Electronics 12 03618 v4
Electronics 12 03618 v4
Article
A New Blockchain-Based Authentication Framework for Secure
IoT Networks
Ahmad K. Al Hwaitat 1 , Mohammed Amin Almaiah 1,2, * , Aitizaz Ali 3 , Shaha Al-Otaibi 4, *, Rima Shishakly 5 ,
Abdalwali Lutfi 6,7 and Mahmaod Alrawad 6
1 King Abdullah the II IT School, Department of Computer Science, The University of Jordan,
Amman 11942, Jordan
2 Fellowship Researcher, INTI International University, Nilai 71800, Malaysia
3 School of IT, UNITAR International University, Petaling Jaya 47301, Malaysia; [email protected]
4 Department of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint
Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
5 Management Department, College of Business Administration, Ajman University,
Ajman 346, United Arab Emirates; [email protected]
6 College of Business Administration, King Faisal University, Al-Ahsa 31982, Saudi Arabia;
[email protected] (A.L.)
7 Applied Science Research Center, Applied Science Private University, Amman 11931, Jordan
* Correspondence: [email protected] (M.A.A.); [email protected] (S.A.-O.)
Abstract: Most current research on decentralized IoT applications focuses on a specific vulnerability.
However, for IoT applications, only a limited number of techniques are dedicated to handling
privacy and trust concerns. To address that, blockchain-based solutions that improve the quality
of IoT networks are becoming increasingly used. In the context of IoT security, a blockchain-based
authentication framework could be used to store and verify the identities of devices in a decentralized
manner, allowing them to communicate with each other and with external systems in a secure and
trust-less manner. The main issues in the existing blockchain-based IoT system are the complexity and
storage overhead. To solve these research issues, we have proposed a unique approach for a massive
IoT system based on a permissions-based blockchain that provides data storage optimization and a
Citation: Al Hwaitat, A.K.; Almaiah,
M.A.; Ali, A.; Al-Otaibi, S.; Shishakly,
lightweight authentication mechanism to the users. The proposed method can provide a solution to
R.; Lutfi, A.; Alrawad, M. A New most of the applications which rely on blockchain technology, especially in assisting with scalability
Blockchain-Based Authentication and optimized storage. Additionally, for the first time, we have integrated homomorphic encryption
Framework for Secure IoT Networks. to encrypt the IoT data at the user’s end and upload it to the cloud. The proposed method is compared
Electronics 2023, 12, 3618. https:// with other benchmark frameworks based on extensive simulation results. Our research contributes
doi.org/10.3390/electronics12173618 by designing a novel IoT approach based on a trust-aware security approach that increases security
Academic Editors: Satyabrata Aich,
and privacy while connecting outstanding IoT services.
Kamalakanta Muduli and
Sushanta Tripathy Keywords: security; privacy; blockchain; smart contracts; IoT; encryption; transaction
of the IoT, the wireless sensor network (WSN) gathers and transmits physical data using
various heterogeneous models [5].
Data security is a major concern of IoT systems because they are built by connecting
many IoT devices [6]. Data generated by these devices are stored in the cloud and transmit-
ted across various networks. A cyber-attack on a smart healthcare system can substantially
impact the system’s ability to produce and supply electricity. In addition to financial and
other types of damage, cyber-attacks on smart healthcare can cause operational failures,
power outages, the theft of critical data, and complete security breaches [7]. Cyber experts
face difficulties keeping tabs on everything that passes via a smart grid and recognizing
potential threats and attacks. Even though machine learning has become an essential part
of cybersecurity, the problem is that this field requires distinct approaches and theoretical
viewpoints to handle the enormous volume of data generated and transported across
numerous networks in a smart grid [8]. The attacks and threats that could be launched
against this proof-of-concept environment are being determined using threat modeling.
Several potential threats have been tested, including detection, tampering, repudiation,
information leakage, denial of service (DoS), and extended privilege (EoP). Each of the risks
and the security elements associated with them are addressed using STRIDE. STRIDE is a
typical threat modeling technique for finding and classifying attack vectors [9]. Using the
well-known industrial framework MITRE ATTCK, researchers can detect threats disguised
as tactics, techniques, and procedures (TTP) [10].
Based on the above, blockchain technology could be one of the main solutions for
IoT security issues [11]. A blockchain provides a decentralized system using a consensus
mechanism and smart contracts [12]. Smart contracts are the protocols that trigger the
blockchain to act according to a particular activity or situation [13]. Blockchains can be
categorized into three classes: private, public, and hybrid public blockchain technology. The
main feature of a blockchain is to provide security and only keep records and transactions
within a single organization. A public blockchain provides access to the public using a
public API. Moreover, such a model interacts with external networks such as gateway
networks or cloud outsourcing. A hybrid blockchain is also called a consortium blockchain,
which provides features of both a private and public blockchain. This research used a hybrid
blockchain to interact with an IoT system. The proposed model receives data from IoT
sensors, verifies them, and encrypts them using homomorphic encryption. Homomorphic
encryption is introduced in this approach for the first time. The primary function of
homomorphic encryption is to encrypt a user’s data at the user layer and outsource them
to the cloud. This approach provides the facility to perform any statistical and machine
learning operation on encrypted data. This IoT-based network consists of thousands of
tiny sensors attached to the human body to remotely detect conditions such as heart rate,
blood pressure, temperature, and sugar level. The data collected from these thousand
sensors are massive data that need training, testing, validation, and an authentication
system. IoT management systems exist, but there are also security issues due to inefficient
authentication, which is discussed more in the literature. The proposed model trains the
IoT-based healthcare data using a hybrid deep learning approach and predicts the patient’s
condition without needing a clinician or physician. The proposed framework provides
privacy preservation, security, and lightweight authentication.
The research presents the following contributions: (1) the design of a novel IoT ap-
proach based on a trust-aware security approach increases security and privacy while
connecting outstanding IoT services; (2) the sensing units generate industrial data across a
dedicated network to concentrate the application service structure; (3) the network architec-
ture connects to a variety of trustworthy IoT devices to meet 6G-enabled IoT requirements,
and the proposed algorithms are enhanced with individual data such as biometric, video,
and speech data.
The paper is organized as follows: Section 2 explains the background of the proposed
research and the preliminary work. Contributions to this research are explained in Section 3.
The proposed methodology is explained in Section 4. The experimental setup and simula-
Electronics 2023, 12, 3618 3 of 25
tion results are discussed in Section 5. The conclusion and future directions are given in
Section 6.
a result, the market will increase rapidly in the future. Consistently protecting user privacy,
blockchain-based trust might be used to provide seamless authentication (TAB-SAPP).
