Trust management serves as a cornerstone of secure IoT ecosystems, especially in contexts marked by device heterogeneity, decentralized ownership, and constantly shifting network topologies. Traditional trust management in IoT has typically depended on centralized authorities or reputation-based mechanisms. Yet, these approaches remain constrained by issues of scalability, limited resilience, and heightened vulnerability to insider threats. Such constraints have prompted increasing scholarly interest in blockchain, which is examined as a decentralized and tamper-resistant basis for establishing trust in IoT networks.
Figure 2 illustrates IoT ecosystems that depend on centralized trust management systems to facilitate communication across different layers and components. Traditional centralized trust models prove inadequate for addressing the dynamic topology and scale of IoT systems. Yet, reducing dependence on such centralized mechanisms remains a persistent challenge in the literature. In this section, we examine state-of-the-art research on trust management in IoT environments, with particular attention to approaches for decentralized identity management and the use of smart contracts in supporting trust within decentralized systems.
The prevailing IoT ecosystem continues to depend heavily on trusted third parties (TTPs) for data storage and processing [
6]. Yet, TTP-based frameworks are inherently constrained by the shortcomings of centralized architectures, notably limited scalability, bandwidth inefficiencies, heightened privacy risks, and susceptibility to single points of failure [
43,
44,
45,
46]. In recent years, various schemes have been introduced to enhance trust management in IoT and mitigate emerging security challenges [
47]. Much of the existing literature, however, remains centered on trust mechanisms rooted in centralized models, with particular emphasis on device and user authentication protocols as well as data access control mechanisms [
44,
48,
49].
Table 2 summarizes the key characteristics and limitations of centralized trust management techniques.
Several studies have investigated trust management in IoT, yet many reveal significant shortcomings in handling the complexities of heterogeneous environments. Sicari et al. [
28] outlined numerous open research challenges in IoT ecosystems, but their contribution was limited to high-level observations without proposing concrete frameworks for practical trust establishment. Although privacy, authentication, and user–device trust are consistently recognized as critical requirements, existing solutions remain fragmented. Behrouz et al. [
29] provided a comprehensive taxonomy of trust management in IoT, categorizing it into four primary categories: reputation-based, policy-based, prediction-based, and recommendation-based schemes, with a comparative analysis using trust metrics. However, their review remains anchored in traditional models and does not sufficiently engage with recent developments such as blockchain-based and decentralized mechanisms. Moreover, while the benefits and drawbacks of each category were discussed, the study offered little assessment of scalability or real-world deployment feasibility. Later works [
30] broadened the scope by addressing challenges such as heterogeneity, integrity, scalability, and device management, yet they largely presented conceptual perspectives rather than actionable strategies for large-scale systems. Similarly, comparative studies in [
31,
32] examined different TMS designs, highlighting commonalities and differences but again focusing on abstract characteristics rather than practical adaptability to dynamic, decentralized, and privacy-sensitive IoT environments. Taken together, these works establish a valuable foundation for understanding IoT trust management but fall short of addressing the integration of decentralized technologies, smart contract automation, and AI-driven trust evaluation models, gaps this survey seeks to address.
Bhatt et al. [
8] introduced an Attribute-Based Access Control (ABAC) model tailored for cloud-enabled IoT environments. Their approach highlights dynamic, context-aware authorization that enables fine-grained control by incorporating factors such as user roles, device characteristics, environmental conditions, and resource sensitivity. The model’s applicability was demonstrated through use cases including smart home automation and smart parking, effectively addressing key challenges related to security, privacy, and scalability in cloud-based IoT systems. A widely adopted strategy is behavior-based trust assessment. Uzair et al. [
15] introduced a blockchain-enabled protocol that evaluates dynamic trust values using historical vehicular data, while P. et al. [
42] proposed an adaptive model employing smart contracts to penalize malicious nodes and incentivize compliant behavior in vehicular networks. Both approaches demonstrate notable effectiveness in mitigating Sybil attacks and false data injection.
2.2. Security and Privacy Mechanisms
Security and privacy are central to trust management in IoT, where heterogeneous, resource-constrained devices interact autonomously across decentralized and often untrusted networks [
40]. Ensuring trust in such environments demands mechanisms that both authenticate entities and protect sensitive data from unauthorized access and inference attacks [
65]. In blockchain-enabled IoT frameworks, security is commonly reinforced through cryptographic primitives and consensus protocols. Public key cryptography, hash functions, and digital signatures secure device identities, preserve message integrity, and prevent tampering with blockchain-stored data. Additionally, smart contracts automate access control and enforce trust relationships without centralized oversight, thereby mitigating insider threats and eliminating single points of failure.
