Settibathini, V. S., Kothuru, S. K., Vadlamudi, A. K., Thammreddi, L., & Rangineni, S. (2023). Strategic analysis review of data analytics with the help of artificial intelligence. International Journal of Advances in Engineering Research, 26, 1-10.

[10] Salman, T., Zolanvari, M., Erbad, A., Jain, R., & Samaka, M. (2019). Security services using blockchains: A state of the art survey. IEEE Communications Surveys & Tutorials, 21(1), 858–880.

[11] Novo, O. (2018). Blockchain meets IoT: An architecture for scalable access management in IoT. IEEE Internet of Things Journal, 5(2), 1184–1195.

[12] Animesh Kumar, “Redefining Finance: The Influence of Artificial Intelligence (AI) and Machine Learning (ML)”, Transactions on Engineering and Computing Sciences, 12(4), 59-69. 2024.

[13] Kirti Vasdev (2024).” Integrating GIS with Natural Language Processing for Location-Based Insights”. International Journal for Multidisciplinary Research (IJFMR).6(2).PP. 1-6. DOI: https://www.ijfmr.com/papers/2024/2/23437

[14] Puneet Aggarwal, Amit Aggarwal. "Ensuring HIPAA Compliance in ERP Systems A Framework for Protected Health Information (PHI) Security", Journal of Validation Technology, 29 (1), 70-82, 2023.

[15] Sahil Bucha, “Integrating Cloud-Based E-Commerce Logistics Platforms While Ensuring Data Privacy: A Technical Review,” Journal Of Critical Reviews, Vol 09, Issue 05 2022, Pages1256-1263.

[16] RK Puvvada . “SAP S/4HANA Finance on Cloud: AI-Powered Deployment and Extensibility” - IJSAT-International Journal on Science and …16.1 2025 :1-14.

[17] Advancing sustainable energy: A systematic review of renewable resources, technologies, and public perceptions, Sree Lakshmi Vineetha Bitragunta, International Journal of Multidisciplinary Research and Growth Evaluation, Volume 4; Issue 2; March-April 2023; Page No. 608-614.

[18] Barigidad, S. (2025). Edge-Optimized Facial Emotion Recognition: A High-Performance Hybrid Mobilenetv2-Vit Model. International Journal of AI, BigData, Computational and Management Studies, 6(2), 1-10. https://doi.org/10.63282/3050-9416.IJAIBDCMS-V6I2P101

[19] B. C. C. Marella and D. Kodi, “Generative AI for fraud prevention: A new frontier in productivity and green innovation,” In Advances in Environmental Engineering and Green Technologies, IGI Global, 2025, pp. 185–200

[20] D. Kodi and S. Chundru, “Unlocking new possibilities: How advanced API integration enhances green innovation and equity,” In Advances in Environmental Engineering and Green Technologies, IGI Global, 2025, pp. 437–460

[21] Venu Madhav Aragani, Arunkumar Thirunagalingam, “Leveraging Advanced Analytics for Sustainable Success: The Green Data Revolution,” in Driving Business Success Through Eco-Friendly Strategies, IGI Global, USA, pp. 229- 248, 2025.

[22] MRM Reethu, LNR Mudunuri, S Banala,(2024) "Exploring the Big Five Personality Traits of Employees in Corporates," in FMDB Transactions on Sustainable Management Letters 2 (1), 1-13

[23] Sudheer Panyaram, Muniraju Hullurappa, “Data-Driven Approaches to Equitable Green Innovation Bridging Sustainability and Inclusivity,” in Advancing Social Equity Through Accessible Green Innovation, IGI Global, USA, pp. 139-152, 2025.

[24] Pulivarthy, P. (2023). Enhancing Dynamic Behaviour in Vehicular Ad Hoc Networks through Game Theory and Machine Learning for Reliable Routing. International Journal of Machine Learning and Artificial Intelligence, 4(4), 1-13.

