{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T07:27:41Z","timestamp":1774596461062,"version":"3.50.1"},"reference-count":26,"publisher":"MDPI AG","issue":"19","license":[{"start":{"date-parts":[[2022,10,4]],"date-time":"2022-10-04T00:00:00Z","timestamp":1664841600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Sharing data securely and efficiently has been identified as an issue in IoT-based smart systems such as smart cities, smart agriculture, smart health, etc. A large number of IoT devices are used in these smart systems and they produce a large amount of data. IoT devices generally have limited storage and processing capabilities, and configuring any security techniques on these devices is a challenge. In this paper, we propose a novel device identity management approach for blockchain-based IoT systems that provides data security in two ways. Firstly, a lightweight time-based identification protocol that uses hub identification for validating data. Secondly, data storage is augmented with an effective blockchain application for providing easy access and immutability for data sharing among multiple parties. Our initial prototype implementation shows that: our identity management approach can be implemented in large scale settings, our system can be effectively implemented in blockchain platforms, and our performance evaluation result shows that the prototype fulfills system requirements adequately.<\/jats:p>","DOI":"10.3390\/s22197535","type":"journal-article","created":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T05:12:21Z","timestamp":1665378741000},"page":"7535","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["A Blockchain Based Secure IoT System Using Device Identity Management"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8455-2499","authenticated-orcid":false,"given":"Fariza","family":"Sabrina","sequence":"first","affiliation":[{"name":"School of Engineering and Technology, Central Queensland University, Sydney, NSW 2000, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9351-2800","authenticated-orcid":false,"given":"Nan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information and Physical Sciences, The University of Newcastle, Callaghan, NSW 2308, Australia"}]},{"given":"Shaleeza","family":"Sohail","sequence":"additional","affiliation":[{"name":"King\u2019s Own Institute, Sydney, NSW 2000, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2022,10,4]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Abosata, N., Al-Rubaye, S., Inalhan, G., and Emmanouilidis, C. (2021). Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications. Sensors, 21.","DOI":"10.3390\/s21113654"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Bezawada, B., Bachani, M., Peterson, J., Shirazi, H., Ray, I., and Ray, I. (2018). IoTSense: Behavioral Fingerprinting of IoT Devices. arXiv.","DOI":"10.1145\/3266444.3266452"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Bai, L., Yao, L., Kanhere, S.S., Wang, X., and Yang, Z. (2018, January 1\u20134). Automatic Device Classification from Network Traffic Streams of Internet of Things. Proceedings of the 2018 IEEE 43rd Conference on Local Computer Networks (LCN), Chicago, IL, USA.","DOI":"10.1109\/LCN.2018.8638232"},{"key":"ref_4","unstructured":"Kolcun, R., Popescu, D.A., Safronov, V., Yadav, P., Mandalari, A.M., Mortier, R., and Haddadi, H. (2021). Revisiting IoT Device Identification. arXiv."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Yousefnezhad, N., Malhi, A., and Fr\u00e4mling, K. (2021). Automated IoT Device Identification Based on Full Packet Information Using Real-Time Network Traffic. Sensors, 21.","DOI":"10.3390\/s21082660"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"5580179","DOI":"10.1155\/2021\/5580179","article-title":"IoT with BlockChain: A Futuristic Approach in Agriculture and Food Supply Chain","volume":"2021","author":"Sabir","year":"2021","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_7","first-page":"298","article-title":"Machine Learning for the Detection and Identification of Internet of Things (IoT) Devices: A Survey","volume":"7","author":"Liu","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Azarmehr, M., Mehta, A., and Rashidzadeh, R. (May, January 30). Wireless device identification using oscillator control voltage as RF fingerprint. Proceedings of the 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), Windsor, ON, Canada.","DOI":"10.1109\/CCECE.2017.7946820"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1862","DOI":"10.1109\/TIFS.2016.2561902","article-title":"Feature Selection for RF Fingerprinting with Multiple Discriminant Analysis and Using ZigBee Device Emissions","volume":"11","author":"Bihl","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Wang, C., Lin, Y., and Zhang, Z. (2017, January 25\u201329). Research on Physical Layer Security of