1. Introduction
The Internet of Things (IoT) has experienced unprecedented expansion in recent years, interconnecting billions of devices across diverse sectors [
1,
2]. Modern IoT applications encompass a wide array of domains, including smart manufacturing, intelligent home automation, connected healthcare systems, urban infrastructure, transportation networks, and precision agriculture [
3]. Market projections estimate that the number of IoT-connected devices will surpass 41 billion by 2027, with the global market valued at approximately USD 157.9 billion as of 2021 [
4]. This widespread integration of IoT technologies offers substantial benefits, such as real-time monitoring of assets, predictive maintenance in industrial settings, personalized health monitoring, efficient agricultural resource usage, and automation of domestic environments [
2,
3].
Despite the transformative potential of IoT, its rapid proliferation introduces significant security and privacy vulnerabilities [
5,
6,
7]. A majority of current IoT architectures depend on centralized cloud or edge-based infrastructures for data aggregation, processing, and decision-making [
8,
9]. Such centralization inherently creates single points of failure and becomes a focal target for cyberattacks, escalating the risks of data breaches, unauthorized system access, and privacy infringements. As emphasized in recent studies, IoT devices typically interoperate via centralized cloud infrastructures, necessitating strong trust and security frameworks [
5]. Attackers can exploit weaknesses across various layers of the IoT stack, including sensors, gateways, and cloud servers, leading to the compromise of data confidentiality, integrity, and system reliability [
6,
7].
Safeguarding data confidentiality, integrity, and user privacy within IoT ecosystems remains a formidable task [
5,
8,
10]. Implementing conventional cryptographic methods is particularly challenging due to the severe resource limitations of IoT devices. Sensors and embedded systems often operate with minimal computational power, restricted memory, and limited battery capacity [
5,
6]. Executing standard encryption protocols or running blockchain consensus algorithms on such devices can deplete their resources rapidly. Studies have shown that traditional cryptographic techniques may be unsuitable for resource-constrained environments, potentially introducing security gaps [
6,
9]. Similarly, the computational and storage demands of public-key cryptography and blockchain protocols often exceed the capabilities of low-power IoT hardware [
11,
12].
These limitations indicate that directly applying conventional security mechanisms in IoT systems is frequently impractical. There is a critical need for lightweight, tailored solutions that do not compromise security [
5,
11]. In this context, blockchain technology has emerged as a promising enabler of decentralized trust and security. By replacing centralized authorities with distributed ledgers, blockchain mitigates single points of failure and offers tamper-evident, auditable, and transparent data management [
4,
11,
12]. Its key attributes, including decentralization, immutability, transparency, and programmable smart contracts, make it highly appealing for enhancing IoT security [
4,
13,
14]. As suggested in recent studies, blockchain’s decentralized architecture can address key limitations in authentication and security management within the IoT ecosystem [
5]. By leveraging cryptographic hashes and smart contracts, blockchain can ensure strong data integrity, facilitate transparent auditing, and automate secure access control, all without dependence on a central authority [
4,
12,
13].
While blockchain offers several advantages, its integration into IoT infrastructures is not without significant challenges. Notably, blockchain systems often encounter performance and scalability limitations that are incompatible with the constraints of IoT deployments [
8,
15]. The consensus protocols and data replication mechanisms used in many public blockchains, particularly those based on proof-of-work, consume substantial computational power, bandwidth, and energy, making them ill-suited for battery-operated IoT devices [
8,
11,
16]. As highlighted in the recent literature, the convergence of blockchain and IoT introduces challenges in scalability, energy efficiency, and data privacy [
8]. Ensuring the ledger’s performance remains acceptable while respecting the limited computational and storage capabilities of individual devices is a pressing concern [
11,
12].
Furthermore, blockchain’s inherent transparency and immutability may conflict with user privacy, as sensitive information cannot be easily modified or deleted once recorded [
15,
17]. Addressing this transparency–confidentiality trade-off is a complex but essential aspect of secure IoT–blockchain integration [
8,
15].
These technical and architectural observations underscore the motivation for this study, while numerous surveys have addressed IoT security and blockchain technologies independently or in general terms, two significant gaps persist. First, there is a lack of a structured and comprehensive taxonomy detailing the unique threat models and privacy challenges introduced by the convergence of IoT and blockchain systems [
4,
18]. Second, existing studies often fail to propose practical and lightweight blockchain frameworks that are specifically optimized for the constrained computational environments typical of IoT devices [
5,
11,
12]. As noted in recent studies, current reviews do not adequately examine consensus algorithms that accommodate IoT’s hardware limitations, and there is a pressing need for explicit security taxonomies tailored to the IoT–blockchain intersection [
5,
8]. In response to these gaps, this work aims to (i) develop a systematic classification of IoT–blockchain threat vectors and (ii) propose a novel lightweight blockchain architecture that minimizes computational and energy overhead while retaining the security advantages of decentralized systems. Ultimately, this research seeks to bridge the divide between the security potential of blockchain and the operational realities of IoT deployments.
Furthermore, as will be seen, there are very few published reviews on the current topic. This research paper presents the development of the new IoT architecture that adopts blockchain technology to solve the privacy problem, thus filling the existing gaps. To the best of our knowledge, the survey presented in this paper is one of the early comprehensive systematic investigations aimed at studying privacy countermeasures and blockchain-based solutions against IoT threats as shown in
Table 1.
This research aims to accomplish the following:
Systematically analyze security and privacy risks arising from IoT–blockchain integration, emphasizing emergent threats like data deanonymization and consensus-layer exploits;
Evaluate the efficacy of blockchain’s decentralized architecture in addressing IoT’s CIA triad (Confidentiality, Integrity, Availability) challenges, particularly in resource-constrained environments;
Propose a lightweight, scalable framework that harmonizes blockchain’s security benefits with IoT’s operational demands, addressing gaps in existing solutions such as high computational overhead and poor interoperability.
The research questions are as follows:
How can blockchain’s decentralized architecture resolve IoT’s inherent security–privacy trade-offs without compromising scalability?
What application-specific adaptations are required to optimize blockchain for IoT’s resource constraints (e.g., low-power devices, real-time processing)?
Can blockchain provide end-to-end privacy guarantees in IoT ecosystems, and under what conditions?
In this paper, we make the following key contributions:
Taxonomy of Threats: We provide a comprehensive taxonomy of security and privacy threats at the IoT–blockchain intersection, integrating insights from IoT vulnerabilities and blockchain attacks. This taxonomy highlights how traditional IoT attacks (e.g., device compromise, data manipulation) are transformed or mitigated when blockchain is introduced.
Critical Analysis of Limitations: We critically analyze why standard cryptographic and blockchain techniques often fall short in IoT contexts. We detail the limitations of existing solutions in terms of scalability, energy consumption, and privacy, emphasizing the need for IoT-tailored designs.
Lightweight Blockchain Framework: We propose a novel lightweight blockchain framework optimized for IoT networks. Our design adjusts consensus methods and data structures to match IoT resource profiles, ensuring tamper resistance with minimal overhead. The framework also incorporates privacy-enhancing features to protect sensitive data on the blockchain.
Application Scenarios: We illustrate our findings and framework through use cases in representative IoT domains, such as smart home automation, connected healthcare monitoring, and precision agriculture. These examples demonstrate how the proposed taxonomy and framework can be applied to improve security and privacy in real-world IoT applications.
While prior studies, such as layer-specific threat analysis and sectoral blockchain–IoT use cases, provide foundational insights, they lack systematic methodologies for cross-domain privacy preservation. This paper bridges that gap through a structured literature review of 115 studies, from which a focused subset of 20 representative works is selected for detailed thematic analysis, revealing critical trends: (1) Smart contracts and federated learning enhance IoT data integrity but require novel encryption strategies to mitigate latency [
19,
20] and (2) hybrid consensus models (e.g., GHOSTDAG [
21]) outperform traditional mechanisms in throughput and fault tolerance but lack real-world validation. By addressing these gaps, our work establishes a roadmap for secure, sustainable IoT–blockchain ecosystems, empowering policymakers and practitioners to navigate evolving regulatory and technical landscapes. Compared with previous surveys that primarily summarize blockchain–IoT architectures, this study synthesizes insights from systematically reviewed literature to outline a conceptual lightweight blockchain framework that addresses security, privacy, and scalability challenges in resource-constrained IoT environments.
The rest of the paper is organized as follows.
Section 2 describes the research methodology in detail.
