A Bibliometric Analysis of Blockchain-Based
Authentication and Security Solutions for IoT
Environments
Ankur Shashank Chaubey Rohit Kumar Verma
dept. of Computer Science dept. of Computer Science dept. of Computer Science
Delhi Technological University Delhi Technological University Delhi Technological University
Delhi, India Delhi, India Delhi, India
[email protected] [email protected] [email protected]Abstract—The convergence of blockchain technology and network bandwidth and storage requirements by embedding
Internet of Things (IoT) environments has introduced novel data in existing IoT data streams.
opportunities for enhancing authentication and security
solutions. This paper presents a comprehensive bibliometric The successful integration of Blockchain-Based
analysis of research literature focusing on Blockchain-Based Authentication and Security Solutions for IoT heralds a
Authentication and Security Solutions for IoT Environments. paradigm shift, introducing decentralized, tamper-resistant
By employing tools like VoSViewer and CiteSpace, we explore authentication mechanisms that elevate overall security[5].
the landscape of scholarly publications, identify key research The application of blockchain principles ensures regulatory
trends, prominent authors and institutions, and elucidate compliance, unlocking innovative potentials across diverse
emerging themes in this interdisciplinary domain. Our analysis domains such as secure supply chain management, reliable
sheds light on the evolution of research efforts, highlights government services[5], and disaster management using
seminal contributions, and uncovers potential areas for future automatic rescue system deployed using IoTs based wireless
exploration and innovation. The findings of this study sensor network[4][8].
contribute to a deeper understanding of the state-of-the-art in
blockchain-based authentication and security solutions for IoT The intrinsic attributes of immutability and tamper
environments, offering valuable insights for researchers, resistance inherent in blockchain make it a compelling
practitioners, and policymakers. solution for enhancing the security of IoT data [9]. By
furnishing a decentralized and distributed ledger, blockchain
Keywords—Blockchain, Internet Of Things, Authentication, ensures the transparent and immutable storage of IoT data,
security, Bibliometric Analysis thereby reshaping the dynamics of identity authentication
and security protection for IoT devices [9]. In 2018, Hammi
I. INTRODUCTION et al. introduced a robust decentralized identification and
Blockchain technology, introduced by Satoshi Nakamoto authentication system called “Bubbles of Trust” [6]. This
in 2008 as the underlying technology of Bitcoin, has approach creates secure virtual zones within the IoT
emerged as a potential solution to enhance the security and environment, where each device operates with an Ethereum-
privacy of IoT systems. Blockchain is a distributed ledger based authorization granted by a central node. “Bubbles of
technology that allows for secure, transparent, and tamper- Trust ” with IoT aims to mitigate authentication
proof transactions[2]. Blockchain offers several advantages vulnerabilities. This approach introduces a paradigm shift,
that contribute to the security of IoT systems like transitioning from centralized to decentralized or multi-
Decentralization, Transparency and Smart contracts[2]. By centralized network structures, ultimately amplifying the
incorporating these security features, a systems can provide a overall security of the system [3].
robust framework for ensuring the integrity, privacy, and
reliability of IoT data and transactions[5]. This paper aims to achieve these goals through
bibliometric analysis. We synthesize and analyze research
The term “Internet of Things” (IoT) describes a scenario literature from academic databases, uncover key insights,
in which a wide variety of gadgets, automobiles, appliances, trends, and patterns related to blockchain-based
and other things are linked together and equipped with authentication in IoT, and utilize bibliometric methodologies
applications, sensors, and network connections. These to examine publication trends, identify influential authors
gadgets may share information with one another and with and institutions, map collaborative networks, and elucidate
centralized databases via the internet[3]. Global end-user emerging research themes within this interdisciplinary field.
spending on IoT solutions is expected to reach 1.6 trillion
dollars by 2025. However, this rapid growth is accompanied • Investigate the growth trajectory of research articles
by security concerns. Many IoT devices lack robust security related to blockchain-based authentication in IoT.
features, leaving them vulnerable to attacks. Shockingly, • Identify shifts in publication frequency over time.
