Towards a Decentralized IoT Onboarding for Smart Homes Using Consortium Blockchain
- URL: http://arxiv.org/abs/2508.21480v1
- Date: Fri, 29 Aug 2025 10:05:22 GMT
- Title: Towards a Decentralized IoT Onboarding for Smart Homes Using Consortium Blockchain
- Authors: Narges Dadkhah, Khan Reaz, Gerhard Wunder,
- Abstract summary: This paper presents a novel framework for secure on-boarding of smart home devices.<n>By integrating consortium blockchain technology, we propose a decentralized mechanism that enhances transparency, security, and monitoring.<n>A prototype implementation demonstrates the system's viability in smart home settings, with verification completing in 0.34 seconds.
- Score: 2.992414059774663
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: The increasing adoption of smart home devices and IoT-based security systems presents significant opportunities to enhance convenience, safety, and risk management for homeowners and service providers. However, secure onboarding-provisioning credentials and establishing trust with cloud platforms-remains a considerable challenge. Traditional onboarding methods often rely on centralized Public Key Infrastructure (PKI) models and manufacturer-controlled keys, which introduce security risks and limit the user's digital sovereignty. These limitations hinder the widespread deployment of scalable IoT solutions. This paper presents a novel onboarding framework that builds upon existing network-layer onboarding techniques and extends them to the application layer to address these challenges. By integrating consortium blockchain technology, we propose a decentralized onboarding mechanism that enhances transparency, security, and monitoring for smart home architectures. The architecture supports device registration, key revocation, access control management, and risk detection through event-driven alerts across dedicated blockchain channels and smart contracts. To evaluate the framework, we formally model the protocol using the Tamarin Prover under the Dolev-Yao adversary model. The analysis focuses on authentication, token integrity, key confidentiality, and resilience over public channels. A prototype implementation demonstrates the system's viability in smart home settings, with verification completing in 0.34 seconds, highlighting its scalability and suitability for constrained devices and diverse stakeholders. Additionally, performance evaluation shows that the blockchain-based approach effectively handles varying workloads, maintains high throughput and low latency, and supports near real-time IoT data processing.
Related papers
- Fuzzychain-edge: A novel Fuzzy logic-based adaptive Access control model for Blockchain in Edge Computing [3.542991606199518]
This research contributes significantly to advancing privacy-preserving, secure, and traceable solutions in IoT environments.<n>It lays the groundwork for future innovations in decentralized technologies and their applications in critical domains such as healthcare and beyond.
arXiv Detail & Related papers (2026-01-15T06:23:43Z) - Application of Blockchain Frameworks for Decentralized Identity and Access Management of IoT Devices [0.0]
The transition from centralized ecosystems to decentralized ecosystems is of paramount importance due to security, privacy, and data use concerns.<n>This study proposes a decentralized identity management framework for IoT environments using Hyperledger Fabric and Decentralized Identifiers (DIDs)<n>Results demonstrated improved data integrity, transparency, and user control, with reduced reliance on centralized authorities.
arXiv Detail & Related papers (2025-10-31T20:44:14Z) - Zero-Trust Foundation Models: A New Paradigm for Secure and Collaborative Artificial Intelligence for Internet of Things [61.43014629640404]
Zero-Trust Foundation Models (ZTFMs) embed zero-trust security principles into the lifecycle of foundation models (FMs) for Internet of Things (IoT) systems.<n>ZTFMs can enable secure, privacy-preserving AI across distributed, heterogeneous, and potentially adversarial IoT environments.
arXiv Detail & Related papers (2025-05-26T06:44:31Z) - Federated Learning-Enhanced Blockchain Framework for Privacy-Preserving Intrusion Detection in Industrial IoT [0.0]
Industrial Internet of Things (IIoT) systems have become integral to smart manufacturing, yet their growing connectivity has exposed them to significant cybersecurity threats.<n>Traditional intrusion detection systems (IDS) often rely on centralized architectures that raise concerns over data privacy, latency, and single points of failure.<n>We propose a novel Federated Learning-Enhanced Framework (FL-BCID) for privacy-preserving intrusion detection tailored for IIoT environments.
