Ranking of Security Factors in Blockchain-Based IoT Paradigm Using AHP-TOPSIS Method

Authors

  • Priyanka Kaushal Department of Computer Science, Babasaheb Bhimrao Ambedkar University, Lucknow, India
  • Vipin Saxena Department of Computer Science, Babasaheb Bhimrao Ambedkar University, Lucknow, India
  • Shalini Chandra Department of Computer Science, Babasaheb Bhimrao Ambedkar University, Lucknow, India

DOI:

https://doi.org/10.46604/peti.2026.15157

Keywords:

IoT, blockchain, AHP, TOPSIS, security

Abstract

The Internet of Things (IoT) connects smart devices for efficient data sharing but faces challenges such as low processing power, limited storage, and security risks. Blockchain technology offers a secure and decentralized solution to these issues. This study prioritizes key security factors in blockchain-based IoT systems using a hybrid approach combining the Analytic Hierarchy Process (AHP) and the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). AHP determines the weights and relative importance of security factors, while TOPSIS ranks them based on closeness to the ideal solution. The results demonstrate a strong Spearman correlation (ρ = 0.9916) with individual AHP and TOPSIS outcomes, and sensitivity analysis confirms the stability of the rankings. Data integrity, access control, and authentication are identified as the top three security factors. These findings support the development of secure and scalable blockchain-based IoT systems.

References

R. W. Saaty, “The Analytic Hierarchy Process—What It Is and How It Is Used,” Mathematical Modelling, vol. 9, no. 3–5, pp. 161-176, 1987.

C. L. Hwang and K. Yoon, Multiple Attribute Decision Making: Methods and Applications: A State-of-the-Art Survey, Berlin: Springer-Verlag, 1981

K. Ashton, “That ‘Internet of Things’ Thing”, https://www.rfidjournal.com/expert-views/that-internet-of-things-thing/73881/, accessed in 2017.

M. A. Ferrag, M. Derdour, M. Mukherjee, A. Derhab, L. Maglaras, and H. Janicke, “Blockchain Technologies for the Internet of Things: Research Issues and Challenges,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2188-2204, 2019.

M. Ma, G. Shi, and F. Li, “Privacy-Oriented Blockchain-Based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario,” IEEE Access, vol. 7, pp. 34045-34059, 2019.

R. Diesch, M. Pfaff, and H. Krcmar, “A Comprehensive Model of Information Security Factors for Decision-Makers,” Computers & Security, vol. 92, article no. 101747, 2020.

L. Wang, Y. Ali, S. Nazir, and M. Niazi, “ISA Evaluation Framework for Security of Internet of Health Things System Using AHP-TOPSIS Methods,” IEEE Access, vol. 8, pp. 152316-152332, 2020.

A. Yohan and N. W. Lo, “FOTB: A Secure Blockchain-Based Firmware Update Framework for IoT Environment,” International Journal of Information Security, vol. 19, no. 3, pp. 257-278, 2020.

J. Kaur, A. Agrawal, and R. A. Khan, “Security Assessment in Foggy Era through Analytical Hierarchy Process,” 11th International Conference on Computing, Communication and Networking Technologies, pp. 1-6, 2020.

G. Shrivastava, D. N. Le, and K. Sharma, Cryptocurrencies and Blockchain Technology Applications, Hoboken, NJ: John Wiley & Sons, Inc., pp. 99-127, 2020.

T. Zhou, J. Shen, Y. Ren, and S. Ji, “Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems,” Security and Communication Networks, vol. 2021, article no. 1864514, 2021.

S. S. Panda, D. Jena, B. K. Mohanta, S. Ramasubbareddy, M. Daneshmand, and A. H. Gandomi, “Authentication and Key Management in Distributed IoT Using Blockchain Technology,” IEEE Internet of Things Journal, vol. 8, no. 16, pp. 12947-12954, 2021.

N. Dissanayake, A. Jayatilaka, M. Zahedi, and M. A. Babar, “Software Security Patch Management - A Systematic Literature Review of Challenges, Approaches, Tools and Practices,” Information and Software Technology, vol. 144, article no. 106771, 2022.

F. Zhou and T. Y. Chen, “A Hybrid Approach Combining AHP with TODIM for Blockchain Technology Provider Selection Under the Pythagorean Fuzzy Scenario,” Artificial Intelligence Review, vol. 55, no. 7, pp. 5411-5443, 2022.

B. B. Gardas, A. Heidari, N. J. Navimipour, and M. Unal, “A Fuzzy-Based Method for Objects Selection in Blockchain-Enabled Edge-IoT Platforms Using a Hybrid Multi-Criteria Decision-Making Model,” Applied Sciences, vol. 12, no. 17, article no. 8906, 2022.

