SECURE IOT-BASED AUTOMATIC GATE SYSTEM WITH DECENTRALIZED AUTHENTICATION AND BIBLIOMETRIC ANALYSIS

Authors

DOI:

https://doi.org/10.62373/pgd00y69

Keywords:

IoT, Blockchain, Bibliometric Analysis

Abstract

The use of IoT-based automatic gate systems is on the rise in smart cities, healthcare, and transportation sectors; however, centralized authentication systems create single points of failure, scalability issues, and security risks. In this paper, a secure automatic gate system using decentralized blockchain-enabled authentication is proposed. Smart contracts are utilized to implement immutable access control without the need for a central authority. A machine learning-based anomaly recognition framework is incorporated to identify and prevent malicious or anomalous access attempts in real-time. Edge and fog computing concepts are leveraged to minimize latency and improve energy efficiency. In addition, a bibliometric study of peer-reviewed articles (2015-2025) on blockchain-enabled verification is performed using Scopus and Web of Science® datasets. The bibliometric study is carried out in the RStudio® environment using the Bibliometrics package, exploring publication patterns, citation effects, collaboration patterns, and topic evolution. The findings show that research has expanded rapidly since 2018 with a focus on permissioned and hybrid blockchain models. Research gaps in energy efficiency, interoperability, and large-scale deployment of secure IoT access control systems are identified.

Downloads

Download data is not yet available.

Author Biographies

  • Minal Shukla, Parul University

    NA

  • Pooja Sapra, Parul University

    NA

  • Amit Sata, Marwadi University

    NA

  • Payal Singh, Parul University

    NA

  • Pravin Vadhel, Parul University

    NA

References

[1] W. Serrano, “Smart or intelligent assets or infrastructure: Technology with a purpose,” Buildings, vol. 13, no. 1, p. 131, 2023, doi: 10.3390/buildings13010131.

[2] K. T. Chui, B. B. Gupta, J. Liu, V. Arya, N. Nedjah, A. Almomani, and P. Chaurasia, “A survey of Internet of Things and cyber-physical systems: Standards, algorithms, applications, security, challenges, and future directions,” Information, vol. 14, no. 7, p. 388, 2023, doi: 10.3390/info14070388.

[3] A. Bourechak, O. Zedadra, M. N. Kouahla, A. Guerrieri, H. Seridi, and G. Fortino, “At the confluence of artificial intelligence and edge computing in IoT-based applications: A review and new perspectives,” Sensors, vol. 23, no. 3, p. 1639, 2023, doi: 10.3390/s23031639.

[4] L. Yan, L. Ge, Z. Wang, G. Zhang, J. Xu, and Z. Hu, “Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment,” J. Cloud Comput., vol. 12, no. 1, p. 61, 2023, doi: 10.1186/s13677-023-00444-4.

[5] J. Lee, M. Kim, K. Park, S. Noh, A. Bisht, A. K. Das, and Y. Park, “Blockchain-based data access control and key agreement system in IoT environment,” Sensors, vol. 23, no. 11, p. 5173, 2023, doi: 10.3390/s23115173.

[6] D.-Z. Sun, Y.-N. Gao, and Y. Tian, “On the security of a PUF-based authentication and key exchange protocol for IoT devices,” Sensors, vol. 23, no. 14, p. 6559, 2023, doi: 10.3390/s23146559.

[7] P. Mahadevappa et al., “A secure edge computing model using machine learning and IDS to detect and isolate intruders,” MethodsX, vol. 12, Art. no. 102597, 2024, doi: 10.1016/j.mex.2024.102597.

[8] U. Tariq and T. A. Ahanger, “Employing SAE-GRU deep learning for scalable botnet detection in smart city infrastructure,” PeerJ Comput. Sci., vol. 11, Art. no. e2869, 2025, doi: 10.7717/peerj-cs.2869.

[9] Q. Arshad et al., “Blockchain-based decentralized trust management in IoT: Systems, requirements and challenges,” Complex Intell. Syst., vol. 9, pp. 6155–6176, 2023, doi: 10.1007/s40747-023-01058-8.