98% of IoT traffic remains unencrypted, and 57% of devices • Recognize researchers and institutions contributing
exhibit medium to high severity vulnerabilities[7]. Vendors significantly to this domain.
often prioritize cost-effective solutions over security, • Map connections among researchers, institutions, and
resulting in insecure deployments. Real world scenarios collaborative efforts.
involve cooperative relationships across multiple domains • Uncover patterns of collaboration and knowledge
when implementing certain functions. Hence, cross-domain exchange.
considerations become essential in IoT device authentication. • Explore novel areas of interest within blockchain-
Data hiding also emerges as a tool to prevent unauthorized based authentication for IoT.
access or tampering of sensitive data, and reduce the • Identify gaps and potential directions for future
research.
A. Data Collection observed, as depicted in Fig. 2. These annual citations
For this study, we relied on Web of Sciences as our signify the number of times a research paper or publication
primary source. Web of Science is widely used by has been cited within a year.
researchers, academics, and institutions worldwide for
conducting literature reviews, citation analysis, and tracking
research trends. The database indexes a wide range of
scholarly journals, conference proceedings, books, and
patents from around the world.
A specific string that goes as ((IoT OR IoMT OR IIoT
OR ("internet of things") OR ("internet-of-things")) NEAR/5
(authentic* or authori* OR verif* OR trust* OR securit* OR
privac*)) AND (blockchain NEAR/5 (authentic* or
authori* OR verif*)) was utilized to retrieve the documents
of the past 5 years published in the domain. A total of 221
documents were obtained from the Web of Sciences to Fig. 2. Annual citations for blockchain-based authentication and security
solutions in IoT environment.
further our research.
II. PUBLICATION STRUCTURE ANALYSIS B. Researchers and Affiliations
In this subsection, we aim to identify the top researchers
A. Yearly Research Publications
and their respective affiliations. From Table I, we can
Fig. 1. depicts the annual progression of research observe the top 10 researchers and their geographic origins.
publications focused on Blockchain-Based Authentication Among them, four authors—Debaio He, Yangjie Cao, Xing
and Security Solutions for IoT Environments. The graph Chen, and Hui Li—are based in People's Republic of China,
reveals a consistent increase in the number of publications
while Ibrahim Khalil and Youyang Qu hail from Australia.
from 2020 to 2024, indicating a significant rise in academic
Usman Khalil represents Brunei, Mauro Conti is affiliated
interest in this area.
with Italy, Jong Hyuk Park is based in South Korea, and
Ashok Kumar Das is associated with India.
Ashok Kumar Das, affiliated with the Centre for Security,
Theory & Algorithmic Research (CSTAR) at the
International Institute of Information Technology in India,
emerges as the most prolific author with six publications,
constituting 2.715% of the total. Following closely are
Debiao He and Jong Hyuk Park, each contributing four
publications, accounting for 1.81% each.
Turning to affiliations, as depicted in Fig. 3., we find that
Vellore Institute of Technology in India leads with 15
publications, comprising 6.787% of the total. Xidian
University in People's Republic of China follows with eight
Fig. 1. Annual Publications for blockchain-based authentication and publications, making up 3.620%. Additionally, Beijing
security solutions in IoT environment. University of Posts Telecommunications and King
Moreover, we notice a slight dip in annual citations Abdulaziz University in Saudi Arabia, along with King
following the year 2020, but there has been a recovery since Saud University and National Institute of Technology NIT
2022, with continued growth observed, as depicted in Fig. 2. System in India, each boast six publications, constituting
These annual citations signify the number of times a research 2.715%.
paper or publication has been cited within a year.
Annual citations provide valuable insights into the
impact and influence of a particular publication within the
academic community during a given period. This trend
reflects the sustained interest and engagement of researchers
in the domain.
