As blockchain-based IDMSs continue to evolve, their system architectures are increasingly adapted to meet the specific requirements of various application domains. This section provides a systematic analysis of blockchain-based IDMS solutions tailored for specific industries, including academic credentialing, electronic healthcare, the Internet of Things (IoT), and energy trading, and even encompassing real-world deployment platforms. The analysis aims to identify prevailing technological trends as well as existing research gaps in these areas.
6.1. Electronic Healthcare
With the rapid advancement of global digital healthcare, technologies such as Electronic Health Records (EHRs), telemedicine, Wearable Health Devices, and Genomic Data Storage are becoming increasingly prevalent [
5,
6]. However, ensuring the security, privacy, and interoperability of healthcare data remains a significant challenge [
5,
6]. Traditional healthcare identity management systems, which predominantly rely on centralized authorities, are vulnerable to cyberattacks, opaque access control, and limited patient control over personal health information [
5,
6]. These weaknesses heighten risks of identity fraud, unauthorized access, and fraudulent medical claims. To address these challenges, decentralized IDMSs incorporate a variety of technologies, including advanced privacy-preserving cryptographic techniques such as zero-knowledge proofs (ZKPs) [
52], which enable identity attribute verification without revealing sensitive information, and decentralized storage architectures that enhance security by ensuring distributed and tamper-resistant data management [
3,
5,
6].
Xiang et al. [
3] address the tension between anonymity and regulatory accountability by proposing a permissioned blockchain-based scheme (PBBIMUA). Their system incorporates elliptic curve cryptography (ECC) [
53] as a lightweight cryptographic mechanism, enabling efficient performance even on resource-constrained devices. The scheme also features a challenge–response protocol for mutual authentication, ensuring both the uniqueness and privacy of user identities [
3]. This balance supports regulatory compliance but lacks selective disclosure and interoperability features. Harrell et al. [
4] proposed and implemented MediLinker, where patients can store, share, and revoke six types of essential credentials, exercising selective disclosure when visiting different clinics and retaining full control over which credentials to share [
4]. Notably, MediLinker incorporates a Medical Power of Attorney (MPOA) feature, enabling legal guardians, such as representatives of elderly individuals or minors who are unable to make independent healthcare decisions, to manage identity, consent to treatments, and oversee medical data on behalf of the patient. Javed et al. [
5] propose Health-ID on an Ethereum consortium blockchain. Using smart contracts and JSON Web Tokens (JWTs), the system verifies attributes while only storing hash values on-chain to reduce storage overhead. This hybrid design enables scalability and supports telemedicine use cases. Compared with MediLinker [
4], Health-ID emphasizes throughput and low-latency verification but offers weaker support for cross-institutional interoperability.
Targeting the challenges of cross-platform data sharing, Torongo et al. [
6] proposed Blockchain-based Decentralized Identity Management for Healthcare Systems (BDIMHS). It also integrates a Decentralized Key Management Service (DKMS) to enhance the security of identity wallets. BDIMHS supports a variety of identity credentials and, unlike Health-ID [
5], enables fully passwordless interactions, relying on VCs for authentication and aligning with the usability needs of healthcare providers. However, its lightweight deployment model makes it more suitable for containerized environments than for large-scale hospital systems.
Saragih et al. [
7] design an SSI-based framework tailored to resource-constrained healthcare settings, particularly in developing regions. Built on ChainSQL, it integrates biometric authentication and lightweight smart contracts for access control. While it enhances usability and inclusivity, the system omits advanced features such as selective disclosure and revocation registries, limiting its applicability in high-assurance clinical contexts. Mikula and Jacobsen [
8] propose an identity and access management (IAM) system that leverages Hyperledger Fabric’s permissioned blockchain to enhance patient data security and streamline access control in EHRs. Finally, Mikula and Jacobsen [
8] propose an identity and access management system on Hyperledger Fabric, replacing centralized CAs with Identity-Based Cryptography (IBC) and implementing a PBFT consensus for efficient EHR queries. Their approach supports permission revocation but lacks selective disclosure or interoperability with broader digital identity ecosystems.
