SECURE IOT-BASED AUTOMATIC GATE SYSTEM WITH DECENTRALIZED AUTHENTICATION AND BIBLIOMETRIC ANALYSIS
DOI:
https://doi.org/10.62373/pgd00y69Keywords:
IoT, Blockchain, Bibliometric AnalysisAbstract
The use of IoT-based automatic gate systems is on the rise in smart cities, healthcare, and transportation sectors; however, centralized authentication systems create single points of failure, scalability issues, and security risks. In this paper, a secure automatic gate system using decentralized blockchain-enabled authentication is proposed. Smart contracts are utilized to implement immutable access control without the need for a central authority. A machine learning-based anomaly recognition framework is incorporated to identify and prevent malicious or anomalous access attempts in real-time. Edge and fog computing concepts are leveraged to minimize latency and improve energy efficiency. In addition, a bibliometric study of peer-reviewed articles (2015-2025) on blockchain-enabled verification is performed using Scopus and Web of Science® datasets. The bibliometric study is carried out in the RStudio® environment using the Bibliometrics package, exploring publication patterns, citation effects, collaboration patterns, and topic evolution. The findings show that research has expanded rapidly since 2018 with a focus on permissioned and hybrid blockchain models. Research gaps in energy efficiency, interoperability, and large-scale deployment of secure IoT access control systems are identified.
Downloads
References
[1] W. Serrano, “Smart or intelligent assets or infrastructure: Technology with a purpose,” Buildings, vol. 13, no. 1, p. 131, 2023, doi: 10.3390/buildings13010131.
[2] K. T. Chui, B. B. Gupta, J. Liu, V. Arya, N. Nedjah, A. Almomani, and P. Chaurasia, “A survey of Internet of Things and cyber-physical systems: Standards, algorithms, applications, security, challenges, and future directions,” Information, vol. 14, no. 7, p. 388, 2023, doi: 10.3390/info14070388.
[3] A. Bourechak, O. Zedadra, M. N. Kouahla, A. Guerrieri, H. Seridi, and G. Fortino, “At the confluence of artificial intelligence and edge computing in IoT-based applications: A review and new perspectives,” Sensors, vol. 23, no. 3, p. 1639, 2023, doi: 10.3390/s23031639.
[4] L. Yan, L. Ge, Z. Wang, G. Zhang, J. Xu, and Z. Hu, “Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment,” J. Cloud Comput., vol. 12, no. 1, p. 61, 2023, doi: 10.1186/s13677-023-00444-4.
[5] J. Lee, M. Kim, K. Park, S. Noh, A. Bisht, A. K. Das, and Y. Park, “Blockchain-based data access control and key agreement system in IoT environment,” Sensors, vol. 23, no. 11, p. 5173, 2023, doi: 10.3390/s23115173.
[6] D.-Z. Sun, Y.-N. Gao, and Y. Tian, “On the security of a PUF-based authentication and key exchange protocol for IoT devices,” Sensors, vol. 23, no. 14, p. 6559, 2023, doi: 10.3390/s23146559.
[7] P. Mahadevappa et al., “A secure edge computing model using machine learning and IDS to detect and isolate intruders,” MethodsX, vol. 12, Art. no. 102597, 2024, doi: 10.1016/j.mex.2024.102597.
[8] U. Tariq and T. A. Ahanger, “Employing SAE-GRU deep learning for scalable botnet detection in smart city infrastructure,” PeerJ Comput. Sci., vol. 11, Art. no. e2869, 2025, doi: 10.7717/peerj-cs.2869.
[9] Q. Arshad et al., “Blockchain-based decentralized trust management in IoT: Systems, requirements and challenges,” Complex Intell. Syst., vol. 9, pp. 6155–6176, 2023, doi: 10.1007/s40747-023-01058-8.
[10] T. Bhardwaj and K. Sumangali, “An explainable federated blockchain framework with privacy-preserving AI optimization for securing healthcare data,” Sci. Rep., vol. 15, 2025, doi: 10.1038/s41598-025-04083-4.
[11] A. Alfahaid et al., “Machine learning-based security solutions for IoT networks: A comprehensive survey,” Sensors, vol. 25, no. 11, p. 3341, 2025, doi: 10.3390/s25113341.