Moreover, we notice a slight dip in annual citations
following the year 2020, attributed largely to the global
impact of the COVID-19 pandemic. The disruptions caused
by the pandemic, including lockdowns, travel restrictions,
and shifts in research priorities, led to a temporary slowdown
Fig. 3. Top Affiliated Organizations
in research activities and academic publications during that
period. Many research institutions and universities faced
challenges in conducting experiments, organizing
conferences, and publishing findings.However, there has
been a notable recovery since 2022, with continued growth
TABLE I. TOP CONTRIBUTING AUTHORS
Record % of
Author Country Organization
Count 221
Ashok Kumar Das India International Institute of Information Technology, Telangana, INDIA 6 2.715
People's Republic of
Debiao He MatrixElements Technologies, Shanghai, People’s Republic of China 4 1.81
China
Jong Hyuk Park South Korea Seoul National University of Science and Technology Seoul, South Korea 4 1.81
People's Republic of
Yangjie Cao Zhengzhou University, Henan, People’s Republic of China 3 1.357
China
People's Republic of Southeast University Electron Science & Engineering, Jiangsu, People’s
Xing Chen 3 1.357
China Republic of China
Mauro Conti Italy University of Padua, Padova PD, Italy 3 1.357
Ibrahim Khalil Australia Royal Melbourne Institute of Technology (RMIT), Melbourne, Australia 3 1.357
Usman Khalil Brunei University Brunei Darussalam, Lebuhraya Tungku, Brunei 3 1.357
People's Republic of
Hui Li Xidian University, Shaanxi, People’s Republic of China 3 1.357
China
Youyang Qu Australia Deakin University Melbourne, Burwood, Australia 3 1.357
The nodes represent number of publications implying the
III. CO-AUTHORSHIP ANALYSIS thicker nodes have more number of publications.
In this section, we will offer valuable insights into the
collaborative aspects of research. We'll examine the TABLE II. AUTHOR CO-AUTHOR LINKAGES
connections among authors who have collaborated on
Rank Author Document Links Citations TLS
Blockchain-Based Authentication and Security Solutions
for IoT. This analysis encompasses diverse metrics and 1 Weizheng Wang 3 12 132 18
visualizations generated using VoS Viewer, aimed at
2 Mauro Conti 3 12 113 16
comprehending the depth and nature of collaboration within
the research community[10]. 3 Mamoun Alazab 2 14 93 14
A. Author Co-Author Linkage 4 Chunhua Su 2 12 109 13
Table II provides insights into the top collaborative 5 Rekha Goyat 2 8 20 12
authors. In the table, "links" denote the number of
collaborative efforts between two researchers. "Total Link 6 Gulshan Kumar 2 8 20 12
Strength" represents the cumulative count of collaborations
7 Rahul Saha 2 8 20 12
between researchers and their co-authors.
Interestingly, there are instances wherein number of links is 8 RejiThomas 2 8 20 12
higher for researchers having lower number of publication
which denotes more open collaboration.
Out of the 221 documents retrieved from Web of Science, B. Country Co-Author Linkages
involving approximately 880 authors, our analysis with Fig. 5. represents the collaboration networks among
VoSViewer required researchers to have at least one countries. The map was generated using a full counting
publication and one citation, resulting in the exclusion of method to examine co-authorship relationships among
180 authors. Consequently, 700 authors met the threshold countries, with a requirement of at least 2 publications and 2
and 25 out of therm formed the largest network. citations each. Out of 57 countries, 42 met the threshold
Fig. 4. illustrates the collaboration network map for criteria, and 41 of them collectively formed the largest
Blockchain-Based Authentication and Security Solutions network. In the visualization, nodes represent publications
for IoT Environments. for each country, with thicker nodes indicating a higher
number of publications generated by that country.
