Blockchain-Enhanced Security for 5G Edge Computing in IoT
Abstract
:1. Introduction
- Proposes a hybrid blockchain authentication framework that combines permissioned and permissionless blockchain models to balance security, decentralization, and computational efficiency in IoT edge computing.
- Introduces AI-driven adaptive consensus mechanisms to optimize transaction processing, anomaly detection, and security enforcement while reducing authentication latency.
- Incorporates Layer-2 scaling solutions (e.g., rollups, state channels, and sharding) to mitigate the transaction cost and scalability bottlenecks of blockchain-based authentication.
- Conducts an extensive performance evaluation, analysing transaction latency, computational overhead, and security resilience under different IoT network conditions using synthetic data simulations.
- Compares blockchain-based authentication with traditional models (e.g., OAuth, Kerberos) to highlight blockchain’s advantages in tamper-proof identity verification and decentralized access control.
- Discusses future research directions in blockchain-based authentication, including zero-knowledge proofs (ZKPs), federated learning for decentralized security, and AI-optimized consensus models for enhancing scalability and privacy.
2. Related Work
2.1. Decentralized Identity Management and Access Control
2.2. Data Integrity and Secure Computation Offloading
2.3. Performance Evaluations in 5G IoT Environments
2.4. Advancements Towards Industry 5.0
2.5. Security in Industrial IoT (IIoT) Systems
2.6. Summary of Literature Review
3. Methodology
3.1. Security Threats in 5G Edge Computing for IoT
3.1.1. Unauthorized Access and Authentication Failures
3.1.2. Data Tampering and Integrity Violations
3.1.3. DDoS Attacks and Resource Exhaustion
3.1.4. Eliminating Single Points of Failure
3.2. Blockchain Integration for Security
3.2.1. Blockchain Network Architecture
3.2.2. Smart Contract-Based Access Control and Enforcement
Listing 1. Pseudo-code for smart contract logic for IoT authentication. |
pragma solidity ^0.8.0; contract IoTAccessControl { mapping(address => bool) authorizedDevices; address owner; constructor() { owner = msg.sender; } function registerDevice(address device) public { require(msg.sender == owner, "Only owner can register devices"); authorizedDevices[device] = true; } function authenticateDevice(address device) public view returns (bool) { return authorizedDevices[device]; } } |
3.2.3. Secure Data Exchange
- Tamper-proof Data Storage: Each transaction is cryptographically hashed and stored in blocks, preventing unauthorized modifications.
- End-to-End Encryption: Only authenticated IoT devices can decrypt and access transmitted data, ensuring data confidentiality.
- Efficient Gas Fee Optimization: Smart contracts execute only when required, minimizing computational overhead and transaction costs in resource-constrained IoT environments.
3.2.4. Anomaly Detection Mechanisms
- Analyse blockchain transaction patterns to detect unusual authentication requests.
- Identify suspicious behaviour, such as repeated failed login attempts or rapid authentication requests from a single device.
- Automatically trigger countermeasures, such as blocking unauthorized devices or flagging suspicious transactions for review.
AI-Driven Anomaly Detection for Blockchain-Based IoT Security
AI–Blockchain Integration for Real-Time Security Monitoring
- Data Collection—Blockchain transaction logs and authentication records are continuously collected from edge nodes.
- Feature Extraction—The ML model extracts key features such as authentication timestamps, transaction frequency, gas fees, failed login attempts, and access patterns.
- Model Training—The extracted features are used to train CNNs, LSTMs, and Autoencoders to recognize normal vs. anomalous authentication events.
- Real-Time Anomaly Detection—Once deployed, the AI model monitors blockchain transactions and flags unusual activity in real time.
- Response Mechanism—Detected anomalies trigger smart contract-based security policies, such as automatically blocking suspicious IoT devices or triggering additional verification steps.
Example: Using LSTMs for Anomaly Detection in Blockchain Authentication
- Trigger a security alert in the blockchain network.
