Exploring the Intersection of Blockchain and Cybersecurity

Year : 2026 | Volume : 16 | Issue : 01 | Page : 32 42
    By

    Kazi Kutubuddin Sayyad Liyakat,

  • Muskan Pathan,

  1. Professor, Electronics and Telecommunication Engineering, Brahmdevdada Mane Institute of Technology, Solapur, Maharashtra, India
  2. Student, Computer Science and Engineering, Brahmdevdada Mane Institute of Technology, Solapur, Maharashtra, India

Abstract

The digital landscape is an increasingly contested battleground, where the escalating sophistication of cyber threats consistently challenges the efficacy of traditional, centralized security architectures. Pervasive data breaches, identity theft, and vulnerabilities stemming from single points of failure underscore an urgent need for a paradigm shift in cybersecurity. This study posits that blockchain technology, with its foundational principles of decentralization, immutability, cryptographic security, and transparent distributed consensus, offers a transformative framework for building more resilient, trustworthy, and impenetrable digital defenses. By moving beyond traditional perimeter-based security, blockchain can fundamentally redefine how digital assets are protected, identities are managed, and data integrity is assured. This paper explores blockchain’s potential to enhance cybersecurity across critical domains, including decentralized identity management, immutable audit trails, secure data sharing, robust access control mechanisms, and the mitigation of supply chain vulnerabilities, ultimately fostering a new era of proactive and self-sustaining security systems. While acknowledging prevailing challenges such as scalability, interoperability, and regulatory hurdles, this analysis highlights blockchain’s capacity to architect a more secure and transparent digital future.

Keywords: Cybersecurity, blockchain, user layer, application layer, distributed ledger technology, principle of least privilege

[This article belongs to Current Trends in Information Technology ]

How to cite this article:
Kazi Kutubuddin Sayyad Liyakat, Muskan Pathan. Exploring the Intersection of Blockchain and Cybersecurity. Current Trends in Information Technology. 2026; 16(01):32-42.
How to cite this URL:
Kazi Kutubuddin Sayyad Liyakat, Muskan Pathan. Exploring the Intersection of Blockchain and Cybersecurity. Current Trends in Information Technology. 2026; 16(01):32-42. Available from: https://journals.stmjournals.com/ctit/article=2026/view=236605


References

  1. Imtiaz A, Shehzad D, Akbar H, Afzaal M, Zubair M, Nasim F. Blockchain technology: the future of cybersecurity. 2023 24th International Arab Conference on Information Technology (ACIT), Ajman, United Arab Emirates, 2023. p. 1–5. doi:10.1109/ACIT58888.2023.10453839.
  2. Govea J, Gaibor-Naranjo W, Villegas-Ch W. Securing critical infrastructure with blockchain technology: an approach to cyberresilience. Computers. 2024;13(5):122. doi:10.3390/computers13050122.
  3. Florez L, Correal D. Securing a national driver and vehicle registration system with blockchain. 2023 IEEE 20th International Conference on Software Architecture Companion (ICSA-C), L’Aquila, Italy. 2023. p. 239–245. doi:10.1109/ICSA-C57050.2023.00058.
  4. Mahbub M. Blockchain technologies for securing IoT infrastructure: IoT-blockchain architectonics. In: Choudhury T, Khanna A, Toe TT, Khurana M, Gia Nhu N, editors. Blockchain Applications in IoT Ecosystem. Cham: Springer International Publishing; 2021. p. 187–202. doi:10.1007/978-3-030-65691-1_13.
  5. Mahammad AB, Kumar R. Scalable and security framework to secure and maintain healthcare data using blockchain technology. 2023 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES), Greater Noida, India. 2023. p. 417–423. doi:10.1109/CISES58720.2023.10183494.
  6. Maqsood S, Chiasson S. Design, development, and evaluation of a cybersecurity, privacy, and digital literacy game for tweens. ACM Trans Priv Secur. 2021;24:1–37. doi:10.1145/3469821.
  7. Rizvi M. Enhancing cybersecurity: the power of artificial intelligence in threat detection and prevention. Int J Adv Eng Res Sci. 2023;10(5):55–60. doi:10.22161/ijaers.105.8.
  8. Yeasmin S, Baig A. Permissioned blockchain: securing industrial IoT environments. Int J Adv Comput Sci Appl. 2021;12(4). doi:10.14569/IJACSA.2021.0120488.
  9. Tariq N, Asim M, Al-Obeidat F, Farooqi MZ, Baker T, Hammoudeh M, et al. The security of big data in fog-enabled IoT applications including blockchain: a survey. Sensors. 2019;19:1788. doi:10.3390/s19081788. PubMed PMID: 31013993.
  10. Manzoor R, Sahay BS, Singh SK. Blockchain technology in supply chain management: an organizational theoretic overview and research agenda. Ann Oper Res. 2022:1–48. doi:10.1007/s10479-022-05069-5. PubMed PMID: 36467003.
  11. Abdelwahed IM, Ramadan N, Ahmed HA. Cybersecurity risks of blockchain technology. Int J Comput Appl. 2020;177(42):8–14. doi:10.5120/ijca2020919922.
  12. Etemadi N, Borbon YG, Strozzi F. Blockchain technology for cybersecurity applications in the food supply chain: a systematic literature review. In: Proceedings of the XXIV Summer School “Francesco Turco” – Industrial Systems Engineering. Bergamo, Italy. 2020. p. 9–11.
  13. Liyakat KKS. Detecting malicious nodes in IoT networks using machine learning and artificial neural networks. 2023 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India. 2023. p. 1–5. doi:10.1109/ESCI56872.2023.10099544.
  14. Liyakat KKS. Malicious node detection in IoT networks using artificial neural networks: a machine learning approach. In: Singh VK, Sagar AK, Nand P, Astya R, Kaiwartya O, editors. Intelligent Networks: Techniques and Applications. Boca Raton (FL): CRC Press; 2024. p. 182–197.
  15. Hodo E, Bellekens X, Hamilton A, Dubouilh PL, Iorkyase E, Tachtatzis C, et al. Threat analysis of IoT networks using artificial neural network intrusion detection system. 2016 International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, Tunisia. 2016. p. 1–6. doi:10.1109/ISNCC.2016.7746067.
  16. Lee GG, Zhai X. Using ChatGPT for science learning: a study on pre-service teachers’ lesson planning. IEEE Trans Learn Technol. 2024;17:1643–1660. doi:10.1109/TLT.2024.3401457.
  17. Tyagi H, Kumar R. Attack and anomaly detection in IoT networks using supervised machine learning approaches. Rev Intell Artif. 2021;35(1):11–21. doi:10.18280/ria.350102.

Regular Issue Subscription Review Article
Volume 16
Issue 01
Received 26/10/2025
Accepted 27/10/2025
Published 07/02/2026
Publication Time 104 Days


Login


My IP

PlumX Metrics