Published 2025-07-22
Keywords
- Blockchain,
- Industrial IoT (IIoT),
- Access Control,
- Data Protection,
- Smart Contracts
- Role-Based Access Control (RBAC),
- Data Integrity,
- Cloud Integration ...More
Copyright (c) 2025

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Abstract
The exponential expansion of Industrial Internet of Things (IIoT) presents major difficulties in guaranteeing strong data security and safe access management over distributed and resource-limited settings. This paper suggests a blockchain-driven architecture combining dynamic access control based on roles with data integrity and confidentiality assurance mechanisms catered for IIoT environments. Three basic levels define the architecture: the IoT layer with intelligent sensors and actuators; the blockchain layer to offer distributed access enforcement and tamper-proof audit trails; and the cloud layer for scalable data storage and processing. Using smart contracts, the system automates access delegation, revocation, and real-time permission changes, hence reducing single points of failure and unwanted access. Compared to centralised systems, experimental evaluation employing Python simulations shows enhanced accuracy, precision, and security at the tradeoff of quite limited throughput. Emphasising privacy, transparency, and resilience, this study provides the basis for reliable, scalable, auditable IIoT infrastructures.
References
- . K. Yu, M. Arifuzzaman, Z. Wen, D. Zhang, and T. Sato, “A key management scheme for secure communications of information centric advanced metering infrastructure in smart grid,” IEEE transactions on instrumentation and measurement, vol. 64, no. 8, pp. 2072–2085, 2015.
- . Z. Guo, K. Yu, A. Jolfaei, A. K. Bashir, A. O. Almagrabi and N. Kumar, “A Fuzzy Detection System for Rumors through Explainable Adaptive Learning,” IEEE Transactions on Fuzzy Systems, doi: 10.1109/TFUZZ.2021.3052109.
- . H. Li, K. Yu, B. Liu, C. Feng, Z. Qin and G. Srivastava, ”An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things,” IEEE Journal of Biomedical and Health Informatics, 2021, doi: 10.1109/JBHI.2021.3075995.
- . K.-K. R. Choo, S. Gritzalis, and J. H. Park, “Cryptographic solutions for industrial internet-of-things: Research challenges and opportunities,” IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3567–3569, aug 2018.
- . K. Yu, Z. Guo, Y. Shen, W. Wang, J. C. Lin, T. Sato, “Secure Artificial Intelligence of Things for Implicit Group Recommendations”, IEEE Internet of Things Journal, 2021, doi: 10.1109/JIOT.2021.3079574.
- . L. Tan, K. Yu, F. Ming, X. Cheng, G. Srivastava, “Secure and Resilient Artificial Intelligence of Things: a HoneyNet Approach for Threat Detection and Situational Awareness”, IEEE Consumer Electronics Magazine, 2021, doi: 10.1109/MCE.2021.3081874.
- . S. Bhatt, T. K. Pham, M. Gupta, J. Benson, J. Park, and R. Sandhu, “Attribute-based access control for AWS Internet of Things and secure industries of the future,” IEEE Access, vol. 9, pp. 107200–107223, 2021.
- . Y. Liu et al., “Capability-based IoT access control using blockchain,” Digital Commun. Netw. vol. 7, no. 4, pp. 463–469, 2021. [Online]. Available: https://www.sciencedirect. com/science/article/ pii/S2352864820302844
- . S. A. Chaudhry, K. Yahya, F. Al-Turjman, and M.-H. Yang, “A secure and reliable device access control scheme for IoT based sensor cloud systems,” IEEE Access, vol. 8, pp. 139244–139254, 2020.
- . L. Liu, H. Wang, and Y. Zhang, “Secure IoT data Outsourcing with aggregate statistics and fine-grained access control,” IEEE Access, vol. 8, pp. 95057–95067, 2020.
- . Q. Yang, M. Zhang, Y. Zhou, T. Wang, Z. Xia, and B. Yang, “A noninteractive attribute-based access control scheme by blockchain for IoT,” Electronics, vol. 10, no. 15, p. 1855, 2021. [Online]. Available: https: //www.mdpi.com/2079-9292/10/15/1855
- . A. Kousalya, K. Sakthidasan, and A. Latha, “Reliable service availability and access control method for cloud assisted IoT communications,” Wireless Netw., vol. 27, pp. 881–892, Feb. 2021.
