SlideShare a Scribd company logo
IAES International Journal of Artificial Intelligence (IJ-AI)
Vol. 13, No. 4, December 2024, pp. 4037~4044
ISSN: 2252-8938, DOI: 10.11591/ijai.v13.i4.pp4037-4044  4037
Journal homepage: http://ijai.iaescore.com
Internet of things and blockchain integration for security and
privacy
Sumita Kumar1,3
, Amarsinh Vidhate2
1
Department of Computer Engineering, Ramrao Adik Institute of Technology, D.Y. Patil Deemed to be University, Navi Mumbai, India
2
Department of Engineering and Technology, Bharati Vidyapeeth Deemed University, Navi Mumbai, India
3
Ramrao Adik Institute of Technology, D.Y. Patil Deemed to be University, Navi Mumbai, India
Article Info ABSTRACT
Article history:
Received Nov 17, 2023
Revised Mar 28, 2024
Accepted Apr 17, 2024
The internet of things (IoT) can be defined as a network of intelligent objects
where physical objects are equipped with electronic and network
components to enable connectivity. These smart objects are embedded with
sensors that enable them to monitor, sense, and gather data pertaining to
their surroundings, including the environment and human activities. The
applications of IoT, both existing and forthcoming, show great promise in
terms of enhancing convenience, efficiency, and automation in our daily
lives. However, for the widespread adoption and effective implementation of
the IoT, addressing concerns related to security, authentication, privacy, and
recovery from potential attacks is crucial. To achieve end-to-end security in
IoT environments, it is imperative to define standard framework to achieve
end to end security for the IoT applications. The blockchain is distributed
ledge offers advantages such as confidentiality, authenticity, and availability.
In this paper, we propose a novel framework to provide security and privacy
for heterogeneous IoT architecture with integration of blockchain. The
framework has provided an assessment framework to deploy, govern
physical deployment. The proposed framework has defined standard
architecture to integrate blockchain with layered IoT architecture with
customization in blockchain with lightweight cryptography and consensus
mechanism to overcome integration challenges and to achieve authenticity,
security, and privacy.
Keywords:
Blockchain
Cloud
Internet of things
Privacy
Security
This is an open access article under the CC BY-SA license.
Corresponding Author:
Amarsinh Vidhate
Department of Engineering and Technology, Bharati Vidyapeeth Deemed University
Nerul, Navi Mumbai, Maharashtra 400706, India
Email: amar.vidhate@rait.ac.in
1. INTRODUCTION
The internet of things (IoT) represents the next phase of Internet development, revolutionizing
communication and traditional applications by connecting computers and physical objects [1], [2]. This
transformation leads to enhancements in productivity and service quality. The "things" in the context of IoT
are any devices and objects in our surroundings with intelligence that communicate and exchange
information within a vast network [3], [4]. In addition, blockchain is an immutable, timestamped, tamper-
resistant, auditable, and permanent ledger of blocks designed for the storage and sharing of data in a peer-to-
peer (P2P) manner. Initially, blockchain was used in cryptocurrency, recently blockchain has been applied
beyond cryptocurrencies in areas such as identity management, Industry 4.0, intelligent transportation, supply
chain management, and healthcare. These features include security, transactional privacy, integrity,
authorization, censorship resistance, data immutability, auditability, system transparency, and fault tolerance
 ISSN: 2252-8938
Int J Artif Intell, Vol. 13, No. 4, December 2024: 4037-4044
4038
[1], [4]. The IoT is significantly contributing to smart city projects and driving the next industry revolution
“Industry 4.0” with diverse applications in various sectors [5], [6]. Revenue generated by IoT applications
across various sectors is projected to grow from $892 billion (about $2,700 per person in the US) in 2018 to
an estimated $4 trillion (about $12,000 per person in the US) by 2025 [4]. IoT applications primarily focus on
automating various daily tasks and enabling objects to function without human intervention. However,
realizing this vision and meeting the increasing demand requires robust security measures, privacy
protection, reliable authentication mechanisms, and effective safeguards against potential attacks [5]‒[7].
The IoT has a large technology stack and different layers of architecture, due to such heterogeneous
and dynamic nature of IoT-based intelligent environments gives rise to a unique set of authentication, privacy
and security concerns and challenges at different layers of the IoT architecture [8]‒[10]. IoT solutions have
challenges like limited storage, computing power, networking capabilities, and power supply [8]‒[10]. The
fundamental security goals of traditional internet systems, namely confidentiality, integrity, authenticity, and
availability along with recovery from attack must be addressed effectively and are also crucial for IoT
networks. Additionally, standardized security policies and assessment frameworks for deployments are
essential [11]‒[13]. Existing assessments and security standards, although not specifically tailored to
IoT-based smart environments [14], [15]. There are various approaches to address the IoT security and
privacy challenges learning base countermeasures, encryption, fog computing, edge computing, machine
learning and blockchain base approach [16]‒[18].
Blockchain integration with IoT can provide the best security, authenticity, and privacy, but all these
advantages come with various integration challenges like resource constraint devices, performance, high
volume data, and layered IoT architecture [19]‒[25]. Address security and privacy challenges for dynamic
IoT architecture influenced by physical deployment demand standard framework to address unique security
challenges. We have proposed a novel generic framework to deploy any IoT application. The framework
expects any IoT application to analyse the environment with standard assessment framework parameters to
deploy, govern, and protect. In our research, we have proposed a novel generic framework for primary
security measures for heterogeneous layered IoT architecture with the integration of blockchain technology
with promising security [26]‒[30]. To address layered architecture integration challenges the proposed
framework uses customized blockchain architecture integrated with layered IoT architecture. The proposed
framework uses lightweight ECC curve cryptography for key exchange, encryption and digital signature,
BLAKE2 for message digest for customized blockchain along lightweight miners with a DAG consensus
mechanism.
The paper presented an overview of a novel security framework with blockchain integration.
Section 2 of this paper presented an overview of the proposed assessment and IoT and blockchain in
integration framework with the experimental setup. Our proposed framework addresses several challenges
related to the integration of blockchain technology, paving the way for enhanced security and privacy in IoT
applications. The work also discussed result analysis with different framework components in section 3.
2. METHOD
This research work aims to develop a standard security framework to ensure confidentiality,
integrity, authenticity, and availability for IoT with integration with blockchain and overcome the challenges
in integration. In this research work, we have presented interim details of the framework. The proposed
framework for integration of IoT and blockchain has considered a layered and heterogeneous IoT
environment, along with a large technology stack, challenges in blockchain integration and security
framework should be generic and can apply to any IoT application. This research has considered layered IoT
architecture with a physical or sensing layer, network layer, middleware layer and application. The IoT
layered architecture is extended with the dew layer as an extension to the physical layer and the cloudlet layer
as an extension to the middleware layer [31]‒[37].
To deploy any IoT application with our proposed framework, assessment parameters will be helpful
to deploy, govern, and protect IoT networks with layered functionalities and integration with blockchain to
ensure security and privacy. We have proposed the standard assessment guidelines for the deployment of IoT
applications with layered architecture. The assessment framework helps to ensure secure IoT deployment,
and effectively manage and continuously protect heterogeneous IoT environments, which helps to define a
generic security framework. The proposed assessment framework is broken down into seven key functions as
following:
− Identify: any deployment must identify how to manage cyber security risk to people, systems, capabilities,
assets, and data including physical environment, asset management, and information technology
governance along with application requirements to configure layered IoT architecture and blockchain
integration parameters for cryptography, smart contract, and data buffer.
Int J Artif Intell ISSN: 2252-8938 
Internet of things and blockchain integration for security and privacy (Sumita Kumar)
4039
− Categorize: any deployment must categorize the requirements based on how the system and information
are processed, stored, and transmitted based on impact analysis.
− Implement: any deployment must document and implement the environment based on the above two
measures.
− Protect: any deployment must document and implement appropriate security measures and blockchain
integration in the environment based on the above two measures.