Section 3 presents a comparative analysis of existing approaches.
Section 4 outlines the background studies in detail.
Section 5 discusses the results and key findings of the study.
Section 6 highlights the challenges and future research directions. Finally,
Section 7 concludes the paper.
2. Methodology
This study follows the PRISMA 2020 guidelines to ensure methodological rigor and reproducibility. The systematic review process is structured into four phases, namely, identification, screening, eligibility assessment, and inclusion and exclusion criteria, which are deeply described in
Figure 1 and
Table 2. Systematic reviews serve as a consolidation of research conducted by expert review groups [
22,
23]. Their purpose is to locate and gather relevant data from various sources. Furthermore, they also seek to review and integrate the conclusions of this research toward the purposes of given practice and policy recommendations and, in several instances, practice or policy recommendations and, in some cases, future research [
24].
The Cochrane handbook defines systematic reviews as employing transparent and systematic methods that are deliberately chosen to minimize bias, resulting in more accurate outcomes that inform decision-making [
25]. These reviews follow a well-defined and predetermined process that incorporates comprehensive methodologies to ensure the accuracy and usefulness of the findings for end-users [
26]. Such reviews are considered a crucial foundation of evidence-based healthcare [
27] and are extensively employed to develop reliable clinical guidelines [
28].
This review adopts a structured and reproducible literature screening methodology to ensure analytical rigor. A comprehensive search was conducted across IEEE Xplore, Scopus, Web of Science, SpringerLink, and ScienceDirect using combinations of keywords including “IoT security,” “blockchain-enabled IoT,” “privacy-preserving blockchain,” and “decentralized IoT architectures.” Studies published between 2017 and 2025 were considered. After removing duplicates and non-peer-reviewed articles, papers were filtered based on relevance to blockchain-based security or privacy mechanisms in IoT environments. Only studies presenting architectural frameworks, consensus mechanisms, privacy-preserving models, or empirical validation were retained for critical analysis. This structured selection process enhances transparency and reduces selection bias.
2.1. Scope of the Review and Proposed Framework
This study comprises two complementary components: (i) a SLR conducted in accordance with PRISMA guidelines and (ii) a conceptual and experimentally evaluated lightweight blockchain framework. The systematic review synthesizes existing research and identifies key gaps, which inform the design of the proposed framework, while both components are integrated within a single study, they are explicitly distinguished throughout the manuscript to clearly separate literature-derived findings from the authors’ original contributions.
2.2. Sources of Data and Searching Approach
In accordance with the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) checklist, this systematic review adheres to the following procedures. The literature search was conducted across IEEE Xplore, Scopus, Web of Science, SpringerLink, and ScienceDirect, covering studies published between 2017 and 2025. Keywords included ‘IoT security,’ ‘blockchain-enabled IoT,’ and ‘privacy-preserving blockchain.’ This unified search strategy ensures consistency with the PRISMA-based methodology described above. This study only focused on papers published in English and accessible in journals only. Moreover, we screened the references section of related publications and grey literature to identify more relevant publications.
2.3. Selection of Articles and Data Extraction
To select the relevant reports for this research, the following criteria were considered, and reports containing a specific keyword description were included. The initial screening process involved evaluating the abstracts and titles, as well as conducting a comprehensive database search. The articles were classified into three classes: unsure, irrelevant, and relevant. Once all the relevant papers were identified, their full texts were thoroughly examined, and the necessary data were extracted and recorded.
2.4. Search String
“IoT blockchain security” OR “IoT blockchain privacy” OR “Challenges in IoT blockchain security” OR “Blockchain-based privacy and security in IoT” OR “Security challenges of blockchain in IoT” OR “Privacy concerns in IoT blockchain” OR “IoT blockchain privacy and security issues” OR “Blockchain solutions for IoT security and privacy” OR “IoT blockchain architecture for privacy and security.”
Figure 1 presents a visual representation of the literature search and study selection process. The initial database search yielded 1410 records. After removing duplicates, articles remained for title and abstract screening Of these, 980 documents were excluded for the following reasons: irrelevance to blockchain-enabled IoT systems, non-English language, non-peer-reviewed sources such as conference proceedings or preprints, and unavailability of full text. Following this exclusion, 258 records were assessed against the eligibility criteria. After full-text screening, 115 articles were selected for further evaluation. From this collection, 42 studies were included in the quantitative synthesis, while the remaining articles were utilized for qualitative analysis. Additionally, a representative subset of 20 studies was selected for in-depth thematic discussion in specific sections of the paper.
3. Comparative Analysis
To ensure comprehensive coverage and minimize selection bias, both backward and forward snowballing strategies were systematically applied in addition to structured database searches. Backward snowballing examined reference lists of eligible studies, while forward snowballing identified subsequent publications citing the included works. This iterative process was conducted until citation saturation was reached, defined as the stage at which no new relevant studies were identified through additional citation tracking, while the primary objective of this study was to conduct a SLR of blockchain-enabled security and privacy mechanisms in IoT systems, several of the included sources are themselves review articles. Consequently, parts of this analysis also reflect an umbrella-style synthesis that integrates insights from existing surveys alongside primary research studies. The final corpus of 115 studies, published between 2017 and 2025, reflects a broad and representative coverage of high-impact research on blockchain-enabled security and privacy mechanisms in IoT systems across leading journals and conferences. This saturation-driven selection process strengthens the methodological robustness of our PRISMA 2020-aligned review and enhances the reliability, transparency, and reproducibility of the synthesized findings.
Unlike prior narrative surveys, this review introduces a structured taxonomy of blockchain-enabled IoT security mechanisms categorized into (i) architectural integration models, (ii) consensus and validation strategies, (iii) privacy-preserving mechanisms, and (iv) scalability and resource optimization techniques. This layered classification enables systematic comparison across decentralized trust models, attack mitigation capabilities, and computational overhead constraints. The proposed taxonomy facilitates identification of architectural trade-offs between decentralization, latency, energy efficiency, and privacy guarantees in heterogeneous IoT ecosystems.
While numerous existing reviews have explored privacy and security challenges at the intersection of blockchain and IoT, most remain either domain-specific, conceptually limited, or lacking in rigorous comparative analysis across application sectors, as shown in
Table 3. They often emphasize architectural overviews or isolated use cases without offering unified frameworks or empirical synthesis. In contrast, this study presents a comprehensive and structured comparative analysis across diverse domains, including healthcare, industrial automation, and decentralized identity, while integrating up-to-date scholarly insights and highlighting overlooked challenges such as interoperability, real-time scalability, and cross-layer privacy enforcement. This broader and deeper examination not only fills critical gaps but also establishes a stronger foundation for future blockchain-IoT research and development.
The authors of [
29] proposed an anonymous auditing mechanism for blockchain-based IoT, utilizing cryptographic techniques to ensure privacy, traceability, and data integrity through five key mechanisms: encryption, minimization, mixing, private contracts, and differential privacy. The authors of [
30] developed an AI-integrated blockchain architecture to enforce privacy in IoT, addressing access control, consent, and data lifecycle management, and enabling adaptive defense against evolving threats. The authors of [
31] reviewed privacy-by-design in blockchain-IoT systems, focusing on decentralized identity and compliance. Their study emphasized user-centric privacy controls within GDPR-aligned frameworks.
The author of [
32] introduced a decentralized trust framework for industrial IoT using blockchain, targeting real-time integrity and data consistency, though limited to automation-focused evaluations. The authors of [
33] provided a broad review of blockchain–IoT cybersecurity threats, including Sybil attacks and smart contract flaws, but lacked practical implementation insights. The authors of [
34] explored structural challenges in Industry 5.0, such as latency and interoperability, suggesting sidechains and layered security without empirical validation. The authors of [
35] surveyed privacy-preserving techniques in healthcare IoT, highlighting encryption schemes and recommending federated learning to address real-time privacy gaps.
Overall, the comparative analysis of the reviewed studies reveals several consistent trends in blockchain-enabled IoT security research. Many studies focus on integrating lightweight consensus mechanisms and decentralized access control to address the resource constraints of IoT devices. Privacy-preserving techniques such as encryption, differential privacy, and decentralized identity management are frequently proposed to protect sensitive data in distributed environments. In addition, several works explore hybrid architectures combining blockchain with edge or fog computing to mitigate latency and scalability challenges. These findings highlight that effective blockchain–IoT systems require balanced design strategies that simultaneously address security, privacy, and performance constraints.