Healthcare IDMS research reveals complementary trade-offs. Systems like MediLinker [
4] and BDIMHS [
6] lead in selective disclosure through VCs and ZKPs, while Health-ID [
5] and PBBIMUA [
3] prioritize efficiency and traceability. Revocation is widely supported, though mechanisms vary, from on-chain credential registries (MediLinker, BDIMHS) to smart contract–driven access revocation [
8]. Interoperability remains partial: MediLinker and BDIMHS show cross-clinic potential, but most systems are siloed within specific infrastructures. None of the surveyed works implement quantum resistance, underscoring a critical gap given the sensitivity and longevity of healthcare records.
Table 3 offers a detailed comparison of the technical features of blockchain-based IDMSs applied in the electronic healthcare sector.
6.2. Academic Credentials
With the increasing digitalization of education, academic credentials such as degrees, diplomas, transcripts, and professional certifications are increasingly issued in digital formats [
10]. However, the absence of a unified global certification framework has led to widespread issues of credential forgery, fraudulent qualifications, and fragmented verification procedures [
13,
14]. Traditional verification requires universities, employers, and government agencies to interact with multiple authorities, resulting in high time costs and complex verification processes [
9,
10]. Furthermore, different countries, regions, and educational institutions use varied accreditation systems, leading to low credential portability and limited mutual recognition, thereby restricting the global mobility of academic qualifications [
10,
11]. To address these challenges, numerous scholars have conducted research on the application of IDMSs in academic credential management, exploring how decentralized identity frameworks can enhance the trustworthiness, security, and verifiability of academic credentials.
Reza et al. [
9] proposed an academic certificate management system based on Hyperledger Fabric. The system employs a composite key generation algorithm that integrates biometric data, internal IDs, and passwords to produce unique identity key pairs for each user, making it extremely difficult to forge identities or academic documents. This design strongly binds user identity to issued credentials, but it lacks fine-grained selective disclosure and interoperability, restricting its applicability across institutional or cross-border contexts. Sy et al. [
10] developed EduCredPH, a permissioned blockchain system built on Hyperledger Fabric. The platform establishes a decentralized verification network that seamlessly integrates with traditional academic management systems. The system comprises four core components: a blockchain network for certificate storage and verification, an API gateway for external interactions, a centralized system that synchronizes data with existing university platforms, and a user-facing application. The system enforces role-based access controls, improving revocation handling and reducing exposure to credential misuse. However, like Reza et al., it remains limited in cross-institutional interoperability and still relies on pre-quantum cryptography. Lux et al. [
12] focus on user-centric control through integration with OpenID Connect (OIDC) [
79]. Their Hyperledger Indy and Sovrin-based system leverages DIDs and VCs with zero-knowledge proofs, enabling flexible selective disclosure and compatibility with existing web login workflows. This improves usability and privacy but does not address post-quantum security risks.
Most existing blockchain-based educational systems rely on pre-quantum cryptography, rendering them vulnerable to future quantum attacks such as Shor’s and Grover’s algorithms [
80]. To address this concern, Shrivas et al. [
11] proposed a post-quantum secure academic credential verification system that replaces conventional cryptographic methods with lattice-based cryptography and hash-based signature schemes to generate quantum-resistant key pairs. Their design also supports multi-university deployment within a single permissioned blockchain, enabling both interoperability and revocation through a post-quantum Membership Service Provider. The approach, however, increases computational overhead and requires optimization for scalability. Li et al. [
14] further explore quantum-resilient credentialing in the Blockchain-based Digital Education Credential (BDEC) framework. BDEC adopts a minimal yet quantum-safe design, requiring only a PQC-secure digital signature scheme and a zkSNARK to achieve both authenticity and privacy in credential verification. By avoiding reliance on blockchain-specific or classical cryptography vulnerable to quantum attacks, BDEC demonstrates that PQC-based designs can be practical and domain-adaptable. Nevertheless, its reliance on zkSNARKs introduces setup complexity, and its current instantiation focuses on the education sector, leaving cross-domain applicability as an open area for exploration.