Consensus mechanisms are fundamental to ensuring the security and consistency of distributed ledgers. Yet, traditional protocols such as Proof-of-Work (PoW) are ill-suited for IoT due to their computational and energy intensity. Consequently, lightweight alternatives such as Proof-of-Authority (PoA), Delegated Proof-of-Stake (DPoS), and Practical Byzantine Fault Tolerance (PBFT) are increasingly employed to balance security with efficiency in resource-constrained environments. Complementing these approaches, cryptographic schemes like attribute-based encryption (ABE) and identity-based encryption (IBE) enable fine-grained access control, allowing resource access to be governed by attributes rather than fixed identities. Together, these techniques strengthen confidentiality while supporting adaptable and scalable security policies.
Privacy preservation is a central challenge in IoT systems, where large volumes of personal and sensitive data are continuously generated and exchanged. While blockchain’s transparency and immutability enhance trust and accountability, they also introduce significant privacy risks in IoT contexts. To mitigate these risks, trust management frameworks increasingly incorporate privacy-enhancing technologies. Zero-knowledge proofs (ZKPs) enable parties to verify information without disclosing the underlying data, facilitating trust establishment while safeguarding privacy. Likewise, ring signatures and homomorphic encryption provide mechanisms for protecting confidentiality while still supporting verifiable interactions on public or semi-public ledgers. Such techniques are especially critical in regulatory contexts, such as GDPR compliance, where strict limitations on the exposure of personal data must be upheld.
Furthermore, off-chain storage solutions are often employed to mitigate privacy risks by keeping sensitive data outside the blockchain while storing only cryptographic hashes or access pointers on-chain. This hybrid approach strikes a balance between the benefits of blockchain integrity assurances and the privacy requirements of sensitive IoT applications.
Furthermore, off-chain storage solutions are frequently adopted to mitigate privacy risks by retaining sensitive data off-chain, while recording only cryptographic hashes or access pointers on-chain. This hybrid design preserves the integrity and auditability afforded by blockchain while meeting the stringent privacy requirements of sensitive IoT applications.
Table 7 summarizes key security and privacy challenges in IoT environments and outlines corresponding blockchain-based mitigation strategies.
IoT systems remain vulnerable to threats such as spoofing, replay, and man-in-the-middle attacks, mainly due to weak device authentication and the absence of centralized oversight. While blockchain enhances baseline integrity, additional security and privacy layers are essential to ensure compliance with data protection standards, such as the GDPR [
18,
24,
40].
Zero-knowledge proofs (ZKPs) have become pivotal in enabling authentication while preserving data confidentiality. Ramezan and Meamari [
40] introduced zk-IoT, a protocol that supports anonymous authentication alongside encrypted access logs. In a complementary approach, Samir et al. [
23] integrated secret-sharing schemes into decentralized identity management, allowing credential recovery without reliance on central servers.
Haya et al. [
18] employed Merkle trees in combination with IPFS to secure IoT data streams, creating tamper-evident logs suitable for forensic auditing. In parallel, Loukil et al. [
19] leveraged smart contracts to dynamically adjust access permissions in response to user behavior, thereby enhancing intrusion resilience and enabling fine-grained access control.
Attribute-Based Access Control (ABAC) models, such as those proposed by Zaidi et al. [
27], enable context-aware access decisions based on device metadata, thereby minimizing risks of over-permissioning. Complementarily, Rouzbahani and Taghiyareh [
41] incorporated social trust constraints into privacy models, strengthening the reliability and accountability of device collaborations [
67].
Blockchain’s immutability also supports robust forensic logging. Al-Turjman et al. [
20] integrated deep learning with blockchain for federated intrusion detection, while Alkhamisi and Alboraei [
5] emphasized the role of decentralized logs as verifiable evidence for policy enforcement.
To mitigate device spoofing and eavesdropping without exposing sensitive data, several studies integrate zero-knowledge proofs (ZKPs) directly into the blockchain layer. For example, the zk-IoT protocol enables anonymous device authentication while maintaining encrypted access logs on-chain [
40]. In scenarios requiring credential revocation or recovery, secret-sharing schemes distribute key shards among multiple peers, preventing any single entity from compromising the identity while still supporting deterministic restoration following loss or key rotation [
23].