4. Background Studies
The following section outlines the background and critically reviews recent literature on blockchain-enabled IoT systems, with a particular focus on privacy and security mechanisms.
Figure 2 illustrates the conceptual structure of blockchain-enabled IoT systems, organizing the key elements identified in the literature into three major categories: core components, security and privacy mechanisms, and domain-specific implementations.
The Core Components section highlights the foundational aspects of integrating blockchain with IoT ecosystems. It begins with the growing exploitation and impact of IoT in modern connectivity, which has significantly increased the number of connected devices and data exchange across networks. This rapid expansion introduces security vulnerabilities in IoT ecosystems, such as unauthorized access, data tampering, and device manipulation. Blockchain is therefore presented as a paradigm shift in IoT security, offering decentralized trust, immutable data records, and transparent transaction verification. However, the integration of blockchain with IoT also introduces challenges and limitations, including scalability issues, resource constraints of IoT devices, and interoperability between heterogeneous systems.
The Security and Privacy Mechanisms section presents the major technical approaches used to secure blockchain-IoT environments. This includes consensus mechanisms in IoT–blockchain systems, such as proof-of- stake (PoS), which help validate transactions while reducing computational overhead. The figure also highlights commonly used blockchain frameworks for IoT applications, including platforms such as Hyperledger and IOTA. In addition, the section outlines threat mitigation strategies, such as protection against Sybil attacks and the use of hybrid consensus mechanisms to improve system resilience.
Privacy protection is addressed through privacy-preserving architectures, including techniques such as federated learning and homomorphic encryption that enable secure data processing without exposing sensitive information. Finally, access control solutions, including smart contracts and reputation-based mechanisms, are presented as methods for managing authorization and secure interactions among IoT devices.
The Domain-Specific Implementations section focuses on real-world applications and performance outcomes of blockchain-enabled IoT systems. Several case studies in blockchain–IoT implementations are highlighted, including platforms such as IBM Food Trust, Helium Network, and Filament’s Blocklet protocol, which demonstrate practical deployments of blockchain technology in supply chains and decentralized IoT networks. The figure also presents performance metrics used to evaluate these systems, such as latency reduction using PBFT consensus, fraud reduction in blockchain-based supply chains, and energy savings achieved through optimized blockchain architectures.
Overall, the figure provides a structured overview of how blockchain technology supports IoT ecosystems by combining foundational components, security mechanisms, and real-world implementations, thereby illustrating the key research directions and technological developments in blockchain-enabled IoT systems.
4.1. Consensus Mechanisms in IoT–Blockchain Systems
Existing studies highlight significant trade-offs between consensus mechanisms and IoT requirements. Proof of work (PoW), while robust for public blockchains like Bitcoin, is widely deemed impractical for IoT due to its high energy consumption and latency. For instance, it has been demonstrated that PoW’s 10-min block times and energy-intensive mining are incompatible with resource-constrained IoT devices [
36]. In contrast, proof of stake (PoS) offers a balance between scalability and energy efficiency, where PoS reduced energy use by 70% compared to PoW in smart home IoT networks [
37].
For latency-sensitive IoT applications (e.g., industrial automation, healthcare), PBFT and IOTA’s Tangle DAG-based protocol are preferred. Studies have reported PBFT’s sub-second latency in industrial IoT setups, while IOTA’s Tangle has been validated for real-time sensor data streaming in smart cities, highlighting its suitability for high-frequency microtransactions [
38,
39].
Unlike traditional blockchains that store transactions in sequential blocks forming a linear chain, IOTA’s Tangle uses a DAG structure in which each new transaction validates two previous transactions. This removes the need for miners and enables parallel transaction processing, which improves scalability and supports feeless microtransactions suitable for high-frequency IoT data exchange. However, the approach introduces trade-offs, including probabilistic transaction finality and less mature smart contract support compared to conventional blockchain platforms.
4.2. Blockchain Frameworks for IoT Applications
The literature reveals distinct advantages and limitations of blockchain frameworks in IoT contexts. IOTA is frequently cited for its feeless transactions and scalability in edge IoT environments. For example, a case study showcased IOTA’s use in vehicle-to-grid (V2G) systems, where its DAG structure enabled seamless microtransactions between electric vehicles (EVs) and charging stations [
40]. However, its immature smart contract support limits complex automation [
41].
Hyperledger Fabric, a permissioned framework, is favored in enterprise IoT for its modularity and privacy features.An implementation in pharmaceutical supply chains demonstrated Hyperledger’s ability to enforce granular access control for IoT sensor data [
42]. Meanwhile, Hedera Hashgraph has emerged as a contender for decentralized IoT ecosystems due to its asynchronous byzantine fault tolerance (ABFT) consensus, achieving 10,000+ transactions per second (TPS) in smart city trials [
43].
4.3. Threat Mitigation Strategies
Research emphasizes hybrid and reputation-based approaches to address IoT–blockchain vulnerabilities. Sybil attacks, a critical threat in decentralized IoT networks, are mitigated through reputation systems like IOTA’s node scoring mechanism. As observed in prior studies, nodes with higher reputational scores in IOTA networks exhibited up to 95% reliability in data validation, reducing malicious actor infiltration [
44].
For 51% attacks, hybrid consensus models (e.g., PoS + PBFT) are gaining traction. A recent study proposed a lightweight hybrid protocol for agricultural IoT, combining PoS’s energy efficiency with PBFT’s fault tolerance to achieve high resistance against attacks [
45]. Similarly, Layer-2 solutions like Polygon’s SDK are being adopted to alleviate scalability bottlenecks. Researchers [
46] demonstrated Polygon’s use in industrial IoT, where off-chain batch processing reduced on-chain latency by 80% while maintaining auditability.
Blockchain-enabled IoT systems constitute a specialized class of cyber-physical systems (CPSs) where computational elements monitor and control physical processes through networked sensors and actuators. Unlike traditional CPS security approaches that focus on control-theoretic countermeasures—such as adaptive sliding mode control for FDI attacks [
47,
48], disturbance-observer-based fuzzy control for input-delayed systems [
49], or neural adaptive control for nonlinear switched systems [
50] blockchain-based security addresses the network and data layers through cryptographic consensus rather than real-time control loop adjustments.
While control-theoretic methods excel at mitigating physical-layer anomalies (e.g., sensor measurement corruption) through robust controller design, blockchain solutions target data integrity, decentralized trust, and auditability across distributed device networks [
50]. The key distinction lies in the threat model: control approaches assume adversaries manipulate sensor readings or actuator commands within bounded parameters, whereas blockchain assumes adversaries may control multiple network nodes and attempts to tamper with historical records. Our framework complements rather than replaces control-theoretic security by ensuring the integrity of data that feeds into control algorithms—a critical prerequisite for the effectiveness of any feedback control system.
4.4. The Evolution and Impact of IoT in Modern Connectivity
The rapid expansion of networking media has led to a significant increase in the number of advanced and intelligent wireless IoT devices [
51]. Consequently, the complexity of diversified IoT services has also grown [
52]. IoT, which aims to connect various environmental products and enable data exchange through the Internet, is a transformative movement that enhances our quality of life through the development of new services and applications [
53].
By utilizing affordable sensors, the IoT enables multiple devices and objects in our surroundings to be identifiable, observable, and locatable. This facilitates the seamless gathering, retrieval, and sharing of information [
54]. This type of IoT device includes household appliances like adapters, bulbs, refrigerators, meters, temperature controls and ovens, smoke alarms, RFIDs, accelerometers, heartbeat monitors, parking lot sensors, and automotive sensors [
55].
4.5. Security Vulnerabilities in IoT Ecosystems
However, the open nature of IoT implementation and its limited resources make it susceptible to disruptive attacks. Compromised Internet-connected devices can be utilized as botnets, posing significant security risks to the IoT ecosystem and the broader Internet [
56]. Therefore, ensuring the security and privacy of IoT systems is crucial, and it relies heavily on the functional implementation of the IoT itself [
57].
Figure 3 illustrates the trade-off between security and privacy in blockchain-enabled IoT systems. Security mechanisms such as strong encryption, blockchain immutability, smart-contract-based access control, and intrusion detection enhance system transparency, trust, and auditability.
However, these mechanisms may reduce privacy by enabling traceability of user activities. Conversely, privacy-preserving approaches such as anonymization, federated learning, homomorphic encryption, and selective disclosure aim to protect sensitive data but may limit transparency and monitoring capabilities. The figure highlights this balance and suggests context-aware architectural solutions, including dynamic privacy layers, hybrid encryption models, and modular policy enforcement to achieve an effective balance between security and privacy requirements. Thus, the overall goals of IoT security solutions are to protect confidentiality, privacy, devices and data, infrastructure, IoT customers, and availability of IoT ecosystem services [
58].