[10] T. Bhardwaj and K. Sumangali, “An explainable federated blockchain framework with privacy-preserving AI optimization for securing healthcare data,” Sci. Rep., vol. 15, 2025, doi: 10.1038/s41598-025-04083-4.

[11] A. Alfahaid et al., “Machine learning-based security solutions for IoT networks: A comprehensive survey,” Sensors, vol. 25, no. 11, p. 3341, 2025, doi: 10.3390/s25113341.

[12] H. Meziane and N. Ouerdi, “A survey on performance evaluation of artificial intelligence algorithms for improving IoT security systems,” Sci. Rep., vol. 13, 2023, doi: 10.1038/s41598-023-46640-9.

[13] E. Rodríguez, B. Otero, and R. Canal, “A survey of machine and deep learning methods for privacy protection in the Internet of Things,” Sensors, vol. 23, no. 3, p. 1252, 2023, doi: 10.3390/s23031252.

[14] C. V. Kifor and A. Popescu, “Automotive cybersecurity: A survey on frameworks, standards, and testing and monitoring technologies,” Sensors, vol. 24, no. 18, p. 6139, 2024, doi: 10.3390/s24186139.

[15] M. Harvanek et al., “Survey on 5G physical layer security threats and countermeasures,” Sensors, vol. 24, no. 17, p. 5523, 2024, doi: 10.3390/s24175523.

[16] B. Alturki et al., “IoMT landscape: Navigating current challenges and pioneering future research trends,” Discover Appl. Sci., vol. 7, no. 26, 2025, doi: 10.1007/s42452-024-06351-w.

[17] N. Yousef, A. Sata, M. Shukla, S. Jarboui, and D. Mobarsa, “Blockchain-integrated IoT device for advanced inspection of casting defects,” Scientific Reports, vol. 15, p. 5300, 2025, doi: 10.1038/s41598-025-86777-3.

[18] D. Mobarsa, A. Sata, M. Shukla, and P. K. Dutta, “Blending blockchain with manufacturing for developing smart and secure process: A review, framework and implementation,” in Proc. 9th Int. Congr. on 3D Printing Technologies and Digital Industry, Cluj-Napoca, Romania, Sep. 18–19, 2025.

[19] W. Jiang, C. Liu, W. Liu, and L. Zheng, “Advancements in intelligent sensing technologies for food safety detection,” Research, vol. 8, Art. no. 0713, 2025, doi: 10.34133/research.0713.

[20] I. Essamlali, H. Nhaila, and M. El Khaili, “Advances in machine learning and IoT for water quality monitoring: A comprehensive review,” Heliyon, vol. 10, Art. no. e27920, 2024, doi: 10.1016/j.heliyon. 2024.e27920.

[21] J. W. Lai, “Research on prediction algorithm of effluent quality and development of integrated control system for wastewater treatment,” Sci. Rep., vol. 15, no. 19257, 2025, doi: 10.1038/s41598-025-03612-5.

[22] A. Chai et al., “DUA-MQTT: A distributed high-availability message communication model for the industrial Internet of Things,” Sensors, vol. 25, no. 16, p. 5071, 2025, doi: 10.3390/s25165071.

[23] V. Iordache et al., “Integrating connected vehicles into IoT ecosystems: A comparative study of low-power, long-range communication technologies,” Sensors, vol. 24, no. 23, p. 7607, 2024, doi: 10.3390/s24237607.

[24] W. Azariah et al., “A survey on open radio access networks: Challenges, research directions, and open source approaches,” Sensors, vol. 24, no. 3, p. 1038, 2024, doi: 10.3390/s24031038.

[25] M. F. Ali et al., “HCAP: Hybrid cyber-attack prediction model for securing healthcare applications,” PLOS One, vol. 20, no. 5, Art. no. e0321941, 2025, doi: 10.1371/journal.pone.0321941.

[26] J. Yun, Y. Lu, X. Liu, and J. Guan, “Bio-rollup: A new privacy protection solution for biometrics based on two-layer scalability-focused blockchain,” PeerJ Comput. Sci., vol. 10, 2024, doi: 10.7717/peerj-cs.2268.

[27] T. Wang et al., “PrivShieldROS: An extended robot operating system integrating Ethereum and interplanetary file system for enhanced sensor data privacy,” Sensors, vol. 24, no. 10, p. 3241, 2024, doi: 10.3390/s24103241.