[25] P. K. Maroju, "Conversational AI for Personalized Financial Advice in the BFSI Sector," International Journal of Innovations in Applied Sciences and Engineering, vol. 8, no.2, pp. 156–177, Nov. 2022. – 1

[26] Mohanarajesh Kommineni (2024) “Investigate Methods for Visualizing the Decision-Making Processes of a Complex AI System, Making Them More Understandable and Trustworthy in financial data analysis” International Transactions in Artificial Intelligence, Pages 1-21

[27] Enhancement of Wind Turbine Technologies through Innovations in Power Electronics, Sree Lakshmi Vineetha Bitragunta, IJIRMPS2104231841, Volume 9 Issue 4 2021, PP-1-11.

[28] Gopichand Vemulapalli Subash Banala,Lakshmi Narasimha Raju Mudunuri,Gopi Chand Vegineni,Sireesha Addanki,Padmaja Pulivarthy, 2025, “Enhancing Decision-Making: From Raw Data to Strategic Insights for Business Growth”, 2nd IEEE International Conference on Data Science And Business Systems.

[29] Anumolu, V. R., & Marella, B. C. C. (2025). Maximizing ROI: The Intersection of Productivity, Generative AI, and Social Equity. In Advancing Social Equity Through Accessible Green Innovation (pp. 373-386). IGI Global Scientific Publishing.

[30] Palakurti, A., & Kodi, D. (2025). “Building intelligent systems with Python: An AI and ML journey for social good”. In Advancing social equity through accessible green innovation (pp. 1–16). IGI Global.

[31] S. Panyaram, "Digital Twins & IoT: A New Era for Predictive Maintenance in Manufacturing," International Journal of Innovations in Electronic & Electrical Engineering, vol. 10, no. 1, pp. 1-9, 2024.

[32] Arpit Garg, "How Natural Language Processing Framework Automate Business Requirement Elicitation," International Journal of Computer Trends and Technology (IJCTT), vol. 73, no. 5, pp. 47-50, 2025. Crossref, https://doi.org/10.14445/22312803/IJCTT-V73I5P107

[33] Kirti Vasdev. (2019). “GIS in Disaster Management: Real-Time Mapping and Risk Assessment”. International Journal on Science and Technology, 10(1), 1–8. https://doi.org/10.5281/zenodo.14288561

[34] Kiran Nittur, Srinivas Chippagiri, Mikhail Zhidko, “Evolving Web Application Development Frameworks: A Survey of Ruby on Rails, Python, and Cloud-Based Architectures”, International Journal of New Media Studies (IJNMS), 7 (1), 28-34, 2020.

[35] Islam Uddin, Salman A. AlQahtani, Sumaiya Noor, Salman Khan. “Deep-m6Am: a deep learning model for identifying N6, 2′-O-Dimethyladenosine (m6Am) sites using hybrid features[J]”. AIMS Bioengineering, 2025, 12(1): 145-161. doi: 10.3934/bioeng.2025006.

[36] Arpit Garg, “CNN-Based Image Validation for ESG Reporting: An Explainable AI and Blockchain Approach”, Int. J. Comput. Sci. Inf. Technol. Res., vol. 5, no. 4, pp. 64–85, Dec. 2024, doi: 10.63530/IJCSITR_2024_05_04_007

[37] Vootkuri, C. Neural Networks in Cloud Security: Advancing Threat Detection and Automated Response.

[38] Sandeep Rangineni Latha Thamma reddi Sudheer Kumar Kothuru , Venkata Surendra Kumar, Anil Kumar Vadlamudi. Analysis on Data Engineering: Solving Data preparation tasks with ChatGPT to finish Data Preparation. Journal of Emerging Technologies and Innovative Research. 2023/12. (10)12, PP 11, https://www.jetir.org/view?paper=JETIR2312580

Downloads

Published

2025-06-09

How to Cite

1.
Deepak. Securing the Internet of Things (IoT): Developing a Decentralized Blockchain-Based Framework for Device Authentication and Data Integrity. IJERET [Internet]. 2025 Jun. 9 [cited 2025 Sep. 12];:239-51. Available from: https://ijeret.org/index.php/ijeret/article/view/196