Fig. 4. Author Co-Author Linkage Network Map
Fig. 5. Country Co-Author Linkage Network Map
A. Sources Citation Analysis
Table III outlines the countries with the highest link Table IV displays the primary sources with the highest total
strength values in Blockchain-Based Authentication and link strength, along with their respective publications,
Security Solutions for IoT Environments research. People's citations, links, and citation counts. IEEE Internet of Things
Republic of China leads the list with 90 publications, 26 Journal leads the table with 23 documents, 425 citations, 17
links, and a total link strength of 85, closely followed by citation links, and a total link strength of 29. Other notable
India with 58 publications, 22 links, and a total link strength sources include Cluster computing - The journal of
of 61. Other notable countries include Saudi Arabia, networks software tools, Peer-to-Peer networking &
Pakistan, South Korea, USA, England, Taiwan, Australia, applications, Electronics, IEEE transactions on services
and Canada. It's noteworthy that the top 5 countries computing, IEEE Access, Journal of Super Computing and
dominating the collaboration network are from Asia. CMC - Computers materials & continua.
Fig. 6. showcases the network map of source citation
TABLE III. COUNTRY CO-AUTHOR LINKAGES linkages, created using the full counting method in
Rank Country Publications Links TLS VoSViewer. We focused on sources with at least 2
1 Peoples R China 90 26 85 publications and 2 citations each. Out of the 85 identified
2 India 58 22 61 sources, 34 met the threshold, forming the largest network
3 Saudi Arabia 26 20 47
4 Pakistan 17 16 38
consisting of 29 sources. In the visualization, nodes
5 South Korea 23 19 34 represent citations, with thicker nodes indicating a higher
6 USA 17 17 34 number of citations, and vice versa.
7 England 16 18 32
8 Taiwan 10 18 31 V. KEYWORD CO-OCCURRENCE ANALYSIS
9 Australia 20 10 27
10 Canada 9 12 23 By analyzing the co-occurrence of keywords in scholarly
publications, researchers can identify prevalent themes and
emerging trends within a specific field or topic. Patterns of
IV. CITATION ANALYSIS keyword co-occurrence can reveal the relationships between
Citation analysis helps researchers and academic different concepts and topics, providing insights into the
institutions assess the impact and influence of scholarly overall research landscape.
works. By tracking the number of times a particular A. Keyword Co-Occurrence
publication is cited by other researchers, one can gauge its
To analyze keyword co-occurrences within published
significance within the scholarly community and its
documents, a full counting method was utilized in
contribution to the advancement of knowledge in a
VoSViewer, resulting in the creation of Figure 7. The data
particular field.
set from Web of Science comprised 760 keywords.
TABLE IV. SOURCES CITATION LINKAGES
Rank Source Document Link Citation TLS
1 IEEE internet of things journal 23 17 425 29
2 Cluster computing-the journal of networks software tools 4 10 136 14
3 Peer-to-Peer networking & applications 8 9 97 13
4 Electronics 10 10 77 12
5 IEEE transactions on services computing 2 10 323 12
6 IEEE access 11 7 199 11
7 Journal of super computing 6 9 11 11
8 CMC-computers materials & continua 7 4 8 8
Fig. 6. Source Citation Network Map
Keywords with a minimum of 2 occurrences were selected TABLE V. KEYWORD CO-OCCURRENCES
for analysis, resulting in 179 keywords meeting the Rank Keyword Occurrences Links TLS
threshold and forming a network. 1 Blockchain 156 171 982
In the visualization, nodes represent occurrences of 2 Security 87 147 668
keywords, with the most frequently occurring node having 3 Internet 79 139 581
the highest weight. A total of 14 clusters were identified,
4 Internet Of Things 80 141 574
with the red and green clusters being the largest, each
5 Authentication 63 120 476
consisting of 27 items.
6 IoT 52 113 359
7 Privacy 42 115 342
Table V presents the most frequented keywords in the
8 Blockchains 33 111 323
network. "Blockchain" ranks first on the list with 156
9 Internet Of Things (IoT) 34 101 288
occurrences, 171 occurrence links, and a total link strength
of 982. The total link strength between two keywords is 10 Things 32 88 252
determined by each occurrence of those keywords 11 Challenges 28 94 245
appearing together in the same document. The higher the 12 Scheme 35 92 245
frequency of co-occurrence between two keywords, the 13 Protocol 25 78 202
greater their total link strength. Other notable keywords 14 Framework 19 81 161
include "Security", "Internet", "Internet Of Things", 15 Servers 14 64 149
"Authentication", "IoT", "Privacy", "Blockchains", "Internet
Of Things (IoT)", "Things" among others.