− Govern: any deployment must develop and implement a governance structure to understand the
organization’s risk and priorities for IoT and blockchain.
− Assess: any deployment must assess the current state of implementation.
− Recover: any deployment must have a recovery plan to ensure resilience and restore to ensure availability.
The proposed generic framework for IoT layered implementation aims at achieving primary security
and privacy concerns for IoT due to a heterogeneous environment with blockchain integration as shown in
Figure 1. We have also considered challenges for IoT like the elimination of central authority, secure
deployment of the new node, and challenges with IoT and blockchain integration like resources constraint
environment, data concurrency, and high-velocity data handling for designing the layered framework. The
proposed framework has been designed by considering some fundamental design principles scalability,
reliability & performance, quality of service, and computational complexity.
Figure 1. IoT and blockchain integration layered architecture
The proposed framework has four important elements; i) secure boarding of new IoT devices and
onboarding of nodes at the edge/dew layer blockchain as well as at cloudlet layer, ii) customization of
blockchain at edge and middleware layer, iii) lightweight cryptographic measures, and iv) implementation of
smart contract and data queue to support many real-time IoT applications. The proposed framework
recommends implementing all four elements with help of various assessment parameters. The
implementation of all four elements has been discussed in subsequent paragraph.
The proposed research framework configures the cloud as a data store and application interfaces
responsible for analysing and processing data requested by authenticated users, things and blockchain nodes
by the cloudlet layer. The cloudlet layer is configured with a fully functional blockchain. The nodes in
cloudlet layers have two roles as mining nodes and blockchain participants. Each node in the cloudlet layer
will be assigned reputation or stake points which is based on the success ratio of miner. The miner's node
also responsible for maintaining stake for dew layer nodes. The dew layer is running with a lightweight
version of the blockchain. The dew layer node also has a reputation as stake points calculated on transaction
validity. The physical layer is deployed with various IoT devices registered with the IoT blockchain
 ISSN: 2252-8938
Int J Artif Intell, Vol. 13, No. 4, December 2024: 4037-4044
4040
framework as shown in Figure 2. Both cloudlet and dew layers are configured with a direct acyclic graph
(DAG) consensus mechanism, memory pool and are responsible for onboarding new nodes in the preceding
layer Figure 3.
Figure 2. Experimental setup and framework components
Figure 3. Blockchain block structure for IoT security framework
The experimental setup analyses the integration with real-time data as well as our ATN simulator
with the DS2OS dataset. The node can work in two modes attacker and authenticate mode. We have analysed
all types of records in the dataset by creating transactions with the simulator for various IoT devices and then
transmitting them to the dew layer blockchain. The layer lightweight blockchain miner then validates the
authenticity of the sender and transaction with the DAG consensus mechanism. A dew layer smart contract
can be triggered if the transaction is critical and needs to be processed in real-time otherwise dew layer miner
creates a block of transaction periodically and sends it to the cloudlet layer. The cloudlet layer miner again
validates the block before proceeding with the blockchain. If the block is critical then a smart contract will be
executed to support real-time IoT applications. If transactions are unauthenticated or there is an intrusion at
the dew/cloudlet layer, then respective miners drop the transaction. As all communications are securely
communicated, validated and stored with lightweight cryptographic measures and blockchain technology.
Algorithm 1: Blockchain IoT Layered Framework
Result: IoT data Security
Begin
1: If new Node at Physical Layer or Dew Layer
− Initiate the Handshake and key Exchange with immediate upper layer blockchain.
− Securely setup distributed elliptical curve key space for node domain p modulus, a, b, generator point g.
− Blockchain authenticate the new node configuration transaction with DAG
Int J Artif Intell ISSN: 2252-8938 
Internet of things and blockchain integration for security and privacy (Sumita Kumar)
4041
− Blockchain initiate genesis transaction for newly setup node.
2: IoT node initiate the transaction T and send to dew layer light weight blockchain
3: Dew layer blockchain miners validate the authenticity of sender and execute DAG consensus mechanism.
4: If transaction is authenticated
− Dew layer perform data filtration
− Execute the smart contract if condition meets
3: Dew layer miners periodically create blocks by creating Markle tree with encrypted transaction and
BLAK2 hash and attach ECC digital signature. Send block to cloudlet layer
4: If source is authentication is successful at cloudlet layer then.
− Run custom DAG consensus algorithm.
− Check IoT field setup in block header executes the smart contract
− Miner broadcast block to cloudlet layer blockchain and push actual transactions to cloud data storage
End
3. RESULTS AND DISCUSSION
The experimental setup has been configured with the “smart home IoT OS2 database”. The
experimental setup has analysed the effectiveness of the framework with a false positive rate of the dataset.
The analyse the reliability and effectiveness, this work has analysed the performance of customised
blockchain with elliptic curve cryptography (ECC) algorithm with distributed key space and the effectiveness
of secure onboarding of new nodes at the dew and cloudlet layer.
The challenges in IoT and blockchain integration like resources constrain environment is solves by
adapted to customise lightweight blockchain with lightweight cryptographic measure and lightweight
consensus mechanism. The customise blockchain with buffer pooling helps to handle high velocity data and
smart helps to support real time IoT application. Our experimental setup work very effectively to maintain
security and privacy for IoT applications.
The experimental setup has analysed the time complexity of ECC vs Rivets Shamir Adelman (RSA)
vs digital signature algorithm (DSA) in distributed blockchain environment. The result recorded in
Figure 4(a) is include cryptographic process of IoT blockchain transaction data and parameters, represents
ECC calculated value from implemented system and RSA and DSA data has been referred from respective
implementation of algorithm for blockchain integration. Figure 4(b) represents DAG calculated value from
implemented system and proof of stake (PoS) and proof of work (PoW) data has been referring from
respective implementation of algorithm for blockchain. The DAG result seems to work much better than
PoW and PoS.
(a) (b)
Figure 4. The performance ECC and DAG with proposed framework; (a) RSA Vs DSA Vs ECC Vs ECC
(distributed key space), and (b) DAG Vs PoS Vs PoW
The Figure 5(a) represents comparison of time complexity for critical data block Vs smart contract
trigger time for IoT blockchain mechanism to support real time IoT application. The Figure 5(b) the
performance of proposed system with DS2OS intrusion detection dataset. The blockchain base IoT network
perform much better, and another benefit is blockchain intrinsic characteristic of immutable database and
ensure confidentiality, authenticity and availability.
 ISSN: 2252-8938
Int J Artif Intell, Vol. 13, No. 4, December 2024: 4037-4044
4042
(a)
(b)
Figure 5. Performance of smart contract with framework and intrusion detection with DS2OS dataset;
(a) critical transaction Vs time complexcity, and (b) DS2OS data result
The graphs in Figure 6(a) shows our analysis for registration time for device and dew layer IoT node
registration time as authorize devices registration is also very important as IoT marketplace is growing very
rapidly. The registration of IoT device involves handshaking between IoT device and dew layer blockchain to
generate and secure sharing of secret keys for further communication. The Figure 6(b) shows performance
measurement for live registration of dew layer node registration with blockchain and distributed IoT
application as secure onboarding of node is necessary to keep system secure from malicious nodes.
(a) (b)
Figure 6. Analysis performance measurement of (a) dew layer blockchain node (IoT gateway), and
(b) physical layer new device registration
Int J Artif Intell ISSN: 2252-8938 
Internet of things and blockchain integration for security and privacy (Sumita Kumar)
4043
4. CONCLUSION
In this paper, we have presented an overview of the current state of the art of IoT, blockchain, and
features of blockchain along with the integration challenges. This paper also provides an overview of As the
IoT market is growing very rapidly, it is necessary to ensure primitive security measures with consideration
of distributed and heterogeneous environments. Blockchain is intrinsically distributed in nature and ensures
confidentiality, authenticity, and availability. This paper presented work on an assessment framework to
deploy any IoT base environment and we have presented our work on a security framework with IoT and
Blockchain integration. In this paper, we have proposed a customized blockchain for IoT-based environments
and our experimental setup with analysis.
REFERNCES
[1] J. Deogirikar and A. Vidhate, “Security attacks in IoT: A survey,” in Proceedings of the International Conference on IoT in