- Dynamically update smart contract rules to require additional verification.
- Isolate suspicious IoT devices from the authentication process.
3.3. Synthetic Data Generation
3.3.1. Dataset Composition
- IoT authentication logs, capturing both legitimate and malicious authentication attempts.
- Blockchain transactions, documenting smart contract executions, access control decisions, and transaction success rates.
3.3.2. Attack Simulation Process
- (a)
- Unauthorized Access Attempts:
- Simulated brute-force login attempts, where an attacker repeatedly tries incorrect credentials to gain access.
- Modelled device spoofing attacks, where a rogue device pretends to be a legitimate IoT node.
- (b)
- DDoS Authentication Flooding:
- Introduced high-frequency authentication requests from malicious nodes to simulate a DDoS attack targeting authentication servers.
- Evaluated how smart contract-based access control limits excessive login requests to mitigate DDoS attacks.
- (c)
- Blockchain Transaction Manipulation:
- Simulated malicious smart contract interactions, including unauthorized modifications of access control policies.
- Tested blockchain’s resistance to double-spending attacks, ensuring the immutability of transaction records.
3.3.3. Data Distribution and Visualization
3.4. Performance Evaluation Metrics
3.4.1. Key Performance Metrics
3.4.2. Blockchain Performance Analysis
4. Results and Discussion
4.1. Security Effectiveness
4.2. Blockchain Performance Trade-Offs
4.2.1. Computational Overhead and Resource Constraints in IoT
- Limited processing power: IoT nodes often rely on microcontrollers that lack the computational capacity to perform cryptographic hashing at scale.
- Energy constraints: Continuous cryptographic operations drain battery life quickly, making always-on authentication impractical.
- Memory limitations: Storing blockchain transaction histories on-device requires large storage capacities, which IoT devices lack.
4.2.2. Network Load and Bandwidth Consumption
- Increased bandwidth consumption for devices transmitting frequent authentication requests.
- Latency concerns—even permissioned blockchains introduce delays when verifying transactions.
- Higher transaction costs in public blockchain environments due to gas fees.
4.2.3. Optimizations: Layer-2 Scaling Solutions
4.3. Scalability and Anomaly Detection
4.3.1. Hybrid Blockchain Models: Combining Permissioned and Permissionless Networks
- Permissionless Blockchain for Security: Used for long-term storage of critical transactions, ensuring immutability and transparency.
- Permissioned Blockchain for High-Speed Processing: Handles frequent authentication requests and low-cost transactions using trusted nodes.
- Local Authentication via Permissioned Blockchain:
- IoT devices authenticate through a high-speed, low-cost permissioned blockchain (e.g., Hyperledger Fabric).
- Transactions are verified instantly without waiting for public blockchain validation.
- Final Verification on Permissionless Blockchain:
- Critical authentication logs are periodically written to a permissionless blockchain (e.g., Ethereum, Polkadot) to ensure tamper-proof security.
- Smart Contract Integration:
- Smart contracts govern the interaction between both chains, ensuring efficient synchronization and data consistency.
4.3.2. AI-Driven Adaptive Consensus Mechanisms for Blockchain Scalability
- AI Monitors Transaction Volume:
- If IoT authentication requests increase, AI automatically adjusts block creation times to reduce congestion.
- Adaptive Node Selection:
- AI selects trustworthy, low-latency validators dynamically to optimize processing speed.
- Real-Time Fraud Prevention:
- AI detects suspicious blockchain transactions, blocking fraudulent authentication attempts before validation.
- Lower transaction costs by dynamically adjusting consensus complexity.
- Faster authentication processing through real-time validator selection.
- Energy-efficient blockchain execution, extending IoT device battery life.
4.4. Discussion Summary
- A layered architecture enabling localized consensus and global verifiability.
- AI-based adaptive anomaly detection and consensus modulation.
- Evaluation on synthetic data replicating multi-modal attack vectors.