4.6. Blockchain as a Paradigm Shift in IoT Security
It is now clear that blockchain technology is a viable path to overcoming multiple network issues [
59]. Furthermore, the continuous enhancement of popular cryptocurrencies including but not limited to Bitcoin has attracted volumes of attention and has equally heightened realization of the core bases of blockchain [
60,
61]. This success of Bitcoin has guaranteed the efficiency, anonymity and reliability of the use of the blockchain technology in numerous sectors and services; IoT, voting solutions, finance, medical practices, and supply chain, storage technology [
62].
As the foundational technology of the Bitcoin network, blockchain is also a platform for designing and constructing financial and non-financial applications. Blockchain is perceived to be one of the solutions for dealing with the challenge of the negative impact of fake media and for setting up a mechanism that will ensure that no one tampers with the decentralized information network [
63]. This technology provides safety and certainty of the transfers and the resources utilized, which makes this gravitate towards numerous types of use [
64]. Following the evolving trends of blockchain, more support for next-generation applications and a wide range of fundamental use cases [
65] are anticipated. In addition, it is consistently viewed as an essential technology to facilitate financial activities and accompany the metadata and agreements essential to commerce. Initially used for recording monetary transactions, blockchain ensures transparency and traceability of transactions [
66].
4.7. Lightweight Blockchain Framework Architecture for IoT Environments
By several studies’ analysis, we proposed a lightweight blockchain framework architecture for IoT environments [
67,
68,
69]. The proposed lightweight blockchain architecture is designed to address the resource constraints and scalability challenges of IoT systems while preserving security, decentralization, and data integrity, as shown in
Figure 4. The framework consists of four key players: (1) Perception Layer (IoT Devices): This layer includes diverse IoT devices such as sensors, wearables, and embedded systems that continuously generate data. Due to limited computational power, these devices offload cryptographic operations and block interactions to intermediary nodes. (2) Edge Layer (Lightweight Gateways): Acting as intermediaries, lightweight edge nodes (e.g., Raspberry Pi, edge servers) collect, preprocess, and validate data from perception-layer devices [
70,
71,
72]. These nodes perform lightweight cryptographic operations and serve as transaction relays to the blockchain network. (3) Blockchain Layer (Private or Consortium Chain): This layer hosts the core blockchain network, operating on a lightweight consensus mechanism such as PBFT, DPoS, or PoET to support low-latency and high-throughput operations. Smart contracts embedded here govern access control, identity management, and data logging. (4) Application Layer (Service Interfaces and Analytics): This top layer provides services such as data analytics, anomaly detection, remote monitoring, and secure API access. It interacts with authorized clients (e.g., healthcare providers, logistics managers) through authenticated endpoints governed by smart contract rules.
The framework ensures the following: End-to-end data integrity through immutable blockchain records. Energy-efficient consensus to support IoT deployment at scale [
73,
74]. Privacy-preserving access control using pseudonymous identities and fine-grained smart contracts. Scalability and modularity, enabling use in domains such as smart healthcare, agriculture, and supply chain tracking.
4.8. Challenges and Limitations in Blockchain–IoT Integration
In the context of deploying IoT, which encompasses areas like the military, citizen livelihood, business, and industry, network security becomes paramount. The integration of IoT applications raises concerns related to security, traffic/bandwidth, privacy, scalability and system mobility. With the increasing complexity of IoT frameworks, the number of interconnected devices and objects also grows, necessitating the resolution of usability issues for the effective implementation of authorization, storage, verification, integrity, confidentiality, trust, authentication, and maintenance in real-life IoT-based applications [
75]. The severity of harm and damages, such as hacker interference, virus damage, and malicious code attacks, will be significantly reduced with the introduction of computer protection measures [
76]. Blockchain, as a distributed network, has gained substantial attention in enhancing IoT security [
77].
Therefore, the utilization of blockchain innovation can offer effective solutions to the challenges faced by IoT systems. Evaluating connection history in a blockchain provides audibility but also brings new privacy threats from presenting the full history of IoT interface communication to users [
78]. Nevertheless, the implementation of blockchain is a challenge in the IoT due to the following limitations, especially in low power and processing requirements [
21]. Hence, this paper aims to examine the challenges associated with blockchain privacy in the context of IoT.
4.9. Blockchain Integration in IoT: Security Mechanisms and Challenges
The field of IoT has witnessed significant advancements, employing various intelligent applications. The integration of IoT software necessitates the use of sensors, intelligent systems, and actuators [
79]. However, the continuous emergence of sophisticated and high-level attacks poses a significant challenge. In recent years, both the scientific community and industry have turned to blockchain technology, which offers six key features: immutability, decentralization, autonomy, transparency, anonymity, and open-source nature [
80]. Blockchain is gradually being recognized as a solution for enhancing security in IoT applications. Its fundamental principle lies in ensuring the accuracy and tamper-proof nature of data generated by users or computers on the blockchain. Although blockchain promotes honesty and non-repudiation to some extent, it falls short in protecting the anonymity and privacy of data and devices [
81]. As a result, this subsection presents research work that provides insights and develops frameworks involving security models of IoT and blockchain. From the total corpus of 115 reviewed studies, we selected a subset of 20 representative articles related to privacy and blockchain challenges in IoT for detailed discussion, organizing them into four sections: management data, methods of access control, smart health, and home.
The advent of the Internet of Things (IoT) has the potential to revolutionize our understanding of information and communication technology. The application of IoT has been extensively explored in various domains, including communication, networking, business, security, and management communities [
59]. In order to facilitate network-related operations, the IoT ecosystem requires reliability, security, scalability, and resilience. In this context, the data management node plays a crucial role by encrypting and dividing the accumulated data from IoT devices, storing it in multiple nodes within the distributed network [
82].
Afterwards, the details of the transaction are recorded in a blockchain: the address of the shared file, data hash, and an invoice assist in preventing the modification of the path where the file can be accessed [
82]. For today’s world, which is as digitalized as it has hardly been in the past, it has become essential to endow sensors, computers, and computational objects with their ability to operate autonomously. Manual management of massive volumes of data has become practically unfeasible.
Building IoT systems that function safely, effectively, and autonomously is a challenging task. However, the integration of blockchain technology holds promise in ensuring the secure implementation of IoT devices, while blockchain is not a panacea for all IoT threats, it does play a significant role in addressing specific security issues [
83].
4.10. Privacy-Preserving Architectures for Blockchain-IoT Systems
In [
81], researchers have presented a new architecture of privacy-preserving blockchain based on IoT applications are attribute-based encryption (ABE) techniques. This approach was the first to use encryption with the blockchain technology to provide varied and specific control of the transaction data in accordance with attributes. The model proposed here added only minor changes to the blockchain protocol to conform to the ABE approach while retaining the basic security features of the blockchain. The privacy and security of the proposed model were discussed, and measures against the enumerated attacks were proposed. The results show that indeed applying feature-dependent encryption (FDE) in a blockchain–IoT (BIoT) system can provide improved privacy protection with a relatively low computational cost.
For distributed multiple parties, the authors of [
84] formulated a secure data sharing framework through the use of blockchain technology. They also improved the data sharing process with privacy-preserving federated learning that changed the problem into a machine learning one. Instead of providing the results in the form of individual values of the coefficients, they saved people’s personal data by presenting the model structure. However, that is not all, they also incorporated FL into the blockchain consensus mechanism to make use of federated training for consensus computer operations. Actual experiments carried out on real-world databases proved that the proposed data sharing model provided excellent precision, great performance and improved security.
For privacy-preserving remote data integrity checking of IoT information management, the authors of [
85] adapted blockchain to develop a novel IoT information management model that does not involve trusted third parties. The framework they proposed was amenable to real-world instantiations within data management systems. Their design was actually able to mitigate the data loss privacy issues by doing away with the third parties’ participation. These key factors include privacy, correctness, and public authentication security and dynamics. Practical assessment highlighted the effectiveness of the designed network, especially in relation to the assessment and calculation.