Smart design architecture is presented for spreading device connectivity over physical
networks. Zigbee, Z-Wave, and Bluetooth Low Energy (BLE) are the most widely used
industrial automation standards. The blockchain’s peer-to-peer nature allows IoT devices
to connect to each other. Decentralized IoT devices and consensus methods generate and
store data in encrypted chain-like blocks, while smart contracts modify data and control
the system [38]. Blockchain-enabled IoT relies on a secure security paradigm (also known
as IoT-EBT). This is possible because smart contracts retain and limit computing resources
associated with a device’s identification [39].
Different applications demand different levels of security, and resource scarcity plays a
factor. Finding the best encryption technique for IoT medical data protection is essential [40–43].
Electronic sensors capture medical data from patients and safely transmit them to the
healthcare system. To avoid unwanted access or needless interruptions, trust and data
privacy must be ensured from the start sensors [44–46].
Thus, data encryption from the start sensors is required, but due to restrictions in
CPU complexity, battery consumption, and transmission bandwidth, using standard crypto
algorithms is impractical [47–50]. Research on realistic, lightweight encryption techniques
for IoT medical systems is ongoing. This study compares eight cryptographic algorithms
in terms of memory usage and speed. The study determines the best candidate algo-
rithm for the proposed health care system, balancing the ideal requirement and future
dangers [51–54]. Both parties must be authenticated to use these services safely [55–58].
The server should require authentication to protect records from unauthorized users and
ensure patient privacy (client side). Patient authentication is required to prevent server im-
personation [59–62]. This proof of concept addresses emergency situations where a patient
arrives unconscious at the hospital and needs to access information without providing an
authorization key. This issue requires safe biometric identification technologies such as
palm vein and iris [63–66]. In addition to providing high levels of security, usability, and
dependability, biometric technology authentication has grown in popularity [67–72]. For ex-
ample, the finger vein (FV) biometric is highly secure. Most modern authentication systems
save biometric patterns in a database. Authentication extracts this data as biological bio-
metrics. Secure biometric authentication with FV will be more resistant to security breaches
and impersonation attempts. The human FV is a physiological biometric used to identify
people by their blood veins’ morphological characteristics. Individuals and offenders (in
legal situations) are identified using this new technology, which is more accurate than other
biometric systems. In order to secure FV biometrics, many researchers have used uni- or
multi-biometrics, which include FV biometrics as part of the verification system. These
approaches are applied in two steps as follows: To protect FV patterns, researchers are
trying to extract trustworthy properties from FVs, which can be used to uniquely identify
individuals. These exclusive properties from the FV junction sites and the angles between
veins are used to build a unique key (biokey). This key is used to encrypt data patterns. The
observation matrix extracts patterns and features, which are then encrypted with a random
key [73]. Some researchers employed multi-biometrics to add to existing features. These
traits have been used to identify people (FV, retina, and fingerprint). The main issues with
the system the author devised in [74–76] were communication cost and computational cost.
Figure
Figure2.2.IoT
IoTusing
usingblockchain
blockchainsmart
smartcontracts.
contracts.
3.3.Methodology
Methodology
Theproposed
The proposedmethodology
methodologyconsists
consistsof ofthe
thesteps
stepsthat
that have
have been
been carried
carried out
out during
during
theexperiments
the experimentsininorder ordertoto obtain
obtain thethe system
system output.
output. TheThe subsections
subsections belowbelow represent
represent the
the steps involved in the proposed methodology, and how the
steps involved in the proposed methodology, and how the system works is explained system works is explained
through aa schematic
through schematic diagram
diagram as asshown
shownbelow.below.InInstepstep1,1,the
theIoT data
IoT dataareare
collected
collected from
fromthe
sensors and sent to the cluster head. In step 2, the data transaction through
the sensors and sent to the cluster head. In step 2, the data transaction through the block- the blockchain
takes takes
chain place.place.
Data Data
are verified and authenticated
are verified and authenticated from from
IoT edge devices
IoT edge which
devices are inare
which large
in
quantity.
large In theInnext
quantity. the step, data data
next step, are encrypted
are encryptedusingusing
homomorphic
homomorphic encryption
encryptionand then
and
outsourced
then outsourcedto thetocloud. The integration
the cloud. The integrationof homomorphic
of homomorphic encryption provides
encryption the facility
provides the
that any kind of statistical and deep learning operation can be
facility that any kind of statistical and deep learning operation can be performed performed over encrypted
over
data. Feature
encrypted data.extraction is the next
Feature extraction is step in our
the next proposed
step framework,
in our proposed in whichinfeatures
framework, which
are extracted from the data such as heart rate, age, sex, weight,
features are extracted from the data such as heart rate, age, sex, weight, and height.and height. Moreover, More-the
proposed framework uses SVM to classify the users and the data
over, the proposed framework uses SVM to classify the users and the data based on the based on the features and
interaction
features andwith the system
interaction with that took place.
the system Finally,
that took theFinally,
place. outputthe is verified
output isand validated
verified and
through a validation model.
validated through a validation model.
3.1. Proposed Algorithms
3.1. Proposed Algorithms
In order to implement the proposed framework, we have proposed a novel algorithm
In order to implement the proposed framework, we have proposed a novel algorithm
in order to govern the proposed framework. The function of this algorithm is explained
in
inorder
detailtostep
govern the as
by step proposed
follows:framework.
Algorithm The function
1 defines theof this algorithm
working is explained
of updates, creating
and revoking the policy. Moreover, the algorithm first creates the PHR on the request of
a user, then it updates the existing PHR, and at the end, it revokes the PHR if the user
Electronics 2023, 12, 3618 7 of 25
violates the access control policy. Algorithm 1 defines the attribute assigned to the patients
and clinicians.
Algorithm 2 checks the attributes by assigning the master key, signature count, and
bi-linear pair group. The user selects a random value from a group of bilinear pairs, such
as G1 and G2. Furthermore, Algorithm 2 is used to define the method evaluation of the
proposed model and the attribute associated with it. It evaluates the parameters and
attributes designed to authenticate the user request to the system. The algorithm describes
the design and use of homomorphic encryption. We have used homomorphic encryption
within our proposed model. The main benefit of the proposed homomorphic encryption is
to perform any operation over encrypted data without decryption.
Algorithm 3 defines the algorithm’s working, which explains the working of cluster
head selection. Based on the battery power, the proposed algorithm selects the cluster head
from one of the sensors and receives the IoT data from the other nodes.
