PROTECTING BLOCKCHAIN FROM IOT DEVICE ATTACKS: CHALLENGES AND SOLUTIONS

Zoran P. Cekerevac, Serghei A. Ohrimenco, Petar Z. Cekerevac

Abstract


This paper focuses on the challenges and solutions in protecting blockchain technology from attacks through IoT devices, emphasizing the importance of integrating these technologies into modern systems. The study is based on the null hypothesis that there is no significant correlation between security challenges posed by IoT devices and the compromise of integrity, availability, or immutability of blockchain technology. While IoT devices enhance operational efficiency, they simultaneously represent vulnerabilities for potential cyberattacks that may jeopardize the security of blockchain systems. Identified security challenges, including DDoS attacks, data manipulation, ransomware, and protocol compromise, are analyzed through real-world cases and technological solutions. The analysis reveals that Zero Trust architecture, smart contracts, cryptographic algorithms, and artificial intelligence significantly enhance the security and resilience of integrated systems. User education, standardization of IoT security protocols, energy-efficient solutions, and collaboration between industries and regulatory bodies are key to mitigating risks. Based on the analysis, a significant correlation between IoT-related security challenges and blockchain compromise was established, rejecting the null hypothesis. The paper offers recommendations for improving the security of these technologies, highlighting the need for continuous monitoring and innovation in IoT and blockchain environments. It is intended to be useful for cybersecurity professionals, researchers working on IoT and blockchain integration, and companies implementing IoT devices in industrial and commercial contexts.


Keywords


Blockchain, IoT Security, DDoS, Smart Contracts, Zero Trust.

Full Text:

PDF

References


AgilePQ. (2021). Colonial Pipeline Co. Ransomware Attack. AgilePQ. Retrieved from https://agilepq.com/wp-content/uploads/2021/07/APQ_WP_Colonial_Pipeline_5.14.21.pdf

Alam, H., & Tomai, E. (2023). Security Attacks and Countermeasures in Smart Homes. International Journal on Cybernetics & Informatics, 12(2). doi:10.5121/ijci.2023.120209

Alsboui, T., Qin, Y., Hill, R., & Al-Aqrabi, H. (2020). Towards a Scalable IOTA Tangle-Based Distributed Intelligence Approach for the Internet of Things. Intelligent Computing. SAI 2020. Advances in Intelligent Systems and Computing. London, UK: Springer, Cham. doi:10.1007/978-3-030-52246-9_35

Alshaikhli, M., Al-Maadeed, S., & Saleh, M. (2025). Enhancing Scalability and Network Efficiency in IOTA Tangle Networks: A POMDP-Based Tip Selection Algorithm. Computers, 14(4), 117. doi:10.3390/computers14040117

Atonomi. (2018, 05 17). Atonomi Launches Identity Registry Network Beta to Enable Secure Interoperability for the Internet of Things. Retrieved from PR Newswire: https://www.prnewswire.com/news-releases/atonomi-launches-identity-registry-network-beta-to-enable-secure-interoperability-for-the-internet-of-things-300647697.html

Balogh, S., Gallo, O., Ploszek, R., Špaček, P., & Zajac, P. (2021). IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques. Electronics, 10(21), 2647. doi:10.3390/electronics10212647

Becher, B., & Urwin, M. (2025, 01 23). Blockchain: What It Is, How It Works, Why It Matters. Retrieved from BuiltIn: https://builtin.com/blockchain

Belin, O. (2018, Jan 30). The Difference Between Blockchain & Distributed Ledger Technology. Retrieved from TRADEIX: https://tradeix.com/distributed-ledger-technology/

Blane, E. (2021, 02 25). The Groundbreaking 2015 Jeep Hack Changed Automotive Cybersecurity. Retrieved from Fractional CISCO: https://fractionalciso.com/the-groundbreaking-2015-jeep-hack-changed-automotive-cybersecurity/

Bobde, Y., Narayanan, G., Jati, M., Raj, R. S., Cvitić, I., & Peraković, D. (2024). Enhancing Industrial IoT Network Security through Blockchain Integration. Electronics, 13(4). doi:10.3390/electronics13040687

