<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>saucis</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Sakarya University Journal of Computer and Information Sciences</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2636-8129</issn>
                                                                                            <publisher>
                    <publisher-name>Sakarya University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.35377/saucis...1607145</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Computer Software</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Bilgisayar Yazılımı</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>Blockchain-Based Iot Security and Performance Analysis</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0000-5375-5317</contrib-id>
                                                                <name>
                                    <surname>Terazi</surname>
                                    <given-names>Selami</given-names>
                                </name>
                                                                    <aff>DUZCE UNIVERSITY</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-9005-3565</contrib-id>
                                                                <name>
                                    <surname>Şentürk</surname>
                                    <given-names>Arafat</given-names>
                                </name>
                                                                    <aff>DUZCE UNIVERSITY</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20250328">
                    <day>03</day>
                    <month>28</month>
                    <year>2025</year>
                </pub-date>
                                        <volume>8</volume>
                                        <issue>1</issue>
                                        <fpage>12</fpage>
                                        <lpage>26</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20241225">
                        <day>12</day>
                        <month>25</month>
                        <year>2024</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20250227">
                        <day>02</day>
                        <month>27</month>
                        <year>2025</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2018, Sakarya University Journal of Computer and Information Sciences</copyright-statement>
                    <copyright-year>2018</copyright-year>
                    <copyright-holder>Sakarya University Journal of Computer and Information Sciences</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>The Internet of Things (IoT) enables devices to connect and exchange data, revolutionizing industries and daily life. However, the rapid growth of IoT devices has introduced significant security challenges, including cyber-attacks, data breaches, and unauthorized access. This study explores the integration of blockchain technology, particularly Hyperledger Fabric, to enhance IoT security. With its permissioned structure and decentralized approach, blockchain ensures secure data storage, integrity, and confidentiality. Hyperledger Fabric’s modular architecture offers organizations the flexibility to address these security needs effectively. Using the OPNET simulation tool, the study analyses the performance of IoT networks transmitting blockchain-encrypted packets. Results show that blockchain integration enhances security, strengthens user authentication, and prevents unauthorized access. These findings highlight blockchain&#039;s transformative potential for IoT security, offering practical solutions for industrial applications and emphasizing the need for continued research in this critical field.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Blockchain</kwd>
                                                    <kwd>  IoT</kwd>
                                                    <kwd>  Cyber security</kwd>
                                                    <kwd>  Hyperledger Fabric</kwd>
                                                    <kwd>  OPNET</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">“How Many IoT Devices Are There(2024-2032).” Accessed: Jul. 22, 2024. [Online]. Available: https://www.demandsage.com/number-of-iot-devices/</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, Sep. 2012, doi: 10.1016/J.ADHOC.2012.02.016.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internet of things for smart cities,” IEEE Internet Things J, vol. 1, no. 1, pp. 22–32, Feb. 2014, doi: 10.1109/JIOT.2014.2306328.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">I. Lee and K. Lee, “The Internet of Things (IoT): Applications, investments, and challenges for enterprises,” Bus Horiz, vol. 58, no. 4, pp. 431–440, Jul. 2015, doi: 10.1016/J.BUSHOR.2015.03.008.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">L. Woetzel, J. Remes, B. Boland, and K. Lv, “Smart city technology for a more liveable future | McKinsey,” Jun. 2018. Accessed: Sep. 13, 2024. [Online]. Available: https://www.mckinsey.com/capabilities/operations/our-insights/smart-cities-digital-solutions-for-a-more-livable-future</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” Computer Networks, vol. 76, pp. 146–164, Jan. 2015, doi: 10.1016/J.COMNET.2014.11.008.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">HP, “Internet of Things Research Study,” 2014.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, “DDoS in the IoT: Mirai and other botnets,” Computer (Long Beach Calif), vol. 50, no. 7, pp. 80–84, 2017, doi: 10.1109/MC.2017.201.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">R. H. Weber and E. Studer, “Cybersecurity in the Internet of Things: Legal aspects,” Computer Law and Security Review, vol. 32, no. 5, pp. 715–728, Oct. 2016, doi: 10.1016/J.CLSR.2016.07.002.