DECENTRALIZED IDENTITY AND ACCESS MANAGEMENT IN INTERNET OF THINGS SYSTEMS BASED ON BLOCKCHAIN

Authors

DOI:

https://doi.org/10.37943/25DQCA5653

Keywords:

Internet of Things, blockchain, decentralized identity, self-sovereign identity, access control, attribute-based access control, verifiable credentials

Abstract

The exponential proliferation of Internet of Things (IoT) devices presents critical challenges to traditional centralized identity and access management systems, which are plagued by issues of scalability, single points of failure, and significant privacy risks. While blockchain technology offers a promising decentralized alternative, its direct application is often hindered by low transaction throughput, high costs, and the computational limitations of IoT devices. This study addresses these challenges by proposing and formally evaluating HybID-AC, a novel hybrid architecture for decentralized identity and access management tailored for large-scale, heterogeneous IoT ecosystems. The methodology involves a dual-layer design that separates global trust anchoring from local execution. A highly scalable, feeless Directed Acyclic Graph (DAG) based distributed ledger serves as a public "anchor layer" for registering W3C standard Decentralized Identifiers (DIDs) and access policy hashes. All high-frequency access control operations are processed off-chain at the "edge layer" using the DIDComm v2 peer-to-peer protocol, Attribute-Based Access Control (ABAC) for fine-grained policy enforcement, and Zero-Knowledge Proofs (ZKP) to ensure privacy-preserving attribute verification. The results of our analytical evaluation demonstrate that the HybID-AC architecture achieves orders-of-magnitude improvements in latency and cost-efficiency compared to fully on-chain models, maintaining consistent performance as the network scales. Furthermore, we introduce an original probabilistic model that provides a quantitative metric for assessing the integral security risk of ABAC policies against attribute compromise. The study concludes that this hybrid approach effectively resolves the inherent trade-offs of blockchain in an IoT context, offering a robust, scalable, and interoperable framework that empowers devices with self-sovereign identity while ensuring security and privacy by design.

Author Biographies

Yersaiyn Mailybayev, International University of Transportation and Humanities

PhD, Department of Computer Technology and Telecommunications

Ulzhalgas Seidaliyeva, Boston University

PhD, Metropolitan College (MET)

Adilkhan Kushukbaev , Satbayev University

Master student, Software Engineering Department

Karina Litvinova , Satbayev University

Master student, Software Engineering Department

Madi Zhatkanbayev, International Information Technology University

Bachelor student, Cybersecurity Department

References

Rahman, Z., Yi, X., Mehedi, S. T., Islam, R., & Kelarev, A. (2022). Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions. Electronics, 11(9), 1416. https://doi.org/10.3390/electronics11091416

Hosseini, S. M., Ferreira, J., & Bartolomeu, P. C. (2023). Blockchain-Based Decentralized Identification in IoT: An Overview of Existing Frameworks and Their Limitations. Electronics, 12(6), 1283. https://doi.org/10.3390/electronics12061283

Obaidat, M. A., Rawashdeh, M., Alja’afreh, M., Abouali, M., Thakur, K., & Karime, A. (2024). Exploring IoT and Blockchain: A Comprehensive Survey on Security, Integration Strategies, Applications and Future Research Directions. Big Data and Cognitive Computing, 8(12), 174. https://doi.org/10.3390/bdcc8120174

Le, H. V. A., Nguyen, Q. D. N., Tadashi, N., & Tran, T. H. (2025). Blockchain‑Based Decentralized Identity Management System with AI and Merkle Trees. Computers, 14(7), 289. https://doi.org/10.3390/computers14070289

Ragothaman, K., Wang, Y., Rimal, B., & Lawrence, M. (2023). Access Control for IoT: A Survey of Existing Research, Dynamic Policies and Future Directions. Sensors, 23(4), 1805. https://doi.org/10.3390/s23041805

Almarri, S., & Aljughaiman, A. (2024). Blockchain Technology for IoT Security and Trust: A Comprehensive SLR. Sustainability, 16(23), 10177. https://doi.org/10.3390/su162310177

