A Blockchain-Based Zero Trust Model for Privacy-Centric IoT Cybersecurity
DOI:
https://doi.org/10.63665/ngbyx646Keywords:
IoT Security, Blockchain, Zero Trust Architecture, Zero-Knowledge Proofs, Post-Quantum Cryptography, Quantum-Resilient Security, AES Encryption, Cybersecurity, Access Control, Privacy PreservationAbstract
The rapid expansion of Internet of Things (IoT) ecosystems has intensified the need for robust, scalable, and privacy-preserving security solutions. This research introduces a novel Unified Quantum-Resilient Blockchain– Zero Knowledge Proofs Privacy Authentication Framework (QBC-ZKPAF) aimed at enhancing security in decentralized IoT environments. The proposed framework integrates blockchain technology, Zero Trust Architecture (ZTA), and post-quantum cryptography to enable secure communication, fine-grained access control, and privacy-preserving authentication. It employs a hybrid Reinforcement-Lattice Blockchain Key Generation mechanism to produce quantum-resilient cryptographic keys, while a Deep Q-Network Multi-Factor
Secure Key (DQN-MFSK) model dynamically selects optimal keys based on system conditions. Furthermore, Zero-Knowledge Proofs (ZKPs) are utilized to validate identities without revealing sensitive information, ensuring strong privacy guarantees.
The architecture ensures confidentiality, integrity, auditability, and traceability of all operations within the IoT network. Leveraging the immutability of blockchain, all access requests, data transactions, and device interactions are recorded in a tamper-proof ledger, enabling transparent monitoring and reliable post-event analysis. In the event of suspicious activities or security breaches, the system supports precise source tracing
through a secure tracing key maintained within the audit server under the Zero Trust framework. Additionally, decentralized identity management combined with multi-factor authentication minimizes reliance on centralized
authorities and reduces vulnerability to single-point failures.
Downloads
References
[1] R. Marshal, K. Gobinath, and V. V. Rao, “Proactive measures to mitigate cybersecurity challenges in IoT-based smart healthcare networks,” in Proc. IEEE IEMTRONICS, 2021.
[2] A. K. Al Hwaitat et al., “A new blockchain-based authentication framework for secure IoT networks,” Electronics, vol. 12, no. 17, 2023.
[3] T. Muhammad et al., “Integrative cybersecurity: Merging zero trust and layered defense,” Int. J. Comput. Sci. Technol., 2022.
[4] V. Stafford, Zero Trust Architecture, NIST SP 800-207, 2020.
[5] D. Li et al., “A micro-segmentation method based on VLAN-VxLAN mapping technology,” Future Internet, 2024.
[6] W. Alnahari and M. T. Quasim, “Privacy concerns and attacks in IoT smart cities,” in Proc. ICOTEN, 2021.
[7] R. Saxena et al., “Bitcoin: A digital cryptocurrency,” Springer, 2021.
[8] M. A. Uddin et al., “Blockchain adoption in IoT: Challenges and solutions,” Blockchain Research and Applications, 2021.
[9] Z. Ruan, “Blockchain technology for security challenges in IoT,” in Proc. CSMIS, 2023.
[10] M. Luecking et al., “Decentralized identity and trust management for IoT,” in Proc. IEEE ICBC, 2020.
[11] A. Niraula, “Zero Trust Architecture for peerto-peer communication using blockchain,” 2021.
[12] T. H. Yuen et al., “DualRing: Efficient ring signatures,” in Proc. Cryptology Conf., 2021.
[13] G. Bian et al., “Privacy-preserving remote data integrity checking,” IEEE Access, 2022.
[14] C. Bast and K.-H. Yeh, “Emerging authentication technologies for zero trust IoT,” Symmetry, 2024.
[15] S. M. Awan et al., “Blockchain-based zero trust access control model for IoT,” Information, 2023.
[16] H. B. Mahajan and A. A. Junnarkar, “Lightweight ECC with blockchain for healthcare,” Multimedia Tools Appl., 2023.
[17] A. Jaramillo-Alcazar et al., “Blockchain and computer vision in smart cities,” Sustainability, 2023.
[18] P. C. Sharma et al., “Secure authentication using blockchain in IIoT,” Computers & Electrical Engineering, 2023.
[19] Y. Liu et al., “Blockchain-based zero trust IoT information sharing,” IEEE Transactions on Computers, 2023.
[20] P. Thantharate and A. Thantharate, “ZeroTrustBlock framework for secure data,” Big Data Cognit. Comput., 2023.
[21] L. Alevizos et al., “Blockchain-enabled intrusion detection in zero trust,” IEEE Access, 2022.
[22] C. Han et al., “Secure blockchain-based zero trust data storage in IoT,” J. Internet Technol., 2022.
[23] D. Li et al., “Blockchain-based zero trust in edge computing,” Math. Biosci. Eng., 2022.
[24] K. Gai et al., “Blockchain-based access control in zero trust systems,” ACM Trans. Internet Technol., 2023.
[25] U. B. Chaudhry et al., “Zero trust model for banking security,” IET Blockchain, 2023.
[26] P. Li et al., “Blockchain-based defense model for EV charging systems,” J. Netw. Comput. Appl., 2023.
[27] M. Miraz and M. Ali, “Integration of blockchain and IoT security,” 2020.
[28] O. Edo et al., “Zero trust architecture for health information systems,” Health Technol., 2024.
[29] A. Padma and M. Ramaiah, “Blockchain-based privacy framework for smart cities,” IEEE Access, 2024.
[30] A. Padma and M. Ramaiah, “Lightweight scalable blockchain for IoT,” Future Gener. Comput. Syst., 2024.
[31] P. Chinnasamy et al., “Secure data sharing using smart contracts,” Applied Sciences, 2023.
[32] P. Gangwani et al., “Secure IoT data using DAG-based blockchain,” Future Internet, 2021.
[33] W. Zhao et al., “Blockchain-based secure sensing data processing,” IEEE Access, 2023.
[34] I. U. Din et al., “Blockchain-enabled zero trust for metaverse security,” IEEE Access, 2024.
[35] A. A. Agarkar et al., “Decentralized identity management using blockchain,” Measurement: Sensors, 2024.
[36] A. Salam et al., “ZKP-based anomaly detection in smart manufacturing,” IEEE Access, 2024.
[37] J. Duan et al., “Concise RingCT protocol,” IEEE Trans. Dependable Secure Comput., 2024.
[38] W. Li et al., “Blockchain consensus optimization using DPoS,” Entropy, 2023.
[39] A. Aburbeian et al., “Secure financial transactions using MFA and ML,” AI Journal, 2024.
[40] B. Lei et al., “DQN-based blockchain storage optimization,” in Proc. WCNC, 2023.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Authors

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
