An Enhanced Multi-Layer Blockchain Security Model for Improved Latency and Scalability
Abstract
:1. Introduction
2. Related Works
- Wan et al. (2019) proposed the Multi-Layer Blockchain Architecture for Secure and Scalable Cloud Systems, which integrates a private blockchain for local data processing and a public blockchain for final data storage and validation. An additional security layer provides advanced encryption techniques to protect data while ensuring that transactions are secure and scalable. The hierarchical structure significantly improves transaction throughput and reduces the risk of data breaches [5].
- Zhang et al. (2020) proposed a multi-layer blockchain security model for IoT systems to address security challenges such as data privacy and trustworthiness. The model utilized both public and private blockchains to ensure data integrity and confidentiality, offering scalability with its two-layer architecture [6].
- Paik et al. (2021) designed a multi-layer security framework for blockchain-based healthcare systems, focusing on patient data privacy and access control. The model integrated Layer 1 public blockchains with Layer 2 private blockchains to enhance both security and data availability. The authors emphasized how their approach outperforms existing models in terms of data access latency and trustworthiness [7].
- Wang et al. (2022) presented a multi-layer blockchain architecture designed for smart cities, incorporating blockchain layers for secure data transmission, transactional security, and smart contract validation. The authors specifically addressed scalability and transaction throughput issues by reducing the load on the public blockchain with Layer 2 solutions [8].
- Kumar et al. (2023) proposed a multi-layered blockchain model for secure IoT communications. This model introduced an additional layer for data encryption and multi-user authentication based on PKI, leveraging Layer 3 to provide robust security mechanisms. Their approach also enhanced scalability by offloading transaction processing to local blockchains [9].
- TA.Bary et al. (2024) proposed the Multi-Layer Blockchain Security Model (MLBSM), which offers an effective solution for safeguarding IoT networks and similar decentralized systems, ensuring the prevention of transaction privacy leakage for all users within a public blockchain network. The integration of the clustering concept enhances the multi-layer architecture, facilitating its efficient implementation. Using this approach, the model can achieve high levels of security and transparency, thereby protecting user privacy across diverse technological environments [3].
3. Multi-Layer Blockchain Security Model (MLBSM)
4. Enhanced Multi-Layer Blockchain Security Model (EMLBSM)
4.1. Layer1: Public Blockchain
4.2. Layer2: IOT with Local Blockchain
4.3. Layer3: Authorization and Authentication by Users
5. Implementation and Analysis
5.1. Blockchain Implementation
- Layer 1: Public blockchain: In this layer, a traditional public blockchain like Ethereum or a similar distributed ledger technology is used to store the final validated transactions. The Layer 1 blockchain ensures that, once data are committed, they cannot be altered or tampered with, providing transparency and trust within the IoT ecosystem.
- Layer 2: Local blockchain for IoT devices: Each IoT device or group of devices operates a local blockchain where it can perform most of the transaction processing locally. These local blockchains are linked to Layer 1 and submit aggregated, validated data periodically. This reduces the burden on the public blockchain and enhances performance, particularly for IoT systems where high-frequency data generation occurs.
- Layer 3: Multi-user authentication and PKI security: The third layer ensures the integrity of communications between devices and users by employing public–private key pairs and digital certificates for authentication and encryption. Each device and/or user is issued a digital certificate by a trusted certificate authority (CA), enabling secure communication channels. This ensures that only authenticated devices can interact with the network and that their transactions are securely recorded on the blockchain.
5.2. Security Implementation
- Encryption and data integrity: PKI provides the foundation for encrypting communications and securing sensitive data. Every message or transaction sent across the network is encrypted using the recipient’s public key, ensuring confidentiality. Additionally, digital signatures are used to verify the authenticity of the transaction and ensure that it has not been tampered with.
- Multi-user authentication: The system supports multiple users or devices, allowing for them to securely authenticate and interact with the blockchain. This is achieved using a combination of PKI for individual authentication and a smart contract system for authorizing specific actions, ensuring that unauthorized users or devices are not able to initiate fraudulent transactions.
- Secure communication channels: All interactions within the IoT ecosystem are protected by secure communication channels using encryption. This prevents man-in-the-middle attacks and ensures that only legitimate devices can access the network and perform transactions.
5.3. Performance Estimation
- Transaction throughput: By using local blockchains (Layer 2) for IoT devices, the system significantly reduces the number of transactions that need to be processed on the public blockchain (Layer 1). This increases throughput by allowing for high-frequency transactions to be managed locally and by only submitting aggregated data to the main blockchain. The system can manage thousands or even millions of IoT device transactions without bottlenecks.
- Latency reduction: One of the key advantages of this multi-layer model is the reduction in latency. Layer 2 local blockchains allow for transactions to be processed locally in real time, meaning that IoT devices can perform actions and exchange data without waiting for global consensus. This leads to faster response times, particularly important for real-time applications like autonomous vehicles, smart grids, and industrial IoT.
