The scalability, adaptability, and security of traditional centralized access control mechanisms are severely limited as Internet of Things (IoT) ecosystems grow to billions of linked devices. In order to enable adaptive and fine-grained authorization, this work suggests a decentralized multi-layer architecture that combines Context-Aware Access Control (CAAC), Attribute-Based Access Control (ABAC), and a semantic Long Short-Term Memory (LSTM) prediction model. The system integrates contextual intelligence processing, consortium blockchain-based policy validation via the Raft consensus protocol, and edge-level preliminary authentication. The framework maintains distributed trust and minimal verification delay while enabling high transaction throughput. Semantic prediction of environmental circumstances reduces computational overhead and improves resilience to replay and interception assaults, according to experimental data. For large-scale IoT environments, the suggested method effectively strikes a balance between scalability, security, and adaptability.
Introduction
The rapid growth of Smart Cities and Industry 4.0 has significantly increased sensitive data sharing among IoT devices, creating the need for secure, scalable, and adaptive access control systems. Traditional models like Role-Based Access Control (RBAC) are insufficient because they cannot adapt to dynamic contextual factors such as location, time, and behavior. Additionally, centralized architectures introduce single points of failure and scalability issues, making systems vulnerable to attacks.
To address these challenges, the proposed framework combines decentralized trust, context awareness, and predictive analytics. It uses a consortium blockchain for decentralized identity management and tamper-proof policy enforcement, a smart contract-based Context-Aware Access Control (CAAC) system for real-time authorization, and a semantic LSTM model to predict risks and enforce least-privilege access dynamically.
In order to overcome the shortcomings of conventional access control methods in extensive IoT ecosystems, this article introduced a scalable and context-aware security architecture that combines Blockchain-based trust management with predictive machine learning. The proposed system provides fine-grained, adaptive, and risk-aware authorization choices by merging Attribute-Based Access Control (ABAC) with Context-Aware Access Control (CAAC) and a semantic LSTM-based environmental prediction engine.
Blockchain-based policy verification, contextual intelligence processing, edge-level pre-authentication, and governance control are all divided by the multi-tier decentralized architecture. In contexts with limited resources, this structural deconstruction increases scalability, decreases single points of failure, and boosts operational effectiveness. Adopting a consortium blockchain with Raft consensus guarantees low-latency transaction processing and predictable validation while preserving access record immutability and auditability. Experimental evaluation demonstrates that the proposed framework achieves high throughput and reduced computational overhead compared to conventional centralized and non-contextual methods for controlling access. By dynamically enforcing minimum-permission principles, the integration of semantic environmental prediction strengthens resilience against replay attacks, impersonation attempts, and privilege escalation, hence contributing to proactive risk mitigation.
Overall, the findings show that the suggested method successfully strikes a balance between scalability, security, and adaptability, making it appropriate for use in industrial IoT systems, smart city infrastructures, and other large-scale distributed contexts.
References
[1] G. D. Putra, V. Dedeoglu, S. S. Kanhere, R. Jurdak, and A. Ignjatovic, “Trust-based blockchain authorization for IoT,” arXiv preprint arXiv:2104.00832, Apr. 2021.
[2] M. M. Merlec and H. P. In, “SC-CAAC: A smart-contract-based context-aware access control scheme for blockchain-enabled IoT systems,” IEEE Internet of Things Journal, vol. 11, no. 11, pp. 19866–19881, Jun. 2024, doi: 10.1109/JIOT.2024.3371504.
[3] I. Singh and B. Singh, “Access management of IoT devices using access control mechanism and decentralized authentication: A review,” Measurement: Sensors, vol. 25, Art. no. 100591, 2023, doi: 10.1016/j.measen.2022.100591.
[4] A. Pathak, I. Al-Anbagi, and H. J. Hamilton, “SATI: Sidechain-based access control & trust mechanism for IoT networks,” IEEE Transactions on Network and Service Management, vol. 21, no. 5, pp. 5888–5903, Oct. 2024, doi: 10.1109/TNSM.2024.3438621.
[5] S. Malik, V. Dedeoglu, S. S. Kanhere, and R. Jurdak, “Trustchain: Trust management in blockchain and IoT supported supply chains,” in Proc. 2019 IEEE Int. Conf. Blockchain (Blockchain), Jul. 2019, pp. 184–193.
[6] M. Gupta, “Integration of IoT and blockchain for user authentication,” Scientific Journal of Metaverse and Blockchain Technologies, vol. 1, no. 1, pp. 72–81, 2023, doi: 10.36676/sjmbt.v1i1.10.
[7] P. Chinnasamy, B. Vinodhini, V. Praveena, C. Vinothini, and B. B. Sujitha, “Blockchain based access control and data sharing systems for smart devices,” Journal of Physics: Conference Series, vol. 1767, no. 1, Art. no. 012056, 2021, doi: 10.1088/1742-6596/1767/1/012056.
[8] E. A. Shammar, A. T. Zahary, and A. A. Al-Shargabi, “An attribute-based access control model for Internet of Things using Hyperledger Fabric blockchain,” Wireless communications and Mobile Computing, vol. 2022, Art. no. 6926408, 2022, doi: 10.1155/2022/6926408.
[9] A. Z. Ourad, B. Belgacem, and K. Salah, “Using blockchain for IoT access control and authentication management,” in Proc. ICIOT 2018, Lecture Notes in Computer Science, vol. 10972, pp. 150–164, 2018, doi: 10.1007/978-3-319-94370-1_11.
[10] D. Ongaro and J. Ousterhout, “In search of an understandable consensus algorithm (extended version),” Stanford University, Tech. Rep., May 2014.
[11] S. Joshi, S. Stalin, P. K. Shukla, P. K. Shukla, R. Bhatt, R. S. Bhadoria, and B. Tiwari, “Unified authentication and access control for future mobile communication-based lightweight IoT systems using blockchain,” Wireless Communications and Mobile Computing, vol. 2021, Art. no. 8621230, 2021, doi: 10.1155/2021/8621230.
[12] S. M. Awan, M. A. Azad, J. Arshad, U. Waheed, and T. Sharif, “A blockchain-inspired attribute-based zero-trust access control model for IoT,” Information, vol. 14, no. 2, Art. no. 129, Feb. 2023, doi: 10.3390/info14020129.
[13] W. Jiang, E. Li, W. Zhou, Y. Yang, and T. Luo, “IoT access control model based on blockchain and trusted execution environment,” Processes, vol. 11, no. 3, Art. no. 723, Feb. 2023, doi: 10.3390/pr11030723.
[14] T. Sultana, A. Almogren, M. Akbar, M. Zuair, I. Ullah, and N. Javaid, “Data sharing system integrating access control mechanism using blockchain-based smart contracts for IoT devices,” Applied Sciences, vol. 10, no. 2, Art. no. 488, Jan. 2020, doi: 10.3390/app10020488.
[15] S. Ding, J. Cao, C. Li, K. Fan, and H. Li, “A novel attribute-based access control scheme using blockchain for IoT,” IEEE Access, vol. 7, pp. 38431–38441, 2019, doi: 10.1109/ACCESS.2019.2905846.
[16] A. Z. Ourad, B. Belgacem, and K. Salah, “Using blockchain for IoT access control and authentication management,” in Proc. Int. Conf. Internet of Things (ICIOT), LNCS 10972, 2018, pp. 150–164, doi: 10.1007/978-3-319-94370-1_11.