ZkPSLB: Zero-Knowledge Proof-Empowered End-to-End Secured Lightweight Blockchain Framework For Smart Cities
Abstract
Recently, developing technologies for smart cities, although scalable and cost-effective, have been challenging to provide anonymous verification and on-chain integrity with low overhead due to the increasing attack surface. We propose ZkPSLB, a layered end-to-end security framework to address the problem. ZkPSLB utilizes a Zero-Knowledge Concise Non-Interactive Knowledge Argument (zk-SNARK), a type of Zero-Knowledge Proof (ZKP) scheme, embedded within the Constrained Application Protocol (CoAP) for anonymous device authentication. Sensor payloads are encrypted with elliptic curve cryptography (ECC) and stored in a decentralized cloud storage system (IPFS). IPFS CIDs are committed to the chain, ensuring both off-chain confidentiality and on-chain integrity. In the evaluation conducted with 500 devices/5000 metadata, the authentication communication overhead was measured at 1952 bits. The event-based smart contract (EBSC) reduces on-chain payload and gas growth compared to storage-based designs, and its cost advantage has been validated.
Keywords
References
- I. Makhdoom, M. Zhou, M. Abolhasan, J. Lipman, and W. Ni, “PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities,” Comput. Secur., vol. 88, p. 101653, 2020. doi: 10.1016/j.cose.2019.101653
- M. Zaman, N. Puryear, S. Abdelwahed, and N. Zohrabi, “A review of IoT-based smart city development and management,” Smart Cities, vol. 7, no. 3, pp. 1462-1501, 2024. doi: 10.3390/smartcities7030061
- U. Majeed, L. U. Khan, I. Yaqoob, S. A. Kazmi, K. Salah, and C. S. Hong, “Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges,” J. Netw. Comput. Appl., vol. 181, p. 103007, 2021. doi: 10.1016/j.jnca.2021.103007
- H. Habibzadeh, B. H. Nussbaum, F. Anjomshoa, B. Kantarci, and T. Soyata, “A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities,” Sustain. Cities Soc., vol. 50, p. 101660, 2019. doi: 10.1016/j.scs.2019.101660
- T. Braun, B. C. M. Fung, F. Iqbal, and B. Shah, “Security and privacy challenges in smart cities,” Sustain. Cities Soc., vol. 39, pp. 499-507, 2018. doi: 10.1016/j.scs.2018.02.039
- L. Loffi, C. M. Westphall, L. D. Grüdtner, and C. B. Westphall, “Mutual authentication with multi-factor in IoT–fog–cloud environment,” J. Netw. Comput. Appl., vol. 176, p. 102932, 2021. doi: 10.1016/j.jnca.2020.102932
- J. Pan, and J. McElhannon, “Future edge cloud and edge computing for Internet of Things applications,” IEEE Internet Things J., vol. 5, no. 1, pp. 439-449, Feb. 2018. doi: 10.1109/JIOT.2017.2767608
- A. Haroon, M. A. Shah, Y. Asim, W. Naeem, M. Kamran, and Q. Javaid, “Constraints in the IoT: The world in 2020 and beyond,” Int. J. Adv. Comput. Sci. Appl., vol. 7, no. 11, 2016. doi: 10.14569/IJACSA.2016.071133
Details
Primary Language
English
Subjects
Information Security and Cryptology , Data and Information Privacy
Journal Section
Research Article
Authors
Early Pub Date
March 16, 2026
Publication Date
March 16, 2026
Submission Date
July 31, 2025
Acceptance Date
November 20, 2025
Published in Issue
Year 2026 Volume: 9 Number: 1