Cognitive Radio Network Based on RF-DNA. Proceedings of the 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Prague, Czech Republic.","DOI":"10.1109\/QRS-C.2017.49"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1402","DOI":"10.1109\/JSAC.2019.2904364","article-title":"AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication","volume":"37","author":"Marchal","year":"2019","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Hamad, S.A., Zhang, W.E., Sheng, Q.Z., and Nepal, S. (2019, January 5\u20138). IoT Device Identification via Network-Flow Based Fingerprinting and Learning. Proceedings of the 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), Rotorua, New Zealand.","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00023"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Yin, F., Yang, L., Wang, Y., and Dai, J. (February, January 30). IoT ETEI: End-to-End IoT Device Identification Method. Proceedings of the 2021 IEEE Conference on Dependable and Secure Computing (DSC), Aizuwakamatsu, Japan.","DOI":"10.1109\/DSC49826.2021.9346251"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.R., and Tarkoma, S. (2017, January 5\u20138). IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA.","DOI":"10.1109\/ICDCS.2017.283"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Gong, L., Alghazzawi, D.M., and Cheng, L. (2021). BCoT sentry: A blockchain-based identity authentication framework for IoT devices. Information, 12.","DOI":"10.3390\/info12050203"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1186\/s13638-021-01966-8","article-title":"Blockchain-based IoT device identification and management in 5G smart grid","volume":"2021","author":"Wang","year":"2021","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Dorri, A., Roulin, C., Pal, S., Baalbaki, S., Jurdak, R., and Kanhere, S. (2022). Device Identification in Blockchain-Based Internet of Things. IEEE Internet Things J., Early Access.","DOI":"10.1109\/JIOT.2022.3194671"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Mohanta, B.K., Sahoo, A., Patel, S., Panda, S.S., Jena, D., and Gountia, D. (2019, January 17\u201320). DecAuth: Decentralized Authentication Scheme for IoT Device Using Ethereum Blockchain. Proceedings of the TENCON 2019\u20142019 IEEE Region 10 Conference (TENCON), Kochi, India.","DOI":"10.1109\/TENCON.2019.8929720"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"100422","DOI":"10.1016\/j.iot.2021.100422","article-title":"Identification and Authentication in Healthcare Internet-of-Things Using Integrated Fog Computing Based Blockchain Model","volume":"15","author":"Shukla","year":"2021","journal-title":"Internet Things"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2419","DOI":"10.1109\/JIOT.2021.3097440","article-title":"Blockchain-Enabled Tripartite Anonymous Identification Trusted Service Provisioning in Industrial IoT","volume":"9","author":"Yang","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Maram, D., Malvai, H., Zhang, F., Jean-Louis, N., Frolov, A., Kell, T., Lobban, T., Moy, C., Juels, A., and Miller, A. (2021, January 24\u201327). Candid: Can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability. Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP40001.2021.00038"},{"key":"ref_22","unstructured":"Li, M., Chen, Y., Lal, C., Conti, M., Alazab, M., and Hu, D. (2021). Eunomia: Anonymous and secure vehicular digital forensics based on blockchain. IEEE Trans. Dependable Secur. Comput., Early Access."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","article-title":"Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data","volume":"38","author":"Dodis","year":"2008","journal-title":"SIAM J. Comput."},{"key":"ref_24","unstructured":"Lee, K., and Liu, L. (2017). Fuzzy Extractors for Biometric Identification. IEEE Biometrics Compendium: Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, ICDCS 2017, Atlanta, GA, USA, 5\u20138 June 2017, IEEE Computer Society."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Sabrina, F., and Jang-Jaccard, J. (2021). Entitlement-Based Access Control for Smart Cities Using Blockchain. Sensors, 21.","DOI":"10.3390\/s21165264"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Tang, W., Kiffer, L., Fanti, G., and Juels, A. (2022). Strategic Latency Reduction in Blockchain Peer-to-Peer Networks. arXiv.","DOI":"10.1145\/3578338.3593572"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/19\/7535\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:46:34Z","timestamp":1760143594000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/19\/7535"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,4]]},"references-count":26,"journal-issue":{"issue":"19","published-online":{"date-parts":[[2022,10]]}},"alternative-id":["s22197535"],"URL":"https:\/\/doi.org\/10.3390\/s22197535","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,4]]}}}