5. Conclusions
Funding
Data Availability Statement
Conflicts of Interest
References
- Cervantes, R. The Impact of 5G on Network Security and IoT. C Solutions IT. Available online: https://csolutionsit.com/impact-5g-network-security-iot/ (accessed on 2 March 2025).
- Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. Blockchain for IoT security and privacy: The case study of a smart home. In Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kona, HI, USA, 13–17 March 2017; pp. 618–623. [Google Scholar] [CrossRef]
- Bhat, S.A.; Sofi, I.B.; Chi, C.-Y. Edge Computing and Its Convergence with Blockchain in 5G and Beyond: Security, Challenges, and Opportunities. IEEE Access 2020, 8, 205340–205373. [Google Scholar] [CrossRef]
- Zhang, J.; Yuan, L.; Xu, S. A lightweight blockchain-based access control scheme for integrated edge computing in the internet of things. arXiv 2021, arXiv:2111.06544. [Google Scholar] [CrossRef]
- Rathore, S.; Park, J.H.; Chang, H. Deep Learning and Blockchain-Empowered Security Framework for Intelligent 5G-Enabled IoT. IEEE Access 2021, 9, 90075–90083. [Google Scholar] [CrossRef]
- Mollah, M.B.; Azad, A.K.; Zhang, Y. Secure Targeted Message Dissemination in IoT Using Blockchain Enabled Edge Computing. IEEE Trans. Consum. Electron. 2024, 70, 5389–5400. [Google Scholar] [CrossRef]
- Ragul, M.; Aloysius, A.; Arulkumar, V. Advancing IoT Security through Blockchain-Driven Dynamic Trust Evaluation. Indian J. Sci. Technol. 2025, 18, 526–538. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Ding, M.; Pathirana, P.N.; Seneviratne, A. Blockchain and AI-Based Solutions to Combat Coronavirus (COVID-19)-Like Epidemics: A Survey. IEEE Access 2021, 9, 95730–95753. [Google Scholar] [CrossRef]
- Ruzbahani, A.M. AI-Protected Blockchain-based IoT environments: Harnessing the Future of Network Security and Privacy. arXiv 2024, arXiv:2405.13847. [Google Scholar] [CrossRef]
- Ramezan, G.; Meamari, E. zk-IoT: Securing the Internet of Things with Zero-Knowledge Proofs on Blockchain Platforms. arXiv 2024, arXiv:2402.08322. [Google Scholar] [CrossRef]
- Rahman, A.; Kundu, D.; Debnath, T.; Rahman, M.; Islam, M.J. Blockchain-based AI Methods for Managing Industrial IoT: Recent Developments, Integration Challenges and Opportunities. arXiv 2024, arXiv:2405.12550. [Google Scholar] [CrossRef]
- Kumar, S.; Banka, H.; Kaushik, B. Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing. Wirel. Networks 2023, 29, 2105–2126. [Google Scholar] [CrossRef]
- Babu, E.S.; Barthwal, A.; Kaluri, R. Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks. Comput. Commun. 2022, 199, 10–29. [Google Scholar] [CrossRef]
- Wang, C. Towards Effective Fusion and Forecasting of Multimodal Spatio-temporal Data for Smart Mobility. arXiv 2024, arXiv:2407.16123. [Google Scholar] [CrossRef]
- Tuli, S.; Mahmud, R.; Tuli, S.; Buyya, R. FogBus: A Blockchain-based Lightweight Framework for Edge and Fog Computing. arXiv 2018, arXiv:1811.11978. [Google Scholar] [CrossRef]
- Cheng, G.; Chen, Y.; Deng, S.; Gao, H.; Yin, J. A Blockchain-Based Mutual Authentication Scheme for Collaborative Edge Computing. IEEE Trans. Comput. Soc. Syst. 2021, 9, 146–158. [Google Scholar] [CrossRef]
- Khan, B.U.I.; Goh, K.W.; Zuhairi, M.F.; Putra, R.R.; Khan, A.R.; Chaimanee, M. A Scalability Enhancement Scheme for Ethereum Blockchains: A Graph-based Decentralized Approach. Eng. Technol. Appl. Sci. Res. 2024, 14, 17725–17736. [Google Scholar] [CrossRef]