[28] S. Swetha and J. P. P. M., “A novel dilated weighted recurrent neural network-based smart contract for secure sharing of big data in Ethereum blockchain using hybrid encryption schemes,” PeerJ Comput. Sci., vol. 11, 2025, doi: 10.7717/peerj-cs.2930.

[29] M. Alabadi and A. Habbal, “Next-generation predictive maintenance: Leveraging blockchain and dynamic deep learning in a domain-independent system,” PeerJ Comput. Sci., vol. 9, 2023, doi: 10.7717/peerj-cs.1712.

[30] H. A. Nahi, S. M. Hashim, and D. J. Kreem, “Blockchain for baccalaureate examination sheets protection in Iraq,” Indonesian J. Electr. Eng. Comput. Sci., vol. 29, no. 2, pp. 1183–1191, 2023, doi: 10.11591/ijeecs. v29.i2. pp1183-1191.

[31] K. W. Goh et al., “Blockchain-based online virtual store (BOVS): A secure framework for managing machine-created elements in business process management,” J. King Saud Univ.–Comput. Inf. Sci., vol. 37, p. 276, 2025, doi: 10.1007/s44443-025-00240-x.

[32] K. Bułkowska, M. Zielińska, and M. Bułkowski, “Implementation of blockchain technology in waste management,” Energies, vol. 16, no. 23, p. 7742, 2023, doi: 10.3390/en16237742.

[33] D. Rajagopal and P. K. T. Subramanian, “AI augmented edge and fog computing for Internet of Health Things (IoHT),” PeerJ Comput. Sci., vol. 11, Art. no. e2431, 2025, doi: 10.7717/peerj-cs.2431.

[34] R. Yuvarani et al., “Energy-aware cluster head optimization and secure blockchain integration for heterogeneous 6G-enabled IoMT networks,” Sci. Rep., vol. 15, no. 30009, 2025, doi: 10.1038/s41598-025-15462-2.

[35] W. C. Tsai, “FPGA-based implementation of zero-trust stream data encryption for enabling 6G-NB-IoT massive device access,” Sensors, vol. 24, no. 3, p. 853, 2024, doi: 10.3390/s24030853.

[36] Z. Allaw, O. Zein, and A.-M. Ahmad, “Cross-layer security for 5G/6G network slices: An SDN, NFV, and AI-based hybrid framework,” Sensors, vol. 25, no. 11, p. 3335, 2025, doi: 10.3390/s25113335.

[37] W. Yao, T. Zhou, Y. Han, and X. Wang, “Verifiable secure aggregation scheme for privacy protection in federated learning networks,” Discover Computing, vol. 28, no. 175, 2025, doi: 10.1007/s10791-025-09676-1.

[38] A. Hassan et al., “ZenGuard: A machine learning-based zero trust framework for context-aware threat mitigation using SIEM, SOAR, and UEBA,” Sci. Rep., vol. 15, no. 35871, 2025, doi: 10.1038/s41598-025-20998-4

[39] Q. Zhang et al., “Blockchain-powered LSTM-attention hybrid model for device situation awareness and on-chain anomaly detection,” Sensors, vol. 25, no. 15, p. 4663, 2025, doi: 10.3390/s25154663.

[40] M. A. Hossain, “Deep learning-based intrusion detection for IoT networks: A scalable and efficient approach,” EURASIP J. Inf. Secur., vol. 2025, no. 28, 2025, doi: 10.1186/s13635-025-00202-w.

[41] P. Reedy, “Interpol review of digital evidence for 2019–2022,” Forensic Sci. Int.: Synergy, vol. 6, 2023, doi: 10.1016/j.fsisyn.2022.100313.

Downloads

Published

04-04-2026

Data Availability Statement

NA

How to Cite

SECURE IOT-BASED AUTOMATIC GATE SYSTEM WITH DECENTRALIZED AUTHENTICATION AND BIBLIOMETRIC ANALYSIS. (2026). PUXplore Multidisciplinary Journal of Engineering, 2(2). https://doi.org/10.62373/pgd00y69

Most read articles by the same author(s)