Blockchain-Based Secure Authentication Framework for IoT Networks
DOI:
https://doi.org/10.15662/IJEETR.2022.0401001Keywords:
IoT Authentication, Blockchain-Based Identity, Lightweight Consensus, Proof-of-Authentication (PoAh), PUFchain (Hardware-Assisted Security), Permissioned Blockchain, Hyperledger Fabric, Decentralized Identity, Resource-Constrained Devices, Authentication ArchitectureAbstract
With the rapid expansion of the Internet of Things (IoT), the need for secure, scalable authentication mechanisms has escalated alongside concerns regarding centralized trust, device identity spoofing, and resource constraints. Traditional centralized authentication models are vulnerable single points of failure and often unsustainable for large-scale IoT deployments. Blockchain, with its decentralized ledger, tamper resistance, and trustless trust model, presents a compelling alternative.
This research investigates blockchain-based authentication frameworks tailored for IoT environments before 2021. It examines lightweight consensus algorithms such as Proof-of-Authentication (PoAh), designed for resource-constrained devices, achieving block validation in mere seconds—unlike heavy Proof-of-Work schemes unsuitable for IoT contexts . We also explore hardware-assisted models like PUFchain, which integrates Physical Unclonable Functions (PUFs) to generate unique and unclonable device identities. The PUF-Enabled Authentication (PoP) consensus mechanism dramatically enhances security while maintaining high throughput and low latency .
Layered architectures such as IoTChain provide three-tier designs comprising authentication, blockchain, and application layers, enabling identity verification, lightweight access control, resilience to node failure, and integrity protection . Other frameworks leverage permissioned blockchains like Hyperledger Fabric to manage identities and authentication flexibly for smart device environments .
Overall, pre-2021 blockchain-enabled IoT authentication frameworks demonstrate promising avenues that reconcile decentralized trust, device constraints, and strong security guarantees, laying a foundation for more robust, scalable authentication infrastructures in the evolving IoT landscape.
References
1. Bao et al. (2018). IoTChain: A Three-Tier Blockchain-Based IoT Security Architecture .
2. Puthal et al. (2020). PoAh: A Novel Consensus Algorithm for Fast Scalable Private Blockchain for IoT.
3. Hammi et al.; A²Chain framework (2020).
4. Studies on lightweight identity authentication using RFID, PUFs, smart contracts.
5. Surveys on blockchain, zero-trust, and trust management in IoT authentication contexts