Social, Mobile, Analytics and Cloud, I-SMAC 2017, pp. 32–37, Feb. 2017, doi: 10.1109/I-SMAC.2017.8058363.
[2] M. Yuvaraju, S. Kumar, K. Singh, G. N. Rao, B. J. Kumar, and K. Vigneshwaran, “Transformer monitoring and security system
using IoT,” in IDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things,
Proceedings, pp. 84–89, Jan. 2023, doi: 10.1109/IDCIoT56793.2023.10053405.
[3] S. Kumar and A. Vidhate, “Issues and future trends in IoT security using blockchain: a review,” in IDCIoT 2023 - International
Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings, pp. 976–984, Jan. 2023, doi:
10.1109/IDCIoT56793.2023.10053430.
[4] S. Rathore, J. H. Park, and H. Chang, “Deep learning and blockchain-empowered security framework for intelligent 5G-enabled
IoT,” IEEE Access, vol. 9, pp. 90075–90083, 2021, doi: 10.1109/ACCESS.2021.3077069.
[5] G. George and S. M. Thampi, “A graph-based security framework for securing industrial IoT networks from vulnerability
exploitations,” IEEE Access, vol. 6, pp. 43586–43601, 2018, doi: 10.1109/ACCESS.2018.2863244.
[6] C. S. Park and H. M. Nam, “Security architecture and protocols for secure MQTT-SN,” IEEE Access, vol. 8, pp. 226422–226436,
2020, doi: 10.1109/ACCESS.2020.3045441.
[7] D. Shin, K. Yun, J. Kim, P. V. Astillo, J.-N. Kim, and I. You, “A security protocol for route optimization in DMM-based smart
home IoT networks,” IEEE Access, vol. 7, pp. 142531–142550, 2019, doi: 10.1109/ACCESS.2019.2943929.
[8] B. Liao, Y. Ali, S. Nazir, L. He, and H. U. Khan, “Security analysis of IoT devices by using mobile computing: a systematic
literature review,” IEEE Access, vol. 8, pp. 120331–120350, 2020, doi: 10.1109/ACCESS.2020.3006358.
[9] V. Gugueoth, S. Safavat, S. Shetty, and D. Rawat, “A review of IoT security and privacy using decentralized blockchain
techniques,” Computer Science Review, vol. 50, Nov. 2023, doi: 10.1016/j.cosrev.2023.100585.
[10] K. Lounis and M. Zulkernine, “Attacks and defenses in short-range wireless technologies for IoT,” IEEE Access, vol. 8, pp.
88892–88932, 2020, doi: 10.1109/ACCESS.2020.2993553.
[11] C. Choi and J. Choi, “Ontology-based security context reasoning for power IoT-cloud security service,” IEEE Access, vol. 7, pp.
110510–110517, 2019, doi: 10.1109/ACCESS.2019.2933859.
[12] N. M. Karie, N. M. Sahri, W. Yang, C. Valli, and V. R. Kebande, “A review of security standards and frameworks for IoT-based
smart environments,” IEEE Access, vol. 9, pp. 121975–121995, 2021, doi: 10.1109/ACCESS.2021.3109886.
[13] V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, “A survey on IoT security: application areas, security
threats, and solution architectures,” IEEE Access, vol. 7, pp. 82721–82743, 2019, doi: 10.1109/ACCESS.2019.2924045.
[14] S. Kumar et al., “An optimized intelligent computational security model for interconnected blockchain-IoT system & cities,” Ad
Hoc Networks, vol. 151, Dec. 2023, doi: 10.1016/j.adhoc.2023.103299.
[15] S. Ali, Q. Li, and A. Yousafzai, “Blockchain and federated learning-based intrusion detection approaches for edge-enabled
industrial IoT networks: a survey,” Ad Hoc Networks, vol. 152, Jan. 2024, doi: 10.1016/j.adhoc.2023.103320.
[16] V. Varriale, A. Cammarano, F. Michelino, and M. Caputo, “Integrating blockchain, RFID and IoT within a cheese supply chain:
A cost analysis,” Journal of Industrial Information Integration, vol. 34, Aug. 2023, doi: 10.1016/j.jii.2023.100486.
[17] S. Siboni et al., “Security testbed for internet-of-things devices,” IEEE Transactions on Reliability, vol. 68, no. 1, pp. 23–44, Mar.
2019, doi: 10.1109/TR.2018.2864536.
[18] M. G. Samaila, J. B. F. Sequeiros, T. Simoes, M. M. Freire, and P. R. M. Inacio, “IoT-HarPSecA: A framework and roadmap for
secure design and development of devices and applications in the IoT space,” IEEE Access, vol. 8, pp. 16462–16494, 2020, doi:
10.1109/ACCESS.2020.2965925.
[19] S. Zaman et al., “Security threats and artificial intelligence based countermeasures for internet of things networks: a
comprehensive survey,” IEEE Access, vol. 9, pp. 94668–94690, 2021, doi: 10.1109/ACCESS.2021.3089681.
[20] K. S. S. Bajpai, “Survey on blockchain technology in IoT for security,” Engineering and Technology Journal for Research and
Innovation (ETJRI), vol. 3, no. 2, pp. 5-11, Jul. 2021.
[21] S. N. Swamy and S. R. Kota, “An empirical study on system level aspects of internet of things (IoT),” IEEE Access, vol. 8, pp.
188082–188134, 2020, doi: 10.1109/ACCESS.2020.3029847.
[22] V. Sharma, I. You, K. Andersson, F. Palmieri, M. H. Rehmani, and J. Lim, “Security, privacy and trust for smart mobile-internet
of things (M-IoT): A survey,” IEEE Access, vol. 8, pp. 167123–167163, 2020, doi: 10.1109/ACCESS.2020.3022661.
[23] S. Khanam, I. B. Ahmedy, M. Y. I. Idris, M. H. Jaward, and A. Q. B. M. Sabri, “A survey of security challenges, attacks
taxonomy and advanced countermeasures in the internet of things,” IEEE Access, vol. 8, pp. 219709–219743, 2020, doi:
10.1109/ACCESS.2020.3037359.
[24] A. K. Das, B. Bera, M. Wazid, S. S. Jamal, and Y. Park, “On the security of a secure and lightweight authentication scheme for
next generation IoT infrastructure,” IEEE Access, vol. 9, pp. 71856–71867, 2021, doi: 10.1109/ACCESS.2021.3079312.
[25] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for the internet of things,” IEEE Access, vol. 4, pp. 2292–
2303, 2016, doi: 10.1109/ACCESS.2016.2566339.
[26] A. Al Sadawi, M. S. Hassan, and M. Ndiaye, “A Survey on the Integration of Blockchain with IoT to enhance performance and
eliminate challenges,” IEEE Access, vol. 9, pp. 54478–54497, 2021, doi: 10.1109/ACCESS.2021.3070555.
[27] L. Xie, Y. Ding, H. Yang, and X. Wang, “Blockchain-based secure and trustworthy internet of things in SDN-enabled 5G-
VANETs,” IEEE Access, vol. 7, pp. 56656–56666, 2019, doi: 10.1109/ACCESS.2019.2913682.
[28] M. Muneeb, Z. Raza, I. U. Haq, and O. Shafiq, “SmartCon: a blockchain-based framework for smart contracts and transaction
management,” IEEE Access, vol. 10, pp. 10719–10730, 2022, doi: 10.1109/ACCESS.2021.3135562.
 ISSN: 2252-8938
Int J Artif Intell, Vol. 13, No. 4, December 2024: 4037-4044
4044
[29] N. M. Kumar and P. K. Mallick, “Blockchain technology for security issues and challenges in IoT,” Procedia Computer Science,
vol. 132, pp. 1815–1823, 2018, doi: 10.1016/j.procs.2018.05.140.
[30] A. E. S. Leni, R. Shankar, R. Thiagarajan, and V. R. Patil, “Block-chain based secure data access over internet of health
application things (IHoT),” KSII Transactions on Internet and Information Systems, vol. 17, no. 5, pp. 1484–1502, May 2023, doi:
10.3837/tiis.2023.05.010.
[31] S. Singh, A. S. M. S. Hosen, and B. Yoon, “Blockchain security attacks, challenges, and solutions for the future distributed IoT
network,” IEEE Access, vol. 9, pp. 13938–13959, 2021, doi: 10.1109/ACCESS.2021.3051602.
[32] A. Yazdinejad, A. Dehghantanha, R. M. Parizi, G. Srivastava, and H. Karimipour, “Secure intelligent fuzzy blockchain
framework: effective threat detection in IoT networks,” Computers in Industry, vol. 144, Jan. 2023, doi:
10.1016/j.compind.2022.103801.
[33] J. Wang, W. Yi, M. Yang, J. Ma, S. Zhang, and S. Hao, “Enhance the trust between IoT devices, mobile apps, and the cloud based
on blockchain,” Journal of Network and Computer Applications, vol. 218, Sep. 2023, doi: 10.1016/j.jnca.2023.103718.
[34] S. Mathur, A. Kalla, G. Gür, M. K. Bohra, and M. Liyanage, “A survey on role of blockchain for IoT: applications and technical
aspects,” Computer Networks, vol. 227, May 2023, doi: 10.1016/j.comnet.2023.109726.
[35] S. Shreya, K. Chatterjee, and A. Singh, “BFSF: A secure IoT based framework for smart farming using blockchain,” Sustainable
Computing: Informatics and Systems, vol. 40, 2023, doi: 10.1016/j.suscom.2023.100917.
[36] T. M. Hewa, Y. Hu, M. Liyanage, S. S. Kanhare, and M. Ylianttila, “Survey on blockchain-based smart contracts: technical
aspects and future research,” IEEE Access, vol. 9, pp. 87643–87662, 2021, doi: 10.1109/ACCESS.2021.3068178.
[37] V. Y. Kemmoe, W. Stone, J. Kim, D. Kim, and J. Son, “Recent advances in smart contracts: a technical overview and state of the
art,” IEEE Access, vol. 8, pp. 117782–117801, 2020, doi: 10.1109/ACCESS.2020.3005020.
BIOGRAPHIES OF AUTHORS
Sumita Kumar is working as an Assistant Professor at Bharati Vidyapeeth
Deemed University, Department of Engineering and Technology, in the Department of
Computer Science Engineering. Her academic qualification is Ph.D. pursuing in (Computer
Engineering) from Dr. D.Y. Patil University Nerul Navi Mumbai, M.Tech. (Computer
Engineering) from Bharati Vidyapeeth Deemed University Pune, and B.E. (Computer Science
& Engineering). She is in the teaching profession for more than 7 years. Her main area of
interest includes machine learning, network security, IoT, blockchain, cryptography, and cyber
security. She can be contacted at email: sumitakumar02@gmail.com.
Amarsinh Vidhate is working as a professor for the last 8 years, in the
Department of Computer Engineering at RAIT, D. Y. Patil deemed to be university. He has
26+ years of academic experience and almost 80+ national and international research papers,
published at international conferences and referred journals. His areas of research are protocol
stacks, computer networking & security, VaNET, IoT, and 5G applications especially
healthcare applications with AI & ML. He is a PG guide and Ph.D. guide at the University of
Mumbai, as well as D.Y. Patil University. His special interest is in mass education and
designing content that is useful for the masses to make them employable. He is a member of
professional bodies like IEEE, CSI, and ISTE. He can be contacted at email:
amar.vidhate@rait.ac.in.
Ad