Based on this, the authors of [
19] proposed a secure support vector machine which the training scheme based on the blockchain and encrypted IoT data. They used the blockchain techniques, on which they developed safe and efficient communication of multiple data providers. The obtained IoT data was, therefore, encrypted and stored on a distributed ledger. The researchers use a holomorphic cryptosystem that was called paillier to build other secure constructions for example, secure polynomial multiplication and secure contrast. This research paper presents an overview of the development of a secure training algorithm for synchronous SVM, which requires at most two interactions in one round thus effectively updating the need for a trusted third party. Security check studies have therefore established that the degree of security assessment, which the model has proposed, actually provides robust security for the highly sensitive data of each data supplier and the specifications of support vector machine for the data analysts. The proposed method is evaluated thoroughly through investigations.
4.11. Access Control Solutions in IoT
Recent incidents of over 150,000 exploited IoT systems have emphasized the crucial role of access control in security breaches [
86]. Inadequate implementation of access control mechanisms can pose significant privacy and economic risks to individuals and organizations [
87]. Fair Access is an access control platform that utilizes intelligent contracts and blockchain technology for maintenance. Smart contracts facilitate the exchange of access control policies and access tokens for compliance [
88]. Leveraging the inherent characteristics of blockchain (distribution, full-fledged functionality, and an append-only ledger), Fair Access offers a promising solution to address the aforementioned challenges in IoT access management. However, implementing blockchain technology for access control functions and addressing the issues of transparency versus privacy and traceability remain complex tasks.
Access control presents substantial obstacles in the context of IoT. Due to the limited capabilities of smart objects, enforcing current access control requirements is challenging. Relying on strong and trusted third parties to manage access control logic can compromise user privacy. To tackle these new challenges, researchers [
89] demonstrated the potential of blockchain, the innovative system behind bitcoin, as an enticing solution.
In the presented study, the authors introduced a new system called FairAccess, which acts as a common pseudonym as well as for authorization control and privacy preservation. This system utilizes blockchain technology that makes it easier to enforce consensus and control access to the restricted devices. Authors described the future opportunities of blockchain technology in eradicating the privacy challenge of IoT data [
90]. They designed a framework model that uses smart contracts to initialize a trustless access control process. This model also seeks to put full control of the data in the hands of the data consumer and control the access that a third party has to the data. Furthermore, the authors introduced an upgrade scheme on the blockchain to disable future tampering of the IoT systems.
For IoT data, the authors of [
91] presented an end-to-end privacy-preserving solution that utilized blockchain. Their framework employs smart contracts to ensure that data owners and consumers conform to privacy expectations as well as the consumer demands. The authors described the configuration of the system and pointed out the system’s parts and the roles those parts play. It also gave them a practical application they could use to explain how the platform works in their entire operation.
4.12. Blockchain-Driven Security Frameworks for Smart Home IoT
While conducting their research, the authors of [
92] outlined some of the shortcomings of the contemporary sphere of IoT security that is centralized and offered the application of blockchain as a potential solution. Their intention was to set what they referred to as a distributed platform to increase security and privacy in IoT devices. To this end, they proposed Fair Access and Privacy-Preserving Permissioned Distributed Access Control (PPPDAC), which provide accurate access control for IoT devices with user anonymity for the end-users. The proposed system addressed lightweight and privacy-preserving access control, specially designed for a new blockchain technology that is permissionless and public. This offered architecture is able to take full advantage of the strengths of blockchain to meet the security and privacy demands of IoT but at the same time solve for the issues related to the incorporation of blockchain technology within IoT systems. Business and industrial sectors have generated considerable interest in IoT over the past years as a research domain. There are many novelties in the integration of the technologies based on the IoT model, for instance, smart home technologies and smart traffic control technologies. All these tools work independently and operate automatically using such components as sensors, actuators, and real-time signal processing. Manufacturers of home appliances are looking forward to their customers’ opinions on the enhancement of their outputs and to building a robust smart home ecosystem as shown in
Figure 5. Thus, there is a need to secure privacy and security in IoT systems to maximize the technology’s possibilities.
Blockchains decentralized structure has made significant strides in enhancing security measures. In late recent times, Internet of Things (IoT) devices have grown from being a concept to being mainstream in practices such as development, shopping, and homes. Nonetheless, the limited security measures in these devices pose opportunities for unauthorized access due to their resource constraints. To address this, a blockchain system is utilized to record transactions between smart home devices, enhancing security. Despite the numerous advantages that IoT offers over traditional communication technologies in the context of smart homes, these implementations remain rare. Extensive research is available on IoT and the security and privacy of smart homes. Additionally, while the home gateway handles packet exchange for smart homes, they are still vulnerable to attacks conducted through subscribers’ smartphones.
4.13. Privacy and Device Management in Smart Home Ecosystems
In [
93], researchers focused on the key components of the smart home tier and examined various transactions and methods associated with it. To access privacy and security aspects, they conducted an integrated empirical analysis. The results of their simulations indicated that their approach imposes limited and manageable overheads on low-resource IoT devices. The authors emphasized that despite these overheads, the notable security and privacy advantages offered make them worthwhile.
In another study [
77], researchers investigated the categorization of devices in IoT-based blockchains. They highlighted the privacy concerns arising from device recognition in such systems. Unlike traditional approaches where physical network access is required for device categorization, the blockchain-based IoT allows any individual to classify devices irrespective of their position. As an example, they selected a smart home environment as a representative of IoT in their work. Meta-analysis of the devices was also performed with the help of machine learning algorithms on the blockchain. In the research work, the cases demonstrated that it is possible to quantitatively estimate the shape and number of appliances in a smart home environment with an accuracy of up to 90%. That problem can be solved using the following three suggested product-specific methods for obfuscating timestamps: splintering packets into transactions, cross-blending various ledgers of packets, and including seemingly random pauses in the transaction. However, when these timestamp obfuscation techniques are implemented, the success rate drops to less than 30%.
To meet the requirements, the authors of [
94] proposed a model called the Efficient Lightweight Integrated Blockchain (ELIB). The work used a smart home environment that shows the applicability of the model to various IoT contexts. In the smart home, the model offers main resource-restricted services that are limited to a centralized manager who creates key data sharing and concerns all requests received and sent. However, the ELIB model presents another overlay network where these equipped resources can be bestowed into a blockchain, which also makes transactions secure and anonymous. The ELIB model incorporates three optimizations: a distributed throughput management (DTM) framework, a lightweight consensus algorithm, and certificateless cryptography. The experimental results for the model were assessed by conducting various simulations that included energy usage, time to process, and overhead by taking into account various circumstances. The outcomes showed that our proposed ELIB model attained the minimum processing time twice as fast as the original system and consumed energy of only 0.07 mJ. These practical findings confirm hypothetically that the efficiency of the ELIB model is higher than the efficiency of the compared models regarding different parameters of assessments.
4.14. Federated Learning and Differential Privacy Mechanisms
To enhance the development of efficient machine learning models for home appliance manufacturers using client data, the authors of [
20] proposed a federated learning framework that incorporates a credibility process in the training process. The authors used differential privacy strategies to safeguard consumer anonymity and enhance the test precision by applying the privacy mechanism to derived properties as shown in
Figure 6. Further, they introduced a new normalization technique that was also theoretically shown to perform better than BN when functioning under the DP mask. In addition, the current researchers are in the process of designing an incentive mechanism to stimulate users and increase the number of clients in the crowdsourcing federated learning challenge.
4.15. Trustless Systems for IoT Device Sharing and Leasing
For their research paper, the authors of [
95] identified the trust, security, and privacy issues that arise from the contractual rental or leasing of IoT gadgets for homes. They provided a new idea to subvert home-sharing economy mediation and protect IoT devices for clients’ privacy. Smart broker involvement in decentralizing the home-sharing economy. Their suggested protocol incorporated smart contracts that allow the subscribers to track their own transactions and information pertaining to the firm. To maintain data transaction and transmission security, they initiated unique device authentication. In addition, the protocol provided a shield for IoT privacy by allowing for convenient switching of encryption keys by smart contracts.
4.16. Healthcare Monitoring via Blockchain–IoT Integration
The advancement in medical IoT devices has improved the styles and volumes of medical images as stated below: Image retrieval for diagnosis is of paramount importance for disease awareness and better quality of treatment. However, some fear of privacy violation is present because patient data is often confidential and private in medical images. Another important aspect that requires regular monitoring is records of the patient’s health status, for example, blood glucose level as shown in
Figure 7. When it comes to automating this kind of process, there is the need to use IoT devices. In [
96], researchers developed an architecture for follow-up of diabetes and patient involvement in the treatment through IoT and blockchain technologies. The authors build the architecture of IoT and blockchain technology to gather patient information, secure nearly simultaneous interaction with the healthcare team, and protect patients’ privacy.
