Smart City Gnosys

Smart city article details

Title Decentralised Iot Authentication Using Blockchain And Machine Learning: The Trust Circle Framework
ID_Doc 17620
Authors Jagdish B.V.; Induraj A.; Vikas M.N.; Akshay M.; Naik C.
Year 2025
Published Proceedings of 8th International Conference on Inventive Computation Technologies, ICICT 2025
DOI http://dx.doi.org/10.1109/ICICT64420.2025.11005150
Abstract The Internet of Things (IoT) is projected to connect more than 50 billion devices by 2020, and its rapid growth has significantly influenced sectors such as smart cities, healthcare, agriculture, and military operations. IoT supports applications like smart appliances, waste management, and traffic monitoring, contributing to reductions in CO2 emissions. At the core of IoT functionality lies the Wireless Sensor Network (WSN), which consists of distributed sensors that collect and transmit data for various uses. The primary aim of IoT is to enable seamless connectivity between devices, allowing any object to access information in real time. However, due to the characteristics of wireless communication, device limitations, and system range, IoT systems face serious security threats such as identity spoofing and message tampering. Traditional centralized security approaches, like Public Key Infrastructure (PKI), are often costly and ineffective for large-scale IoT networks, leading to challenges in integration and scalability. To enhance security, reliability, and scalability in IoT, this research proposes the Trust Circle Framework, a decentralized authentication system that incorporates blockchain technology and machine learning. The framework emphasizes adaptability to the decentralized nature of IoT without reliance on centralized security systems. It enables the addition of new services, facilitates smooth device communication, and aligns with multiple IoT standards. Experimental outcomes show that this approach offers improved authentication accuracy, decreased latency, and heightened resistance to cyber threats compared to conventional methods. Blockchain technology provides immutable identity verification and protects against data manipulation and spoofing. Moreover, machine learning algorithms enable adaptive threat detection, allowing the system to distinguish between legitimate and harmful nodes. This innovative, trust-based strategy addresses the limitations of existing security measures and delivers a scalable and secure solution for IoT ecosystems, fostering robust networks capable of meeting the demands of modern interconnected environments. © 2025 IEEE.
Author Keywords


Similar Articles


Id Similarity Authors Title Published
17680 View0.902Islam R.; Bose R.; Roy S.; Khan A.A.; Sutradhar S.; Das S.; Ali F.; AlZubi A.A.Decentralized Trust Framework For Smart Cities: A Blockchain-Enabled Cybersecurity And Data Integrity ModelScientific Reports, 15, 1 (2025)
477 View0.9Huang C.; Yan K.A Blockchain Based Fast Authentication Framework For Iot Networks With Trusted HardwareProceedings - 2020 IEEE 22nd International Conference on High Performance Computing and Communications, IEEE 18th International Conference on Smart City and IEEE 6th International Conference on Data Science and Systems, HPCC-SmartCity-DSS 2020 (2020)
1277 View0.893Chaira M.; Aouag S.; Cherroun H.; Brik B.; Rezgui A.A Decentralized Blockchain-Based Authentication Scheme For Cross-Communication In Iot NetworksCluster Computing, 27, 3 (2024)
771 View0.893Khalil U.; Malik O.A.; Uddin M.; Chen C.-L.A Comparative Analysis On Blockchain Versus Centralized Authentication Architectures For Iot-Enabled Smart Devices In Smart Cities: A Comprehensive Review, Recent Advances, And Future Research DirectionsSensors, 22, 14 (2022)
485 View0.888Ali R.; Qadri Y.A.; Zikria Y.B.; Al-Turjman F.; Kim B.-S.; Kim S.W.A Blockchain Model For Trustworthiness In The Internet Of Things (Iot)-Based Smart-CitiesEAI/Springer Innovations in Communication and Computing (2020)
15536 View0.883Ranjan R.; Saini M.; Bhushan B.Conceptual Security Framework For Vulnerability Exploitation And Privacy Threats In Iot-Based Smart EnvironmentsLecture Notes in Networks and Systems, 1306 LNNS (2025)
47728 View0.882Otoum S.; Ridhawi I.A.; Mouftah H.Securing Critical Iot Infrastructures With Blockchain-Supported Federated LearningIEEE Internet of Things Journal, 9, 4 (2022)
35041 View0.882Moawad M.M.; Madbouly M.M.; Guirguis S.K.Leveraging Blockchain And Machine Learning To Improve Iot Security For Smart CitiesLecture Notes on Data Engineering and Communications Technologies, 164 (2023)
26947 View0.881Kiran B.V.; Shetty S.D.; Shetty V.V.; Shetty P.P.; ShivaKumar V.Fortifying Iot Networks: A Blockchain-Based Communication Security ParadigmProceedings - 2024 IEEE 16th International Conference on Communication Systems and Network Technologies, CICN 2024 (2024)
24139 View0.88Rehman A.; Abdullah S.; Fatima M.; Iqbal M.W.; Almarhabi K.A.; Ashraf M.U.; Ali S.Ensuring Security And Energy Efficiency Of Wireless Sensor Network By Using BlockchainApplied Sciences (Switzerland), 12, 21 (2022)