- Scalability enhanced: With the introduction of local blockchains in Layer 2, scalability is enhanced by offloading transactional processing from the main blockchain. This allows for the system to grow without being constrained by the limitations of the public blockchain’s transaction processing capacity. Additionally, the clustering of IoT devices in Layer 2 creates a hierarchical structure that further improves scalability by reducing the volume of data that need to be propagated to Layer 1.
5.4. Reducing Latency
- Edge processing: Edge computing principles are used to process data at or near the source, reducing the time required to send data to a centralized cloud server or public blockchain. Local blockchains manage most operations autonomously, reducing dependency on Layer 1 and improving response time.
- Transaction batching and aggregation: Instead of sending individual transactions to the blockchain, Layer 2 allows for transaction batching, where multiple IoT device actions are grouped into a single transaction. This reduces the number of interactions with Layer 1 and reduces the overall processing time for the entire system.
5.5. Scalability
- Clustered IoT devices: IoT devices are grouped into clusters, with each cluster operating a local blockchain. This hierarchical approach helps scale the system by reducing the load on the main blockchain and allowing for each cluster to independently process transactions. This method also minimizes the amount of data that need to be propagated, thus improving scalability.
- Offloading transaction processing: Local blockchains process a large volume of transactions and only submit critical data to Layer 1. This reduces congestion and ensures that the public blockchain is not overwhelmed by high-frequency data from IoT devices. This mechanism allows for the system to scale without compromising on transaction speed or security.
6. Security Analysis and Results of the EMLBSM
- Layer 1 (public blockchain): This layer primarily stores validated and immutable transaction data. The data here include finalized records of all validated transactions that have passed through Layer 2 (local blockchains). These transactions are critical for maintaining transparency, data integrity, and immutability across the system. The data typically contain transaction IDs, timestamps, hashes, and digital signatures, ensuring the authenticity and non-repudiation of the stored information.
- Layer 2 (local blockchain for IoT devices): The data in Layer 2 primarily involves high-frequency transaction information generated using IoT devices. This includes real-time device interactions, sensor readings, and device status updates. The data are processed and validated locally within IoT clusters, aggregated, and then submitted to Layer 1 for final storage. Key data types include transaction requests, device identifiers, aggregated sensor data, and event logs.
- Layer 3 (security and authentication): This layer handles the data related to user and device authentication, such as digital certificates, public and private keys, and transaction authorization information. The data in this layer ensure the secure communication and validation of actions between IoT devices and users, thereby preventing unauthorized access and ensuring data integrity across the system.
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Rebollar, F.; Ramos, M.A.; Marcial-Romero, J.R.; Hernández-Servín, J.A. Analysis of Multi-layer Information Flow in a Four-Layer Blockchain Model. In Computer Science On-line Conference; Springer: Berlin/Heidelberg, Germany, 2023; Volume 2, pp. 338–348. [Google Scholar]
- Mukhlif, F.; Ithnin, N. Blockchain technology: Applications, security and privacy, big data, challenges and future directions. Int. J. Crit. Comput. Based Syst. 2024, 11, 216–233. [Google Scholar] [CrossRef]
- Abdel Bary, T.A.A.A.; Elomda, B.M.; Hassan, H.A. Multiple Layer Public Blockchain Approach for Internet of Things (IoT) Systems. IEEE Access 2024, 12, 56431–56438. [Google Scholar] [CrossRef]
- Abdel Bary, T.A.A.A.; Elomda, B.M.; Hassan, H.A. Blockchain: Architecture, Security and Consensus Algorithms. In International Conference on Intelligent and Fuzzy Systems; Springer Nature: Cham, Switzerland, 2023; pp. 738–753. [Google Scholar]
- Wan, J.; Li, J.; Imran, M.; Li, D.; Amin, F.E. A blockchain-based solution for enhancing security and privacy in smart factory. IEEE Trans. Ind. Informatics 2019, 15, 3652–3660. [Google Scholar] [CrossRef]
- Yang, X.; Li, Z.; Geng, Z.; Zhang, H. A Multi-Layer Blockchain Security Model for Internet of Things. IEEE Access 2020, 8, 2982975–2982985. [Google Scholar]
- Wu, H.Y.; Li, L.J.; Paik, H.Y.; Kanhere, S.S. MEChain: A multi-layer blockchain structure with hierarchical consensus for secure EHR system. In Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, 18–20 August 2021; pp. 976–987. [Google Scholar]