The reviewed systems illustrate a clear progression from basic forgery prevention [
9,
10] toward advanced privacy and security guarantees [
11,
12,
14]. Selective disclosure is strongest in [
12,
14], where VCs and ZKPs enable attribute minimization. Interoperability is best supported by Shrivas et al.’s system, explicitly designed for multi-institutional networks. Revocation support is common across systems but varies in efficiency, with Sy et al. [
10] and Shrivas et al.’s systems [
11] offering more fine-grained controls than Reza et al.’s [
9]. Quantum resistance remains the least addressed feature: only Shrivas et al. [
11] and Li et al. [
14] incorporate PQC, underscoring a critical research gap given the long-term risks of quantum computing.
Table 4 summarizes and compares the technical characteristics of blockchain-based IDMSs within the academic credential domain.
6.3. Internet of Things (IoT)
The rapid development of Internet-of-Things (IoT) technology has enabled seamless connectivity across various smart systems, including smart homes, industrial automation, vehicular networks, and smart cities [
16,
17]. However, IoT devices are often widely distributed, resource-constrained, and lack a unified identity management framework, posing significant challenges for traditional centralized systems such as Public Key Infrastructure (PKI) [
15,
17,
18]. These challenges include complex device authentication, elevated data security risks, insufficient privacy protection, and vulnerability to identity spoofing attacks [
15,
17,
18,
20]. In contrast, decentralized IDMSs operate without a central authority, making them well suited for IoT device registration, authentication, access control, and data sharing [
15,
16,
17,
18,
19,
20]. By eliminating centralized identity providers, a decentralized IDMS enables IoT devices to autonomously manage their identities, thereby enhancing overall security, privacy, and system robustness [
17,
18,
20]. The following academic studies review how researchers are integrating blockchain, lightweight cryptography, decentralized storage, and privacy-enhancing techniques to develop efficient, secure, and privacy-preserving IoT identity management solutions.
For wireless sensor networks on the IoT, Ismail et al. [
15] introduce a lightweight blockchain-based identity management and security authentication mechanism that tackles authentication and access control challenges in resource-constrained sensor devices. Their hybrid blockchain architecture employs a private blockchain for node authentication within the network and a public blockchain for cross-network identity verification in the IoT cloud, thereby enhancing both security and scalability. The architecture comprises Base Stations for node registration and data aggregation, Cluster Heads for in-network data handling and smart contract–based identity management, and Monitoring Nodes for sensor operations. To prevent identity spoofing, the system utilizes the Elliptic Curve Digital Signature Algorithm (ECDSA) [
53] with a hashed ID mechanism. Additionally, a machine learning module is employed to detect various Denial-of-Service attacks and automatically isolate malicious nodes via smart contracts.
To enhance authentication and access security for cloud-hosted IoT devices, Katta et al. [
16] developed a blockchain-based distributed identity management system that integrates public and private cloud infrastructure. In that architecture, the private cloud is responsible for authenticating IoT devices and issuing access tokens, while a Network Address Translation plus Virtual Private Network gateway securely connects the private cloud to the public cloud, linking local identity modules with Amazon Web Services’ (AWS) Virtual Private Cloud. Once authenticated, device data streams are sent to AWS for behavioral analysis, storage, and security monitoring. Local IoT device authentication is managed by a private blockchain, whereas cross-domain identity management is supported by a public blockchain, enabling interoperability and transparency. The system is deployed on Ethereum and includes mechanisms for man-in-the-middle (MitM) attack detection, allowing it to automatically isolate compromised devices and issue new credentials.
Traditional public key cryptography (PKC)-based authentication algorithms impose a high computational burden on low-power IoT devices and are often ill suited for such environments, where threats like device spoofing, identity theft, and replay attacks are common. To address these challenges, Mukhandi et al. [
17] proposed a consensus-driven lightweight device identity management system based on a private Ethereum blockchain. In that framework, device-specific attributes—such as MAC address, firmware version, and configuration data—are hashed and used with ECDSA to generate a unique, verifiable device identity fingerprint, which is registered on-chain to ensure identity integrity and uniqueness. The system combines decentralized identity management with a lightweight consensus mechanism and stores identity data securely and efficiently using a Merkle tree structure. During authentication, a voting-based consensus model is employed to overcome the limitations of point-to-point verification. If consensus among nodes confirms that the submitted identity matches the stored record, access is granted; otherwise, a security alert is triggered.