Algorithm 4 presents the step-by-step working of the algorithm used to encrypt EMR
with homomorphic encryption (HE). Homomorphic encryption allows users or AI models
to perform complex statistical or mathematical operations without decryption, as it can
be achieved on plain text. HE allows the users to encrypt data at their side and outsource
to the cloud, which leads to security and privacy preservation. Moreover, there are three
types of homomorphic encryption: fully HE, partially HE, and hybrid HE. In this research,
Electronics 2023, 12, 3618 8 of 25
we used fully homomorphic encryption due to the proposed approach requirements and
integration with the IoMT devices that are more in number.
thousands and millions of tiny sensors, edge devices, computers, Wi-Fi, and RFID, and all
these devices generate data. Data received from these devices are so massive that security
breaches and data mismanagement can easily happen. A multi-signature-compatible
contract examines all aspects of a transaction, from quality control to mechanical technique
to decision-making. To make independent decisions, the intelligent model makes use of
traffic patterns. An IoT device’s fundamental operational operations are analyzed by a
smart contract to maximize overall system efficiency.
Table 1 shows how scientists use the TAB-SAPP notation. Figure 3 represent the
application of cloud computing in various organizations. Cloud provides on-demand
resource allocation anywhere, anytime, and any place. Moreover, three types of the cloud
exist depending on the application of the cloud and usage, such as private, public and
hybrid cloud [30,31].
Parameters Details
Dataset size 100 number of blocks + PHR
Hardware Software Parameters GPU-enabled system Ethereum, hyperledger fabric
Block height, number of blocks, No. transactions, No. PHR,
Performance Metric
delay, signature creation
Efficiency (average percentage of Gas, no. packets, no. dead
nodes, no. alive nodes), security (the execution time of policies)
Number of simulations Number of rounds or transactions
and cost (execution time of blocks),
Number of tests performed on single dataset: 5000
no. dead nodes, no. alive nodes), security (the exe-
Number of simulations Number
cution time of policies) and cost (execution time of
of rounds or transactions
blocks),
Number of tests performed on single dataset: 5000
Electronics 2023, 12, 3618 10 of 25
Figure3.3. Application
Figure Application of
ofcloud
cloudcomputing.
computing.
Communication
Communication components
components include
include thethe following:
following: An An external
external owner
owner account
account cancan
access
access a billfold
billfold contract.
contract.AA reliable
reliable transaction
transaction cancan address
address the the different
different IoT devices
IoT devices scat-
scattered by automation.
tered by automation. Automation
Automation and control
and control experts
experts are needed
are needed to distribute
to distribute and
and man-
manage
age largelarge
IoT IoT devices.
devices.
Figure
Figure44 presents
presentsaaschematic
schematicof ofthe
theproposed
proposedsmartsmartcontracts
contractsforforauthentication
authenticationand and
governing
governing the proposed framework. We have developed two
proposed framework. We have developed two types of smart types of smart contracts,
contracts, i.e.,
i.e.,
oneone we call
we call a local
a local smart
smart contract,
contract, andand the second
the second one one a global
a global smartsmart contract.
contract. More-
Moreover,
over, the local
the local smartsmart contract’s
contract’s main main function
function is to govern
is to govern thedomain,
the local local domain, i.e., the
i.e., inside inside
or-
the organization.
ganization. A global
A global smart contract
smart contract is usedistoused
governto govern the interaction
the global global interaction
with thewith
sys-
Electronics 2023, 12, 3618 the 11 of 25
tem,system,
which which
means means the proposed
the proposed approach approach
supports supports scalability
scalability and cross-domain
and cross-domain applica-
applications
tions [31]. [31].
Figure4.4.Schematic
Figure Schematicrepresentation
representationofofthe
theproposed
proposedsmart
smartcontracts
contractsintegration
integrationwith
withthe
thecloud.
cloud.
Consumersregularly
Consumers regularlyuseuseIoT
IoTdevices
devicestotoperform
performtransactions
transactionsfrom
fromone
onelocation
locationtoto
another location using IoT networks. Sending a Web3API transaction requires
another location using IoT networks. Sending a Web3API transaction requires a contracting a contract-
state. Using a billfold contract, clients may securely access industrial assets andand
ing state. Using a billfold contract, clients may securely access industrial assets regis-
register
ter large
large IoT devices.
IoT devices. Moreover,
Moreover, the control
the control contract
contract allows
allows the public
the public to inspect
to inspect and ap-
and approve
prove
the the IoT worth
IoT device’s device’s worth
[35]. In the[35]. In theTAB-SAPP,
proposed proposed TAB-SAPP, smart
smart contracts contracts
handle handle
whitelisting,
whitelisting, IoT registration, IoT payment, key computation, and device operation. Con-
sumer signature uses a 256-bit Keccak hash to cope with the external account (ECDSA).
The control contract’s private key connects the user, IoT device, and control contract. Here
are the steps: In the first phase, an external owner account creates a whitelist. The control
contract charges a fee to indicate consumer device access. Anyone who wants to verify a
Electronics 2023, 12, 3618 11 of 25
IoT registration, IoT payment, key computation, and device operation. Consumer signature
uses a 256-bit Keccak hash to cope with the external account (ECDSA). The control contract’s
private key connects the user, IoT device, and control contract. Here are the steps: In the
first phase, an external owner account creates a whitelist. The control contract charges
a fee to indicate consumer device access. Anyone who wants to verify a transaction on
the blockchain pays a charge. Step two involves the client and IoT device being linked to
the external owner account, which facilitates the consideration of consumer needs when
fulfilling contractual responsibilities [32]. After successful registration, the IoT gadget
pays fees. TAB-SAPP smart contracts handle whitelisting, registration, payment, and key
computation. Encrypted elliptic curve signatures with Keccak hash (ECDSA). The control
contract’s private key addresses the consumer, IoT device, and control contract. Here are
the steps: The contract organization maintains and updates the whitelist using an external
owner account. The consumer device control contract specifies the fee request. Using
multi-signature to verify a data transaction incurs costs to each party [36]. Customers and
devices must be linked to an external owner account to complete IoT registration. The
contract organization can accommodate client requests. The IoT gadget then handles the
fee payment [37].