- Puthal, D.; Mohanty, S.P.; Yanambaka, V.P.; Kougianos, E. PoAh: A Novel Consensus Algorithm for Fast Scalable Private Blockchain for Large-scale IoT Frameworks. arXiv 2020, arXiv:2001.07297. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Ding, M.; Pathirana, P.N.; Seneviratne, A.; Li, J.; Poor, H.V. Federated Learning for Internet of Things: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 2021, 23, 1622–1658. [Google Scholar] [CrossRef]
- Hewa, T.; Braeken, A.; Liyanage, M.; Ylianttila, M. Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing. IEEE Trans. Ind. Inform. 2022, 18, 7174–7185. [Google Scholar] [CrossRef]
- Jude, T. Performance and Scalability of Blockchain Protocols in 5G IoT Environments. 2024. Available online: https://www.researchgate.net/publication/389435436_Performance_and_Scalability_of_Blockchain_Protocols_in_5G_IoT_Environments (accessed on 17 April 2025).
- Ejaz, M.; Kumar, T.; Kovacevic, I.; Ylianttila, M.; Harjula, E. Health-BlockEdge: Blockchain-Edge Framework for Reliable Low-Latency Digital Healthcare Applications. Sensors 2021, 21, 2502. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Pathirana, P.N.; Ding, M.; Seneviratne, A. Blockchain for 5G and beyond networks: A state of the art survey. J. Netw. Comput. Appl. 2020, 166, 102693. [Google Scholar] [CrossRef]
- Oliveira, M.; Chauhan, S.; Pereira, F.; Felgueiras, C.; Carvalho, D. Blockchain Protocols and Edge Computing Targeting Industry 5.0 Needs. Sensors 2023, 23, 9174. [Google Scholar] [CrossRef] [PubMed]
- Rathi, V.K.; Chaudhary, V.; Rajput, N.K.; Ahuja, B.; Jaiswal, A.K.; Gupta, D.; Elhoseny, M.; Hammoudeh, M. A Blockchain-Enabled Multi Domain Edge Computing Orchestrator. IEEE Internet Things Mag. 2020, 3, 30–36. [Google Scholar] [CrossRef]
- Xu, X.; Weber, I.; Staples, M.; Zhu, L.; Bosch, J.; Bass, L.; Pautasso, C.; Rimba, P. A Taxonomy of Blockchain-Based Systems for Architecture Design. In Proceedings of the 2017 IEEE International Conference on Software Architecture (ICSA), Gothenburg, Sweden, 3–7 April 2017; pp. 243–252. [Google Scholar] [CrossRef]
- Zhukabayeva, T.; Zholshiyeva, L.; Karabayev, N.; Khan, S.; Alnazzawi, N. Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions. Sensors 2025, 25, 213. [Google Scholar] [CrossRef]
- Jangirala, S.; Das, A.K.; Vasilakos, A.V. Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment. IEEE Trans. Ind. Informatics 2019, 16, 7081–7093. [Google Scholar] [CrossRef]
- Nkenyereye, L.; Tama, B.A.; Shahzad, M.K.; Choi, Y.-H. Secure and Blockchain-Based Emergency Driven Message Protocol for 5G Enabled Vehicular Edge Computing. Sensors 2019, 20, 154. [Google Scholar] [CrossRef]
- Zhang, K.; Zhu, Y.; Maharjan, S.; Zhang, Y. Edge Intelligence and Blockchain Empowered 5G Beyond for the Industrial Internet of Things. IEEE Netw. 2019, 33, 12–19. [Google Scholar] [CrossRef]
- Gao, J.; Agyekum, K.O.-B.O.; Sifah, E.B.; Acheampong, K.N.; Xia, Q.; Du, X.; Guizani, M.; Xia, H. A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks. IEEE Internet Things J. 2019, 7, 4278–4291. [Google Scholar] [CrossRef]
- Gumaei, A.; Al-Rakhami, M.; Hassan, M.M.; Pace, P.; Alai, G.; Lin, K.; Fortino, G. Deep Learning and Blockchain with Edge Computing for 5G-Enabled Drone Identification and Flight Mode Detection. IEEE Netw. 2021, 35, 94–100. [Google Scholar] [CrossRef]
- Hewa, T.; Braeken, A.; Ylianttila, M.; Liyanage, M. Multi-Access Edge Computing and Blockchain-based Secure Telehealth System Connected with 5G and IoT. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352–375. [Google Scholar] [CrossRef]