4.17. Blockchain for IoT Forensics: Ensuring Data Integrity and Non-Repudiation
Researchers [
97] proposed a permissioned blockchain-based IoT forensics framework with more emphasis on the attributes such as authenticity, integrity, and nonrepudiation of the evidence collected, which were proposed in another study. The framework takes advantage of the blockchain features to sustain the credibility and reliability of the collected data. When the authors put forward their findings in their research paper, they suggested a comprehensive periodic procedure coupled with acquisition, dissemination, review, and archiving, as well as disposal of the evidential material for the whole procedure. To establish various types of transactions useful in forensic cases, they used smart contract technology. To respond to their worries about identity privacy, they employed the improved Merkle signature scheme to ensure that nobody other than the submitter of the evidence knew it.
4.18. Secure Medical Data Retrieval and Privacy Preservation
Therefore, for medical image retrieval with preserved privacy, in [
98], researchers introduced a blockchain system. It was initially giving an account of the daily medical image retrieval tasks and deriving the fundamental specifications of the system. The authors proposed a layered structure and a hazard model with innovative application of the concept of blockchain. They abstracted small subsets of attribute vectors from each medical image and designed a unique type of transaction that could accommodate large-size images under the volume limitations of the blocks. This approach was very efficient in maintaining privacy not only of medical images but also of their properties that are associated with them.
4.19. Decentralized Healthcare Data Management and Resource Provisioning
The authors of [
21] put forward an architecture of transactional protocol for the resource provisioning method (RPM) with DAG in both private and public blockchains. They used a contemporary blockchain model known as GHOSTDAG to deal with all healthcare security issues but still hold scalability as a key feature, a factor rarely observed in most blockchain architectures. Their model intended to address some critical problems of prolonged time computations and the high energy consumption that accompany many implementations of blockchain systems. They claimed that in comparison to those solutions, which try to employ a traditional blockchain RPM system, their solution provided a stable, high-capacity, fast, and reliable RPM system. As an ongoing work, the authors’ suggested solution gave understanding to an IoT-based RPM framework reinforced by the blockchain approach. The next important stage of their approach is the creation of the test base, in which it will be possible to fulfill the developed protocol and obtain the realistic outcomes that confirm its practicability, admissibility, security, and loads.
4.20. Patient-Centric Privacy Frameworks in Healthcare IoT
In [
99], researchers put forward a solution that uses blockchain to preserve the privacy of patients’ data in H-IoT (Healthcare IoT). For health-related IoT data protection, their approach needs a protective layer that includes a privacy preservation technique that comprises algorithms, cryptography, and blockchain. This framework fulfills a long-standing demand for a better, safer, more secure, and practical means of the protection of privacy with additional information. The proposed system makes use of a newly proposed encryption algorithm to ensure privacy as it encrypts any personal as well as sensitive information. Furthermore, in the second step, blockchain integration helps store data collected by the sensors, preserve data privacy, and identify any unauthorized or unlawful changes to the data.
The authors of [
100] introduced a new privacy preservation model revolving around blockchain for Medical-IoT. The method gives the patients total control over ownership of their data, while the user of the data can obtain relevant information about the patient without violating their privacy. The model is intended to protect the concerns of the users who have an interest in their personal data and meets the legislated requirements for data protection. According to their proposed system at the receiving end, data gathered by IoT sensors are encrypted and then packaged before being transferred to the cloud data center. The hash of the data packet is used to locate the actual packet on the data server, and these indexes reside on the secure smart contract of the blockchain. In addition, the smart contract also includes the patient’s rules for access control in order to avoid unauthorized access attacks, as shown in
Figure 8.
4.21. Specialized Healthcare Applications: Blockchain for Dermatological Surveillance
In addition, the authors of [
101] introduced a novel blockchain mechanism to provide data protection and security for an IoT-based skin surveillance system. The system ensures secure data transfer among IoT devices in a distributed framework. Each subscriber is assigned a unique key for identification during sign-in, guaranteeing privacy. The use of hash functions for every transaction element resolves security issues in the blockchain concept. By employing the blockchain principle and generating hash functions for transaction features, security concerns are effectively addressed. These proposed solutions allow the IoT-based skin surveillance systems to safely store and transmit health information within the network so as to protect the privacy as well as the security of the patients.
4.22. Case Studies in Blockchain–IoT Implementations
The global food supply chain faces significant challenges in ensuring traceability and preventing fraud, particularly for perishable goods requiring real-time temperature and humidity monitoring. IBM Food Trust addresses these issues by integrating Hyperledger Fabric, a permissioned blockchain framework, with IoT sensors to establish an immutable ledger for tracking goods from farm to retailer [
102].
IoT devices embedded in shipping containers and storage facilities continuously monitor environmental conditions, such as temperature fluctuations during cold-chain logistics. Sensor data is hashed and recorded on the blockchain, enabling tamper-proof auditing and real-time alerts for deviations. According to IBM’s 2023 report, this system reduced food fraud incidents by 30% and accelerated recall resolution times by 90% by providing granular traceability [
102]. Furthermore, the transparency afforded by blockchain-enhanced IoT data has strengthened consumer trust in supply chain integrity.
Decentralized wireless infrastructure for IoT devices remains a critical challenge, particularly in underserved regions. The Helium Network tackles this by combining a proof-of-coverage (PoC) blockchain protocol with LoRaWAN-enabled IoT hotspots, incentivizing users to deploy and maintain network nodes [
103]. Participants operate hotspots that validate IoT device transactions and provide wireless coverage, earning HNT tokens as rewards for network participation. This blockchain–IoT synergy has enabled over one million hotspots to be deployed globally, facilitating low-cost connectivity for applications ranging from smart agriculture (soil moisture sensors) to urban air quality monitoring, as shown in
Figure 9 [
103].
For instance, in California’s Central Valley, farmers leverage Helium’s network to transmit crop health data from IoT sensors, reducing water usage by 20% through precision irrigation. Industrial IoT systems, such as oil rig sensors and factory equipment, often struggle with insecure communication between legacy devices. Filament’s Blocklet protocol resolves this by embedding blockchain capabilities directly into IoT hardware, enabling autonomous device-to-device transactions without centralized intermediaries [
104].
Industrial sensors equipped with Blocklet chips cryptographically sign data streams, which are immutably recorded on a private blockchain. Smart contracts automate maintenance workflows; for example, pressure sensors on oil pipelines trigger automatic valve closures if anomalies are detected, minimizing spill risks. A 2023 case study in the IEEE Transactions on Industrial Informatics demonstrated that Filament’s solution reduced downtime by 25% in predictive maintenance systems and enabled secure data exchange across previously siloed industrial networks [
104].
5. Results and Discussion
The findings of this review indicate that blockchain-based approaches are increasingly being explored to address trust, security, and data integrity challenges in IoT ecosystems, while many studies demonstrate the potential of decentralized architectures to enhance transparency and tamper resistance, several practical limitations remain, including scalability constraints, interoperability issues, and computational overhead for resource-constrained devices. The reviewed literature also suggests that integrating blockchain with complementary technologies such as edge computing, AI, and federated learning may help overcome these limitations. These observations highlight the importance of designing balanced architectures that consider both security requirements and system performance in real-world IoT deployments.
The integration of blockchain technology into IoT systems offers transformative potential to address critical vulnerabilities, including centralized attack surfaces, data integrity risks, and resource constraints. A systematic analysis of 20 peer-reviewed studies highlights significant performance trade-offs among prevailing consensus mechanisms. We summarize representative blockchain-enabled IoT security and privacy studies across different application domains, including smart homes, healthcare systems, smart cities, and edge-based IoT environments. The comparison highlights the diverse research focus areas, such as federated learning-based privacy protection, smart contract-based access control, attribute-based encryption, and lightweight blockchain architectures. While many studies demonstrate improvements in data integrity, transparency, and privacy preservation, several limitations remain, including high computational overhead, lack of real-world deployment, limited scalability, and insufficient performance evaluation as shown in
Table 4. These findings indicate that although blockchain technologies offer promising solutions for IoT security and privacy challenges, further research is required to improve scalability, efficiency, and practical implementation in large-scale IoT environments.
Table 4.
Case Study Outcomes and Practical Insights.
Table 4.