Immutable hash pointers remain central to ensuring data integrity, yet Merkle tree anchoring with off-chain storage offers a more storage-efficient approach. Haya et al. [
18] store only root hashes on-chain while maintaining streaming sensor data in IPFS, producing tamper-evident but lightweight audit trails. To comply with GDPR’s “right to erasure,” privacy-aware frameworks encrypt personal data off-chain and record only cryptographic anchors on the ledger; when users withdraw consent, smart contract logic can revoke or re-key these anchors [
5]. This encrypted anchoring mechanism also strengthens credential security by binding each claim to a verifiable on-chain hash, thereby preventing forgery.
Attribute-Based Access Control (ABAC) enforced through smart contracts enables dynamic, metadata-driven permissions, thereby reducing over-provisioning in large-scale IoT deployments [
27]. Behavior-aware extensions refine these permissions at runtime; for example, Loukil et al. [
19] adapt access levels in response to real-time usage patterns, strengthening intrusion resilience without manual oversight. Extending further, social-trust privacy filters incorporate peer reputation into access decisions, helping to mitigate collusion and insider threats in collaborative IoT environments [
41].
Deep learning models integrated with consortium blockchains enable intrusion detection systems (IDSs) that both identify coordinated attacks at the edge and immutably log forensic evidence. Al-Turjman et al. demonstrated that such federated IDSs preserve data locality while maintaining high accuracy in detecting complex threat signatures [
39]. Complementing these systems, policy verification smart contracts allow regulators and auditors to query proof-of-compliance logs on demand, thereby eliminating the single points of failure that undermine traditional, centrally managed SIEM platforms [
5].
Physical Unclonable Function (PUF) fingerprints bind blockchain identities directly to device hardware, mitigating Sybil and cloning attacks even under adversarial network control. Javaid et al. [
15] showed that coupling PUF challenges with smart contract logic effectively blocks rogue-node injection in vehicular IoT, while avoiding the storage burden associated with certificate revocation lists.
Resource-constrained devices can still engage in trust formation through lightweight cryptographic primitives. Jingwei et al. [
25] applied trust-weighted signatures alongside a Proof-of-Trust (PoT) leader-election algorithm, achieving lower authentication latency and reduced energy consumption compared with traditional PKI-based handshakes. When integrated with complementary mechanisms, such consensus optimisations contribute to a holistic, defence-in-depth strategy for blockchain-enabled IoT deployments.
2.3. AI and Machine Learning Integration with IoT Trust Management
The integration of Artificial Intelligence (AI) and Machine Learning (ML) into trust management frameworks has been widely explored as a means to enhance adaptability, scalability, and intelligence in IoT environments [
68]. Traditional rule-based or static trust models often fail to accommodate the dynamic, heterogeneous, and evolving nature of IoT networks. In contrast, AI- and ML-based approaches enable data-driven, context-aware, and adaptive trust evaluation mechanisms that learn from historical behavior, detect anomalies, and predict trustworthiness in real time. When combined with blockchain, this synergy becomes particularly powerful: ML contributes predictive analytics and anomaly detection, while blockchain ensures traceability and auditability of both trust data and AI model outputs [
20,
69].
Existing research demonstrates the application of AI and ML across multiple dimensions of IoT trust management [
33,
68,
70,
71]. For instance, behavioral analysis examines communication patterns, resource consumption, and service interactions to identify anomalous or malicious activity, thereby supporting dynamic trust assessment [
68]. Trust prediction employs models such as decision trees, neural networks, and Bayesian networks to estimate the future trustworthiness of devices and services using historical data [
72]. Reputation systems leverage AI-driven aggregation and interpretation of trust feedback from diverse sources, producing more accurate and resilient trust decisions [
68,
73]. Finally, anomaly and intrusion detection techniques [
74,
75] enable resource-constrained IoT networks to detect and mitigate trust violations autonomously, thereby reducing their dependence on human oversight.
Al-Turjman et al. [
20] proposed a federated intrusion detection system that integrates deep learning with blockchain to identify sophisticated cyberattacks in Industrial IoT (IIoT) environments. Their decentralized architecture supports cross-node intelligence sharing while preserving data privacy. Building on this work, Motamarri et al. [
20] incorporated real-time feedback loops into smart contracts, allowing dynamic threshold adjustments for predictive alerting and more adaptive threat mitigation.
Chandan et al. [
69] proposed an adaptive blockchain–IoT framework that fuses smart contract logic with reinforcement learning to enable proactive resource management. This integration enhances system efficiency and responsiveness, making it particularly well-suited for dynamic environments such as smart cities and industrial automation.