- Nkenyereye, L.; Nkenyereye, L.; Jang, J.-W. Convergence of Software-Defined Vehicular Cloud and 5G Enabling Technologies: A Survey. Electronics 2023, 12, 2066. [Google Scholar] [CrossRef]
- Chen, X.; Nguyen, K.; Sekiya, H. On the Latency Performance in Private Blockchain Networks. IEEE Internet Things J. 2022, 9, 19246–19259. [Google Scholar] [CrossRef]
- Asif, M.; Aziz, Z.; Bin Ahmad, M.; Khalid, A.; Waris, H.A.; Gilani, A. Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities. Sensors 2022, 22, 2604. [Google Scholar] [CrossRef] [PubMed]
- Dabbagh, M.; Choo, K.-K.R.; Beheshti, A.; Tahir, M.; Safa, N.S. A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities. Comput. Secur. 2021, 100, 102078. [Google Scholar] [CrossRef]
- Wang, Y.; Zhang, Q.; Li, K.; Tang, Y.; Chen, J.; Luo, X.; Chen, T. iBatch: Saving Ethereum fees via secure and cost-effective batching of smart-contract invocations. In Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, in ESEC/FSE 2021, Athens, Greece, 23–27 August 2021; Association for Computing Machinery: New York, NY, USA, 2021; pp. 566–577. [Google Scholar] [CrossRef]
- Choo, K.-K.R. Internet of Things (IoT) Security and Forensics: Challenges and Opportunities. In Proceedings of the 2nd Workshop on CPS&IoT Security and Privacy, in CPSIoTSec ’21, New York, NY, USA, 15 November 2021; Association for Computing Machinery: New York, NY, USA, 2021; pp. 27–28. [Google Scholar] [CrossRef]
- Mandal, M.; Chishti, M.S.; Banerjee, A. Investigating Layer-2 Scalability Solutions for Blockchain Applications. In Proceedings of the 2023 IEEE International Conference on High Performance Computing & Communications, Data Science & Systems, Smart City & Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), Melbourne, Australia, 17–21 December 2023; pp. 710–717. [Google Scholar] [CrossRef]
- Rebello, G.A.F.; Camilo, G.F.; de Souza, L.A.C.; Potop-Butucaru, M.; de Amorim, M.D.; Campista, M.E.M.; Costa, L.H.M.K. A Survey on Blockchain Scalability: From Hardware to Layer-Two Protocols. IEEE Commun. Surv. Tutorials 2024, 26, 2411–2458. [Google Scholar] [CrossRef]
- Jain, N.; Husain, S.O.; Goyal, S.; Hariharasudhan, S.; Victor, M. Manjula Predictive Analytics for Network Traffic Management. In Proceedings of the 2024 IEEE International Conference on Communication, Computing and Signal Processing (IICCCS), Asansol, India, 19–20 September 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Bathe, A.B.; Balvalli, A.V.; Kadam, A.R.; Paul, A.; Dharpawar, H.P.; Mahamuni, C.V. Improving Scalability in Smart Grid Energy Trading Using Smart Contracts and Layer 2 Blockchain Solutions. In Proceedings of the 2024 4th International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS), Erode, India, 12–13 December 2024; pp. 1389–1400. [Google Scholar] [CrossRef]
Study | Blockchain Type | AI Integration | Target Domain | 5G Evaluation | Key Limitation |
---|---|---|---|---|---|
[2] | Permissioned | ✗ | Smart home IoT | ✗ | Early-stage, lacks scalability |
[3] | Hybrid | ✗ | Edge computing | ✗ | No performance metrics |
[5] | Public | ✓ (DL) | 5G IoT | ✗ | No Layer-2 scaling |
[9] | Public | ✓ (ML) | Generic IoT | ✗ | Limited scalability validation |
[10] | Public + ZKP | Partial | Embedded IoT | ✓ | No adaptive consensus |
[7] | Hybrid | ✗ | Large-scale IoT | Partial | No implementation details |
[11] | Hybrid | ✓ (AI + FL) | IIoT | ✓ | Complex integration |
This work | Hybrid | ✓ (CNN, LSTM) | 5G IoT | ✓ | Uses synthetic data |
Security Threat | Impact Level | Likelihood | Mitigation via Blockchain |
---|---|---|---|
Unauthorized Access | High | High | Decentralized authentication using blockchain-based identity verification. |