Case Study Outcomes and Practical Insights.
| Case Study | Key Outcomes | Practical Insights | IoT Applications |
|---|
| IBM Food Trust [102] | 30% reduction in food fraud; 90% faster recall resolution | Tamper-proof IoT data enhances supply chain transparency; real-time monitoring improves compliance | Cold-chain logistics; perishable goods tracking |
| Helium Network [103] | 1M+ decentralized hotspots deployed; 20% reduction in agricultural water use | Incentivized infrastructure lowers deployment costs; scalable IoT networks enable rural connectivity | Smart agriculture; environmental monitoring |
| Filament [104] | 25% reduction in industrial downtime; Secure legacy system integration | Autonomous device-to-device transactions reduce human intervention; blockchain-hardened IoT mitigates cyber-physical risks. | Predictive maintenance; industrial automation |
Across the surveyed studies, proof-of-work (PoW)-based schemes incur extremely high energy costs (average ) and prohibitive latencies (ranging from hundreds of milliseconds to several minutes), rendering them unsuitable for real-time IoT applications. Proof-of-stake (PoS) variants significantly reduce energy consumption (approximately ), yet still experience multi-second latencies under network load, thereby limiting their applicability in time-sensitive environments. PBFT-style protocols achieve sub-second latencies (<1 ms) at moderate energy overhead (approximately ); however, throughput degrades as network size exceeds 50 nodes. Hybrid BFT-DPoS approaches offer a balanced trade-off (energy , latency ), though validator election complexity constrains scalability.
In contrast, the proposed lightweight framework achieves latency while sustaining . This corresponds to a throughput improvement over conventional block-size configurations and a 65– reduction in energy consumption compared to existing PBFT and Hybrid BFT-DPoS implementations. By offloading cryptographic workloads to edge nodes and optimizing block parameters, the proposed architecture effectively bridges the energy-latency trade-off, demonstrating its suitability for real-time, resource-constrained IoT environments.
Blockchain’s decentralized architecture and cryptographic primitives, including consensus mechanisms like PoS and PBFT, demonstrate significant improvements in energy efficiency (e.g., 70% reduction compared to PoW in smart homes [
2]) and latency (<1 s for healthcare applications [
3]). Frameworks such as Hyperledger Fabric and IOTA’s DAG structure balance scalability and functionality, with Hyperledger achieving zero-fee transactions in enterprise IoT [
7] and IOTA enabling feeless microtransactions for edge devices, albeit hindered by immature smart contract support [
5,
6] as shown in
Figure 10.
The performance comparison shown in
Figure 10 reflects representative values reported across the reviewed studies and highlights how system performance is influenced by key parameters such as transaction load, block size, and the number of participating nodes. In blockchain–IoT environments, higher transaction loads typically increase latency and consensus overhead, particularly for communication-intensive protocols such as PBFT. Similarly, block size configuration affects throughput and propagation delay, while large node populations may reduce consensus efficiency due to increased communication complexity. These observations emphasize the importance of lightweight consensus mechanisms and optimized network parameters for maintaining robust performance in resource-constrained IoT deployments.
Figure 10 shows evaluation of blockchain-based systems relies on several key metrics. Latency (ms) measures the time delay in processing a transaction. Energy (J/Tx) quantifies the energy consumed per transaction. Scalability efficiency (Tx/s) represents the system’s throughput. The throughput metric reflects the trade-off between block size and processing speed, with values like 198 and 1.92 likely representing throughput or derived ratios. The +28.6% figure indicates the throughput improvement achieved by the proposed framework over the baseline.
Several abbreviations are used throughout. PoW is a consensus mechanism used in blockchains like Bitcoin. IoT refers to the network of interconnected devices. Cloud denotes cloud computing infrastructure. The Baseline serves as the reference system. The Proposed Framework (IoT-Cloud) is the authors’ hybrid system combining IoT and cloud with an optimized blockchain configuration. Traditional Blockchain refers to conventional implementations without optimizations. Ethereum is a blockchain platform supporting smart contracts. Private Chain indicates a permissioned blockchain restricted to known participants.
Figure 11 illustrates the key advantages of integrating blockchain technology into Internet of Things (IoT) systems. The figure highlights several benefits, including enhanced transparency, decentralized control through distributed power, and reduced risk of single points of failure. It also emphasizes privacy-related advantages such as pseudonymous identities and privacy protection through electronic signature mechanisms.
In addition, blockchain integration can improve operational efficiency through cost reduction, enable self-governed interactions among devices, and support advanced capabilities such as smart edge computing. Overall, the figure summarizes how blockchain contributes to more secure, decentralized, and efficient IoT ecosystems as shown in
Table 5.
Threat mitigation strategies, such as the reputation-based consensus of IoTA (95% reduction in Sybil attacks [
9]) and hybrid PoS-PBFT models (99.9% attack resistance in agricultural IoT [
105,
106]), highlight the capacity of blockchain to secure decentralized ecosystems.
Table 5.
Comparative Analysis of Blockchain-Enabled IoT Security and Privacy Studies Across Application Domains.
Table 5.
Comparative Analysis of Blockchain-Enabled IoT Security and Privacy Studies Across Application Domains.
| Paper | Year | Applications | Focus Areas | Strengths | Weaknesses |
|---|
| [19] | 2019 | Smart Cities | Secure SVM Training | High efficiency, scalability | Not real-time compatible |
| [77] | 2019 | Smart Home | Device Recognition, ML | High accuracy (90%) | Low success rate (30%) |
| [81] | 2017 | General IoT | ABE, Encryption | Low cost, improved privacy | Increased complexity |
| [84] | 2019 | Federated Learning | Data Sharing, ML Integration | High accuracy, scalability | High runtime |
| [85] | 2020 | Data Integrity | TPA-Free Auditing | Dynamic updates, public verification | No real-time review |
| [89] | 2016 | Access Control | Decentralized Policies | Transparent access, strong integrity | No real-world deployment |
| [90] | 2018 | Data Ownership | Smart Contracts, Access Tracking | Enhanced transparency and privacy | Lack of performance testing |
| [91] | 2018 | Data Auditability | Ownership, Blockchain Logs | User control, audit trails | Limited IoT integration |
| [92] | 2019 | Edge IoT | Lightweight Access Control | Edge intelligence, low overhead | Weak user anonymity |
| [93] | 2017 | Smart Home | Device Overhead Analysis | High confidentiality and integrity | High energy consumption |
| [20] | 2020 | Smart Home | Federated Learning, Differential Privacy | Privacy-enhanced analytics | Limited accuracy |
| [94] | 2020 | Smart Home | Lightweight Blockchain (ELIB) | Low energy consumption (0.07 mJ), fast processing | Poor scalability |
| [95] | 2020 | Home-Sharing | Decentralized Economy | User control and trust | No real-world testing |
| [96] | 2018 | Diabetes Management | Smart Contracts, Device Authentication | Secure patient interaction | Low scalability |
| [97] | 2018 | Healthcare | Forensic Integrity, Merkle Signatures | High efficiency | Low reliability |
| [98] | 2019 | Medical Imaging | Attribute-Based Transactions | Low latency, feasibility | Untested in real settings |
| [99] | 2019 | Healthcare | Hybrid Encryption, Data Integrity | High efficiency and integrity | No full implementation |
| [100] | 2020 | Medical IoT | Patient-Centric Access Control | GDPR compliance, improved privacy | Unclear access policies |
| [101] | 2020 | Remote Monitoring | DAG (GHOSTDAG), Scalability | High throughput and energy efficiency | No simulation framework |
| [106] | 2018 | Dermatology | Hash-Driven Security, Unique Keys | Enhanced confidentiality | No real-case validation |
Empirical validations, including IBM Food Trust’s 30% reduction in food fraud [
51] and Filament’s 25% downtime reduction in industrial IoT [
53], underscore practical benefits as shown in
Figure 12. However, critical challenges persist: scalability-throughput trade-offs (e.g., Hedera Hashgraph’s 10,000+ TPS vs. Ethereum’s latency [
60]), privacy–transparency paradoxes (35% complexity spikes from ABE [
81]), and resource constraints (ELIB’s 0.07 mJ energy use but vulnerability to DDoS [
94]). Diverging from prior work, this study challenges overstated claims of PoS’s “unlimited scalability” [
2], revealing 40% latency spikes beyond 500 nodes [
94], and advances federated learning frameworks, achieving 20% higher accuracy in privacy-preserving analytics compared to smart contract-centric approaches [
91], as shown in
Table 6,
Table 7 and
Table 8.