Fig. 7. Keyword Co-Occurrences
Keyword occurrence assists scholars to identify patterns, provided valuable insights into the current state of research
trends, and relationships among keywords, which can on blockchain-based authentication and security solutions in
inform literature reviews, content analysis, and the IoT environment.
development of research frameworks or conceptual models
within blockchain-based authentication and security REFERENCES
solution in IoT environment.
[1] D. Sharma, R. Kumar, and K.-H. Jung,: A Bibliometric Analysis of
Convergence of Artificial Intelligence and Blockchain for Edge of
VI. CONCLUSION AND FUTURE DIRECTIONS Things 2023.
[2] Y. Li, Y. Zhang, and J. Liu, “Bibliometric analysis of blockchain-
The following conclusions can be drawn from the based cross-domain authentication in IoT environment,” in 2020
research and analysis conducted: IEEE International Conference on Big Data and Smart Computing
• Ashok Kumar Das from India is the top contributor (BigComp), 2020.
with a total of 6 publications under his name. [3] H. Zhang, Y. Wang, and Y. Zhang, “Bibliometric analysis of
blockchain-based cross-domain authentication strategy for trusted
• Vellore Institute of Technology, India holds the access to mobile devices in the IoT,” in 2020 IEEE International
highest number of affiliations amounting to 15. Conference on Big Data and Smart Computing (BigComp), 2020 .
• People’s Republic of China tops the table as the [4] A. S. Nandan, S. Singh, R. Kumar, and N. Kumar, “An optimized
country with the maximum number of publications. genetic algorithm for cluster head election based on movable sinks
• The most often recognized publishing body stands to and adjustable sensing ranges in IoT-based HWSNs,” IEEE Internet
Things J., vol. 9, no. 7, pp. 5027–5039, 2022.
be IEEE with 66 publications in the last five years.
• Weizheng Wang and People’s Republic of China are [5] M. T. Al Ahmed, F. Hashim, S. J. Hashim, A. Abdullah, and A.
Kerrouche, “Authentication-Chains: Blockchain-Inspired Lightweight
the authors and countries with the highest total link Authentication Protocol for IoT Networks,” Electronics, vol. 12, no. 4,
strength based co-authorship. p. 867, 2023.
• The organization with the highest TLS based co- [6] Hammi MT, Hammi B, Bellot P, Serhrouchni A Bubbles of trust: A
authorship is Vellore Institute of Technology. decentralized block-chain-based authentication system for iot.
• Articles published by IEEE Internet of things Journal Comput Secur 2018.
were the most cited articles with 425 citations. [7] M. M. Alani, “Blockchain-Based Authentication in IoT
Environments: A Survey,” Advances in Information Security, vol.102,
The analysis reveals a growing interest in blockchain- pp. 325-344, 2022.
based authentication and security solutions in IoT [8] A. S. Nandan, S.Singh, A. Malik, and R. Kumar,“A green data
environment, as evidenced by an increasing number of collection & transmission method for IoT-based WSN in disaster
publications over time. The analysis assisted in the management,” IEEE Sensors Journal, vol. 21, no. 22, Article ID
identification of key researchers, institutions, and countries 25912, 2021.
contributing to research in this domain. [9] Wang, Y., Zhang, H., & Zhang, Y. Bibliometric analysis of
blockchain-based cross-domain authentication for IoT devices. In
Future research should emphasize practical implementations 2021 IEEE International Conference on Big Data and Smart
and case studies to validate theoretical frameworks and Computing (BigComp) 2021.
algorithms proposed in academic literature. The study [10] Kuzior, A.; Sira, M. A Bibliometric Analysis of Blockchain
Technology Research Using VOSviewer. Sustainability 2022.