Traditional identity and access management systems are designed around human-centric interactions and are ill suited for the autonomous, device-driven communication landscape of the Internet of Things (IoT). To address this gap, Giaretta et al. [
18] proposed UniquID, a fully decentralized, blockchain-based identity management system tailored specifically for IoT devices and machine-to-machine (M2M) communication. The system is blockchain-agnostic and can be deployed on any platform that supports Merkle tree structures and smart contracts. Each device autonomously generates a public key, while an Imprinter creates an Imprinting Contract (IC) on-chain to bind the device identity and specify its access control policies (ACLs). This enables verifiable identity and authorization, with support for off-chain authentication between devices. UniquID eliminates the need for traditional PKI, supports offline authentication, and enables autonomous trust relationships between devices, thus presenting a novel paradigm for decentralized identity management on the IoT.
For industrial applications, Vallois et al. [
19] proposed a blockchain-based identity and access management (IAM) system designed to support the secure sharing of IoT device identities, permissions, and access control policies across multiple organizations and use-case domains. The system ensures data integrity, traceable authentication, and transparent, verifiable operations. Built on a Hyperledger Fabric private blockchain, the solution combines decentralized device identity registration with smart-contract-driven access control, forming a secure framework for multi-enterprise collaboration. Operating in a consortium blockchain model, each participating organization runs its own IAM controller, responsible for managing identity registration, permission updates, access requests, and revocations. Device identities are registered via encrypted transactions and stored in a shared directory, supporting both Role-Based Access Control (RBAC) [
81] and Attribute-Based Access Control (ABAC) [
82] models for dynamic and fine-grained permission management. To address scalability, the system incorporates a key–value database and off-chain storage mechanisms.
Tcydenova et al. [
20] proposed a decentralized access control framework aimed at eliminating the single point of failure inherent in traditional centralized systems. Designed specifically for IoT environments, the framework integrates decentralized identifiers (DIDs), blockchain, multi-signature smart contracts, and a decentralized oracle network to achieve highly robust identity management for IoT devices. In that architecture, IoT devices are not directly connected to the blockchain; instead, they are managed by oracles, which handle data generation and maintain a unique DID for each device. The decentralized oracle network is collectively responsible for maintaining DIDs, performing authentication, and making access control decisions. The blockchain stores DID documents, access control policies, and multi-signature contracts. The system defines two core smart contracts: the DID Registry Smart Contract (DIDSC), which stores and resolves user/device DID documents, and the Access Control Smart Contract (ACSC), which governs the multi-signature access control verification process. By tightly integrating DIDs, multi-signature contracts, and oracle networks, the framework enables off-chain communication for resource-constrained IoT devices, making it highly suitable for scalable, decentralized identity management in large-scale IoT deployments.
Recent studies extend these efforts to high-demand and edge-oriented IoT environments. Xiong et al. [
83] introduced BDIM, a decentralized identity scheme for vehicular ad hoc networks (VANETs) that employs smart contracts for access control and integrates reputation-based trust management. The system achieves millisecond-scale responses (≤250 ms) and low query delays even under high user loads, demonstrating scalability in large-scale IoT. Complementing this perspective, Bai et al. [
84] extended decentralized identity management to mobile edge computing (MEC) environments by coupling blockchain with a proactive caching strategy. Their approach optimized cache selection based on node utility while leveraging blockchain for secure and tamper-resistant data management. Simulation results confirmed significant improvements in cache hit rate, latency reduction, and overall system efficiency, illustrating the potential of decentralized IDMSs to support trustworthy and performance-sensitive IoT applications at the network edge.
Table 5 highlights a comparative analysis of the technical features of blockchain-based IDMSs in the IoT domain.
