BLOCKCHAIN-BASED AUTHENTICATION FOR SECURE IOT NETWORKS: A DECENTRALIZED APPROACH TO IDENTITY MANAGEMENT AND DATA INTEGRITY

Authors

  • Rozina Chohan Associate Professor Institute of Computer Science, Shah Abdul Latif University, Khairpur Mir’s, Sindh, Pakistan Author
  • Gulshan Naheed Assistant Professor, Computer Science, Higher Education Department KPK Author
  • Dr Khakoo Mal Assistant professor, Department of Computer Science, Sukkur IBA University Author
  • Muhammad Jalil Afridi Dipartimento di Informatica, Università di Salerno Author
  • Dr. Taha Shabbir Associate Prof. Computing, Hamdard University, Karachi Author
  • Dr. Saira Yamin Assistant Professor Department of Economics & Finance, Faculty of Management Sciences Foundation university Islamabad Author

DOI:

https://doi.org/10.71146/kjmr556

Keywords:

Blockchain, Internet of Things (IoT), Authentication, Data Integrity, Proof of Stake (PoS), Proof of Work (PoW), Scalability, Privacy Preservation, Consensus Mechanisms, Transaction Speed, Security

Abstract

The growing popularity of the Internet of Things (IoT) networks has called out a growing need in sound and scalable security. The blockchain technology and its features of decentralization, immutability, and transparency can offer an effective solution to manage key security vulnerabilities, namely, authentication, data integrity, and privacy. This paper discusses the use of blockchain to IoT security, namely: decentralized authentication systems, data integrity management, and the challenge of scalability of large IoT networks. The findings indicate that despite the fact that blockchain can greatly improve security by guaranteeing data integrity and scheme-level device authentication, the performance of blockchain faced with output times of heightened issuance, slow transaction processing, and network constraints only emerge as network sizes rise. It has been proven that Proof of Stake (PoS) performs better than Proof of Work (PoW) regarding energy consumption, transaction latency, and time of recovery after failures due to attacks. Nonetheless, the paper underlines that streamlining blockchain protocols can help to mitigate performance stalls during massive IoT usage. The paper shows that, despite blockchain offering a secure basis to IoT, refinements in autonomous agreements, privacy safety nets, and scalability methods are required to make it an opportunity with broad IoT implementations.

Downloads

Download data is not yet available.

Downloads

Published

2025-07-28

Issue

Section

Engineering and Technology

How to Cite

BLOCKCHAIN-BASED AUTHENTICATION FOR SECURE IOT NETWORKS: A DECENTRALIZED APPROACH TO IDENTITY MANAGEMENT AND DATA INTEGRITY. (2025). Kashf Journal of Multidisciplinary Research, 2(07), 225-247. https://doi.org/10.71146/kjmr556

Similar Articles

11-20 of 283

You may also start an advanced similarity search for this article.