where a, b, x, and y belong to q, and if a point P(x, y) satisfies Equation (1), then the point
P(x, y) is a point on an elliptic curve, and the point Q(x, y) is the negative point of P(x, y),
i.e., P = Q. Let points P(x1, y1) and Q(x2, y2) be points on the elliptic curves Eq (a, b) and
P*6 =Q; thus, the line ‘l’ passes through the points P and Q, and intersects the elliptic curve
at the point R0 = (x3, y), the points of R0 symmetrical about the x-axis are R = (x3, y3) and
R = P+Q. The points on the elliptic curve Eq (a, b) and the infinite point 0 together form an
additive cyclic group of prime order q as follows:
h = H2(m||r), (8)
Di t = ∑ ui if (11)
Yi = di ∗ G + ci ∗ p ki (12)
Ki = di ∗ G + ci ∗ p ki (18)
Zi = ui ∗ G + vi ∗ G, (20)
Ci = H1 (h, Y1, Y2, . . ., Ys, . . ., Yn, δ1, δ2, . . ., δs, . . ., δn) (24)
Ci = H1 (h, L1, L2, . . ., Ls, . . ., Ln, R1, R2, . . ., Rs, . . ., Rn) (25)
n
Cs= ∑ Ci (26)
i =0
Cs = ∑ Ci (26)
Equations (14)–(27) represent the homomorphic encryption of the proposed ap-
Electronics 2023, 12, 3618 proach. H1 represents the homomorphic encryption function that converts the plain 13 oftext
25
into cipher text. Cs represent the cipher text. Homomorphic encryption provides the fa-
cility to encrypt the data, outsource it to the cloud, and perform any statistical operations
over
the encrypted
data, outsource data.
it toThis
the leads
cloud,toand
more privacy
perform anyand security.
statistical In Figureover
operations 5, we have ex-
encrypted
plained
data. Thisthe process
leads of access
to more control
privacy and as well asIn
security. encryption
Figure 5, wefrom endexplained
have to end in the
thenetwork.
process
The
of proposed
access controlframework
as well asuses homomorphic
encryption from end encryption
to end inover IoT data inThe
the network. order to out-
proposed
source to the
framework usescloud. Using homomorphic
homomorphic encryption overencryption
IoT dataprovides
in order totheoutsource
capabilitytoto perform
the cloud.
any kind
Using of operationencryption
homomorphic over encrypted
providesdata.
theMoreover,
capabilitythe access control
to perform checks
any kind the user’s
of operation
attributes
over such as
encrypted userMoreover,
data. name, id, age, gender,
the access location,
control and the
checks height in order
user’s to provide
attributes such as ac-
user
cess name, id, age,
to the EHR gender,
or EMR. location, ifand
Moreover, theheight in ordersimilar
user acquires to provide accessthen
attributes, to the EHRis
access
or EMR. Moreover,
granted through smartif thecontracts;
user acquires similaraccess
otherwise, attributes, then access
is denied. Figure is 6 granted
presentsthrough
the flow
smart
of datacontracts;
throughotherwise,
the proposed access is denied.
network. Figure
Figure 6 presents
7 presents thethe flow ofexecution
timeline data through the
through
proposed
proposednetwork.
framework. Figure 7 presents the timeline execution through proposed framework.
Figure5.5.Schematic
Figure Schematicrepresentation
representation of the
of the proposed
proposed access
access control
control and outsourcing
and outsourcing through
through block-
blockchain.
chain.
Figure
Figure 6. 6. Data
Data flow
flow through
through proposed
proposed network.
network.
Figure7.7.Timeline
Figure Timelineexecution
executionthrough
throughproposed
proposedframework.
framework.
3.4.3. Decryption
The recipient decrypts the message using both public and private keys. A user with the
appropriate attributes can decrypt the cipher text. In the proposed framework, authorized
users exchange keys via CA. The decryption time complexity equation is as follows, where
K is the number of certificate authorities, n is the message size, and C is the ciphertext.
3.5. Latency
In order to find the total latency of the proposed network it is required to first count
latency between node and then calculate the latency of the network. The mathematical
model to calculate the total network latency [39] are calculated as follows:
Dk,j Dk,j + hk
Tc = + T co k,j + + k,j D · krBC,k (34)
r PB,k r PB,k
4. Experimental Setup
In order to carry out the experiment, we use a hyperledger fabric tool for blockchain
and IoT nodes. During the experiments, the parameters that we recorded and used were
the number of nodes, number of rounds, block creation, block digest, encryption time, and
access control time. During the simulation results, the system used was core i7 GPU-based
and Linux-enabled. Furthermore, for security verification of the proposed model, we used
AVISPA [37] and METRE [38] framework in order to verify that the proposed model resist
collusion attack and phishing attack.
Figure 9 illustrates the simulation results based on the classification of the users using
the SVM method. The classification of the users is based on the activities of the users
within the system. We used an LSTM deep learning approach to record the previous ac-
tivities of the users interacting with the system. The proposed approach creates a log of
each user’s behavior and provides access rights as well as authorization based on the
user’s behavior.
Figure
Figure9.9.Classification
Classification of
of users based on
users based onthe
thebehavior
behaviorand
andinteraction
interaction with
with thethe system
system model.
model.
Figure 10 presents the simulation results based on the displacement of moving sen-
sors connected with the IoT system and the output of the sensor.
Figure 9. Classification of users based on the behavior and interaction with the system model.
3, 12, 3618 18 of 25
technology, coupled with the real-time data capabilities of mobility speed, this will thus
ensure that the proposed system is a more secure, efficient, and reliable authentication
system. The findings relating to this proposed method offer valuable insights for organi-
zations seeking to optimize their authentication processes in the era of dynamic mobility
and digital transformation. The conducted comparative analysis is based on the number
of nodes and encryption time with the benchmark models. The proposed framework is
compared
Figure with the benchmark
10. Simulations results based models which of
on the number are mentioned
sensors outputon Figure 11.
nodes.
Figure 10. Simulations results based on the number of sensors output nodes.
Based on the findings in Figure 11, which indicates that the proposed method has
enhanced the authentication process through integrating blockchain technology with mo-
bility speed. Through leveraging the immutable and decentralized nature of blockchain
Figure 12 showsFigure
simulation results
12 shows based results
simulation on the based
latencyon of
theeach node.
latency Moreover,
of each it
node. Moreover, it
can be observed that the proposed framework exhibits low latency
can be observed that the proposed framework exhibits low latency as compared to the as compared to the
benchmark
benchmark models. models.
Therefore, Therefore, the
the proposed proposed
model model
exhibits exhibitsand
efficiency efficiency and robustness.
robustness.
Figure 11. Comparative analysis of the proposed framework versus benchmark model based on the
speed and number of nodes.
Figure 12 shows simulation results based on the latency of each node. Moreover, it
can
Electronics 2023, 12, be
observed that the proposed framework exhibits low latency as compared to the
3618 18 of 25
benchmark models. Therefore, the proposed model exhibits efficiency and robustness.
Figure 12. Comparative analysis with the proposed framework versus benchmark model based on
ofComparative
Figure 12.
the latency and number nodes. analysis with the proposed framework versus benchmark model based on
the latency and number of nodes.
In Figure 13, the simulation results represent the comparative analysis of the pro-
In Figure 13, the simulation results represent the comparative analysis of the proposed
posed framework versus benchmark
framework models.
versus benchmark The comparisons
models. are based
The comparisons on theonnumber
are based the number of
of transactionstransactions
and d2d distance. Moreover, for the same distance between
and d2d distance. Moreover, for the same distance betweenpeer peer
nodes,
nodes, the
the number of number
transactions varies. varies.
of transactions
Moreover, Figure 14 provides the comparative analysis based on the network delay.