6.4. Energy Trading
As the global energy market shifts toward distributed energy resources and smart grids, energy trading models are evolving rapidly [
21,
23]. Traditional energy trading systems depend on centralized entities—such as grid operators, government regulators, and third-party platforms—to manage energy distribution and authenticate identities [
21,
22,
23]. However, these centralized approaches suffer from low transaction efficiency, high trust costs, and insufficient user privacy [
21,
22,
23]. In contrast, peer-to-peer (P2P) energy trading and renewable energy markets require a decentralized approach that can support direct transactions [
21,
22,
23]. Decentralized IDMSs offer a secure, efficient, and privacy-preserving alternative by enabling energy producers and consumers to transact without relying on centralized certification authorities [
21,
22,
23]. This model not only reduces identity management costs but also enhances transparency and trust in transactions [
21,
22,
23]. In the following sections, we review decentralized IDMS solutions for energy trading and examine how they integrate blockchain, smart contracts, zero-knowledge proofs [
52], and distributed storage to facilitate identity authentication, P2P energy trading, and decentralized market operations.
Cali et al. [
21] proposed a local energy market management framework that integrates blockchain with self-sovereign identity (SSI) [
34] to enhance security, privacy, and network resilience in decentralized energy trading. Within the system, users can select one or more VCs and present them as a Verifiable Presentation (VP) signed using zero-knowledge proofs (ZKPs) [
52], enabling minimal disclosure authentication and preventing the leakage of unnecessary personal information. The architecture adopts a dual-layer blockchain + middleware structure: the SSI platform manages DID documents, VC revocation lists, and issuer public keys; the smart contract platform handles pricing, settlement, and scheduling logic for the energy market; and the middleware module functions as a VC verifier, serving as a bridge between the SSI layer and the smart contracts. The market mechanism is implemented through a pluggable smart contract architecture, where credential verification is required for every energy transaction prior to execution. Contract events are logged using events, with each transaction including a VP hash and timestamp. The system also supports asynchronous pricing for market clearing, enhancing its flexibility and scalability.
To address the challenge of privacy-preserving identity verification in decentralized energy trading, Volkmann et al. [
22] introduced a peer-to-peer transaction verification framework based on self-sovereign identity (SSI) [
34] and blockchain, grounded in the Trust-over-IP (ToIP) model [
85]. The framework maps the four-layer ToIP architecture to the context of P2P energy trading: Layer 1 replaces traditional identities with user-generated DIDs; Layer 2 establishes secure, peer-to-peer encrypted communication channels between DIDs; Layer 3 utilizes standardized VCs to represent identity and authorization attributes; and Layer 4 governs permission policies, such as who can publish DIDs, issue VCs, and verify transactions. The system combines C-based implementations with zero-knowledge proofs (ZKPs) [
52] to achieve minimal data disclosure, allowing prosumers to submit only a minimal subset of identity attributes. A standardized VC schema builds a unified market trust framework, ensuring that VCs issued by different institutions are structurally compatible and composable, supporting cross-regional and cross-operator identity interoperability and trusted energy transactions.
Congestion management in low-voltage distribution networks, the security and verifiability of local peer-to-peer (P2P) energy trading, and the effective incentivization and participation of active resources in grid control are critical challenges in energy markets. To address these issues, Kilthau et al. [
23] proposed a P2P energy trading and flexibility market management platform that integrates self-sovereign identity (SSI) [
34] and blockchain technologies. Built upon the Trust-over-IP (ToIP) architecture, the system utilizes Hyperledger Indy and Aries to enable privacy-preserving identity verification with support for selective disclosure. Identity authentication is carried out via DID resolution and end-to-end encryption, while a smart contract-driven market management engine governs transaction execution. Additionally, the system employs a bottom-up forecasting method to generate individual load predictions for each prosumer agent, and a sensitivity analysis algorithm to assess the relationship between node-level voltage/current variations and adjustment strategies, both of which contribute to effective congestion mitigation in the grid.
Table 6 presents a comparison of the technical aspects of blockchain-based IDMSs designed for energy trading applications.