[12] H. Meziane and N. Ouerdi, “A survey on performance evaluation of artificial intelligence algorithms for improving IoT security systems,” Sci. Rep., vol. 13, 2023, doi: 10.1038/s41598-023-46640-9.
[13] E. Rodríguez, B. Otero, and R. Canal, “A survey of machine and deep learning methods for privacy protection in the Internet of Things,” Sensors, vol. 23, no. 3, p. 1252, 2023, doi: 10.3390/s23031252.
[14] C. V. Kifor and A. Popescu, “Automotive cybersecurity: A survey on frameworks, standards, and testing and monitoring technologies,” Sensors, vol. 24, no. 18, p. 6139, 2024, doi: 10.3390/s24186139.
[15] M. Harvanek et al., “Survey on 5G physical layer security threats and countermeasures,” Sensors, vol. 24, no. 17, p. 5523, 2024, doi: 10.3390/s24175523.
[16] B. Alturki et al., “IoMT landscape: Navigating current challenges and pioneering future research trends,” Discover Appl. Sci., vol. 7, no. 26, 2025, doi: 10.1007/s42452-024-06351-w.
[17] N. Yousef, A. Sata, M. Shukla, S. Jarboui, and D. Mobarsa, “Blockchain-integrated IoT device for advanced inspection of casting defects,” Scientific Reports, vol. 15, p. 5300, 2025, doi: 10.1038/s41598-025-86777-3.
[18] D. Mobarsa, A. Sata, M. Shukla, and P. K. Dutta, “Blending blockchain with manufacturing for developing smart and secure process: A review, framework and implementation,” in Proc. 9th Int. Congr. on 3D Printing Technologies and Digital Industry, Cluj-Napoca, Romania, Sep. 18–19, 2025.
[19] W. Jiang, C. Liu, W. Liu, and L. Zheng, “Advancements in intelligent sensing technologies for food safety detection,” Research, vol. 8, Art. no. 0713, 2025, doi: 10.34133/research.0713.
[20] I. Essamlali, H. Nhaila, and M. El Khaili, “Advances in machine learning and IoT for water quality monitoring: A comprehensive review,” Heliyon, vol. 10, Art. no. e27920, 2024, doi: 10.1016/j.heliyon. 2024.e27920.
[21] J. W. Lai, “Research on prediction algorithm of effluent quality and development of integrated control system for wastewater treatment,” Sci. Rep., vol. 15, no. 19257, 2025, doi: 10.1038/s41598-025-03612-5.
[22] A. Chai et al., “DUA-MQTT: A distributed high-availability message communication model for the industrial Internet of Things,” Sensors, vol. 25, no. 16, p. 5071, 2025, doi: 10.3390/s25165071.
[23] V. Iordache et al., “Integrating connected vehicles into IoT ecosystems: A comparative study of low-power, long-range communication technologies,” Sensors, vol. 24, no. 23, p. 7607, 2024, doi: 10.3390/s24237607.
[24] W. Azariah et al., “A survey on open radio access networks: Challenges, research directions, and open source approaches,” Sensors, vol. 24, no. 3, p. 1038, 2024, doi: 10.3390/s24031038.
[25] M. F. Ali et al., “HCAP: Hybrid cyber-attack prediction model for securing healthcare applications,” PLOS One, vol. 20, no. 5, Art. no. e0321941, 2025, doi: 10.1371/journal.pone.0321941.
[26] J. Yun, Y. Lu, X. Liu, and J. Guan, “Bio-rollup: A new privacy protection solution for biometrics based on two-layer scalability-focused blockchain,” PeerJ Comput. Sci., vol. 10, 2024, doi: 10.7717/peerj-cs.2268.
[27] T. Wang et al., “PrivShieldROS: An extended robot operating system integrating Ethereum and interplanetary file system for enhanced sensor data privacy,” Sensors, vol. 24, no. 10, p. 3241, 2024, doi: 10.3390/s24103241.
