Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
Blockchain-driven smart contract with key exchange protocol for secure device-to-device communication using verkle tree K-ary structures
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 17 February 2026

Blockchain-driven smart contract with key exchange protocol for secure device-to-device communication using verkle tree K-ary structures

  • A. Simbu1,
  • S. Nandakumar1 &
  • K. Saravanan1 

Scientific Reports , Article number:  (2026) Cite this article

  • 366 Accesses

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing

Abstract

In the rapidly evolving landscape of wireless communication, the traditional model of data exchange predominantly relies on a centralized infrastructure, where all communications, even between nearby devices, are routed through a base station (BS) and potentially the core network. Device-to-device (D2D) communication emerges as a transformative paradigm that challenges this conventional model. The concept of D2D communication has gained considerable traction, especially with the advent of 4G LTE and its crucial role in 5G and beyond. D2D aims to unlock numerous benefits, including improved spectral efficiency, increased throughput, reduced latency, enhanced energy efficiency, and better network offloading. In this paper, we focus on secure D2D communication using D2D-ECDH key exchange protocol with blockchain smart contracts along with blockchain Verkle tree data structure. This approach helps to improve secure communication between IoT devices and avoids Man-in-the-Middle (MITM) attacks, replay attacks, and central points of failure. The Verkle tree approach provides a smaller proof size to verify the root commitment value compared to the traditional Merkle tree data structure. The simulation has been executed in both Python and Solidity coding. Python has executed in VS Code generator, and Solidity code has executed in Remix IDE, Ethereum network V0.65.0. The Remix IDE was developed in Ganache V2.7.1 for blockchain smart contracts. Compared to the traditional Merkle tree approach, the Verkle tree provides less proof size up to 33 times.

Similar content being viewed by others

Certificateless data integrity auditing with sparse Merkle trees for the cloud-edge environment

Article Open access 10 November 2025

Secure IoT data dissemination with blockchain and transfer learning techniques

Article Open access 11 January 2025

A decentralized authentication scheme for smart factory based on blockchain

Article Open access 20 October 2024

Data availability

The data supporting the results and findings of this work/study can be provided by corresponding author upon responsible request.

References

  1. Jayakumar, S. & Nandakumar, S. A review on resource allocation techniques in D2D communication for 5G and B5G technology. Peer-to-Peer Netw. Appl. https://doi.org/10.1007/s12083-020-00962-x (2020).

    Google Scholar 

  2. Chandrakar, P., Amin, R. & Bagga, R. Blockchain based security protocol for device to device secure communication in internet of things networks. Secur. Priv. https://doi.org/10.1002/spy2.267 (2023).

    Google Scholar 

  3. Sakho, S., Jianbiao, Z., Essaf, F. & Blockchain Perspectives and issues. J. Intell. Fuzzy Syst. https://doi.org/10.3233/JIFS-190449 (2019).

    Google Scholar 

  4. IBM. What are smart contracts on blockchain? https://www.ibm.com/think/topics/smart-contracts (2025).

  5. Stute, M., Kohnhauser, F., Freisleben, B. & RESCUE A resilient and secure device-to-device communication framework for emergencies. IEEE Trans. Dependable Secure Comput. 19 (3). https://doi.org/10.1109/TDSC.2020.3036224 (2022).

  6. Mahdi, W. H. & Taspinar, N. Bee system-based self configurable optimized resource allocation technique in device-to-device (D2D) communication networks. IEEE Access 12 (2024).

  7. Lou, C., Cao, M. & Wu, R. A lightweight key generation scheme for secure device-to-device (D2D) communication. Wirel Commun. Mob. Comput. Article 6642605 https://doi.org/10.1155/2021/6642605 (2021).

  8. Lu, S. P., Lei, C. L. & Ho, C. Y. Distributed Ledger technology based architecture for decentralized device-to-device communication network. IEEE Access 10 https://doi.org/10.1109/ACCESS.2022.3199880 (2022).

  9. Gaba, G. S., Kumar, G. & Kim, T. H. Secure device-to-device communications for 5G enabled internet of things applications. Comput. Commun. 169, 114–128. https://doi.org/10.1016/j.comcom.2021.01.010 (2021).

    Google Scholar 

  10. Shang, Z., Ma, M. & Li, X. A secure group-oriented device-to-device authentication protocol for 5G wireless networks. IEEE Trans. Wirel. Commun. 19 (11). https://doi.org/10.1109/TWC.2020.3007702 (2020).

  11. Bouchaala, M., Ghazel, C. & Saidane, L. A. Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card. J. Supercomput. 78, 497–522. https://doi.org/10.1007/s11227-021-03857-7 (2022).

    Google Scholar 

  12. Ryu, J., Oh, J. & Kwon, D. Secure ECC-based three-factor mutual authentication protocol for Telecare medical information system. IEEE Access 10 https://doi.org/10.1109/ACCESS.2022.3145959 (2022).

  13. Das, A. K., Yannam, A. R. & Rodrigues, J. J. P. C. Provably secure ECC-based device access control and key agreement protocol for IoT environment. IEEE Access 7 https://doi.org/10.1109/ACCESS.2019.2912998 (2019).