Bursztein, E. (2017, 12 14). Inside the infamous Mirai IoT Botnet: A Retrospective Analysis. Retrieved from CloudFlare: https://blog.cloudflare.com/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/

Cekerevac, Z., Dvorak, Z., Prigoda, L., & Cekerevac, P. (2017). Internet of Things and the Man-In-the-Middle Attacks – Security and Economic Risks. MEST Journal, 5(2), 15-25. doi:10.12709/mest.05.05.02.03

Cekerevac, Z., Prigoda, L., & Čekerevac, P. (2025). Enhancing Digital Security in the Financial Sector With AI, IoT, and Blockchain. Sustainability and Economic Resilience in the Context of Global Systemic Transformations. Chisinau, Moldova.

Cekerevac, Z., Prigoda, L., & Maletic, J. (2018, July 15). Blockchain Technology and Industrial Internet of Things in the Supply Chains. (Z. Cekerevac, Ed.) MEST Journal, 6(2), 39-47. doi:10.12709/mest.06.06.02.05

Cosmos Network. (n.d.). Build on the Interchain. Retrieved 04 08, 2025, from Cosmos Network: https://cosmos.network/

Čekerevac, Z., Prigoda, L., & Čekerevac, P. (2025). Leading Technological Innovations in Digital Security (TIDS-2025). Technological Innovations in Digital Security, (p. 15). Chisinau, Moldova.

Demertzis, K., Iliadis, L., Tziritas, N., & Kikiras, P. (2020). Anomaly detection via blockchained deep learning smart contracts in industry 4.0. Neural Computing and Applications, 32, 17361–17378. doi:10.1007/s00521-020-05189-8

Douaioui, K., & Benmoussa, O. (2024). Insights into Industrial Efficiency: An Empirical Study of Blockchain Technology. Big Data Cogn. Comput, 8(6), 62. doi:10.3390/bdcc8060062

Ethereum. (2025, 03 03). Introduction to Smart Contracts. Retrieved from Ethereum: https://ethereum.org/en/smart-contracts/

Fruhlinger, J. (2018, 03 09). The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet. Retrieved from CSO: https://www.csoonline.com/article/564711/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html

Gebresilassie, S. K., Rafferty, J., Chen, L., Cui, Z., & Abu-Tair, M. (2023). Transfer and CNN-Based De-Authentication (Disassociation) DoS Attack Detection in IoT Wi-Fi Networks. Electronics, 12(17), 3731. doi:10.3390/electronics12173731

Helium. (2025). Proof-of-Coverage. Retrieved from Helium Foundation: https://docs.helium.com/iot/proof-of-coverage/

Humayun, M., Jhanjhi, N., Alsayat, A., & Ponnusamy, V. (2021). Internet of things and ransomware: Evolution, mitigation and prevention. Egyptian Informatics Journal, 22(1), 105-117. doi:10.1016/j.eij.2020.05.003

Hunter, A., & Moody, M. (2017). Exploiting known vulnerabilities of a smart thermostat. Proceedings Of 2016 14Th Annual Conference On Privacy, Security And Trust (Pst), (pp. 1-4). doi:10.1109/PST.2016.7906936

Hyperledger Fabric. (2023). A Blockchain Platform for the Enterprise. Retrieved from Hyperledger Fabric: https://hyperledger-fabric.readthedocs.io/en/release-2.5/

Ibrahim, R. F., Al-Haija, Q. A., & Ahmad, A. (2022). DDoS Attack Prevention for Internet of Thing Devices Using Ethereum Blockchain Technology. Sensors, 22(18), 6806. doi:10.3390/s22186806

Joodat, R. (n.d). Distributed Denial of Service (DDOS) attacks and IoT Security. (Mirai Botnet). Retrieved from Academia: https://www.academia.edu/33385809/Distributed_Denial_of_Service_DDOS_attacks_and_IoT_Security_Mirai_Botnet_Cloudflare_Orbit_Robert_Joodat

Kristiyanto, Y., & Ernastuti. (2020). Analysis of Deauthentication Attack on IEEE 802.11 Connectivity Based on IoT Technology Using External Penetration Test. CommIT Journal, 14(1), 45-51.

