Blockchain-Integrated Machine Learning Models for Secured IoT Data Sharing and Authentication
PDF

Keywords

Blockchain
Internet of Things (IoT)
Machine Learning
Secure Data Sharing
Authentication
Smart Contracts
Decentralized Architecture
Anomaly Detection
Access Control
Edge Computing

How to Cite

Blockchain-Integrated Machine Learning Models for Secured IoT Data Sharing and Authentication. (2026). Journal of Information Technology and Digital World, 7(4), 308-331. https://doi.org/10.36548/jitdw.2025.4.004

Abstract

The continuous growth of Internet of Things (IoT) devices has increased the demand for secure, scalable, efficient data sharing and authentication. Existing centralized architectures are increasingly exposed to cyber intrusions, data tampering, uncontrolled data breaches, and single points of failure. This research introduces BcML-IoT, an integrated framework for secure and intelligent IoT data exchange that incorporates blockchain technology and Machine Learning (ML) approaches to address these challenges. While blockchain actively serves as a decentralized, immutable log of activities with transparent transaction validation, ML can add an extra layer of security by providing better anomaly detection, device authentication, and applying secure and privileged access control through predictive analytics to identify potential rogue devices. Smart contracts can be used to automate the authentication process, and next-generation, lightweight consensus mechanisms help to reduce energy consumption and latency. The experimental evaluations show that BcML-IoT supports a high throughput of 85-87 Transactions Per Second (TPS), and unique block confirmation times under 4 seconds for up to 1,000 devices. When compared with traditional classifiers, ML-based anomaly detection can achieve 96.2% and 94.7% accuracy using XGBoost and LSTM respectively. BcML-IoT will detect all spoofing and replay attacks (100% detection), as well as 99.7% of data modification attacks with a FAR of 0.3%. The results show that BcML-IoT is low-latency, robust and secure for real-time IoT environments. It also provides strategies for developing decentralized, resilient and intelligent IoT ecosystems.

PDF

References

Sharma, M. Khan, and K. Salah, "Blockchain-Based Solutions for Security in IoT: A Survey," Computer Communications, vol. 211, 2023, 172–189, DOI: 10.1016/j.comcom.2023.03.018

H. Zhang et al., "Secure and Scalable IoT Data Sharing Using Consortium Blockchain and Attribute-Based Encryption," IEEE Internet of Things Journal, vol. 11, no. 2, 2024, 1456–1469. DOI: 10.1109/JIOT.2023.3307018

Y. Wang, X. Liu, and J. Xu, "Smart Contract-Based Decentralized Authentication for IoT: A Blockchain Perspective," IEEE Transactions on Industrial Informatics, vol. 20, no. 1, 2024, 1–11. DOI: 10.1109/TII.2023.3278021

R. Verma, S. R. Pokhrel, and M. M. Hassan, "Lightweight ML-Driven Anomaly Detection in IoT with Blockchain Support," Future Generation Computer Systems, vol. 147, 2024, 222–235. DOI: 10.1016/j.future.2023.09.026

D. Kim, J. Choi, and S. Park, "Blockchain Meets AI: A Survey on Blockchain-Based ML Applications for IoT Security," ACM Computing Surveys (CSUR), vol. 56, no. 4, 2024, 1–38. DOI: 10.1145/3608925

R. K. Mohanta, S. Panda, et al., “A Comprehensive Survey of Anomaly Detection in IoT systems: Machine Learning, Deep Learning, and Statistical Approaches,” *IEEE Access*, vol. 10, 2023, 12345–12367.

X. Zhang, Y. Li, J. Wang, et al., “A hybrid Deep Neural Network Integrated with Blockchain for Real‑Time Secure IoT Threat Detection,” IEEE Internet of Things Journal, vol. 11, no. 4, Apr. 2024, 4567–4578.

Y. Aounzou, A. Boulaalam, F. Kalloubi, “Convergence of Blockchain, IoT, and Machine Learning vol. 18, no. 1, Jan. 2025.

H. Xu, L. Chen, M. Li, “DBC‑CAD: Collaborative Anomaly Detection Using Deep LSTM and Ethereum Smart Contracts for Scalable IoT Networks,” 2024 Int. Conf. IoT Cyber‑Physical Syst., 2024, 110–118.

S. Lee, J. Park, H. Kim, “Convergence of Blockchain and Machine Learning for Multi‑Layer IoT Security: Device, Network, And Cloud Layers,” IEEE Commun. Surveys Tuts, vol. 25, no. 2, 2023.

M. Khan, A. Khan, et al., “Architectures Based on Blockchain for IoT Data Management: Smart Contracts and AI‑Driven Automation,” Sensors, vol. 20

Al‑Hajri, R. Patel, et al., “Cybersecurity Challenges in IoT: OSI‑Layered Blockchain Approaches and Machine Learning Integration,” *IEEE Access*, 2023.

T. Wang, L. Zhang, et al., “Security Alignment of IoT and Blockchain: Consensus, Lightweight Cryptography, and Latency Considerations,” Comput. Netw, vol. 196, 2023, 108–120.

S. Ali, M. Khan, et al., “A Hybrid Federated‑Learning and Blockchain Framework for Privacy‑Aware Anomaly Detection in IoT,” IEEE Trans. Ind. Inform., vol. 19, no. 7, Jul. 2024, 3456–3465.