METHODS AND INFORMATION TECHNOLOGIES FOR SECURE INTEGRATION OF THE ETHEREUM BLOCKCHAIN WITH THE INTERNET OF THINGS (IOT)

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.28.758

Keywords:

cybersecurity, smart contracts, decentralized systems, access management, cryptographic protection, resource optimization, tokenization, Layer-2 solutions

Abstract

The article examines methods and information technologies aimed at ensuring the secure integration of the Ethereum blockchain with Internet of Things (IoT) systems. The relevance of the study is driven by the rapid development of IoT, which is accompanied by increasing cybersecurity threats, including unauthorized data access, man-in-the-middle (MITM) attacks, device identifier spoofing, and the low transparency of centralized systems. The use of Ethereum blockchain technology, particularly smart contracts, opens new opportunities for creating decentralized security management models for IoT devices, enhancing trust levels, automating processes, and minimizing third-party interference risks.

 

The “Problem statement” section outlines the key challenges in securing IoT networks, including the vulnerabilities of centralized solutions, limited computational resources of devices, and the need to develop autonomous access control systems. The “Analysis of Recent Research and Publications” section summarizes modern approaches to integrating Ethereum blockchain into the IoT field, including tokenized identification mechanisms, access control, and transaction processing using smart contracts. It is noted that leading researchers suggest Layer-2 solutions (state channels, zk-rollups, Plasma) aimed at reducing the load on the main blockchain and improving scalability.

The aim of the article is to systematize modern methods of integrating the Ethereum blockchain with IoT and develop recommendations for their implementation, considering the limited resources of devices. The “Research results” section presents a secure IoT system architecture concept based on decentralized account management, local storage of cryptographic keys on devices, the use of optimized transaction signing algorithms, and the introduction of a hybrid data storage model based on IPFS. The proposed model minimizes the risk of unauthorized access, increases transparency in the interaction between IoT devices, and reduces computational resource costs.

The “Conclusions and prospects for further research” section emphasizes that the implementation of the Ethereum blockchain in IoT promotes the development of secure decentralized platforms. However, it requires addressing issues such as energy consumption, transaction costs, and optimizing client applications for low-performance devices. Future research should focus on developing effective scalability tools, adapting smart contracts to IoT specifics, and improving integration with cloud computing platforms for storing large data sets.

 

Downloads

Download data is not yet available.

References

Gupta, S., Singh, A., & Kumar, N. (2022). Secure IoT access at scale using blockchains and smart contracts. arXiv preprint, 10–22.

Wang, Y., Chen, X., & Sun, Y. (2021). Rethinking IoT Security: A Protocol Based on Blockchain Smart Contracts for Secure and Automated IoT Deployments. arXiv preprint, 1–15.

Lopez, J., Yan, Z., & Ray, S. (2020). Interacting with the Internet of Things using Smart Contracts and Blockchain Technologies. In Proceedings of the IEEE International Conference, 25–40.

Raj, A., Maji, K. & Shetty, S. D. (2021). Ethereum for Internet of Things security. Multimed Tools Appl 80, 18901–18915. https://doi.org/10.1007/s11042-021-10715-4

Zhang, L., & Zhao, Q. (2019). Towards Efficient Integration of Blockchain for IoT Security: The Case Study of IoT Remote Access. arXiv preprint, 50–70.

Benet, J. (2014). IPFS – Content Addressed, Versioned, P2P File System. arXiv preprint, 12–30.

Wood, G. (2014). Ethereum: A Secure Decentralised Generalised Transaction Ledger. Ethereum Foundation, 1–32.

Buterin, V., & Poon, J. (2022). Layer-2 Scaling Solutions for Ethereum. Academia.edu, 15–45.

Tereshchenko, G. & Kyrychenko, I. (2024). Analysis and justification of the use of existing blockchain solutions for the protection of digital assets. Innovative technologies and scientific solutions for industries, 1(27), 123–140. https://doi.org/10.30837/ITSSI.2024.27.164

Saliieva, О., & Rymarenko, М. (2023). Using blockchain technology to improve the security of computer networks. Journal “Cybersecurity and Information Protection, 85–102.

Rafaiani, G,. Santini, P., Baldi, M., & Chiaraluce, F. (2022). Implementation of Ethereum Accounts and Transactions on Embedded IoT Devices. arXiv preprint, 30–50.

Downloads


Abstract views: 0

Published

2025-06-26

How to Cite

Zarudnyi, I., & Liubchak, V. (2025). METHODS AND INFORMATION TECHNOLOGIES FOR SECURE INTEGRATION OF THE ETHEREUM BLOCKCHAIN WITH THE INTERNET OF THINGS (IOT). Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(28), 104–114. https://doi.org/10.28925/2663-4023.2025.28.758