Quarterly Journal of Information and Communication Technology ​

Improving Security and Privacy in the Internet of Things Based on Blockchain Technology

Document Type : Original Research Article

Author

Department of Business Administration, Islamic Azad University, Arak Branch, Arak, Iran

10.22034/apj.2025.723054
Abstract
As a smart and effective technology, the Internet of Things (IoT) plays a very important role in today's technology-driven world. This technology refers to a set of computer and technology-driven communications and interactions such as sensors, processing units, software and hardware with other devices and systems, that are connected and linked via the Internet or other communication networks. On the other hand, blockchain is a decentralized and distributed ledger that records transactions on many computers. This structure ensures that no single entity can access the entire chain to commit fraud. Each block in the chain contains a list of transactions, a time stamp and a cryptographic hash of the previous block, so each record created is unchangeable in a secure way. Blockchain technology, as one of the great innovations of the digital world, has been applied in many areas, including cybersecurity. Security is one of the fundamental challenges in the field of IoT, which can be enhanced and improved through blockchain. The purpose of this research is to analyze the solutions to improve security and privacy and to apply it in creating a privacy monitoring system in the Internet of Things based on blockchain technology. Finally, blockchain, with its unique features, can be an important tool in strengthening the security of the IoT against various threats and reducing risks. Using this technology in areas such as data protection, preventing information manipulation, and increasing the security of cloud systems can help reduce threats and improve digital security. Although there are challenges in the path of blockchain adoption and implementation, its benefits, especially in this area, are very significant.

Keywords


[1] Hassen, Hafedh Ben, Nadia Ayari, and Belgacem Hamdi. "A home hospitalization system based on the Internet of things, Fog computing and cloud computing." Informatics in Medicine Unlocked, vol. 20, pp. 136-148, 2020.
[2] Tuli, Shreshth, Nipam Basumatary, Sukhpal Singh Gill, Mohsen Kahani, Rajesh Chand Arya, Gurpreet Singh Wander, and Rajkumar Buyya. "HealthFog: An ensemble deep learning based Smart Healthcare System for Automatic Diagnosis of Heart Diseases in integrated IoT and fog computing " Future Generation Computer Systems, vol. 104, pp. 187-200, 2020.
[3] Karthika, P., R. Ganesh Babu, and P. A. Karthik. "Fog computing using interoperability and IoT security issues in health care." In Springer Micro-Electronics and Telecommunication Engineering, 97-105., 2020.
[4] Rincon, Jaime A., Solanye Guerra-Ojeda, Carlos Carrascosa, and Vicente Julian. "An IoT and Fog Computing-Based Monitoring System for Cardiovascular Patients with Automatic ECG Classification Using Deep Neural Networks." Sensors, vol. 20, no. 24, pp. 735-746, 2020.
[5] Bradley, D., Russell, D., Ferguson, I., Isaacs, J., MacLeod, A., & White, R. (2015). The Internet of Things–The future or the end of mechatronics. Mechatronics, 27, 57-74.
[6] Bonomi, F., Milito, R., Natarajan, P., & Zhu, J. (2014). Fog computing: A platform for internet of things and analytics. In Big data and internet of things: A roadmap for smart environments (pp. 169-186). Springer, Cham.
[7] Shammar EA, Zahary AT, Al-Shargabi AA. A survey of IoT and blockchain integration: Security perspective. IEEE Access. 2021 Nov 19;9:156114-50.
[8] Sultan A, Mushtaq MA, Abubakar M. IOT security issues via blockchain: a review paper. InProceedings of the 2019 international conference on blockchain technology 2019 Mar 15 (pp. 60-65).
[9] Shammar EA, Zahary AT, Al-Shargabi AA. A survey of IoT and blockchain integration: Security perspective. IEEE Access. 2021 Nov 19;9:156114-50.
[10] Uckelmann, D., Harrison, M., & Michahelles, F. (Eds.). (2011). Architecting the internet of things. Springer Science & Business Media.
[11] Mosenia, A., & Jha, N. K. (2017). A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing, 5(4), 586-602.
[12] Banerjee M, Lee J, Choo KK. A blockchain future for internet of things security: a position paper. Digital Communications and Networks. 2018 Aug 1;4(3):149-60.
[13] Hafsa A, Sghaier A, Malek J, Machhout M. Image encryption method based on improved ECC and modified AES algorithm. Multimedia Tools and Applications. 2021 May;80:19769-801.
[14] Hafsa A, Sghaier A, Zeghid M, Malek J, Machhout M. An improved co-designed AES-ECC cryptosystem for secure data transmission. International Journal of Information and Computer Security. 2020;13(1):118-40.
[15] JR MN, Lutimath NM. AN ENHANCED AES-ECC MODEL FOR THE SECURITY OF MOBILE APPLICATIONS USING CLOUD COMPUTING. Computer Integrated Manufacturing Systems. 2023 Apr 16;29(4):116-27.
[16] Smith J, Fathima SA. Securing IoT Networks in Smart Homes: Advanced Encryption Techniques and Authentication Protocols.
[17] Ugbedeojo M, Adebiyi MO, Aroba OJ, Adebiyi AA. RSA and Elliptic Curve Encryption System: A Systematic Literature Review. International Journal of Information Security and Privacy (IJISP). 2024 Jan 1;18(1):1-27.