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">K. Christidis and M. Devetsikiotis, “Blockchains and Smart Contracts for the Internet of Things,” IEEE Access, vol. 4, pp. 2292–2303, 2016, doi: 10.1109/ACCESS.2016.2566339.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” 2008, Accessed: Sep. 13, 2024. [Online]. Available: www.bitcoin.org</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">S. Singh, A. S. M. Sanwar Hosen, and B. Yoon, “Blockchain Security Attacks, Challenges, and Solutions for the Future Distributed IoT Network,” IEEE Access, vol. 9, pp. 13938–13959, 2021, doi: 10.1109/ACCESS.2021.3051602.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">A. Reyna, C. Martín, J. Chen, E. Soler, and M. Díaz, “On blockchain and its integration with IoT. Challenges and opportunities,” Future Generation Computer Systems, vol. 88, pp. 173–190, Nov. 2018, doi: 10.1016/J.FUTURE.2018.05.046.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">A. Bahga, V. K. Madisetti, A. Bahga, and V. K. Madisetti, “Blockchain Platform for Industrial Internet of Things,” Journal of Software Engineering and Applications, vol. 9, no. 10, pp. 533–546, Oct. 2016, doi: 10.4236/JSEA.2016.910036.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">E. A. Shammar, A. T. Zahary, and A. A. Al-Shargabi, “A Survey of IoT and Blockchain Integration: Security Perspective,” IEEE Access, vol. 9, pp. 156114–156150, 2021, doi: 10.1109/ACCESS.2021.3129697.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends,” Proceedings - 2017 IEEE 6th International Congress on Big Data, BigData Congress 2017, pp. 557–564, Sep. 2017, doi: 10.1109/BIGDATACONGRESS.2017.85.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">E. Androulaki et al., “Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains,” Proceedings of the 13th EuroSys Conference, EuroSys 2018, vol. 2018-January, Jan. 2018, doi: 10.1145/3190508.3190538.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">A. de Vries, “Bitcoin’s Growing Energy Problem,” Joule, vol. 2, no. 5, pp. 801–805, May 2018, doi: 10.1016/J.JOULE.2018.04.016.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">S. Basudan, “A Scalable Blockchain Framework for Secure Transactions in IoT-Based Dynamic Applications,” IEEE Open Journal of the Communications Society, 2023, doi: 10.1109/OJCOMS.2023.3307337.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">A. Pathak, I. Al-Anbagi, and H. J. Hamilton, “TABI: Trust-Based ABAC Mechanism for Edge-IoT Using Blockchain Technology,” IEEE Access, vol. 11, pp. 36379–36398, 2023, doi: 10.1109/ACCESS.2023.3265349.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">S. S. Seshadri et al., “IoTCop: A Blockchain-Based Monitoring Framework for Detection and Isolation of Malicious Devices in Internet-of-Things Systems,” IEEE Internet Things J, vol. 8, no. 5, pp. 3346–3359, Mar. 2021, doi: 10.1109/JIOT.2020.3022033.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">B. Bera, S. Saha, A. K. Das, and A. V. Vasilakos, “Designing blockchain-based access control protocol in iot-enabled smart-grid system,” IEEE Internet Things J, vol. 8, no. 7, pp. 5744–5761, Apr. 2021, doi: 10.1109/JIOT.2020.3030308.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">H. M. Buttar, W. Aman, M. M. U. Rahman, and Q. H. Abbasi, “Countering Active Attacks on RAFT-Based IoT Blockchain Networks,” IEEE Sens J, vol. 23, no. 13, pp. 14691–14699, Jul. 2023, doi: 10.1109/JSEN.2023.3274687.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">X. Yang et al., “Blockchain-Based Secure and Lightweight Authentication for Internet of Things,” IEEE Internet Things J, vol. 9, no. 5, pp. 3321–3332, Mar. 2022, doi: 10.1109/JIOT.2021.3098007.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">G. Rathee, F. Ahmad, N. Jaglan, and C. Konstantinou, “A Secure and Trusted Mechanism for Industrial IoT Network Using Blockchain,” IEEE Trans Industr Inform, vol. 19, no. 2, pp. 1894–1902, Feb. 2023, doi: 10.1109/TII.2022.3182121.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">H. Liu, D. Han, and D. Li, “Fabric-iot: A Blockchain-Based Access Control System in IoT,” IEEE Access, vol. 8, pp. 18207–18218, 2020, doi: 10.1109/ACCESS.2020.2968492.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">J. Maeng, Y. Heo, and I. Joe, “Hyperledger Fabric-Based Lightweight Group Management (H-LGM) for IoT Devices,” IEEE Access, vol. 10, pp. 56401–56409, 2022, doi: 10.1109/ACCESS.2022.3177270.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">E. A. Shammar, A. T. Zahary, and A. A. Al-Shargabi, “An Attribute-Based Access Control Model for Internet of Things Using Hyperledger Fabric Blockchain,” Wirel Commun Mob Comput, vol. 2022, 2022, doi: 10.1155/2022/6926408.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">R. Kaur and A. Ali, “A Novel Blockchain Model for Securing IoT Based Data Transmission,” International Journal of Grid and Distributed Computing, vol. 14, no. 1, pp. 1045–1055, Apr. 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">H. Zhang, X. Zhang, Z. Guo, H. Wang, D. Cui, and Q. Wen, “Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a New Tool,” IEEE Internet Things J, vol. 10, no. 14, pp. 11985–11999, Jul. 2023, doi: 10.1109/JIOT.2021.3121482.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">Z. Gong-Guo and Z. Wan, “Blockchain-based IoT security authentication system,” Proceedings - 2021 International Conference on Computer, Blockchain and Financial Development, CBFD 2021, pp. 415–418, 2021, doi: 10.1109/CBFD52659.2021.00090.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">D. Li, W. Peng, W. Deng, and F. Gai, “A blockchain-based authentication and security mechanism for IoT,” Proceedings - International Conference on Computer Communications and Networks, ICCCN, vol. 2018-July, Oct. 2018, doi: 10.1109/ICCCN.2018.8487449.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