- . K. M. Hossein, M. E. Esmaeili, T. Dargahi, A. Khonsari, and M. Conti, “BCHealth: A novel blockchain-based privacy-preserving architecture for IoT Healthcare applications,” Comput. Commun., vol. 180, pp. 31–47, Dec. 2021. [Online]. Available: https://www.sciencedirect.com/science/article /pii/S0140366421003054
- . Z. Li, J. Hao, J. Liu, H. Wang, and M. Xian, “An IoT-applicable access control model under double-layer blockchain,” IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 68, no. 6, pp. 2102–2106, Jun. 2021.
- . U. Khalid, M. Asim, T. Baker, P. C. K. Hung, M. A. Tariq, and L. Rafferty, “A decentralized lightweight blockchain-based authentication mechanism for IoT systems,” Clust. Comput., vol. 23, pp. 2067–2087, Feb. 2020.
- . S. Xiong, Q. Ni, L. Wang, and Q. Wang, “SEM-ACSIT: Secure and efficient multiauthority access control for IoT cloud storage,” IEEE Internet Things J., vol. 7, no. 4, pp. 2914–2927, Apr. 2020.
- . S. Banerjee et al., “Multi-authority CP-ABE-based user access control scheme with constant-size key and ciphertext for IoT deployment,” J. Inf. Security Appl., vol. 53, Aug. 2020, Art. no. 102503. [Online]. Available: https://www.sciencedirect.com/ science/article/pii/S2214212619310178
- . M. Dammak, S.-M. Senouci, M. A. Messous, M. H. Elhdhili, and C. Gransart, “Decentralized lightweight group key management for dynamic access control in IoT environments,” IEEE Trans. Netw. Service Manag., vol. 17, no. 3, pp. 1742–1757, Sep. 2020.
- . P. Chinnasamy, P. Deepalakshmi, A. K. Dutta, J. You, and G. P. Joshi, “Ciphertext-policy attribute-based encryption for cloud storage: Toward data privacy and authentication in AI-enabled IoT system,” Mathematics, vol. 10, no. 1, p. 68, 2022. [Online]. Available: https://www.mdpi.com/ 2227-7390/10/1/68
- . N. Tapas, F. Longo, G. Merlino, and A. Puliafito, “Experimenting with smart contracts for access control and delegation in IoT,” Future Gener. Comput. Syst., vol. 111, pp. 324–338, Oct. 2020. [Online]. Available: https://www. sciencedirect.com/science/article/pii/S0167739X18326979
- . S. Pal, T. Rabehaja, M. Hitchens, V. Varadharajan, and A. Hill, “On the design of a flexible delegation model for the Internet of Things using blockchain,” IEEE Trans. Ind. Informat., vol. 16, no. 5, pp. 3521–3530, May 2020
- . Zhong, Botao, Xing Pan, Lieyun Ding, Qiang Chen, and Xiaowei Hu. "Blockchain-driven integration technology for the AEC industry." Automation in Construction 150 (2023): 104791.
- . Tong, Wei, Xuewen Dong, Yulong Shen, Xiaohong Jiang, and Zhiwei Zhang. "A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity." Future Generation Computer Systems 135 (2022): 85-94.
- . Patil, Pradnya, M. Sangeetha, and Vidhyacharan Bhaskar. "Blockchain for IoT access control, security and privacy: a review." Wireless Personal Communications 117, no. 3 (2021): 1815-1834.
- . Sodhro, Ali Hassan, Sandeep Pirbhulal, Muhammad Muzammal, and Luo Zongwei. "Towards blockchain-enabled security technique for industrial internet of things based decentralized applications." Journal of Grid Computing 18, no. 4 (2020): 615-628.
- . Alshehri, Suhair, Omaimah Bamasaq, Daniyal Alghazzawi, and Arwa Jamjoom. "Dynamic secure access control and data sharing through trusted delegation and revocation in a blockchain-enabled cloud-IoT environment." IEEE Internet of Things Journal 10, no. 5 (2022): 4239-4256.