Secure IOT Authentication Using ECC in Blockchain

Main Article Content

Aditya Ankana, Nandiraju Bhargav, Koduru Mahesh Reddy, Mallempalli Gagan Chandra

Abstract

The optimistic increase in Internet of things (IoT) devices has imposed unrivalled security threats in authentication of devices and recording of identity of information. The paper also presents a detailed description of the way that safe IoT authentication would become possible under the assistance of Elliptic Curve Cryptography (ECC) and blockchain technology to develop a decentralized and un-traceable authentication system. The proposed system using the ECC-256 with ECC256k1 curve would be able to achieve the generation of the cryptography key pairs as well as the generation of the lightweight and yet robust cryptography signature that would be able to run on device characteristics of the resource-constrained IoT devices. The blockchain design can be employed in the form an irrevocable decentralized registry, where all the registration and authentication operation of the devices can be located meaning all the single points/location of vulnerability like the centralized arrangement is eliminated. The structure works based on the concept of a proof-of-work to web mine the blocks therefore block integrity and avert any modifications. The advanced analytics and real- time monitoring make the system give detailed view wrt system health, breach attempts, and behaviour patterns of the devices used. The system architecture allows it to deploy at enterprise level given that it contains some features like automated threat detection, security event logging and optimising functioning of the system. Results are presented in the case of experimental performance showing effective key generation time, low authentication time and high success rates during user verification on the device. The implemented

Article Details

How to Cite
Secure IOT Authentication Using ECC in Blockchain. (2026). Dandao Xuebao Journal of Ballistics, 38(1), 87-99. https://ballisticsjournal.com/index.php/journal/article/view/240
Section
Articles

How to Cite

Secure IOT Authentication Using ECC in Blockchain. (2026). Dandao Xuebao Journal of Ballistics, 38(1), 87-99. https://ballisticsjournal.com/index.php/journal/article/view/240