A Blockchain-Based Zero Trust Model for Privacy-Centric IoT Cybersecurity

Authors

  • Taha Ahmed B.E Students, Dept. of CSE ISL Engineering College, Hyderabad India. Author
  • Syed Faraz Ali B.E Students, Dept. of CSE ISL Engineering College, Hyderabad India. Author
  • Adnan Sabeel B.E Students, Dept. of CSE ISL Engineering College, Hyderabad India. Author
  • Dr. Pathan Ahmed Khan Associate Professor; Dept. of CSE ISL Engineering College, Hyderabad India. Author

DOI:

https://doi.org/10.63665/ngbyx646

Keywords:

IoT Security, Blockchain, Zero Trust Architecture, Zero-Knowledge Proofs, Post-Quantum Cryptography, Quantum-Resilient Security, AES Encryption, Cybersecurity, Access Control, Privacy Preservation

Abstract

The rapid expansion of Internet of Things (IoT) ecosystems has intensified the need for robust, scalable, and privacy-preserving security solutions. This research introduces a novel Unified Quantum-Resilient Blockchain– Zero Knowledge Proofs Privacy Authentication Framework (QBC-ZKPAF) aimed at enhancing security in decentralized IoT environments. The proposed framework integrates blockchain technology, Zero Trust Architecture (ZTA), and post-quantum cryptography to enable secure communication, fine-grained access control, and privacy-preserving authentication. It employs a hybrid Reinforcement-Lattice Blockchain Key Generation mechanism to produce quantum-resilient cryptographic keys, while a Deep Q-Network Multi-Factor

Secure Key (DQN-MFSK) model dynamically selects optimal keys based on system conditions. Furthermore, Zero-Knowledge Proofs (ZKPs) are utilized to validate identities without revealing sensitive information, ensuring strong privacy guarantees.

The architecture ensures confidentiality, integrity, auditability, and traceability of all operations within the IoT network. Leveraging the immutability of blockchain, all access requests, data transactions, and device interactions are recorded in a tamper-proof ledger, enabling transparent monitoring and reliable post-event analysis. In the event of suspicious activities or security breaches, the system supports precise source tracing

through a secure tracing key maintained within the audit server under the Zero Trust framework. Additionally, decentralized identity management combined with multi-factor authentication minimizes reliance on centralized

authorities and reduces vulnerability to single-point failures.

Downloads

Download data is not yet available.

References

[1] R. Marshal, K. Gobinath, and V. V. Rao, “Proactive measures to mitigate cybersecurity challenges in IoT-based smart healthcare networks,” in Proc. IEEE IEMTRONICS, 2021.

[2] A. K. Al Hwaitat et al., “A new blockchain-based authentication framework for secure IoT networks,” Electronics, vol. 12, no. 17, 2023.

[3] T. Muhammad et al., “Integrative cybersecurity: Merging zero trust and layered defense,” Int. J. Comput. Sci. Technol., 2022.

[4] V. Stafford, Zero Trust Architecture, NIST SP 800-207, 2020.

[5] D. Li et al., “A micro-segmentation method based on VLAN-VxLAN mapping technology,” Future Internet, 2024.

[6] W. Alnahari and M. T. Quasim, “Privacy concerns and attacks in IoT smart cities,” in Proc. ICOTEN, 2021.

[7] R. Saxena et al., “Bitcoin: A digital cryptocurrency,” Springer, 2021.

[8] M. A. Uddin et al., “Blockchain adoption in IoT: Challenges and solutions,” Blockchain Research and Applications, 2021.

[9] Z. Ruan, “Blockchain technology for security challenges in IoT,” in Proc. CSMIS, 2023.

[10] M. Luecking et al., “Decentralized identity and trust management for IoT,” in Proc. IEEE ICBC, 2020.

[11] A. Niraula, “Zero Trust Architecture for peerto-peer communication using blockchain,” 2021.

[12] T. H. Yuen et al., “DualRing: Efficient ring signatures,” in Proc. Cryptology Conf., 2021.

[13] G. Bian et al., “Privacy-preserving remote data integrity checking,” IEEE Access, 2022.

[14] C. Bast and K.-H. Yeh, “Emerging authentication technologies for zero trust IoT,” Symmetry, 2024.

[15] S. M. Awan et al., “Blockchain-based zero trust access control model for IoT,” Information, 2023.

[16] H. B. Mahajan and A. A. Junnarkar, “Lightweight ECC with blockchain for healthcare,” Multimedia Tools Appl., 2023.

[17] A. Jaramillo-Alcazar et al., “Blockchain and computer vision in smart cities,” Sustainability, 2023.

[18] P. C. Sharma et al., “Secure authentication using blockchain in IIoT,” Computers & Electrical Engineering, 2023.

[19] Y. Liu et al., “Blockchain-based zero trust IoT information sharing,” IEEE Transactions on Computers, 2023.

[20] P. Thantharate and A. Thantharate, “ZeroTrustBlock framework for secure data,” Big Data Cognit. Comput., 2023.

[21] L. Alevizos et al., “Blockchain-enabled intrusion detection in zero trust,” IEEE Access, 2022.

[22] C. Han et al., “Secure blockchain-based zero trust data storage in IoT,” J. Internet Technol., 2022.

[23] D. Li et al., “Blockchain-based zero trust in edge computing,” Math. Biosci. Eng., 2022.

[24] K. Gai et al., “Blockchain-based access control in zero trust systems,” ACM Trans. Internet Technol., 2023.

[25] U. B. Chaudhry et al., “Zero trust model for banking security,” IET Blockchain, 2023.

[26] P. Li et al., “Blockchain-based defense model for EV charging systems,” J. Netw. Comput. Appl., 2023.

[27] M. Miraz and M. Ali, “Integration of blockchain and IoT security,” 2020.

[28] O. Edo et al., “Zero trust architecture for health information systems,” Health Technol., 2024.

[29] A. Padma and M. Ramaiah, “Blockchain-based privacy framework for smart cities,” IEEE Access, 2024.

[30] A. Padma and M. Ramaiah, “Lightweight scalable blockchain for IoT,” Future Gener. Comput. Syst., 2024.

[31] P. Chinnasamy et al., “Secure data sharing using smart contracts,” Applied Sciences, 2023.

[32] P. Gangwani et al., “Secure IoT data using DAG-based blockchain,” Future Internet, 2021.

[33] W. Zhao et al., “Blockchain-based secure sensing data processing,” IEEE Access, 2023.

[34] I. U. Din et al., “Blockchain-enabled zero trust for metaverse security,” IEEE Access, 2024.

[35] A. A. Agarkar et al., “Decentralized identity management using blockchain,” Measurement: Sensors, 2024.

[36] A. Salam et al., “ZKP-based anomaly detection in smart manufacturing,” IEEE Access, 2024.

[37] J. Duan et al., “Concise RingCT protocol,” IEEE Trans. Dependable Secure Comput., 2024.

[38] W. Li et al., “Blockchain consensus optimization using DPoS,” Entropy, 2023.

[39] A. Aburbeian et al., “Secure financial transactions using MFA and ML,” AI Journal, 2024.

[40] B. Lei et al., “DQN-based blockchain storage optimization,” in Proc. WCNC, 2023.

Downloads

Published

2026-04-26

How to Cite

A Blockchain-Based Zero Trust Model for Privacy-Centric IoT Cybersecurity. (2026). International Journal of Multidisciplinary Engineering In Current Research, 11(4s), 58-65. https://doi.org/10.63665/ngbyx646