It can be observed that the network delay for the proposed approach is less as compared
to the benchmark approaches.
Electronics 2023, 12, 3618 19 of 25
Figure 13. Comparative analysis based on number of nodes versus encryption time.
Moreover, Figure
Moreover, Figure1414provides
providesthe
thecomparative
comparativeanalysis
analysisbased
basedononthe
thenetwork
network delay.
delay. It
It can be observed that the network delay for the proposed approach is less as compared
can be observed that the network delay for the proposed approach is less as compared to
to the
the benchmark
benchmark approaches.
approaches.
Figure 14. Comparative analysis based on average network delay versus computing time.
Figure 15. Comparative analysis based on D2D distance versus number of transactions.
Figure 15. Comparative analysis based on D2D distance versus number of transactions.
Finally, Figure 16 presents the simulation results of the proposed approach, which
shows the evaluation based on the number of attributes and the complexity.
Electronics 2023, 12, 3618 20 of 25
Figure 15. Comparative analysis based on D2D distance versus number of transactions.
Finally, Figure
Finally, Figure 16
16 presents
presents the
the simulation
simulation results
results of
of the
the proposed
proposed approach,
approach, which
which
shows the evaluation based on the number of attributes and the complexity.
shows the evaluation based on the number of attributes and the complexity.
The simulation results are based on the number of attributes (X-axis) and execution
time (Y-axis). Moreover, it can be observed that using lightweight HE, the proposed ap-
proach performs better than the benchmark models in terms of execution for the same
number of attributes. In order to evaluate the attack resistance of the proposed framework
with the benchmark models, we carried out the comparison shown in Table 2.
Electronics 2023, 12, 3618 21 of 25
The simulation results are based on the number of attributes (X-axis) and execution
time (Y-axis). Moreover, it can be observed that using lightweight HE, the proposed
approach performs better than the benchmark models in terms of execution for the same
number of attributes. In order to evaluate the attack resistance of the proposed framework
with the benchmark models, we carried out the comparison shown in Table 2.
Author Contributions: Conceptualization, M.A.A.; Methodology, A.K.A.H., S.A.-O., R.S. and A.L.;
Software, M.A.A. and M.A.; Validation, A.A.; Formal analysis, A.K.A.H., A.L. and M.A.; Investigation,
S.A.-O.; Resources, M.A.A. and R.S.; Data curation, A.K.A.H., S.A.-O., A.L. and M.A.; Writing—original
draft, A.A.; Writing—review & editing, R.S. All authors have read and agreed to the published
version of the manuscript.
Funding: This work was supported through the Annual Funding track by the Deanship of Scientific
Research, Vice Presidency for Graduate Studies and Scientific Research, King Faisal University, Saudi
Arabia (Project No. Grant No. 3898) and Princess Nourah bint Abdulrahman University Researchers
Supporting Project number (PNURSP2023R136), Princess Nourah bint Abdulrahman University,
Riyadh, Saudi Arabia.
Electronics 2023, 12, 3618 22 of 25
References
1. Siam, A.I.; Almaiah, M.A.; Al-Zahrani, A.; Elazm, A.A.; El Banby, G.M.; El-Shafai, W.; El-Samie, F.E.A.; El-Bahnasawy, N.A.
Secure Health Monitoring Communication Systems Based on IoT and Cloud Computing for Medical Emergency Applications.
Comput. Intell. Neurosci. 2021, 2021, 8016525. [CrossRef]
2. Ali, A.; Pasha, M.F.; Fang, O.H.; Khan, R.; Almaiah, M.A.; KAl Hwaitat, A. Big data based smart blockchain for information
retrieval in privacy-preserving healthcare system. In Big Data Intelligence for Smart Applications; Springer International Publishing:
Cham, Switzerland, 2022; pp. 279–296.
3. Altulaihan, E.; Almaiah, M.A.; Aljughaiman, A. Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT:
Future Research Directions. Electronics 2022, 11, 3330.
4. Hasnain, M.; Pasha, M.F.; Ghani, I.; Mehboob, B.; Imran, M.; Ali, A. Benchmark Dataset Selection of Web Services Technologies: A
Factor Analysis; IEEE Access: Piscataway, NJ, USA, 2020; Volume 8, pp. 53649–53665.
5. Ali, A.; Rahim, H.A.; Pasha, M.F.; Dowsley, R.; Masud, M.; Ali, J.; Baz, M. Security, Privacy, and Reliability in Digital Healthcare
Systems Using Blockchain. Electronics 2021, 10, 2034.
6. Almaiah, M.A.; Hajjej, F.; Ali, A.; Pasha, M.F.; Almomani, O. An AI-Enabled Hybrid Lightweight Authentication Model for
Digital Healthcare Using Industrial Internet of Things Cyber-Physical Systems. Sensors 2022, 22, 1448. [PubMed]
7. Yazdinejad, A.; Dehghantanha, A.; Parizi, R.M.; Srivastava, G.; Karimipour, H. Secure Intelligent Fuzzy Blockchain Framework:
Effective Threat Detection in IoT Networks. Comput. Ind. 2023, 144, 103801. [CrossRef]
8. Hameed, K.; Ali, A.; Naqvi, M.H.; Jabbar, M.; Junaid, M.; Haider, A. Resource management in operating systems-a survey
of scheduling algorithms. In Proceedings of the International Conference on Innovative Computing (ICIC), Lanzhou, China,
2–5 August 2016; Volume 1.
9. Singh, H.; Ahmed, Z.; Khare, M.D.; Bhuvana, J. An IoT and Blockchain-Based Secure Medical Care Framework Using Deep
Learning and Nature-Inspired Algorithms. Int. J. Intell. Syst. Appl. Eng. 2023, 11, 183–191.
10. Kim, H.; Kim, S.-H.; Hwang, J.Y.; Seo, C. Efficient Privacy-Preserving Machine Learning for Blockchain Network. IEEE Access
2019, 7, 136481–136495.
11. Sharma, P.; Namasudra, S.; Crespo, R.G.; Parra-Fuente, J.; Trivedi, M.C. EHDHE: Enhancing security of healthcare documents in
IoT-enabled digital healthcare ecosystems using blockchain. Inf. Sci. 2023, 629, 703–718.