Enaya, A., Fernando, X., & Kashef, R. (2025). Survey of Blockchain-Based Applications for IoT. Applied Sciences, 15(8), 4562. https://doi.org/10.3390/app15084562

Ren, J., Zhang, J., Ren, Y., & Xu, J. (2025). Blockchain‑Based Self‑Sovereign Identity Management Mechanism in AIoT Environments. Electronics, 14(19), 3954. https://doi.org/10.3390/electronics14193954

Taherpour, A., & Wang, X. (2025). A high-throughput and secure coded blockchain for IoT. IEEE Transactions on Dependable and Secure Computing. https://doi.org/10.1109/TDSC.2025.3532850

Sarower, A. H., & Hassan, M. M. (2023). Necessity of reliable self-sovereign identity management framework for resource constrained IoT devices. AIP Conference Proceedings, 2579(1), 020003. https://doi.org/10.1063/5.0112785

Alanzi, H., & Alkhatib, M. (2022). Towards Improving Privacy and Security of Identity Management Systems Using Blockchain Technology: A Systematic Review. Applied Sciences, 12(23), 12415. https://doi.org/10.3390/app122312415

Strüker, J., Urbach, N., Guggenberger, T., Lautenschlager, J., Ruhland, N., Schlatt, V., Sedlmeir, J., Stoetzer, J.-C., & Völter, F. (2021). Self-Sovereign Identity – Foundations, Applications, and Potentials of Portable Digital Identities. Project Group Business & Information Systems Engineering, Fraunhofer Institute for Applied Information Technology FIT, Bayreuth.

Satybaldy, A., Ferdous, M. S., & Nowostawski, M. (2024). A taxonomy of challenges for self-sovereign identity systems. IEEE Access, PP, 1–10. https://doi.org/10.1109/ACCESS.2024.3357940

Ramírez-Gordillo, T., Maciá-Lillo, A., Pujol, F. A., García-D’Urso, N., Azorín-López, J., & Mora, H. (2025). Decentralized Identity Management for Internet of Things (IoT) Devices Using IOTA Blockchain Technology. Future Internet, 17(1), 49. https://doi.org/10.3390/fi17010049

Ahsan, M. S., & Pathan, A.-S. K. (2025). A Comprehensive Survey on the Requirements, Applications, and Future Challenges for Access Control Models in IoT: The State of the Art. IoT, 6(1), 9. https://doi.org/10.3390/iot6010009

Zaidi, S. Y. A., Shah, M. A., Khattak, H. A., Maple, C., Rauf, H. T., El-Sherbeeny, A. M., & El-Meligy, M. A. (2021). An Attribute-Based Access Control for IoT Using Blockchain and Smart Contracts. Sustainability, 13(19), 10556. https://doi.org/10.3390/su131910556

Kukut, Melike & Sogukpinar, Ibrahim. (2024). Attribute-Based Access Control in Internet of Things Security. The Eurasia Proceedings of Science Technology Engineering and Mathematics. 28. 23-33. https://doi.org/10.55549/epstem.1519125

Caserio, C., Lonetti, F., & Marchetti, E. (2022). A Formal Validation Approach for XACML 3.0 Access Control Policy. Sensors, 22(8), 2984. https://doi.org/10.3390/s22082984

Papatheodorou, N., Hatzivasilis, G., & Papadakis, N. (2025). The YouGovern Secure Blockchain‑Based Self‑Sovereign Identity (SSI) Management and Access Control. Appl. Sci., 15(12), 6437. https://doi.org/10.3390/app15126437

Namane, Sarra & Ben Dhaou, Imed. (2022). Blockchain-Based Access Control Techniques for IoT Applications. Electronics. 11. 2225. https://doi.org/10.3390/electronics11142225

Downloads

Published

2026-03-30

How to Cite

Mailybayev, Y., Seidaliyeva, U., Kushukbaev , A. ., Litvinova , K. ., & Zhatkanbayev, M. (2026). DECENTRALIZED IDENTITY AND ACCESS MANAGEMENT IN INTERNET OF THINGS SYSTEMS BASED ON BLOCKCHAIN. Scientific Journal of Astana IT University, 25. https://doi.org/10.37943/25DQCA5653

Issue

Section

Information Technologies