Recommended

PDF
Enhancing road image clarity with residual neural network dehazing model
IAESIJAI
 
PDF
Seeding precision: a mask region based convolutional neural networks classifi...
IAESIJAI
 
PDF
Obstructive sleep apnea detection based on electrocardiogram signal using one...
IAESIJAI
 
PDF
Enhancing video anomaly detection for human suspicious behavior through deep ...
IAESIJAI
 
PDF
Detecting fraudulent financial statement under imbalanced data using neural n...
IAESIJAI
 
PDF
A novel pairwise based convolutional neural network for image preprocessing e...
IAESIJAI
 
PDF
Hybrid improved fuzzy C-means and watershed segmentation to classify Alzheime...
IAESIJAI
 
PDF
Unified and evolved approach based on neural network and deep learning method...
IAESIJAI
 
PDF
Implementation of fuzzy logic approach for thalassemia screening in children
IAESIJAI
 
PDF
Enhancing interpretability in random forest: Leveraging inTrees for associati...
IAESIJAI
 
PDF
The use of augmented reality in assessing and training children with attentio...
IAESIJAI
 
PDF
Review of cloud computing models in education and the unmet needs
IAESIJAI
 
PDF
Development of a prioritized traffic light control system for emergency vehicles
IAESIJAI
 
PDF
Optimizing the position of photovoltaic solar tracker panels with artificial ...
IAESIJAI
 
PDF
Optimisation of semantic segmentation algorithm for autonomous driving using ...
IAESIJAI
 
PDF
Design and analysis plant factory with artificial light
IAESIJAI
 
PDF
Navigating the tech-savvy generation; key considerations in developing of an ...
IAESIJAI
 
PDF
Enhancing legal research through knowledge-infused information retrieval for...
IAESIJAI
 
PDF
Anartificial intelligence approach to smart exam supervision using YOLO v5 an...
IAESIJAI
 
PDF
Fog and rain augmentation for license plate recognition in tropical country e...
IAESIJAI
 
PDF
Navigating the tech-savvy generation; key considerations in developing of an ...
IAESIJAI
 
PDF
Using pattern mining to determine fine climatic parameters for maize yield in...
IAESIJAI
 
PDF
Harnessing adapted capsule networks for accurate lumpy skin disease diagnosis...
IAESIJAI
 
PDF
Framework for abnormal event detection and tracking based on effective sparse...
IAESIJAI
 
PDF
Design of an effective multiple objects tracking framework for dynamic video ...
IAESIJAI
 
PDF
A systematic assertive wide-band routing using location and potential aware t...
IAESIJAI
 
PDF
Implementation of global navigation satellite system software defined radio b...
IAESIJAI
 
PDF
Deep learning approach for forensic facial reconstruction depends on unidenti...
IAESIJAI
 
PDF
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
PDF
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 

More Related Content

More from IAESIJAI (20)

PDF
Implementation of fuzzy logic approach for thalassemia screening in children
IAESIJAI
 
PDF
Enhancing interpretability in random forest: Leveraging inTrees for associati...
IAESIJAI
 
PDF
The use of augmented reality in assessing and training children with attentio...
IAESIJAI
 
PDF
Review of cloud computing models in education and the unmet needs
IAESIJAI
 
PDF
Development of a prioritized traffic light control system for emergency vehicles
IAESIJAI
 