Data Tampering | High | Medium | Immutable blockchain ledger ensures data integrity. |
DDoS Attacks | Critical | Medium | Smart contracts limit repeated authentication requests, reducing attack vectors. |
Single Point of Failure | High | High | Blockchain decentralization eliminates dependency on centralized servers. |
Blockchain Type | Characteristics | Suitability for 5G IoT Security |
---|---|---|
Permissionless Blockchain | Fully decentralized, open to all participants, high transparency, requires high computational power (e.g., Bitcoin, Ethereum). | Not ideal for IoT due to high energy consumption and latency. |
Permissioned Blockchain | Access restricted to trusted nodes, higher efficiency, customizable security policies (e.g., Hyperledger Fabric, Quorum). | Best for 5G IoT, as it balances security, performance, and resource efficiency. |
Feature | Blockchain Authentication (e.g., Hyperledger, Ethereum) | OAuth (Centralized Token-Based) | Kerberos (Centralized Ticket-Based) |
---|---|---|---|
Security Robustness | High—Immutable ledger prevents tampering; cryptographic security ensures strong authentication | Medium—Tokens can be intercepted if not encrypted properly | Medium—Tickets are vulnerable to replay attacks and key theft |
Single Point of Failure (SPoF) | None—Decentralized, reducing the risk of a single point of failure | High—OAuth relies on a centralized identity provider | High—Kerberos authentication server is a single point of failure |
Tamper Resistance | High—All authentication transactions are cryptographically signed and immutable | Medium—Tokens are cryptographically signed; tampering is prevented unless encryption is weak or access tokens are leaked | Medium—Tickets can be replayed if not expired or if keys are compromised, though mitigated by time-stamped session tickets and short expiration windows |
Scalability | Medium—Transaction speed depends on blockchain type (permissioned blockchains are more scalable) | High—OAuth scales efficiently in web and cloud services | High—Kerberos scales well for enterprise networks but struggles with large-scale IoT |
Computational Overhead | Moderate—PoS significantly reduces energy cost compared to PoW, while PBFT introduces communication overhead but avoids heavy computation | Low—Lightweight authentication, but requires continuous token verification | Medium—Kerberos requires encryption but is optimized for corporate networks |
Real-time Performance | Medium—Latency depends on blockchain consensus (e.g., 1–10 sec for Hyperledger, 10+ min for Bitcoin) | High—OAuth tokens enable fast authentication in milliseconds | High—Kerberos supports real-time authentication through pre-shared tickets |
Privacy | High—Pseudonymous authentication; no central authority tracks credentials | Low—OAuth providers track user credentials and access logs | Low—Kerberos relies on a central key distribution centre (KDC), which can be compromised |
Resistance to DDoS Attacks | High—Decentralized nodes reduce the impact of attacks | Low—Centralized servers are vulnerable to high-traffic attacks | Medium—Kerberos is vulnerable to KDC overload but uses ticket expiration as a mitigation |
Method | Advantages | Limitations |
---|---|---|
Traditional Rule-Based Security | Simple implementation, deterministic decisions | High false positives, unable to detect evolving threats |
AI-Based Anomaly Detection | Adaptive, detects complex attack patterns, real-time threat mitigation | Requires training data, computationally intensive |
