International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies


:: International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies

ISSN 2228-9860
eISSN 1906-9642


Vol.12(13) (2021)

  • Using Blockchain Technology to Secure Data of IoT

    Khaled Mofawiz Alfawaz(Management Information System Department, Faculty of Economics and Administration, King Abdulaziz University, Jeddah, SAUDI ARABIA ).

    Disciplinary: Information System, Technology, and Application.

    ➤ FullText

    doi: 10.14456/ITJEMAST.2021.254

    Keywords: Louvain clustering; Louvain algorithm; k-means; IoT blockchain; Security network.

    In the coming era blockchain and the IoT are going to become the two essential technologies that might have a great role in the organizations and industries such as education, healthcare, governance, commerce, agriculture, and more. IoT has the capability to handle the physical object networks which consist of different enclosed technologies that support communication and interaction or sensors between the internal and external environment. With the changing time, the cost of actuators and sensors are reducing, which intends easy to implement IoT platforms for lots of organizations. A number of healthcare systems are already available with IoT technologies but there a problem arises due to centralized databases. Thus, the data might be vulnerable, also it's difficult for the organizations to store this huge amount of data securely. This study explains the necessity of blockchain technology, blockchain the only the user has complete control over his data. His data cannot be shared without this owner’s approval, which is the best part of blockchain technology. Louvain clustering algorithm is introduced.

    Paper ID: 12A13B

    Cite this article:

    Alfawaz, K. M. (2021). Using Blockchain Technology to Secure Data of IoT.International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies, 12(12), 12A13B, 1-13.


  1. Haber, Stuart, and W. Scott Stornetta. How to time-stamp a digital document. Conference on the Theory and Application of Cryptography. Springer, Berlin, Heidelberg, 1990.
  2. Nakamoto, Satoshi. Bitcoin: A peer-to-peer electronic cash system. 2008.
  3. Alphand, Olivier, et al. IoTChain: A blockchain security architecture for the Internet of Things. Wireless Communications and Networking Conference (WCNC), 2018 IEEE. IEEE, 2018.
  4. Singh, Parbhakar, Parveen Kumar, and Tanweer Alam. Generating Different Mobility Scenarios in Ad Hoc Networks., International Journal of Electronics Communication and Computer Technology, 4(2), 2014
  5. Sharma, Abhilash, Tanweer Alam, and Dimpi Srivastava. Ad Hoc Network Architecture Based on Mobile Ipv6 Development. Advances in Computer Vision and Information Technology (2008): 224.
  6. Alam, Tanweer. Fuzzy control based mobility framework for evaluating mobility models in MANET of smart devices. ARPN Journal of Engineering and Applied Sciences 12, no. 15 (2017): 4526-4538.
  7. S. K. Usha Nandini Raghavan, Reka Albert, Near linear time algorithm to detect community structures in large-scale networks, CoRR, vol. abs/0709.2938, 2007.
  8. S. Fortunato and A. Lancichinetti, Community detection algorithms: a comparative analysis, in 4th International ICST Conference on Performance Evaluation Methodologies and Tools, 2009.
  9. S. Arifuzzaman, M. Khan, and M. Marathe, A Spaceefficient Parallel Algorithm for Counting Exact Triangles in Massive Networks, in 17th IEEE International Conference on High Performance Computing and Communications, 2015.

Other issues:


Call-for-Scientific Papers
Call-for-Research Papers:
ITJEMAST invites you to submit high quality papers for full peer-review and possible publication in areas pertaining engineering, science, management and technology, especially interdisciplinary/cross-disciplinary/multidisciplinary subjects.

To publish your work in the next available issue, your manuscripts together with copyright transfer document signed by all authors can be submitted via email to Editor @ (no space between). (please see all detail from Instructions for Authors)

Publication and peer-reviewed process:
After the peer-review process (4-10 weeks), articles will be on-line published in the available next issue. However, the International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies cannot guarantee the exact publication time as the process may take longer time, subject to peer-review approval and adjustment of the submitted articles.