Presenting a blockchain-based nonlinear model for the security of smart home

Document Type : Research Paper


Department of Electrical and Computer Engineering, Tabriz University, Tabriz, Iran



Using the Internet of Things technology, it will be possible to control the smart devices and appliances in a smart home. In this paper, the policies and concerns of users of smart devices and devices in homes and the factors that threaten privacy and access control in the Internet of Things are identified. In order to prevent the factors that cause these limitations, a non-linear model with its application in the smart home is presented. It is also investigated at which stage access to the Internet of Things weakens the security of smart homes and attacks by hackers. The independent variable of this research is the safe design of the smart home, and the variables of speed, time, usefulness, efficiency, ease of use, usability and security are dependent variables. The emphasis of this paper is on the use of blockchain technology to store the security rules in the form of a script inside the blockchain and the security rules are not concentrated in one place. Finally, a non-linear model is presented that can cover some of the security disadvantages of using the Internet of Things in smart homes and increase the security of the smart home.


[1] H. Abdulkarim, Review on machine learning and deep learning algorithms for IoT security, Int. J. Nonlinear Anal. Appl. 14 (2023), no. 5, 27–35.
[2] M. Amoozadeh, A. Raghuramu, Ch.-N. Chuah, D. Ghosal, H.M. Zhang, J. Rowe, and K. Levitt, Security vulnerabilities of connected vehicle streams and their impact on cooperative driving, IEEE Commun. Mag. 53 (2015), 6, 126–132. 
[3] A. Baliga, Understanding blockchain consensus models, Persistent 4 (2017), no. 1, 14.
[4] A. Banafa, IoT and blockchain convergence: Benefits and challenges, IEEE Internet of Things 9 (2017), no. 2017.
[5] V. Beltran, J.A. Martinez, A. Skarmeta, and P. Martinez-Julia, An arm-compliant IoT platform: Security by design for the smart home, IEEE 5th Glob. Conf. Consum. Electron., IEEE, 2016, pp. 1–2.
[6] G. Brambilla, M. Amoretti, and F. Zanichelli, Using blockchain for peer-to-peer proof-of-location, arXiv preprint arXiv:1607.00174 20 (2016).
[7] J. Buchmann, Introduction to Cryptography, vol. 335, Springer, 2004.
[8] E. Castello Ferrer, The blockchain: A new framework for robotic swarm systems, Proc. Future Technol. Conf. (FTC) 2018, Volume 2, Springer, 2019, pp. 1037–1058.
[9] M. L. Das, Privacy and security challenges in Internet of Things, Distrib. Comput. Internet Technol.: 11th Int. Conf., ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015. Proceedings 11, Springer, 2015, pp. 33–48.
[10] S.K. Datta, Ch. Bonnet, and N. Nikaein, An IoT gateway centric architecture to provide novel m2m services, IEEE World Forum on Internet of Things (WF-IoT), IEEE, 2014, pp. 514–519.
[11] M.C. Domingo, An overview of the internet of underwater things, J. Network Comput. Appl. 35 (2012), no. 6, 1879–1890.
[12] A. Dorri, S.S. Kanhere, R. Jurdak, and P. Gauravaram, Blockchain for IoT security and privacy: The case study of a smart home, IEEE Int. Conf. Pervasive Comput. Commun. Workshops (PerCom workshops), IEEE, 2017, pp. 618–623.
[13] A. Ekblaw, A. Azaria, J.D. Halamka, and A. Lippman, A case study for blockchain in healthcare: “medrec” prototype for electronic health records and medical research data, Proc. IEEE Open Big Data Conf., vol. 13, 2016, pp. 13.
[14] H. Gross, M. Holbl, D. Slamanig, and R. Spreitzer, Privacy-aware authentication in the internet of things, Cryptol. Network Secur.: 14th Int. Conf., CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings 14, Springer, 2015, pp. 32–39. 
[15] G. Ho, D. Leung, P. Mishra, A. Hosseini, D. Song, and D. Wagner, Smart locks: Lessons for securing commodity Internet of Things devices, Proc. 11th ACM Asia Conf. Comput. Commun. Secur., 2016, pp. 461–472.
[16] Sunny King, Primecoin: Cryptocurrency with prime number proof-of-work, Preprint
[17] I. Kotenko, I. Saenko, and A. Branitskiy, Framework for mobile Internet of Things security monitoring based on big data processing and machine learning, IEEE Access 6 (2018), 72714–72723.
[18] L. Li, R. Lu, K.-K.R. Choo, A. Datta, and J. Shao, Privacy-preserving-outsourced association rule mining on vertically partitioned databases, IEEE Trans. Inf. Forensics Secur.11 (2016), no. 8, 1847–1861.
[19] A. Mosenia and N.K. Jha, A comprehensive study of security of internet-of-things, IEEE Trans. Emerg. Topics Comput. 5 (2016), no. 4, 586–602.
[20] A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and Cryptocurrency Technologies, Princeton University Press, 2016.
[21] A. Ouaddah, H. Mousannif, A. Abou Elkalam, and A.A. Ouahman, Access control in the internet of things: Big challenges and new opportunities, Comput. Networks 112 (2017), 237–262.
[22] R. Roman, J. Zhou, and J. Lopez, On the features and challenges of security and privacy in distributed Internet of Things, Comput. Networks 57 (2013), no. 10, 2266–2279.
[23] S. Sicari, A. Rizzardi, L.A. Grieco, and A. Coen-Porisini, Security, privacy and trust in Internet of Things: The road ahead, Comput. Networks 76 (2015), 146–164.
[24] J. Sun, J. Yan, and K.Z.K. Zhang, Blockchain-based sharing services: What blockchain technology can contribute to smart cities, Financ. Innov. 2 (2016), no. 1, 1–9.
[25] A Tandulwadikar, Blockchain in banking: A measured approach, cognizant reports, Cognizant Reports, 2020, from
[26] Ch. Wang, Zh. Bi, and L.D. Xu, Iot and cloud computing in automation of assembly modeling systems, IEEE Trans. Ind. Inf. 10 (2014), no. 2, 1426–1434.
[27] Y. Wang and Q. Wen, A privacy-enhanced dns scheme for the Internet of Things, IET Int. Conf. Commun. Technol. Appl., 2011, pp. 699–702.
[28] G. Wood, Ethereum: A secure decentralised generalised transaction ledger, Ethereum project yellow paper 151 (2014), no. 2014, 1–32.
[29] Ch. Yang, X. Chen, and Y. Xiang, Blockchain-based publicly verifiable data deletion scheme for cloud storage, J. Network Comput. Appl. 103 (2018), 185–193.
[30] K. Zhao and L. Ge, A survey on the Internet of Things security, Ninth Int. Conf. Comput. Intell. Secur., IEEE, 2013, pp. 663–667.
[31] W. Zhou, Y. Jia, A. Peng, Y. Zhang, and P. Liu, The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved, IEEE Internet Things J. 6 (2018), no. 2, 1606–1616.

Articles in Press, Corrected Proof
Available Online from 11 March 2024
  • Receive Date: 07 July 2023
  • Accept Date: 30 September 2023