AI Model | How It Works | Use Case in Blockchain-Based IoT Authentication | Advantages |
---|---|---|---|
Convolutional Neural Networks (CNNs) | Learns spatial patterns in authentication transactions | Detects anomalies in blockchain logs based on transaction structure | Fast pattern recognition with high accuracy |
Long Short-Term Memory (LSTM) Networks | Captures temporal dependencies in transaction sequences | Identifies suspicious repetitive authentication failures and timing-based attacks | Effective for sequential data in time-series blockchain records |
Autoencoders | Learns normal behaviour and detects deviations | Flags deviations in blockchain authentication logs, reducing false positives | Self-learning, requires minimal labelled data |
Random Forest and Decision Trees | Classifies transactions as normal or suspicious | Detects fraudulent blockchain activities with interpretable results | Low computational cost, effective for structured datasets |
Reinforcement Learning (RL) | Continuously optimizes security rules based on attack patterns | Adapts authentication policies dynamically to minimize cyber threats | Self-improving, robust against evolving attacks |
Component | Description |
---|---|
Model Type | Long Short-Term Memory (LSTM) Neural Network |
Architecture | 2 stacked LSTM layers (128 units each) + 1 dense layer (sigmoid activation) |
Input Features | Timestamp, gas fee, authentication outcome (success/fail), device ID |
Input Format | Sliding window of 10 sequential transactions per sample |
Output | Binary anomaly score (0: normal; 1: anomaly) |
Loss Function | Binary cross-entropy |
Optimizer | Adam (learning rate = 0.001) |
Training Epochs | Max 100, with early stopping (patience = 10) |
Hyperparameter Tuning | Grid search (batch size, window size, number of LSTM units) |
Validation Split | 20% of training data |
Frameworks Used | TensorFlow 2.x, Scikit-learn |
Metric | Count | Mean | Std Dev | Min | 25% | 50% (Median) | 75% | Max |
---|---|---|---|---|---|---|---|---|
Gas Fee (ETH) | 500.0 | 0.005465 | 0.002642 | 0.001013 | 0.003206 | 0.005447 | 0.007808 | 0.009978 |
Metric | Count | Mean | Std Dev | Min | 25% | 50% | 75% | Max |
---|---|---|---|---|---|---|---|---|
Latency (s) | 500.0 | 172.50 | 177.86 | 0.00 | 44.00 | 115.00 | 236.50 | 1040.00 |
Success Rate (%) | 500.0 | 52.80 | 49.97 | 0.00 | 0.00 | 100.00 | 100.00 | 100.00 |
Parameter | Value |
---|---|
Total Authentication Attempts | 500 |
Successful Authentications | 52.8% |
Failed Authentications | 47.2% |
Total Blockchain Transactions | 500 |
Attack Simulation Percentage | 30% |
Metric | Definition and Relevance |
---|---|
Transaction Latency | Measures the time delay between an authentication request and its validation on the blockchain. Lower latency is crucial for real-time IoT applications. |
Throughput | Represents the number of successful authentication transactions per second. High throughput ensures scalability in large IoT networks. |
Energy Consumption | Evaluates the computational cost of blockchain transactions on IoT devices. Efficient authentication should minimize energy usage. |
Security Effectiveness | Assesses the resilience of the framework against unauthorized access, data tampering, and DDoS attacks. Higher effectiveness improves overall network reliability. |
Metric | Value |
---|---|
Average Transaction Latency | 172.50 s |
Maximum Latency | 1040.00 s |
Minimum Latency | 0.00 s |
Average Gas Fee per Transaction | ETH 0.005465 |
Transaction Success Rate | 52.80% |
Layer-2 Scaling Technique | How It Works | Benefits for IoT | Limitations |