PDF
Optimizing the position of photovoltaic solar tracker panels with artificial ...
IAESIJAI
 
PDF
Optimisation of semantic segmentation algorithm for autonomous driving using ...
IAESIJAI
 
PDF
Design and analysis plant factory with artificial light
IAESIJAI
 
PDF
Navigating the tech-savvy generation; key considerations in developing of an ...
IAESIJAI
 
PDF
Enhancing legal research through knowledge-infused information retrieval for...
IAESIJAI
 
PDF
Anartificial intelligence approach to smart exam supervision using YOLO v5 an...
IAESIJAI
 
PDF
Fog and rain augmentation for license plate recognition in tropical country e...
IAESIJAI
 
PDF
Navigating the tech-savvy generation; key considerations in developing of an ...
IAESIJAI
 
PDF
Using pattern mining to determine fine climatic parameters for maize yield in...
IAESIJAI
 
PDF
Harnessing adapted capsule networks for accurate lumpy skin disease diagnosis...
IAESIJAI
 
PDF
Framework for abnormal event detection and tracking based on effective sparse...
IAESIJAI
 
PDF
Design of an effective multiple objects tracking framework for dynamic video ...
IAESIJAI
 
PDF
A systematic assertive wide-band routing using location and potential aware t...
IAESIJAI
 
PDF
Implementation of global navigation satellite system software defined radio b...
IAESIJAI
 
PDF
Deep learning approach for forensic facial reconstruction depends on unidenti...
IAESIJAI
 
Implementation of fuzzy logic approach for thalassemia screening in children
IAESIJAI
 
Enhancing interpretability in random forest: Leveraging inTrees for associati...
IAESIJAI
 
The use of augmented reality in assessing and training children with attentio...
IAESIJAI
 
Review of cloud computing models in education and the unmet needs
IAESIJAI
 
Development of a prioritized traffic light control system for emergency vehicles
IAESIJAI
 
Optimizing the position of photovoltaic solar tracker panels with artificial ...
IAESIJAI
 
Optimisation of semantic segmentation algorithm for autonomous driving using ...
IAESIJAI
 
Design and analysis plant factory with artificial light
IAESIJAI
 
Navigating the tech-savvy generation; key considerations in developing of an ...
IAESIJAI
 
Enhancing legal research through knowledge-infused information retrieval for...
IAESIJAI
 
Anartificial intelligence approach to smart exam supervision using YOLO v5 an...
IAESIJAI
 
Fog and rain augmentation for license plate recognition in tropical country e...
IAESIJAI
 
Navigating the tech-savvy generation; key considerations in developing of an ...
IAESIJAI
 
Using pattern mining to determine fine climatic parameters for maize yield in...
IAESIJAI
 
Harnessing adapted capsule networks for accurate lumpy skin disease diagnosis...
IAESIJAI
 
Framework for abnormal event detection and tracking based on effective sparse...
IAESIJAI
 
Design of an effective multiple objects tracking framework for dynamic video ...
IAESIJAI
 
A systematic assertive wide-band routing using location and potential aware t...
IAESIJAI
 
Implementation of global navigation satellite system software defined radio b...
IAESIJAI
 
Deep learning approach for forensic facial reconstruction depends on unidenti...
IAESIJAI
 

Recently uploaded (20)

PDF
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
PDF
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
PDF
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
 
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
PDF
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
PPTX
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
PPTX
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
PDF
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
PPTX
UserCon Belgium: Honey, VMware increased my bill
stijn40
 
PDF
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
PDF
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
PDF
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
PDF
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
 
PPTX
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
 
PDF
Database Benchmarking for Performance Masterclass: Session 2 - Data Modeling ...
ScyllaDB
 
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
PDF
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
PPTX
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
Agentic AI for Developers and Data Scientists Build an AI Agent in 10 Lines o...
All Things Open
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
UserCon Belgium: Honey, VMware increased my bill
stijn40
 
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
Tech-ASan: Two-stage check for Address Sanitizer - Yixuan Cao.pdf
caoyixuan2019
 
Quantum AI Discoveries: Fractal Patterns Consciousness and Cyclical Universes
Saikat Basu
 
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
 
Database Benchmarking for Performance Masterclass: Session 2 - Data Modeling ...
ScyllaDB
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Priyanka Aash
 
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
" How to survive with 1 billion vectors and not sell a kidney: our low-cost c...
Fwdays
 
