Blockchain-based Decentralized Authentication and Authorization for IoT Applications

Authors

  • Dr. Hewa Majeed Zangana Duhok Polytechnic University , Iraq Author
  • Hakem Beitollahi Soran University , Iraq Author
  • Sabat Salih Muhamad Soran University , Iraq Author
  • Marwan Omar Illinois Institute of Technology , United States Author
  • Firas Mahmood Mustafa Duhok Polytechnic University , Iraq Author
  • Aquil Mirza Mohammed The Hong Kong Polytechnic University (PolyU) , Hong Kong Author
  • Sharyar Wani International Islamic University Malaysia (IIUM) , Malaysia Author
  • Shuai Li University of Oulu , Finland Author

DOI:

https://doi.org/10.64021/ijmst.1.3.115-124.2025

Keywords:

Authentication, Blockchain, Cybersecurity, IoT, Scalability

Abstract

The rapid proliferation of Internet of Things (IoT) devices has introduced significant challenges in ensuring secure and efficient authentication and authorization mechanisms. Traditional centralized approaches are increasingly inadequate due to their single points of failure, scalability issues, and vulnerability to attacks. This paper explores a blockchain-based decentralized framework for authentication and authorization in IoT applications, leveraging the inherent security features of blockchain technology. The proposed solution employs smart contracts to automate and enforce access control policies, ensuring that IoT devices can securely interact without relying on a trusted third party. By integrating blockchain with IoT, this approach enhances data integrity, transparency, and auditability while mitigating common security risks associated with centralized systems. The paper provides a comprehensive analysis of the architecture, implementation details, and performance evaluation, demonstrating the feasibility and advantages of the proposed decentralized authentication and authorization scheme. Experimental results indicate improved security, scalability, and operational efficiency, positioning blockchain as a promising solution for secure IoT environments.

References

N. Kshetri, “Blockchain’s roles in strengthening cybersecurity and protecting privacy,” Telecomm Policy, vol. 41, no. 10, pp. 1027–1038, 2017.

S. Demirkan, I. Demirkan, and A. McKee, “Blockchain technology in the future of business cyber security and accounting,” Journal of Management Analytics, vol. 7, no. 2, pp. 189–208, 2020.

A. Alkhalifah, A. Ng, M. J. M. Chowdhury, A. S. M. Kayes, and P. A. Watters, “An empirical analysis of blockchain cybersecurity incidents,” in 2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE), IEEE, 2019, pp. 1–8.

M. M. Rahman, A. Elshamly, S. U. Rehman, Z. Jameel, and R. Hameed, “Blockchain Technology And Its Impact On European Bank’s Cyber Security And Data Integrity,” Journal of Namibian Studies: History Politics Culture, vol. 34, pp. 1796–1813, 2023.

A. Banafa, Blockchain technology and applications. River Publishers, 2022.

A. R. Mathew, “Cyber security through blockchain technology,” Int. J. Eng. Adv. Technol, vol. 9, no. 1, pp. 3821–3824, 2019.

A. N. S. Putro, S. Mokodenseho, N. A. Hunawa, M. Mokoginta, and E. R. M. Marjoni, “Enhancing security and reliability of information systems through blockchain technology: a case study on impacts and potential,” West Science Information System and Technology, vol. 1, no. 01, pp. 35–43, 2023.

H. Hasanova, U. Baek, M. Shin, K. Cho, and M. Kim, “A survey on blockchain cybersecurity vulnerabilities and possible countermeasures,” International Journal of Network Management, vol. 29, no. 2, p. e2060, 2019.

A. Tezel, E. Papadonikolaki, I. Yitmen, and M. Bolpagni, “Blockchain opportunities and issues in the built environment: Perspectives on trust, transparency and cybersecurity,” in Industry 4.0 for the Built Environment: Methodologies, Technologies and Skills, Springer, 2021, pp. 569–588.

N. Mengidis, T. Tsikrika, S. Vrochidis, and I. Kompatsiaris, “Blockchain and AI for the next generation energy grids: cybersecurity challenges and opportunities,” Information & Security, vol. 43, no. 1, pp. 21–33, 2019.

S. Mahmood, M. Chadhar, and S. Firmin, “Cybersecurity challenges in blockchain technology: A scoping review,” Hum Behav Emerg Technol, vol. 2022, no. 1, p. 7384000, 2022.

V. P. Sriram et al., “Enhancing Cybersecurity Through Blockchain Technology,” in Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications, IGI Global, 2023, pp. 208–224.

V. Wylde et al., “Cybersecurity, data privacy and blockchain: A review,” SN Comput Sci, vol. 3, no. 2, p. 127, 2022.

F. Zidan, D. Nugroho, and B. A. Putra, “Securing enterprises: harnessing blockchain technology against cybercrime threats,” International Journal of Cyber and IT Service Management, vol. 3, no. 2, pp. 167–172, 2023.

M. Omar and H. M. Zangana, Redefining Security With Cyber AI. in Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. doi: 10.4018/979-8-3693-6517-5.

C. Catalini, “Blockchain technology and cryptocurrencies: Implications for the digital economy, cybersecurity, and government,” Georgetown journal of international affairs, vol. 19, pp. 36–42, 2018.

E. A. Antonyan and O. S. Rybakova, “Blockchain technologies for security against cyber attacks,” Вестник Национальной академии наук Республики Казахстан, no. 4 (386), p. 21, 2020.

N. Etemadi, Y. G. Borbon, and F. Strozzi, “Blockchain technology for cybersecurity applications in the food supply chain: A systematic literature review,” Proceedings of the XXIV Summer School “Francesco Turco”—Industrial Systems Engineering, Bergamo, Italy, pp. 9–11, 2020.

I. A. Shah, N. Z. Jhanjhi, and A. Laraib, “Cybersecurity and blockchain usage in contemporary business,” in Handbook of Research on Cybersecurity Issues and Challenges for Business and FinTech Applications, IGI Global, 2023, pp. 49–64.

K. J. Smith and G. Dhillon, “Assessing blockchain potential for improving the cybersecurity of financial transactions,” Managerial Finance, vol. 46, no. 6, pp. 833–848, 2020.

C. Gurdgiev and A. Fleming, “Informational Efficiency and Cybersecurity: Systemic Threats to Blockchain Applications,” Innovations in Social Finance: Transitioning Beyond Economic Value, pp. 347–372, 2021.

M. Sadigov, O. Kuzmenko, and H. Yarovenko, “Blockchain technology based system-dynamic simulation modeling of enterprise’s cyber security system,” Economic and Social Development: Book of Proceedings, pp. 399–408, 2020.

S. Yeasmin and A. Baig, “Unblocking the potential of blockchain,” in 2019 international conference on electrical and computing technologies and applications (ICECTA), IEEE, 2019, pp. 1–5.

R. Prakash, V. S. Anoop, and S. Asharaf, “Blockchain technology for cybersecurity: A text mining literature analysis,” International Journal of Information Management Data Insights, vol. 2, no. 2, p. 100112, 2022.

Downloads

Published

2025-09-30

Issue

Section

Articles

How to Cite

Blockchain-based Decentralized Authentication and Authorization for IoT Applications. (2025). Indonesian Journal of Modern Science and Technology, 1(3), 115-124. https://doi.org/10.64021/ijmst.1.3.115-124.2025

Similar Articles

You may also start an advanced similarity search for this article.