---|---|---|---|
State Channels (e.g., Lightning Network, Raiden Network) | Off-chain authentication transactions with final settlement recorded on-chain | Reduces on-chain transaction load and speeds up authentication | Requires an initial on-chain transaction setup |
Sidechains (e.g., Plasma, Polygon) | Uses separate blockchain chains that periodically sync with the main blockchain | Allows lightweight authentication with faster processing | Additional security risks in cross-chain transactions |
Sharding | Splits the blockchain into smaller partitions to process transactions in parallel | Improves scalability for large IoT networks | Requires redesign of blockchain architecture |
Rollups (Optimistic and ZK-Rollups) | Bundles multiple transactions into a single on-chain record | Significantly reduces transaction fees and verification time | Computationally intensive for IoT nodes |
Feature | Permissionless Blockchain | Permissioned Blockchain | Hybrid Approach |
---|---|---|---|
Decentralization | High (fully open) | Low (restricted participants) | Medium (selective data decentralization) |
Transaction Speed | Slow (minutes) | Fast (milliseconds) | Optimized (fast local processing, periodic global verification) |
Energy Consumption | High (PoW, PoS) | Low (PBFT, RAFT) | Balanced (efficient local processing, minimal public blockchain interactions) |
Scalability | Limited | High | High |
Security | Strong | Medium | Strong |
AI Optimization Method | Consensus Mechanism | How It Works | Benefits for IoT Scalability |
---|---|---|---|
Reinforcement Learning-Based Consensus Selection | Adaptive PoS/DPoS | AI selects the most efficient consensus mechanism based on network load | Reduces transaction latency |
Federated Learning for Dynamic Validator Selection | Byzantine Fault Tolerance (PBFT) | AI-based model evaluates node reliability for validation | Increases security while reducing computation |
Deep Learning for Fraud Detection in Transactions | PoS/Hybrid Models | Detects fraudulent transactions before they reach consensus | Lowers unnecessary blockchain congestion |
Neural Networks for Energy Optimization | Hybrid PoS-PBFT | Adjusts blockchain verification complexity dynamically | Reduces energy costs for IoT devices |
Framework | Blockchain Type | AI Integration | Avg. Latency (s) | Gas Cost (ETH) | Anomaly Detection | Scalability Strategy |
---|---|---|---|---|---|---|
[22] | Public + Edge | ✗ | ~195 | 0.0081 | ✗ | Offloading |
[10] | Public + ZKP | Partial | ~200 | 0.0049 | ✗ | Zero-Knowledge Proofs |
[9] | Public | ✓ (ML) | ~178 | 0.0063 | ✗ | Static model policies |
[7] | Hybrid | ✗ | ~210 | 0.0070 | ✗ | Fog node orchestration |
[13] | Permissioned | ✗ | ~160 | Not available | ✗ | Localized blockchains |
EdgeChainGuard (this work) | Hybrid | ✓ (LSTM) | 172.5 | 0.0055 | ✓ | Layer-2 + Adaptive AI |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Reis, M.J.C.S. Blockchain-Enhanced Security for 5G Edge Computing in IoT. Computation 2025, 13, 98. https://doi.org/10.3390/computation13040098
Reis MJCS. Blockchain-Enhanced Security for 5G Edge Computing in IoT. Computation. 2025; 13(4):98. https://doi.org/10.3390/computation13040098
Chicago/Turabian StyleReis, Manuel J. C. S. 2025. "Blockchain-Enhanced Security for 5G Edge Computing in IoT" Computation 13, no. 4: 98. https://doi.org/10.3390/computation13040098
APA StyleReis, M. J. C. S. (2025). Blockchain-Enhanced Security for 5G Edge Computing in IoT. Computation, 13(4), 98. https://doi.org/10.3390/computation13040098