arXiv Detail & Related papers (2025-05-21T11:11:44Z) - Intelligent Detection of Non-Essential IoT Traffic on the Home Gateway [45.70482328441101]
This work presents ML-IoTrim, a system for detecting and mitigating non-essential IoT traffic by analyzing network behavior at the edge.<n>We test our framework in a consumer smart home setup with IoT devices from five categories, demonstrating that the model can accurately identify and block non-essential traffic.<n>This research advances privacy-aware traffic control in smart homes, paving the way for future developments in IoT device privacy.
arXiv Detail & Related papers (2025-04-22T09:40:05Z) - A Distributed Blockchain-based Access Control for the Internet of Things [0.0]
Internet of Things (IoT) environment has become increasingly fertile for malicious users to break the security and privacy of IoT users.<n>To address the distributed IoT environment, blockchain is viewed as a promising data management technology.<n>We propose a decentralised access control and attribute-based access control model for IoT entitled (DBC-ABAC)<n>A proof-of-concept implementation is presented using Hyperledger Fabric.
arXiv Detail & Related papers (2025-03-22T22:36:02Z) - Balancing Confidentiality and Transparency for Blockchain-based Process-Aware Information Systems [43.253676241213626]
We propose an architecture for blockchain-based PAISs to preserve confidentiality and transparency.<n>Smart contracts enact, enforce and store public interactions, while attribute-based encryption techniques are adopted to specify access grants to confidential information.<n>We assess the security of our solution through a systematic threat model analysis and evaluate its practical feasibility.
arXiv Detail & Related papers (2024-12-07T20:18:36Z) - SPOQchain: Platform for Secure, Scalable, and Privacy-Preserving Supply Chain Tracing and Counterfeit Protection [46.68279506084277]
This work proposes SPOQchain, a novel blockchain-based platform that provides comprehensive traceability and originality verification.
It provides an analysis of privacy and security aspects, demonstrating the need and qualification of SPOQchain for the future of supply chain tracing.
arXiv Detail & Related papers (2024-08-30T07:15:43Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Blockchain-based Zero Trust on the Edge [5.323279718522213]
This paper proposes a novel approach based on Zero Trust Architecture (ZTA) extended with blockchain to further enhance security.
The blockchain component serves as an immutable database for storing users' requests and is used to verify trustworthiness by analyzing and identifying potentially malicious user activities.
We discuss the framework, processes of the approach, and the experiments carried out on a testbed to validate its feasibility and applicability in the smart city context.
arXiv Detail & Related papers (2023-11-28T12:43:21Z) - HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a
Collaborative IoT Intrusion Detection [0.0]
We propose a hierarchical blockchain-based federated learning framework to enable secure and privacy-preserved collaborative IoT intrusion detection.
The proposed ML-based intrusion detection framework follows a hierarchical federated learning architecture to ensure the privacy of the learning process and organisational data.
The outcome is a securely designed ML-based intrusion detection system capable of detecting a wide range of malicious activities while preserving data privacy.
arXiv Detail & Related papers (2022-04-08T19:06:16Z) - A lightweight blockchain-based access control scheme for integrated edge
computing in the internet of things [4.308257382729074]
We propose an attribute-based encryption and access control scheme (ABE-ACS) for the Edge-Iot network.
For the problems of high resource consumption and difficult deployment of existing blockchain platforms, we design a lightweight blockchain (LBC)
Six smart contracts are designed to realize the ABAC and penalty mechanism, with which ABE is outsourced to edge nodes for privacy and integrity.
arXiv Detail & Related papers (2021-11-12T02:56:09Z) - Smart Home, security concerns of IoT [91.3755431537592]
The IoT (Internet of Things) has become widely popular in the domestic environments.
People are renewing their homes into smart homes; however, the privacy concerns of owning many Internet connected devices with always-on environmental sensors remain insufficiently addressed.
Default and weak passwords, cheap materials and hardware, and unencrypted communication are identified as the principal threats and vulnerabilities of IoT devices.
arXiv Detail & Related papers (2020-07-06T10:36:11Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.