- Cao, B.; Wang, Z.; Zhang, L.; Feng, D.; Peng, M.; Zhang, L.; Han, Z. Blockchain systems, technologies, and applications: A methodology perspective. IEEE Commun. Surv. Tutor. 2022, 25, 353–385. [Google Scholar] [CrossRef]
- Kumar, P.A. A Multi-Layer Blockchain Model for Secure IoT Communications. IEEE Access 2023, 11, 1076543–1076555. [Google Scholar]
- Biswas, K.; Muthukkumarasamy, V. Securing Smart Cities Using Blockchain Technology. In Proceedings of the 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Sydney, Australia, 12–14 December 2016; pp. 1392–1393. [Google Scholar]
- Kokoris-Kogias, L.; Gasser, L.; Khoffi, I.; Jovanovic, P.; Gailly, N.; Ford, B. Managing identities using blockchains and CoSi. In Proceedings of the 9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2016), Darmstadt, Germany, 19–22 May 2016. [Google Scholar]
- Li, Z.; Kang, J.; Yu, R.; Ye, D.; Deng, Q.; Zhang, Y. Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans. Ind. Inform. 2017, 14, 3690–3700. [Google Scholar] [CrossRef]
- Esposito, C.; De Santis, A.; Tortora, G.; Chang, H.; Choo, K.-K.R. Blockchain: A panacea for healthcare cloud-based data security and privacy? IEEE Cloud Comput. 2018, 5, 31–37. [Google Scholar] [CrossRef]
- Pajooh, H.H.; Rashid, M.; Alam, F.; Demidenko, S. Multi-Layer Blockchain-Based Security Architecture for Internet of Things. Sensors 2021, 21, 772. [Google Scholar] [CrossRef]
- Wu, J.; Sie, M.F.; Harding, S.A.; Lin, C.L.; Wang, S.T.; Liao, S.W. Multi-layer aggregate verification for IoT blockchain. In Proceedings of the 2021 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Paris, France, 27–30 September 2021; pp. 43–44. [Google Scholar]
Study | Key Features | Security Focus | Scalability | Latency/Performance |
---|---|---|---|---|
Wan et al. [5] | Multi-layer architecture for cloud systems with private and public blockchain layers | Advanced Encryption | High scalability, enhanced security | Improved throughput, reduced delay |
Zhang et al. (2020) [6] | Multi-layer blockchain for IoT | Data privacy, Integrity | Scalable by integrating private and public chains | Improved latency and performance through Layer 2 |
Li et al. (2021) [7] | Multi-layer security for healthcare data management | Data privacy, Access control | High scalability with Layer 2 private blockchains | Reduced access latency and faster transactions |
Wang et al. (2022) [8] | Blockchain for smart cities | Data transmission, Smart contract security | Enhanced scalability with Layer 2 solutions | Reduced blockchain load and enhanced throughput |
Kumar et al. (2023) [9] | IoT security with multi-layered blockchain | Data encryption, Multi-user authentication | High scalability by leveraging Layer 2 blockchains | Enhanced performance and security through Layer 3 |
TA.Bary, et al. (2024) [3] | Multi-Layer Blockchain Security Model (MLBSM) | Data encryption, Multi-user authentication | High scalability through Layer 3 (Local blockchain) | Enhanced performance and security until 100 [TpS] |
References | IoT Application | Framework Privacy | Heterogeneity and Flexibility | Authentication | Scalability | Latency Issue | Implemented Consensus | Implemented Blockchain |
---|---|---|---|---|---|---|---|---|
[5] | Industrial IoT | ✓ | ✓ | x | x | x | PoW | Private |
[10] | Smart Grids and Smart Cities | x | ✓ | x | ✓ | ✓ | PoW | Private |
[11] | Microgrids, Smart Grids, Vehicle-to-Grids | ✓ | x | x | x | ✓ | PoW | Consortium |
[12] | Industrial IoT, Energy Harvesting networks | ✓ | ✓ | x | x | x | PoW | Consortium |
[13] | e-Health Application | ✓ | x | x | x | x | PoW | Public |
[14] | IoT 5G MBS Multi-Layer Security | ✓ | ✓ | ✓ | ✓ | x | PBFT, PoC | Consortium |
[15] | Multi-Layer Aggregate Verification (MLAV) | ✓ | ✓ | x | ✓ | x | PoW | Consortium |
[3] | Multi-Layer Blockchain Security (MLBSM) | ✓ | ✓ | ✓ | ✓ | x | PBFT, PoC | Consortium |
Enhanced Multi-Layer Blockchain Scurity (EMLBSM) | ✓ | ✓ | ✓ | ✓ | ✓ | PBFT, PoC | Consortium |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Elomda, B.M.; Abdelbary, T.A.A.; Hassan, H.A.; Hamza, K.S.; Kharma, Q. An Enhanced Multi-Layer Blockchain Security Model for Improved Latency and Scalability. Information 2025, 16, 241. https://doi.org/10.3390/info16030241
Elomda BM, Abdelbary TAA, Hassan HA, Hamza KS, Kharma Q. An Enhanced Multi-Layer Blockchain Security Model for Improved Latency and Scalability. Information. 2025; 16(3):241. https://doi.org/10.3390/info16030241
Chicago/Turabian StyleElomda, Basem Mohamed, Taher Abouzaid Abdelaty Abdelbary, Hesham Ahmed Hassan, Kamal S. Hamza, and Qasem Kharma. 2025. "An Enhanced Multi-Layer Blockchain Security Model for Improved Latency and Scalability" Information 16, no. 3: 241. https://doi.org/10.3390/info16030241
APA StyleElomda, B. M., Abdelbary, T. A. A., Hassan, H. A., Hamza, K. S., & Kharma, Q. (2025). An Enhanced Multi-Layer Blockchain Security Model for Improved Latency and Scalability. Information, 16(3), 241. https://doi.org/10.3390/info16030241