Zaidi et al. [
27] applied machine learning algorithms to adjust access thresholds dynamically according to device behavior, embedding the results into ABAC-driven smart contracts for decentralized enforcement. In parallel, Alkadi et al. [
39] designed a collaborative ML-based intrusion detection framework that leverages blockchain to log, verify, and autonomously respond to detected threats.
AI-enabled blockchain approaches are increasingly being investigated for dynamic trust scoring. Singh et al. [
42] employed supervised learning to develop adaptive trust models that integrate historical interaction data with blockchain logs. This line of research opens promising opportunities for automated trust negotiation in rapidly evolving IoT environments.
AR and Katiravan [
74] proposed a hybrid deep learning framework for IoT trust assessment that integrates social and behavioral indicators to strengthen resilience against advanced attacks. Their model combines Bi-GRU (Bidirectional Gated Recurrent Unit) and Bi-LSTM (Bidirectional Long Short-Term Memory) architectures to analyze dynamic trust features derived from device interaction histories. This approach enables accurate detection of abnormal behavior while adapting to real-time contextual changes, outperforming conventional static trust models in both precision and robustness. The findings highlight how deep-learning techniques can advance decentralized trust management by continuously capturing nuanced trust patterns in heterogeneous IoT environments.
Chithanuru and Ramaiah [
75] introduced an AI-driven anomaly detection framework for blockchain-based IoT systems that combines an artificial neural network (ANN) with an adaptive linear regression algorithm. The system continuously monitors blockchain transactional flows to identify deviations signalling malicious behavior, such as data manipulation or unauthorized access. Implemented within a Hyperledger Fabric environment, the framework achieves real-time detection with minimal computational overhead, making it well-suited for resource-constrained IoT deployments. This work demonstrates how AI can enhance blockchain infrastructures by enabling early, autonomous threat detection, thereby strengthening trust and resilience in distributed IoT ecosystems.
AlGhamdi et al. [
72] proposed a framework for developing trusted IoT healthcare information systems integrating AI and blockchain. The approach includes a smart unsupervised medical clinic designed to provide safe and fast services during pandemics without exposing medical staff to danger, a deep learning algorithm for COVID-19 detection based on X-ray images using transfer learning with the ResNet152 model, and a novel blockchain-based pharmaceutical system. These components aim to enhance efficiency, security, and transparency in healthcare, with the algorithms and systems proven effective and secure for use in healthcare environments. In federated IoT settings, combining blockchain with AI-driven reputation systems offers a robust mechanism for trust management. Fortino et al. [
73] introduced a multi-agent architecture in which each IoT device is represented by a software agent that cooperates based on a quantifiable reputation capital (RC). This RC is continuously updated through blockchain-certified interactions and feedback loops, enabling AI-enhanced group formation and partner selection in decentralized environments. Experimental evaluations showed that when the proportion of malicious agents remained below 25%, nearly all adversarial actors were successfully identified, while honest agents incurred significantly lower service costs. This hybrid framework highlights the effectiveness of integrating AI-based behavioral models with blockchain to foster trust-aware cooperation in dynamic and distributed IoT ecosystems.
The integration of AI into blockchain-enabled trust management frameworks for IoT brings notable advantages but also presents significant challenges. AI, particularly machine learning, supports dynamic and adaptive trust evaluations by continuously learning from device behaviors, contextual factors, and historical data. This adaptability improves the precision of trust decisions and enhances security through early anomaly detection, identification of malicious activity, and recognition of compromised devices. Automated, AI-driven assessments further reduce reliance on manual oversight, enabling scalable, self-managing IoT ecosystems. Privacy-preserving approaches such as federated learning complement blockchain’s decentralized architecture, allowing devices to collaboratively train trust models without exposing sensitive raw data.
Nonetheless, significant limitations remain. Many AI algorithms require substantial computational, storage, and energy resources, which pose difficulties for deployment on resource-constrained IoT devices. Their effectiveness is also contingent on access to high-quality, diverse datasets an asset that is often scarce or fragmented in practice. Privacy concerns persist, as behavioral data collected for training may still reveal sensitive information if not properly protected. Moreover, AI models especially deep learning architectures tend to lack transparency and interpretability, complicating auditability and regulatory compliance in trust-sensitive environments. Finally, AI itself introduces vulnerabilities, such as susceptibility to adversarial manipulation, which can undermine the reliability and robustness of trust evaluations.
Table 8 summarizes key studies integrating AI and ML techniques into blockchain–IoT trust management frameworks.