12. Almadani, M.S.; Alotaibi, S.; Alsobhi, H.; Hussain, O.K.; Hussain, F.K. Blockchain-based multi-factor authentication: A systematic
literature review. Internet Things 2023, 23, 100844. [CrossRef]
13. Kumar, P.; Kumar, R.; Gupta, G.P.; Tripathi, R.; Jolfaei, A.; Islam, A.N. A blockchain-orchestrated deep learning approach for
secure data transmission in IoT-enabled healthcare system. J. Parallel Distrib. Comput. 2023, 172, 69–83. [CrossRef]
14. Yazdinejad, A.; Parizi, R.M.; Dehghantanha, A.; Choo, K.-K.R. P4-to-blockchain: A secure blockchain-enabled packet parser for
software defined networking. Comput. Secur. 2020, 88, 101629. [CrossRef]
15. Sharma, P.C.; Mahmood, R.; Raja, H.; Yadav, N.S.; Gupta, B.B.; Arya, V. Secure authentication and privacy-preserving blockchain
for industrial internet of things. Comput. Electr. Eng. 2023, 108, 108703. [CrossRef]
16. Jiang, S.; Cao, J.; Wu, H.; Yang, Y. Fairness-Based Packing of Industrial IoT Data in Permissioned Blockchains. IEEE Trans. Ind.
Inform. 2020, 17, 7639–7649. [CrossRef]
17. Bordel, B.; Alcarria, R.; Robles, T. A Blockchain Ledger for Securing Isolated Ambient Intelligence Deployments Using Reputation and
Information Theory Metrics; Wireless Networks: New York, NY, USA, 2023; pp. 1–7.
18. Selvarajan, S.; Srivastava, G.; Khadidos, A.O.; Khadidos, A.O.; Baza, M.; Alshehri, A.; Lin, J.C.-W. An artificial intelligence
lightweight blockchain security model for security and privacy in IIoT systems. J. Cloud Comput. 2023, 12, 38. [CrossRef]
[PubMed]
19. Lacity, M.C. Addressing Key Challenges to Making Enterprise Blockchain Applications a Reality. J. Mis. Q. Exec. 2018, 17, 3.
20. Sengupta, J.; Ruj, S.; Das Bit, S. A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT. J.
Netw. Comput. Appl. 2020, 149, 102481. [CrossRef]
21. Pajooh, H.; Rashid, M.; Alam, F.; Demidenko, S. Multi-Layer Blockchain-Based Security Architecture for Internet of Things.
Sensors 2021, 21, 772. [CrossRef]
22. Peng, C.; Wu, C.; Gao, L.; Zhang, J.; Yau, K.-L.A.; Ji, Y. Blockchain for Vehicular Internet of Things: Recent Advances and Open
Issues. Sensors 2020, 20, 5079. [CrossRef]
23. Esposito, C.; De Santis, A.; Tortora, G.; Chang, H.; Choo, K.-K.R. Blockchain: A Panacea for Healthcare Cloud-Based Data Security
and Privacy? IEEE Cloud Comput. 2018, 5, 31–37. [CrossRef]
24. Patel, V. A framework for secure and decentralized sharing of medical imaging data via blockchain consensus. Health Inform. J.
2018, 25, 1398–1411. [CrossRef] [PubMed]
25. Kim, T.M.; Lee, S.-J.; Chang, D.-J.; Koo, J.; Kim, T.; Yoon, K.-H.; Choi, I.-Y. DynamiChain: Development of Medical Blockchain
Ecosystem Based on Dynamic Consent System. Appl. Sci. 2021, 11, 1612. [CrossRef]
Electronics 2023, 12, 3618 23 of 25
26. Hang, L.; Kim, D.-H. Design and Implementation of an Integrated IoT Blockchain Platform for Sensing Data Integrity. Sensors
2019, 19, 2228. [CrossRef] [PubMed]
27. Figorilli, S.; Antonucci, F.; Costa, C.; Pallottino, F.; Raso, L.; Castiglione, M.; Pinci, E.; Del Vecchio, D.; Colle, G.; Proto, A.R.; et al.
A Blockchain Implementation Prototype for the Electronic Open Source Traceability of Wood along the Whole Supply Chain.
Sensors 2018, 18, 3133. [CrossRef]
28. Zhu, X.; Badr, Y. Identity management systems for the internet of things: A survey towards blockchain solutions. Sensors 2018,
18, 4215. [CrossRef]
29. Jia, X.; Hu, N.; Su, S.; Yin, S.; Zhao, Y.; Cheng, X.; Zhang, C. IRBA: An Identity-Based Cross-Domain Authentication Scheme for
the Internet of Things. Electronics 2020, 9, 634. [CrossRef]
30. Ali, A.; Rahim, H.; Ali, J.; Pasha, M.F.; Masud, M.; Rehman, A.U.; Chen, C.; Baz, M. A Novel Secure Blockchain Framework for
Accessing Electronic Health Records Using Multiple Certificate Authority. Appl. Sci. 2021, 11, 9999. [CrossRef]
31. Lin, Z.; Niu, H.; An, K.; Wang, Y.; Zheng, G.; Chatzinotas, S.; Hu, Y. Refracting RIS-Aided Hybrid Satellite-Terrestrial Relay
Networks: Joint Beamforming Design and Optimization. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 3717–3724. [CrossRef]
32. Lin, Z.; An, K.; Niu, H.; Hu, Y.; Chatzinotas, S.; Zheng, G.; Wang, J. SLNR-based Secure Energy Efficient Beamforming in
Multibeam Satellite Systems. IEEE Trans. Aerosp. Electron. Syst. 2022, 59, 2085–2088. [CrossRef]
33. Niu, H.; Lin, Z.; Chu, Z.; Zhu, Z.; Xiao, P.; Nguyen, H.X.; Lee, I.; Al-Dhahir, N. Joint Beamforming Design for Secure RIS-Assisted
IoT Networks. IEEE Internet Things J. 2022, 10, 1628–1641. [CrossRef]
34. Lin, Z.; Lin, M.; de Cola, T.; Wang, J.-B.; Zhu, W.-P.; Cheng, J. Supporting IoT With Rate-Splitting Multiple Access in Satellite and
Aerial-Integrated Networks. IEEE Internet Things J. 2021, 8, 11123–11134. [CrossRef]
35. Tan, L.; Shi, N.; Yu, K.; Aloqaily, M.; Jararweh, Y. A Blockchain-empowered Access Control Framework for Smart Devices in
Green Internet of Things. ACM Trans. Internet Technol. 2021, 21, 1–20. [CrossRef]
36. Yu, K.; Tan, L.; Yang, C.; Choo, K.-K.R.; Bashir, A.K.; Rodrigues, J.J.P.C.; Sato, T. A Blockchain-Based Shamir’s Threshold
Cryptography Scheme for Data Protection in Industrial Internet of Things Settings. IEEE Internet Things J. 2021, 9, 8154–8167.