[28] S. Swetha and J. P. P. M., “A novel dilated weighted recurrent neural network-based smart contract for secure sharing of big data in Ethereum blockchain using hybrid encryption schemes,” PeerJ Comput. Sci., vol. 11, 2025, doi: 10.7717/peerj-cs.2930.
[29] M. Alabadi and A. Habbal, “Next-generation predictive maintenance: Leveraging blockchain and dynamic deep learning in a domain-independent system,” PeerJ Comput. Sci., vol. 9, 2023, doi: 10.7717/peerj-cs.1712.
[30] H. A. Nahi, S. M. Hashim, and D. J. Kreem, “Blockchain for baccalaureate examination sheets protection in Iraq,” Indonesian J. Electr. Eng. Comput. Sci., vol. 29, no. 2, pp. 1183–1191, 2023, doi: 10.11591/ijeecs. v29.i2. pp1183-1191.
[31] K. W. Goh et al., “Blockchain-based online virtual store (BOVS): A secure framework for managing machine-created elements in business process management,” J. King Saud Univ.–Comput. Inf. Sci., vol. 37, p. 276, 2025, doi: 10.1007/s44443-025-00240-x.
[32] K. Bułkowska, M. Zielińska, and M. Bułkowski, “Implementation of blockchain technology in waste management,” Energies, vol. 16, no. 23, p. 7742, 2023, doi: 10.3390/en16237742.
[33] D. Rajagopal and P. K. T. Subramanian, “AI augmented edge and fog computing for Internet of Health Things (IoHT),” PeerJ Comput. Sci., vol. 11, Art. no. e2431, 2025, doi: 10.7717/peerj-cs.2431.
[34] R. Yuvarani et al., “Energy-aware cluster head optimization and secure blockchain integration for heterogeneous 6G-enabled IoMT networks,” Sci. Rep., vol. 15, no. 30009, 2025, doi: 10.1038/s41598-025-15462-2.
[35] W. C. Tsai, “FPGA-based implementation of zero-trust stream data encryption for enabling 6G-NB-IoT massive device access,” Sensors, vol. 24, no. 3, p. 853, 2024, doi: 10.3390/s24030853.
[36] Z. Allaw, O. Zein, and A.-M. Ahmad, “Cross-layer security for 5G/6G network slices: An SDN, NFV, and AI-based hybrid framework,” Sensors, vol. 25, no. 11, p. 3335, 2025, doi: 10.3390/s25113335.
[37] W. Yao, T. Zhou, Y. Han, and X. Wang, “Verifiable secure aggregation scheme for privacy protection in federated learning networks,” Discover Computing, vol. 28, no. 175, 2025, doi: 10.1007/s10791-025-09676-1.
[38] A. Hassan et al., “ZenGuard: A machine learning-based zero trust framework for context-aware threat mitigation using SIEM, SOAR, and UEBA,” Sci. Rep., vol. 15, no. 35871, 2025, doi: 10.1038/s41598-025-20998-4
[39] Q. Zhang et al., “Blockchain-powered LSTM-attention hybrid model for device situation awareness and on-chain anomaly detection,” Sensors, vol. 25, no. 15, p. 4663, 2025, doi: 10.3390/s25154663.
[40] M. A. Hossain, “Deep learning-based intrusion detection for IoT networks: A scalable and efficient approach,” EURASIP J. Inf. Secur., vol. 2025, no. 28, 2025, doi: 10.1186/s13635-025-00202-w.
[41] P. Reedy, “Interpol review of digital evidence for 2019–2022,” Forensic Sci. Int.: Synergy, vol. 6, 2023, doi: 10.1016/j.fsisyn.2022.100313.
Downloads
Published
Data Availability Statement
NA
Issue
Section
License
Copyright (c) 2026 Alok Pandit, Minal Shukla, Pooja Sapra, Amit Sata, Payal Singh, Pravin Vadhel (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
All articles published in PUXplore: Multidisciplinary Journal of Engineering are licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) license.
Under this license, anyone may read, download, copy, distribute, and share the work for non-commercial purposes, provided that appropriate credit is given to the author(s), the journal, and a link to the license is included.
No adaptations, derivatives, or modifications of the work are permitted without prior written permission from the copyright holder.
Authors retain copyright and grant the journal the right of first publication under this license.