Ad

Internet of things and blockchain integration for security and privacy

  • 1. IAES International Journal of Artificial Intelligence (IJ-AI) Vol. 13, No. 4, December 2024, pp. 4037~4044 ISSN: 2252-8938, DOI: 10.11591/ijai.v13.i4.pp4037-4044  4037 Journal homepage: http://ijai.iaescore.com Internet of things and blockchain integration for security and privacy Sumita Kumar1,3 , Amarsinh Vidhate2 1 Department of Computer Engineering, Ramrao Adik Institute of Technology, D.Y. Patil Deemed to be University, Navi Mumbai, India 2 Department of Engineering and Technology, Bharati Vidyapeeth Deemed University, Navi Mumbai, India 3 Ramrao Adik Institute of Technology, D.Y. Patil Deemed to be University, Navi Mumbai, India Article Info ABSTRACT Article history: Received Nov 17, 2023 Revised Mar 28, 2024 Accepted Apr 17, 2024 The internet of things (IoT) can be defined as a network of intelligent objects where physical objects are equipped with electronic and network components to enable connectivity. These smart objects are embedded with sensors that enable them to monitor, sense, and gather data pertaining to their surroundings, including the environment and human activities. The applications of IoT, both existing and forthcoming, show great promise in terms of enhancing convenience, efficiency, and automation in our daily lives. However, for the widespread adoption and effective implementation of the IoT, addressing concerns related to security, authentication, privacy, and recovery from potential attacks is crucial. To achieve end-to-end security in IoT environments, it is imperative to define standard framework to achieve end to end security for the IoT applications. The blockchain is distributed ledge offers advantages such as confidentiality, authenticity, and availability. In this paper, we propose a novel framework to provide security and privacy for heterogeneous IoT architecture with integration of blockchain. The framework has provided an assessment framework to deploy, govern physical deployment. The proposed framework has defined standard architecture to integrate blockchain with layered IoT architecture with customization in blockchain with lightweight cryptography and consensus mechanism to overcome integration challenges and to achieve authenticity, security, and privacy. Keywords: Blockchain Cloud Internet of things Privacy Security This is an open access article under the CC BY-SA license. Corresponding Author: Amarsinh Vidhate Department of Engineering and Technology, Bharati Vidyapeeth Deemed University Nerul, Navi Mumbai, Maharashtra 400706, India Email: [email protected] 1. INTRODUCTION The internet of things (IoT) represents the next phase of Internet development, revolutionizing communication and traditional applications by connecting computers and physical objects [1], [2]. This transformation leads to enhancements in productivity and service quality. The "things" in the context of IoT are any devices and objects in our surroundings with intelligence that communicate and exchange information within a vast network [3], [4]. In addition, blockchain is an immutable, timestamped, tamper- resistant, auditable, and permanent ledger of blocks designed for the storage and sharing of data in a peer-to- peer (P2P) manner. Initially, blockchain was used in cryptocurrency, recently blockchain has been applied beyond cryptocurrencies in areas such as identity management, Industry 4.0, intelligent transportation, supply chain management, and healthcare. These features include security, transactional privacy, integrity, authorization, censorship resistance, data immutability, auditability, system transparency, and fault tolerance
  • 2.  ISSN: 2252-8938 Int J Artif Intell, Vol. 13, No. 4, December 2024: 4037-4044 4038 [1], [4]. The IoT is significantly contributing to smart city projects and driving the next industry revolution “Industry 4.0” with diverse applications in various sectors [5], [6]. Revenue generated by IoT applications across various sectors is projected to grow from $892 billion (about $2,700 per person in the US) in 2018 to an estimated $4 trillion (about $12,000 per person in the US) by 2025 [4]. IoT applications primarily focus on automating various daily tasks and enabling objects to function without human intervention. However, realizing this vision and meeting the increasing demand requires robust security measures, privacy protection, reliable authentication mechanisms, and effective safeguards against potential attacks [5]‒[7]. The IoT has a large technology stack and different layers of architecture, due to such heterogeneous and dynamic nature of IoT-based intelligent environments gives rise to a unique set of authentication, privacy and security concerns and challenges at different layers of the IoT architecture [8]‒[10]. IoT solutions have challenges like limited storage, computing power, networking capabilities, and power supply [8]‒[10]. The fundamental security goals of traditional internet systems, namely confidentiality, integrity, authenticity, and availability along with recovery from attack must be addressed effectively and are also crucial for IoT networks. Additionally, standardized security policies and assessment frameworks for deployments are essential [11]‒[13]. Existing assessments and security standards, although not specifically tailored to IoT-based smart environments [14], [15]. There are various approaches to address the IoT security and privacy challenges learning base countermeasures, encryption, fog computing, edge computing, machine learning and blockchain base approach [16]‒[18]. Blockchain integration with IoT can provide the best security, authenticity, and privacy, but all these advantages come with various integration challenges like resource constraint devices, performance, high volume data, and layered IoT architecture [19]‒[25]. Address security and privacy challenges for dynamic IoT architecture influenced by physical deployment demand standard framework to address unique security challenges. We have proposed a novel generic framework to deploy any IoT application. The framework expects any IoT application to analyse the environment with standard assessment framework parameters to deploy, govern, and protect. In our research, we have proposed a novel generic framework for primary security measures for heterogeneous layered IoT architecture with the integration of blockchain technology with promising security [26]‒[30]. To address layered architecture integration challenges the proposed framework uses customized blockchain architecture integrated with layered IoT architecture. The proposed framework uses lightweight ECC curve cryptography for key exchange, encryption and digital signature, BLAKE2 for message digest for customized blockchain along lightweight miners with a DAG consensus mechanism. The paper presented an overview of a novel security framework with blockchain integration. Section 2 of this paper presented an overview of the proposed assessment and IoT and blockchain in integration framework with the experimental setup. Our proposed framework addresses several challenges related to the integration of blockchain technology, paving the way for enhanced security and privacy in IoT applications. The work also discussed result analysis with different framework components in section 3. 2. METHOD This research work aims to develop a standard security framework to ensure confidentiality, integrity, authenticity, and availability for IoT with integration with blockchain and overcome the challenges in integration. In this research work, we have presented interim details of the framework. The proposed framework for integration of IoT and blockchain has considered a layered and heterogeneous IoT environment, along with a large technology stack, challenges in blockchain integration and security framework should be generic and can apply to any IoT application. This research has considered layered IoT architecture with a physical or sensing layer, network layer, middleware layer and application. The IoT layered architecture is extended with the dew layer as an extension to the physical layer and the cloudlet layer as an extension to the middleware layer [31]‒[37]. To deploy any IoT application with our proposed framework, assessment parameters will be helpful to deploy, govern, and protect IoT networks with layered functionalities and integration with blockchain to ensure security and privacy. We have proposed the standard assessment guidelines for the deployment of IoT applications with layered architecture. The assessment framework helps to ensure secure IoT deployment, and effectively manage and continuously protect heterogeneous IoT environments, which helps to define a generic security framework. The proposed assessment framework is broken down into seven key functions as following: − Identify: any deployment must identify how to manage cyber security risk to people, systems, capabilities, assets, and data including physical environment, asset management, and information technology governance along with application requirements to configure layered IoT architecture and blockchain integration parameters for cryptography, smart contract, and data buffer.