[CrossRef]
37. Peng, Z.; Xu, J.; Hu, H.; Chen, L.; Kong, H. BlockShare: A Blockchain empowered system for privacy-preserving verifiable data
sharing Bull. IEEE Comput. Soc. Tech. Comm. Data Eng. 2022, 1, 14–24.
38. Peng, Z.; Zhang, Y.; Xu, Q.; Liu, H.; Gao, Y.; Li, X.; Yu, G. NeuChain: A fast permissioned blockchain system with deterministic
ordering. Proc. VLDB Endow. 2022, 15, 2585–2598. [CrossRef]
39. Peng, Z.; Huang, J.; Wang, H.; Wang, S.; Chu, X.; Zhang, X.; Chen, L.; Huang, X.; Fu, X.; Guo, Y.; et al. BU-trace: A permissionless
mobile system for privacy-preserving intelligent contact tracing. In International Conference on Database Systems for Advanced
Applications; Springer: Cham, Switzerland, 2021; pp. 381–397.
40. Ruan, P.; Chen, G.; Dinh, T.T.A.; Lin, Q.; Ooi, B.C.; Zhang, M. Fine-grained, secure and efficient data provenance on blockchain
systems. Proc. VLDB Endow. 2019, 12, 975–9888. [CrossRef]
41. Wang, H.; Xu, C.; Zhang, C.; Xu, J.; Peng, Z.; Pei, J. vChain+: Optimizing Verifiable Blockchain Boolean Range Queries. In
Proceedings of the 2022 IEEE 38th International Conference on Data Engineering (ICDE), Kuala Lumpur, Malaysia, 9–12 May 2022;
pp. 1927–1940.
42. Ruan, P.; Dinh, T.T.A.; Lin, Q.; Zhang, M.; Chen, G.; Ooi, B.C. Revealing Every Story of Data in Blockchain Systems. ACM
SIGMOD Rec. 2020, 49, 70–77. [CrossRef]
43. Saadeh, M.; Sleit, A.; Qatawneh, M.; Almobaideen, W. Authentication techniques for the internet of things: A survey. In
Proceedings of the 2016 Cybersecurity and Cyberforensics Conference (CCC), Amman, Jordan, 2–4 August 2016; pp. 28–34.
44. AbuAlghanam, O.; Qatawneh, M.; Almobaideen, W.; Saadeh, M. A new hierarchical architecture and protocol for key distribution
in the context of IoT-based smart cities. J. Inf. Secur. Appl. 2022, 67, 103173. [CrossRef]
45. Altarawneh, M.; Qatawneh, M.; Almobaideen, W. Overview of Applied Data Analytic Mechanisms and Approaches Using
Permissioned Blockchains. Int. J. Adv. Sci. Eng. Inf. Technol. 2022, 12, 42–52. [CrossRef]
46. Qatawneh, M.; Almobaideen, W.; AbuAlghanam, O. Challenges of Blockchain Technology in Context Internet of Things: A
Survey. Int. J. Comput. Appl. 2020, 175, 13–20. [CrossRef]
47. Abualghanam, O.R.; Qatawneh, M.O.; Almobaideen, W.E. A survey of key distribution in the context of internet of things.
J. Theor. Appl. Inf. Technol. 2019, 97, 3217–3241.
48. Adil, M.; Almaiah, M.A.; Alsayed, A.O.; Almomani, O. An Anonymous Channel Categorization Scheme of Edge Nodes to Detect
Jamming Attacks in Wireless Sensor Networks. Sensors 2020, 20, 2311. [CrossRef] [PubMed]
49. Adil, M.; Khan, R.; Almaiah, M.A.; Al-Zahrani, M.; Zakarya, M.; Amjad, M.S.; Ahmed, R. MAC-AODV Based Mutual Authentica-
tion Scheme for Constraint Oriented Networks. IEEE Access 2020, 8, 44459–44469. [CrossRef]
50. Adil, M.; Khan, R.; Ali, J.; Roh, B.-H.; Ta, Q.T.H.; Almaiah, M.A. An Energy Proficient Load Balancing Routing Scheme for
Wireless Sensor Networks to Maximize Their Lifespan in an Operational Environment. IEEE Access 2020, 8, 163209–163224.
[CrossRef]
51. Adil, M.; Khan, R.; Almaiah, M.A.; Binsawad, M.; Ali, J.; Al Saaidah, A.; Ta, Q.T.H. An Efficient Load Balancing Scheme of Energy
Gauge Nodes to Maximize the Lifespan of Constraint Oriented Networks. IEEE Access 2020, 8, 148510–148527. [CrossRef]
Electronics 2023, 12, 3618 24 of 25
52. Rahman, H.U.; Almaiah, M.A.; Khan, M.Z.; Khan, A.; Raza, M.; Al-Zahrani, M.; Almomani, O.; Khan, R. Improving En-
ergy Efficiency With Content-Based Adaptive and Dynamic Scheduling in Wireless Sensor Networks. IEEE Access 2020, 8,
176495–176520.
53. Tatnall, A. Editorial for EAIT issue 2, 2019. Educ. Inf. Technol. 2019, 24, 953–962. [CrossRef]
54. Almaiah, M.A.; Al-Zahrani, A.; Almomani, O.; Alhwaitat, A.K. Classification of cyber security threats on mobile devices and
applications. In Artificial Intelligence and Blockchain for Future Cybersecurity Applications; Springer: Cham, Switzerland, 2021;
pp. 107–123.
55. Sultana, T.; Almogren, A.; Akbar, M.; Zuair, M.; Ullah, I.; Javaid, N. Data Sharing System Integrating Access Control Mechanism
using Blockchain-Based Smart Contracts for IoT Devices. Appl. Sci. 2020, 10, 488. [CrossRef]
56. Shen, B.; Guo, J.; Yang, Y. MedChain: Efficient Healthcare Data Sharing via Blockchain. Appl. Sci. 2019, 9, 1207. [CrossRef]
57. Sharma, A.; Sarishma; Tomar, R.; Chilamkurti, N.; Kim, B.-G. Blockchain Based Smart Contracts for Internet of Medical Things in
e-Healthcare. J. Electron. 2020, 9, 1609. [CrossRef]
58. Alam Khan, F.; Asif, M.; Ahmad, A.; Alharbi, M.; Aljuaid, H. Blockchain technology, improvement suggestions, security challenges
on smart grid and its application in healthcare for sustainable development. Sustain. Cities Soc. 2020, 55, 102018. [CrossRef]
59. Dwivedi, A.D.; Srivastava, G.; Dhar, S.; Singh, R. A Decentralized Privacy-Preserving Healthcare Blockchain for IoT. Sensors 2020,
19, 326. [CrossRef]
60. Alamer, M.; Almaiah, M.A. Cybersecurity in Smart City: A systematic mapping study. In Proceedings of the 2021 International
Conference on Information Technology (ICIT), Amman, Jordan, 14–15 July 2021; pp. 719–724.