B. Alojaiman, “A Multi-Criteria Decision-Making Process for the Selection of an Efficient and Reliable IoT Application,” Processes, vol. 11, no. 5, article no. 1313, 2023.

N. M. Alshahrani, M. L. Mat Kiah, B. B. Zaidan, A. H. Alamoodi, and A. Saif, “A Review of Smart Contract Blockchain Based on Multi-Criteria Analysis: Challenges and Motivations,” Computers, Materials & Continua, vol. 75, no. 2, pp. 2833-2858, 2023.

Y. Zhao, Y. Qu, Y. Xiang, Y. Zhang, and L. Gao, “A Lightweight Model-Based Evolutionary Consensus Protocol in Blockchain as a Service for IoT,” IEEE Transactions on Services Computing, vol. 16, no. 4, pp. 2343-2358, 2023.

A. Ali, B. A. S. Al-Rimy, F. S. Alsubaei, A. A. Almazroi, and A. A. Almazroi, “Healthlock: Blockchain-Based Privacy Preservation Using Homomorphic Encryption in Internet of Things Healthcare Applications,” Sensors, vol. 23, no. 15, article no. 6762, 2023.

E. U. Haque, W. Abbasi, A. Almogren, J. Choi, A. Altameem, A. U. Rehman, et al., “Performance Enhancement in Blockchain Based IoT Data Sharing Using Lightweight Consensus Algorithm,” Scientific Reports, vol. 14, article no. 26561, 2024.

S. Almotairi, S. R. Addula, O. Alharbi, Z. Alzaid, Y. M. Hausawi, and J. Almutairi, “Personal Data Protection Model in IOMT-Blockchain on Secured Bit-Count Transmutation Data Encryption Approach,” Fusion: Practice and Applications, vol. 16, no. 01, pp. 152-170, 2024.

M. Z. Khan, M. Shoaib, M. S. Husain, K. Ul Nisa, and M. T. Quasim, “Enhanced Mechanism To Prioritize the Cloud Data Privacy Factors Using AHP and TOPSIS: A Hybrid Approach,” Journal of Cloud Computing, vol. 13, no. 1, article no. 42, 2024.

R. Dahiya, L. Samal, D. Samal, J. Kumar, V. Sharma, D. K. Sahni, et al., “A Blockchain Based Security System Framework in Healthcare Domain Using IoT,” Journal of Electrical Systems, vol. 20, no. 3s, pp. 2039-2050, 2024.

M. Deng, Y. Lyu, C. Yang, F. Xu, M. Ahmed, N. Yang, et al., “Lightweight Trust Management Scheme Based on Blockchain in Resource-Constrained Intelligent IoT Systems,” IEEE Internet of Things Journal, vol. 11, no. 15, pp. 25706-25719, 2024.

S. V. Matey, D. N. Raut, R. B. Pansare, and R. Kant, “A Hybrid Framework To Prioritize the Performance Metrics for Blockchain Technology Adoption in Manufacturing Industries,” Journal of Modelling in Management, vol. 20, no. 3, pp. 701-731, 2025.

L. García, C. Cancimance, R. Asorey-Cacheda, C. L. Zúñiga-Cañón, A. J. Garcia-Sanchez, and J. Garcia-Haro, “Lightweight Blockchain for Data Integrity and Traceability in IoT Networks,” IEEE Access, vol. 13, pp. 81105-81117, 2025.

W. Villegas-Ch, R. Gutierrez, A. M. Navarro, and A. Mera-Navarrete, “Lightweight Blockchain for Authentication and Authorization in Resource-Constrained IoT Networks,” IEEE Access, vol. 13, pp. 48047-48067, 2025.

S. A. Mohammed Uveise and S. M. H. Sithi Shameem Fathima, “Efficient Lightweight Blockchain with Hybridized Consensus Algorithm for IoT Networks,” IETE Journal of Research, vol. 70, no. 12, pp. 8527-8537, 2024.

S. R. Addula, M. K. Meesala, P. Ravipati, and G. S. Sajja, “A Hybrid Autoencoder and Gated Recurrent Unit Model Optimized by Honey Badger Algorithm for Enhanced Cyber Threat Detection in IoT Networks,” Security and Privacy, vol. 8, no. 6, article no. e70086, 2025.

Downloads

Published

2026-02-04

How to Cite

[1]
Priyanka Kaushal, Vipin Saxena, and Shalini Chandra, “Ranking of Security Factors in Blockchain-Based IoT Paradigm Using AHP-TOPSIS Method”, Proc. eng. technol. innov., Feb. 2026.

Issue

Section

Articles