  • 3. Int J Artif Intell ISSN: 2252-8938  Internet of things and blockchain integration for security and privacy (Sumita Kumar) 4039 − Categorize: any deployment must categorize the requirements based on how the system and information are processed, stored, and transmitted based on impact analysis. − Implement: any deployment must document and implement the environment based on the above two measures. − Protect: any deployment must document and implement appropriate security measures and blockchain integration in the environment based on the above two measures. − Govern: any deployment must develop and implement a governance structure to understand the organization’s risk and priorities for IoT and blockchain. − Assess: any deployment must assess the current state of implementation. − Recover: any deployment must have a recovery plan to ensure resilience and restore to ensure availability. The proposed generic framework for IoT layered implementation aims at achieving primary security and privacy concerns for IoT due to a heterogeneous environment with blockchain integration as shown in Figure 1. We have also considered challenges for IoT like the elimination of central authority, secure deployment of the new node, and challenges with IoT and blockchain integration like resources constraint environment, data concurrency, and high-velocity data handling for designing the layered framework. The proposed framework has been designed by considering some fundamental design principles scalability, reliability & performance, quality of service, and computational complexity. Figure 1. IoT and blockchain integration layered architecture The proposed framework has four important elements; i) secure boarding of new IoT devices and onboarding of nodes at the edge/dew layer blockchain as well as at cloudlet layer, ii) customization of blockchain at edge and middleware layer, iii) lightweight cryptographic measures, and iv) implementation of smart contract and data queue to support many real-time IoT applications. The proposed framework recommends implementing all four elements with help of various assessment parameters. The implementation of all four elements has been discussed in subsequent paragraph. The proposed research framework configures the cloud as a data store and application interfaces responsible for analysing and processing data requested by authenticated users, things and blockchain nodes by the cloudlet layer. The cloudlet layer is configured with a fully functional blockchain. The nodes in cloudlet layers have two roles as mining nodes and blockchain participants. Each node in the cloudlet layer will be assigned reputation or stake points which is based on the success ratio of miner. The miner's node also responsible for maintaining stake for dew layer nodes. The dew layer is running with a lightweight version of the blockchain. The dew layer node also has a reputation as stake points calculated on transaction validity. The physical layer is deployed with various IoT devices registered with the IoT blockchain
  • 4.  ISSN: 2252-8938 Int J Artif Intell, Vol. 13, No. 4, December 2024: 4037-4044 4040 framework as shown in Figure 2. Both cloudlet and dew layers are configured with a direct acyclic graph (DAG) consensus mechanism, memory pool and are responsible for onboarding new nodes in the preceding layer Figure 3. Figure 2. Experimental setup and framework components Figure 3. Blockchain block structure for IoT security framework The experimental setup analyses the integration with real-time data as well as our ATN simulator with the DS2OS dataset. The node can work in two modes attacker and authenticate mode. We have analysed all types of records in the dataset by creating transactions with the simulator for various IoT devices and then transmitting them to the dew layer blockchain. The layer lightweight blockchain miner then validates the authenticity of the sender and transaction with the DAG consensus mechanism. A dew layer smart contract can be triggered if the transaction is critical and needs to be processed in real-time otherwise dew layer miner creates a block of transaction periodically and sends it to the cloudlet layer. The cloudlet layer miner again validates the block before proceeding with the blockchain. If the block is critical then a smart contract will be executed to support real-time IoT applications. If transactions are unauthenticated or there is an intrusion at the dew/cloudlet layer, then respective miners drop the transaction. As all communications are securely communicated, validated and stored with lightweight cryptographic measures and blockchain technology. Algorithm 1: Blockchain IoT Layered Framework Result: IoT data Security Begin 1: If new Node at Physical Layer or Dew Layer − Initiate the Handshake and key Exchange with immediate upper layer blockchain. − Securely setup distributed elliptical curve key space for node domain p modulus, a, b, generator point g. − Blockchain authenticate the new node configuration transaction with DAG
  • 5. Int J Artif Intell ISSN: 2252-8938  Internet of things and blockchain integration for security and privacy (Sumita Kumar) 4041 − Blockchain initiate genesis transaction for newly setup node. 2: IoT node initiate the transaction T and send to dew layer light weight blockchain 3: Dew layer blockchain miners validate the authenticity of sender and execute DAG consensus mechanism. 4: If transaction is authenticated − Dew layer perform data filtration − Execute the smart contract if condition meets 3: Dew layer miners periodically create blocks by creating Markle tree with encrypted transaction and BLAK2 hash and attach ECC digital signature. Send block to cloudlet layer 4: If source is authentication is successful at cloudlet layer then. − Run custom DAG consensus algorithm. − Check IoT field setup in block header executes the smart contract − Miner broadcast block to cloudlet layer blockchain and push actual transactions to cloud data storage End 3. RESULTS AND DISCUSSION The experimental setup has been configured with the “smart home IoT OS2 database”. The experimental setup has analysed the effectiveness of the framework with a false positive rate of the dataset. The analyse the reliability and effectiveness, this work has analysed the performance of customised blockchain with elliptic curve cryptography (ECC) algorithm with distributed key space and the effectiveness of secure onboarding of new nodes at the dew and cloudlet layer. The challenges in IoT and blockchain integration like resources constrain environment is solves by adapted to customise lightweight blockchain with lightweight cryptographic measure and lightweight consensus mechanism. The customise blockchain with buffer pooling helps to handle high velocity data and smart helps to support real time IoT application. Our experimental setup work very effectively to maintain security and privacy for IoT applications. The experimental setup has analysed the time complexity of ECC vs Rivets Shamir Adelman (RSA) vs digital signature algorithm (DSA) in distributed blockchain environment. The result recorded in Figure 4(a) is include cryptographic process of IoT blockchain transaction data and parameters, represents ECC calculated value from implemented system and RSA and DSA data has been referred from respective implementation of algorithm for blockchain integration. Figure 4(b) represents DAG calculated value from implemented system and proof of stake (PoS) and proof of work (PoW) data has been referring from respective implementation of algorithm for blockchain. The DAG result seems to work much better than PoW and PoS. (a) (b) Figure 4. The performance ECC and DAG with proposed framework; (a) RSA Vs DSA Vs ECC Vs ECC (distributed key space), and (b) DAG Vs PoS Vs PoW The Figure 5(a) represents comparison of time complexity for critical data block Vs smart contract trigger time for IoT blockchain mechanism to support real time IoT application. The Figure 5(b) the performance of proposed system with DS2OS intrusion detection dataset. The blockchain base IoT network perform much better, and another benefit is blockchain intrinsic characteristic of immutable database and ensure confidentiality, authenticity and availability.
  • 6.  ISSN: 2252-8938 Int J Artif Intell, Vol. 13, No. 4, December 2024: 4037-4044 4042 (a) (b) Figure 5. Performance of smart contract with framework and intrusion detection with DS2OS dataset; (a) critical transaction Vs time complexcity, and (b) DS2OS data result The graphs in Figure 6(a) shows our analysis for registration time for device and dew layer IoT node registration time as authorize devices registration is also very important as IoT marketplace is growing very rapidly. The registration of IoT device involves handshaking between IoT device and dew layer blockchain to generate and secure sharing of secret keys for further communication. The Figure 6(b) shows performance measurement for live registration of dew layer node registration with blockchain and distributed IoT application as secure onboarding of node is necessary to keep system secure from malicious nodes. (a) (b) Figure 6. Analysis performance measurement of (a) dew layer blockchain node (IoT gateway), and (b) physical layer new device registration