61. Rathi, V.K.; Chaudhary, V.; Rajput, N.K.; Ahuja, B.; Jaiswal, A.K.; Gupta, D.; Elhoseny, M.; Hammoudeh, M. A blockchain-enabled
multi domain edge computing orchestrator. J. IEEE Internet Things Mag. 2020, 3, 30–36. [CrossRef]
62. Al Hwaitat, A.K.; Almaiah, M.A.; Almomani, O.; Al-Zahrani, M.; Al-Sayed, R.M.; Asaifi, R.M.; Adhim, K.K.; Althunibat, A.;
Alsaaidah, A. Improved security particle swarm optimization (PSO) algorithm to detect radio jamming attacks in mobile networks.
Int. J. Adv. Comput. Sci. Appl. 2020, 11, 4. [CrossRef]
63. Ali, A.; Almaiah, M.A.; Hajjej, F.; Pasha, M.F.; Fang, O.H.; Khan, R.; Teo, J.; Zakarya, M. An Industrial IoT-Based Blockchain-
Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network. Sensors 2022, 22, 572. [CrossRef]
[PubMed]
64. Almaiah, M.A.; Dawahdeh, Z.; Almomani, O.; Alsaaidah, A.; Al-Khasawneh, A.; Khawatreh, S. A new hybrid text encryption
approach over mobile ad hoc network. Int. J. Electr. Comput. Eng. IJECE 2020, 10, 6461–6471. [CrossRef]
65. Nkenyereye, L.; Adhi Tama, B.; Shahzad, M.K.; Choi, Y.-H. Secure and blockchain-based emergency driven message protocol for
5G enabled vehicular edge computing. Sensors 2020, 20, 154. [CrossRef]
66. Feng, C.; Yu, K.; Bashir, A.K.; Al-Otaibi, Y.D.; Lu, Y.; Chen, S.; Zhang, D. Efficient and secure data sharing for 5G flying drones: A
blockchain-enabled approach. IEEE Netw. 2021, 35, 130–137. [CrossRef]
67. Khujamatov, K.; Reypnazarov, E.; Akhmedov, N.; Khasanov, D. Blockchain for 5G Healthcare architecture. In Proceedings
of the 2020 International Conference on Information Science and Communications Technologies (ICISCT), Karachi, Pakistan,
8–9 February 2020; pp. 1–5.
68. Almaiah, M.A. A new scheme for detecting malicious attacks in wireless sensor networks based on blockchain technology. In
Artificial Intelligence and Blockchain for Future Cybersecurity Applications; Springer: Cham, Switzerland, 2021; pp. 217–234.
69. Bubukayr, M.A.; Almaiah, M.A. Cybersecurity concerns in smart-phones and applications: A survey. In Proceedings of the 2021
International Conference on Information Technology (ICIT), Amman, Jordan, 14 July 2021; pp. 725–731.
70. Almaiah, M.A.; Hajjej, F.; Ali, A.; Pasha, M.F.; Almomani, O. A Novel Hybrid Trustworthy Decentralized Authentication and
Data Preservation Model for Digital Healthcare IoT Based CPS. Sensors 2022, 22, 1448. [CrossRef]
71. Al Nafea, R.; Almaiah, M.A. Cyber security threats in cloud: Literature review. In Proceedings of the 2021 International Conference
on Information Technology (ICIT), Amman, Jordan, 14 July 2021; pp. 779–786.
72. Almomani, O.; Almaiah, M.A.; Alsaaidah, A.; Smadi, S.; Mohammad, A.H.; Althunibat, A. Machine learning classifiers for
network intrusion detection system: Comparative study. In Proceedings of the 2021 International Conference on Information
Technology (ICIT), Amman, Jordan, 14–15 July 2021; pp. 440–445.
73. Almaiah, M.A.; Ali, A.; Hajjej, F.; Pasha, M.F.; Alohali, M.A. A Lightweight Hybrid Deep Learning Privacy Preserving Model for
FC-Based Industrial Internet of Medical Things. Sensors 2022, 22, 2112. [CrossRef]
74. Vivekanandan, M.; Sastry, V.N. BIDAPSCA5G: Blockchain Based Internet of Things (IoT) Device to Device Authentication Protocol
for Smart City Applications Using 5G Technology Peer-to-Peer Networking and Applications; Springer: Cham, Switzerland, 2021;
Volume 14, pp. 403–419.
75. Gao, J.; Agyekum, K.O.O.; Sifah, E.B.; Acheampong, K.N.; Xia, Q.; Du, X.; Guizani, M.; Xia, H. A blockchain-SDN-enabled
Internet of vehicles environment for fog computing and 5G networks. IEEE Internet Things J. 2019, 7, 4278–4291. [CrossRef]
76. Zhou, S.; Huang, H.; Chen, W.; Zhou, P.; Zheng, Z.; Guo, S. Pirate: A blockchain-based secure framework of distributed machine
learning in 5g networks. IEEE Netw. 2020, 34, 84–91. [CrossRef]
77. Zhang, Y.; Wang, K.; Moustafa, H.; Wang, S.; Zhang, K. Guest Editorial: Blockchain and AI for Beyond 5G Networks. IEEE Netw.
2020, 34, 22–23. [CrossRef]
78. Yazdinejad, A.; Parizi, R.M.; Dehghantanha, A.; Choo, K.-K.R. Blockchain-enabled authentication handover with efficient privacy
protection in SDN-based 5G networks. IEEE Trans. Netw. Sci. Eng. 2019, 8, 1120–1132. [CrossRef]
Electronics 2023, 12, 3618 25 of 25
79. Zhao, Y.; Zhao, J.; Zhai, W.; Sun, S.; Niyato, D.; Lam, K. A Survey of 6G Wireless Communications: Emerging Technologies Future of
Information and Communication Conference; Springer: Cham, Switzerland, 2021; pp. 150–170.
80. Bhattacharya, P.; Tanwar, S.; Shah, R.; Ladha, A. Mobile edge computing-enabled blockchain framework—A survey. In
Proceedings of the ICRIC 2019; Springer: Cham, Switzerland, 2020; pp. 797–809.
81. Blockchain and 5G-Enabled Internet of Things: Background and Preliminaries Blockchain for 5G-Enabled IoT; Springer: Cham, Switzerland,
2021; pp. 3–31.
82. Mistry, I.; Tanwar, S.; Tyagi, S.; Kumar, N. Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions,
and challenges. Mech. Syst. Signal Process. 2020, 135, 106382. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.