Liu, C., Tan, R., Wu, Y., Feng, Y., Jin, Z., Zhang, F., . . . Liu, Q. (2024). Dissecting zero trust: research landscape and its implementation in IoT. Cybersecurity, 7(20). doi:10.1186/s42400-024-00212-0

Lubin, A. (2023). Cyber Plungers: Colonial Pipeline and the Case for an Omnibus Cybersecurity Legislation. Georgia Law Review, 57, 1607-1634. Retrieved from https://ssrn.com/abstract=4483228

Maletic, J., & Cekerevac, Z. (2019). IIoT Security in Supply Chain. Proceedings of the V International Scientific and Practical Conference "Scientific and Technical Aspects of Innovative Development of the Transport Complex", (pp. 44-48). Doneck. Retrieved from https://cekerevac.eu/biblioteka/K74.pdf

McCracken, S. (2019, 01 19). The uConnect Infotainment System Was Hacked. Now What? Retrieved from Jeepproblems.com: https://www.jeepproblems.com/uconnect-hack/

Mittal, M. (2024). Colonial Pipeline Cyberattack Drives Urgent Reforms in Cybersecurity and Critical Infrastructure Resilience. International Journal of Oil, Gas and Coal Engineering, 12(6), 106-119. doi:10.11648/j.ogce.20241205.11

Palkadot. (2024, 07 29). Defy what's possible. Retrieved from Palkadot: https://polkadot.com/

R3. (2025, 02 12). Corda. Retrieved from R3: https://r3.com/corda/

Rizon. (2022, 01 12). RIZON Blockchain Digital Currency & Asset Hub. Retrieved from RIZON: http://rizon.world/

SC. (2023, 06 23). Trojanized OpenSSH used in Linux, IoT device compromise. Retrieved from SC Media: https://www.scworld.com/brief/trojanized-openssh-used-in-linux-iot-device-compromise

Sengupta, J. (2020). A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT. Journal of Network and Computer Applications, 20. doi:10.1016/j.jnca.2019.102481

Shah, Z., Ullah, I., Li, H., Levula, A., & Khurshid, K. (2022). Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey. Sensors, 22(3), 1094. doi:10.3390/s22031094

SSL. (2021, 11 23). Securing the Internet of Things (IoT) with SSL/TLS. Retrieved from SSL.com: https://www.ssl.com/article/securing-the-internet-of-things-iot-with-ssl-tls/

Tendermint. (2025). The standard for interchain communication. Retrieved from Tendermint: https://tendermint.com/ibc/

Tsaur, W.-J., Chang, J.-C., & Chen, C.-L. (2022). A Highly Secure IoT Firmware Update Mechanism Using Blockchain. Sensors, 22(2), 530. doi:10.3390/s22020530

Valencia-Payan, C., Griol, D., & Corrales, J. C. (2024). Blockchain self-update smart contract for supply chain traceability with data validation. Logic Journal of the IGPL, jzae047. doi:10.1093/jigpal/jzae047

Velazquez, R. (2022, 10 19). Blockchain and IoT: 10 Examples Making Our Future Smarter. Retrieved from Builtin: https://builtin.com/blockchain/blockchain-iot-examples

Wigmore, I. (July 2016 г.). Internet of Things (IoT). Получено из TechTarget - IoT Agenda: https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT

Xage. (2025). Xage Fabric Platform. Retrieved from Xage: https://xage.com/products/xage-fabric-platform/

Zafar, S., Bhatti, K. M., Shabbir, M., Hashmat, F., & Akbar, A. H. (2021). Integration of blockchain and Internet of Things: challenges and solutions. Annals of Telecommunications, 77, 13-32.

Zaheer, H., Shoaib, M., Iqbal, F., Arshad, S., Altaf, A., Villena, E. G., . . . Ashraf, I. (2024). An Energy-Efficient Technique to Secure Internet of Things Devices Using Blockchain. Journal of Network and System Management, 32. doi:10.1007/s10922-024-09870-4

Zetzsche, D. A., Arner, D. W., & Buckley, R. P. (2020). Decentralized Finance. Journal of Financial Regulation, 6(2), 172-203. doi:10.1093/jfr/fjaa010




DOI: http://dx.doi.org/10.12709/mest.13.13.02.05

Refbacks

  • There are currently no refbacks.