  • 7. Int J Artif Intell ISSN: 2252-8938  Internet of things and blockchain integration for security and privacy (Sumita Kumar) 4043 4. CONCLUSION In this paper, we have presented an overview of the current state of the art of IoT, blockchain, and features of blockchain along with the integration challenges. This paper also provides an overview of As the IoT market is growing very rapidly, it is necessary to ensure primitive security measures with consideration of distributed and heterogeneous environments. Blockchain is intrinsically distributed in nature and ensures confidentiality, authenticity, and availability. This paper presented work on an assessment framework to deploy any IoT base environment and we have presented our work on a security framework with IoT and Blockchain integration. In this paper, we have proposed a customized blockchain for IoT-based environments and our experimental setup with analysis. REFERNCES [1] J. Deogirikar and A. Vidhate, “Security attacks in IoT: A survey,” in Proceedings of the International Conference on IoT in Social, Mobile, Analytics and Cloud, I-SMAC 2017, pp. 32–37, Feb. 2017, doi: 10.1109/I-SMAC.2017.8058363. [2] M. Yuvaraju, S. Kumar, K. Singh, G. N. Rao, B. J. Kumar, and K. Vigneshwaran, “Transformer monitoring and security system using IoT,” in IDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings, pp. 84–89, Jan. 2023, doi: 10.1109/IDCIoT56793.2023.10053405. [3] S. Kumar and A. Vidhate, “Issues and future trends in IoT security using blockchain: a review,” in IDCIoT 2023 - International Conference on Intelligent Data Communication Technologies and Internet of Things, Proceedings, pp. 976–984, Jan. 2023, doi: 10.1109/IDCIoT56793.2023.10053430. [4] S. Rathore, J. H. Park, and H. Chang, “Deep learning and blockchain-empowered security framework for intelligent 5G-enabled IoT,” IEEE Access, vol. 9, pp. 90075–90083, 2021, doi: 10.1109/ACCESS.2021.3077069. [5] G. George and S. M. Thampi, “A graph-based security framework for securing industrial IoT networks from vulnerability exploitations,” IEEE Access, vol. 6, pp. 43586–43601, 2018, doi: 10.1109/ACCESS.2018.2863244. [6] C. S. Park and H. M. Nam, “Security architecture and protocols for secure MQTT-SN,” IEEE Access, vol. 8, pp. 226422–226436, 2020, doi: 10.1109/ACCESS.2020.3045441. [7] D. Shin, K. Yun, J. Kim, P. V. Astillo, J.-N. Kim, and I. You, “A security protocol for route optimization in DMM-based smart home IoT networks,” IEEE Access, vol. 7, pp. 142531–142550, 2019, doi: 10.1109/ACCESS.2019.2943929. [8] B. Liao, Y. Ali, S. Nazir, L. He, and H. U. Khan, “Security analysis of IoT devices by using mobile computing: a systematic literature review,” IEEE Access, vol. 8, pp. 120331–120350, 2020, doi: 10.1109/ACCESS.2020.3006358. [9] V. Gugueoth, S. Safavat, S. Shetty, and D. Rawat, “A review of IoT security and privacy using decentralized blockchain techniques,” Computer Science Review, vol. 50, Nov. 2023, doi: 10.1016/j.cosrev.2023.100585. [10] K. Lounis and M. Zulkernine, “Attacks and defenses in short-range wireless technologies for IoT,” IEEE Access, vol. 8, pp. 88892–88932, 2020, doi: 10.1109/ACCESS.2020.2993553. [11] C. Choi and J. Choi, “Ontology-based security context reasoning for power IoT-cloud security service,” IEEE Access, vol. 7, pp. 110510–110517, 2019, doi: 10.1109/ACCESS.2019.2933859. [12] N. M. Karie, N. M. Sahri, W. Yang, C. Valli, and V. R. Kebande, “A review of security standards and frameworks for IoT-based smart environments,” IEEE Access, vol. 9, pp. 121975–121995, 2021, doi: 10.1109/ACCESS.2021.3109886. [13] V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, “A survey on IoT security: application areas, security threats, and solution architectures,” IEEE Access, vol. 7, pp. 82721–82743, 2019, doi: 10.1109/ACCESS.2019.2924045. [14] S. Kumar et al., “An optimized intelligent computational security model for interconnected blockchain-IoT system & cities,” Ad Hoc Networks, vol. 151, Dec. 2023, doi: 10.1016/j.adhoc.2023.103299. [15] S. Ali, Q. Li, and A. Yousafzai, “Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey,” Ad Hoc Networks, vol. 152, Jan. 2024, doi: 10.1016/j.adhoc.2023.103320. [16] V. Varriale, A. Cammarano, F. Michelino, and M. Caputo, “Integrating blockchain, RFID and IoT within a cheese supply chain: A cost analysis,” Journal of Industrial Information Integration, vol. 34, Aug. 2023, doi: 10.1016/j.jii.2023.100486. [17] S. Siboni et al., “Security testbed for internet-of-things devices,” IEEE Transactions on Reliability, vol. 68, no. 1, pp. 23–44, Mar. 2019, doi: 10.1109/TR.2018.2864536. [18] M. G. Samaila, J. B. F. Sequeiros, T. Simoes, M. M. Freire, and P. R. M. Inacio, “IoT-HarPSecA: A framework and roadmap for secure design and development of devices and applications in the IoT space,” IEEE Access, vol. 8, pp. 16462–16494, 2020, doi: 10.1109/ACCESS.2020.2965925. [19] S. Zaman et al., “Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey,” IEEE Access, vol. 9, pp. 94668–94690, 2021, doi: 10.1109/ACCESS.2021.3089681. [20] K. S. S. Bajpai, “Survey on blockchain technology in IoT for security,” Engineering and Technology Journal for Research and Innovation (ETJRI), vol. 3, no. 2, pp. 5-11, Jul. 2021. [21] S. N. Swamy and S. R. Kota, “An empirical study on system level aspects of internet of things (IoT),” IEEE Access, vol. 8, pp. 188082–188134, 2020, doi: 10.1109/ACCESS.2020.3029847. [22] V. Sharma, I. You, K. Andersson, F. Palmieri, M. H. Rehmani, and J. Lim, “Security, privacy and trust for smart mobile-internet of things (M-IoT): A survey,” IEEE Access, vol. 8, pp. 167123–167163, 2020, doi: 10.1109/ACCESS.2020.3022661. [23] S. Khanam, I. B. Ahmedy, M. Y. I. Idris, M. H. Jaward, and A. Q. B. M. Sabri, “A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things,” IEEE Access, vol. 8, pp. 219709–219743, 2020, doi: 10.1109/ACCESS.2020.3037359. [24] A. K. Das, B. Bera, M. Wazid, S. S. Jamal, and Y. Park, “On the security of a secure and lightweight authentication scheme for next generation IoT infrastructure,” IEEE Access, vol. 9, pp. 71856–71867, 2021, doi: 10.1109/ACCESS.2021.3079312. [25] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for the internet of things,” IEEE Access, vol. 4, pp. 2292– 2303, 2016, doi: 10.1109/ACCESS.2016.2566339. [26] A. Al Sadawi, M. S. Hassan, and M. Ndiaye, “A Survey on the Integration of Blockchain with IoT to enhance performance and eliminate challenges,” IEEE Access, vol. 9, pp. 54478–54497, 2021, doi: 10.1109/ACCESS.2021.3070555. [27] L. Xie, Y. Ding, H. Yang, and X. Wang, “Blockchain-based secure and trustworthy internet of things in SDN-enabled 5G- VANETs,” IEEE Access, vol. 7, pp. 56656–56666, 2019, doi: 10.1109/ACCESS.2019.2913682. [28] M. Muneeb, Z. Raza, I. U. Haq, and O. Shafiq, “SmartCon: a blockchain-based framework for smart contracts and transaction management,” IEEE Access, vol. 10, pp. 10719–10730, 2022, doi: 10.1109/ACCESS.2021.3135562.
  • 8.  ISSN: 2252-8938 Int J Artif Intell, Vol. 13, No. 4, December 2024: 4037-4044 4044 [29] N. M. Kumar and P. K. Mallick, “Blockchain technology for security issues and challenges in IoT,” Procedia Computer Science, vol. 132, pp. 1815–1823, 2018, doi: 10.1016/j.procs.2018.05.140. [30] A. E. S. Leni, R. Shankar, R. Thiagarajan, and V. R. Patil, “Block-chain based secure data access over internet of health application things (IHoT),” KSII Transactions on Internet and Information Systems, vol. 17, no. 5, pp. 1484–1502, May 2023, doi: 10.3837/tiis.2023.05.010. [31] S. Singh, A. S. M. S. Hosen, and B. Yoon, “Blockchain security attacks, challenges, and solutions for the future distributed IoT network,” IEEE Access, vol. 9, pp. 13938–13959, 2021, doi: 10.1109/ACCESS.2021.3051602. [32] A. Yazdinejad, A. Dehghantanha, R. M. Parizi, G. Srivastava, and H. Karimipour, “Secure intelligent fuzzy blockchain framework: effective threat detection in IoT networks,” Computers in Industry, vol. 144, Jan. 2023, doi: 10.1016/j.compind.2022.103801. [33] J. Wang, W. Yi, M. Yang, J. Ma, S. Zhang, and S. Hao, “Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain,” Journal of Network and Computer Applications, vol. 218, Sep. 2023, doi: 10.1016/j.jnca.2023.103718. [34] S. Mathur, A. Kalla, G. Gür, M. K. Bohra, and M. Liyanage, “A survey on role of blockchain for IoT: applications and technical aspects,” Computer Networks, vol. 227, May 2023, doi: 10.1016/j.comnet.2023.109726. [35] S. Shreya, K. Chatterjee, and A. Singh, “BFSF: A secure IoT based framework for smart farming using blockchain,” Sustainable Computing: Informatics and Systems, vol. 40, 2023, doi: 10.1016/j.suscom.2023.100917. [36] T. M. Hewa, Y. Hu, M. Liyanage, S. S. Kanhare, and M. Ylianttila, “Survey on blockchain-based smart contracts: technical aspects and future research,” IEEE Access, vol. 9, pp. 87643–87662, 2021, doi: 10.1109/ACCESS.2021.3068178. [37] V. Y. Kemmoe, W. Stone, J. Kim, D. Kim, and J. Son, “Recent advances in smart contracts: a technical overview and state of the art,” IEEE Access, vol. 8, pp. 117782–117801, 2020, doi: 10.1109/ACCESS.2020.3005020. BIOGRAPHIES OF AUTHORS Sumita Kumar is working as an Assistant Professor at Bharati Vidyapeeth Deemed University, Department of Engineering and Technology, in the Department of Computer Science Engineering. Her academic qualification is Ph.D. pursuing in (Computer Engineering) from Dr. D.Y. Patil University Nerul Navi Mumbai, M.Tech. (Computer Engineering) from Bharati Vidyapeeth Deemed University Pune, and B.E. (Computer Science & Engineering). She is in the teaching profession for more than 7 years. Her main area of interest includes machine learning, network security, IoT, blockchain, cryptography, and cyber security. She can be contacted at email: [email protected]. Amarsinh Vidhate is working as a professor for the last 8 years, in the Department of Computer Engineering at RAIT, D. Y. Patil deemed to be university. He has 26+ years of academic experience and almost 80+ national and international research papers, published at international conferences and referred journals. His areas of research are protocol stacks, computer networking & security, VaNET, IoT, and 5G applications especially healthcare applications with AI & ML. He is a PG guide and Ph.D. guide at the University of Mumbai, as well as D.Y. Patil University. His special interest is in mass education and designing content that is useful for the masses to make them employable. He is a member of professional bodies like IEEE, CSI, and ISTE. He can be contacted at email: [email protected].