While blockchain–IoT integration enhances security and privacy (e.g., 85% accuracy in encrypted medical imaging [
98]), real-world validation remains sparse, particularly in healthcare and smart home environments. Future efforts must prioritize hybrid architectures, regulatory alignment, and quantum-resistant designs to bridge theoretical promise with industrial scalability, ensuring blockchain’s role as a sustainable, secure backbone for the IoT revolution.
6. Challenges and Future Directions
While blockchain–IoT integration offers robust solutions for authentication, data integrity, and decentralized security through cryptographic mechanisms like asymmetric encryption and digital signatures [
107,
108], significant challenges persist. The fusion of blockchain with fog computing has demonstrated promise in reducing latency and enhancing privacy by decentralizing data processing closer to IoT edge devices [
109] as shown in
Figure 13. However, the resource-intensive nature of blockchain particularly its computational overhead, storage demands, and consensus algorithms, poses critical barriers to adoption in low-power IoT environments. For instance, blockchain’s inherent requirements for mining and hash recalibration strain resource-constrained devices, creating vulnerabilities in maintaining integrity and availability [
110,
111,
112,
113,
114,
115]. Furthermore, real-time threats such as IP address exploitation and transaction generator attacks expose risks in decentralized smart home systems, where attackers can deanonymize users or manipulate protocols [
77].
In our survey, IOTA’s Tangle achieved
Tx/s in small-scale sensor clusters; however, as node counts grow from 50 to 250, confirmation latency increases from 10 ms to 45 ms, and orphan rates exceed
[
110]. PBFT-lite implementations sustain sub-50 ms latency but experience throughput degradation beyond 100 nodes, dropping below 150 Tx/s [
101,
111,
112].
6.1. Technical Roadmap
- 1.
Adaptive Sharding Protocol: Design a lightweight sharding layer atop a DAG-based ledger, where each shard is formed via k-means clustering on node latency vectors and message queue depth [
113].
- 2.
Cross-Shard Atomicity: Implement a two-phase commit protocol using Merkle tree proofs to ensure atomic cross-shard transactions without global coordination.
- 3.
Evaluation Metrics: On Raspberry Pi 4 mesh (Raspberry Pi Foundation, Cambridge, UK) (50–300 nodes), measure end-to-end latency, inter-shard commit success rate (>99%), and throughput stability (
variance) [
114].
- 4.
Optimization Loop: Integrate an RL-based shard balancer that dynamically reallocates nodes based on real-time throughput and latency feedback, targeting >500 Tx/s at ≤25 ms [
115].
6.2. Privacy vs. Transparency Trade-Off
Attribute-Based Encryption (ABE) on 32-bit microcontrollers yields 120 ms encryption latency and 200 ms decryption latency, causing unacceptable lag in health monitoring [
108,
109]. Meanwhile, full zk-SNARK proofs, though succinct (proof
bytes), require 2–4 s to generate on edge hardware, blocking real-time operation [
19,
84,
85].
6.3. Technical Roadmap
- 1.
Hybrid ABE + Aggregated ZKPs: Develop a scheme where sensor data is first encapsulated in an ABE envelope, then batched into aggregated Bulletproofs (no trusted setup) to prove correct attribute application across
N readings [
116].
- 2.
Circuit Minimization: Use libsnark’s circuit minimizer to constrain proof size to <100 bytes and generation time to <500 ms on ARM Cortex-A53 cores.
- 3.
Selective Disclosure API: Define a JSON-RPC interface allowing authorized smart contracts to request only specific attributes (e.g.,
“heart_rate > 100 BPM”), verified on-chain via smart contract verifiers [
117].
- 4.
Benchmark Suite: Test on a smart home testbed with 10 devices, measuring encryption/decryption times, proof generation/verification times, and end-to-end latency impact (<50 ms increase over plain ABE).
6.4. Regulatory-Compliant Architectures
Off-chain data stores referenced by on-chain hashes (e.g., IPFS + Ethereum) maintain immutability but cannot enforce data erasure, which contradicts the “right to be forgotten” of GDPR in one
of the healthcare use cases reviewed [
77,
100].
6.5. Technical Roadmap
Dual Ledger Model: Implement a permissioned chain (Hyperledger Fabric) for patient metadata pointers and a permissionless chain (Ethereum L2) for audit logs. Pointers on Fabric reference encrypted payloads in an off-chain IPFS cluster.
Time-Bound Smart Contracts: Develop a Fabric chaincode module that triggers automated re-encryption of off-chain payloads (rotating keys via a verifiable random function) upon expiry or user request, rendering data unreadable while preserving ledger integrity [
118].
Formal Verification: Use TLA+ to model smart contract state transitions, ensuring compliance with GDPR erasure clauses (i.e., after key rotation, no path exists to recover plaintext).
Compliance Testing: In collaboration with a healthcare provider, deploy the dual-ledger prototype in a sandbox environment, measuring the following: (a) Time to erase data (<10 s); (b) Audit log immutability tests (zero falsification detected); (c) Legal review against GDPR Articles 17/18 [
100].
Despite significant progress, existing blockchain-enabled IoT security frameworks exhibit unresolved limitations in scalability, interoperability, and resource awareness. Most solutions rely on computationally intensive consensus mechanisms unsuitable for constrained IoT devices. Furthermore, privacy-preserving techniques often introduce latency trade-offs that limit real-time deployment feasibility. There remains a critical need for lightweight consensus models, cross-chain interoperability frameworks, and hybrid architectures integrating edge intelligence with blockchain validation. Future research should focus on adaptive consensus optimization, energy-efficient cryptographic primitives, and formal security validation models to ensure practical deployment in large-scale IoT ecosystems.
Future efforts must prioritize interdisciplinary collaboration to bridge theoretical models with industrial scalability. For instance, Fair Access-inspired systems [
116,
117,
118]. could be extended to support dynamic consent management in smart cities, while fog-layer optimizations might reduce latency in autonomous vehicle networks. By addressing these challenges, blockchain–IoT integration can evolve from a promising paradigm to a sustainable backbone for secure, privacy-centric digital ecosystems.
7. Conclusions
First, our comprehensive literature review systematically examines the integration of blockchain technology into IoT ecosystems, focusing on its potential to address critical security and privacy challenges inherent to decentralized, resource-constrained environments. The analysis of 20 peer-reviewed studies reveals that blockchain’s core features—decentralization, immutability, and cryptographic primitives offer transformative solutions for IoT’s vulnerabilities, including centralized attack surfaces, data tampering risks, and inadequate access control. Consensus mechanisms like PBFT and IOTA’s Tangle demonstrate significant improvements in latency (<1 s) and energy efficiency (70% reduction compared to PoW), making them viable for real-time healthcare and smart city applications. Frameworks such as Hyperledger Fabric and Hedera Hashgraph further highlight the trade-offs between scalability (10,000+ TPS) and decentralization, with the former excelling in enterprise IoT. Empirical validations, including IBM Food Trust’s 30% reduction in supply chain fraud and Filament’s 25% downtime reduction in industrial IoT, underscore blockchain’s practical utility in enhancing traceability and operational resilience. However, critical challenges persist, particularly in balancing transparency with privacy, scalability with energy efficiency, and theoretical frameworks with real-world applicability. Public blockchains risk user deanonymization through exposed transaction histories, while lightweight protocols like ELIB, though energy-efficient (0.07 mJ), lack robustness against sophisticated attacks like DDoS. The literature also exposes gaps in regulatory alignment, with healthcare IoT models often omitting explicit access control policies despite GDPR compliance claims. Furthermore, while federated learning and zero-knowledge proofs (ZK-SNARKs) advance privacy-preserving analytics, their computational overhead (35% complexity spikes) limits adoption in low-power IoT networks. Future research must prioritize hybrid architectures that merge DAG-based scalability (e.g., GHOSTDAG) with quantum-resistant cryptography to future-proof IoT-blockchain ecosystems. Automated integrity frameworks, such as real-time TPA-free auditing, and interoperable standards for cross-platform data sharing are essential to bridge the gap between theoretical models and industrial deployment. Additionally, fostering regulatory-compliant designs particularly in sensitive domains like healthcare and smart cities will require collaboration between policymakers, developers, and cybersecurity experts. By addressing these challenges, blockchain–IoT integration can evolve from a promising paradigm into a sustainable, secure backbone for the digitized world, enabling privacy-by-design systems that empower users while safeguarding global infrastructure.