  14. Vivekanandan, M. BIDAPSCA5G: blockchain based IoT device to device authentication protocol for smart City applications using 5G technology. Peer-to-Peer Netw. Appl. 14, 403–419. https://doi.org/10.1007/s12083-020-00963-w (2021).

    Google Scholar 

  15. Vishwakarma, L. & Das, D. SCAB-IoTA: secure communication and authentication for IoT applications using blockchain. J. Parallel Distrib. Comput. 154, 94–105. https://doi.org/10.1016/j.jpdc.2021.04.003 (2021).

    Google Scholar 

  16. Kuszmaul, J. & Verkle trees. https://math.mit.edu/research/highschool/primes/materials/2018/Kuszmaul.pdf (2019).

  17. Iavich, M. & Kapalova, N. Asymmetric post-quantum digital signature scheme with k-ary verkle trees. Symmetry 17, 437. https://doi.org/10.3390/sym17030437 (2025).

    Google Scholar 

  18. Iavich, M., Kuchukhidze, T. & Bocu, R. A post-quantum digital signature using verkle trees and lattices. Symmetry 15, 2165. https://doi.org/10.3390/sym15122165 (2023).

    Google Scholar 

  19. Iavich, M., Kuchukhidze, T. & Okhrimenko, T. Verkle tree-based post-quantum digital signature scheme using stateless updatable vector commitment. In: Proc. CPITS-2023-II, Kyiv, Ukraine (2023).

  20. Vimitha, R., Lakshmi, V., Kumar, G. K. & VADIA Verkle tree-based approach for dealing data integrity attacks in opportunistic mobile social networks. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 15 (1), 154–171. https://doi.org/10.58346/JOWUA.2024.I1.011 (2024).

    Google Scholar 

  21. Guo, Z., Gao, Z. & Liu, Q. Verkle-accumulator-based stateless transaction validation (VA-STV) scheme for the blockchain-based IoT network. IEEE Internet Things J. 11 (1). https://doi.org/10.1109/JIOT.2023.3287210 (2024).

  22. Kate, A., Zaverucha, G. M. & Goldberg, I. Constant-size commitments to polynomials and their applications. In: ASIACRYPT 2010, LNCS 6477 https://doi.org/10.1007/978-3-642-17373-8_11 (2010).

  23. Shahidinejad, A., Abawajy, J. & Huda, S. Highly-Secure yet efficient Blockchain-Based CRL-Free key management protocol for IoT-Enabled smart grid environments. IEEE Trans. Inf. Forensics Secur. 19, 6738–6750. https://doi.org/10.1109/TIFS.2024.3423724 (2024).

    Google Scholar 

  24. Shahidinejad, A. & Abawajy, J. H. Anonymous Blockchain-Assisted authentication protocols for secure Cross-Domain IoD communications. IEEE Trans. Netw. Sci. Eng. 11 (3), 2661–2674. https://doi.org/10.1109/TNSE.2023.3347594 (2024).

  25. Shahidinejad, A. & Abawajy, J. Efficient provably secure authentication protocol for multidomain IIoT using a combined Off-Chain and On-Chain approach. IEEE Internet Things J. 11 (9), 15241–15251. https://doi.org/10.1109/JIOT.2023.3347677 (2024).

    Google Scholar 

  26. Ali Shahidinejad and Jemal Abawajy. An all-inclusive taxonomy and critical review of blockchain-assisted authentication and session key generation protocols for IoT. ACM Comput. Surv. 56, 38 https://doi.org/10.1145/3645087 (2024).

  27. Singh, A. K., Nayyar, A. & Garg, A. A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud. Multimed Tools Appl. https://doi.org/10.1007/s11042-022-14140-z (2023).

    Google Scholar 

  28. Merkle, R. A certified digital signature. In: CRYPTO ’89, LNCS 435 https://doi.org/10.1007/0-387-34805-0_21 (1990).

  29. Ugbedeojo, M. et al. RSA and elliptic curve encryption system: A systematic literature review. Int. J. Inf. Secur. Priv. 18 (1). https://doi.org/10.4018/IJISP.340728 (2024).

Download references

Funding

Open access funding provided by Vellore Institute of Technology.

Author information

Authors and Affiliations

  1. School of Electronic Engineering, Vellore Institute of Technology, Vellore, 632014, India

    A. Simbu, S. Nandakumar & K. Saravanan

Authors
  1. A. Simbu
    View author publications

    Search author on:PubMed Google Scholar

  2. S. Nandakumar
    View author publications

    Search author on:PubMed Google Scholar

  3. K. Saravanan
    View author publications

    Search author on:PubMed Google Scholar

Contributions

Simbu A: Writing the original draft, figures, software, methodology, investigation, validation, formal analysis, and conceptualization. Nandakumar S* and Saravanan K: Writing—review and editing the manuscripts, validation, visualization, supervision, investigation, conceptualization.

Corresponding author

Correspondence to S. Nandakumar.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

Below is the link to the electronic supplementary material.

Supplementary Material 1

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Simbu, A., Nandakumar, S. & Saravanan, K. Blockchain-driven smart contract with key exchange protocol for secure device-to-device communication using verkle tree K-ary structures. Sci Rep (2026). https://doi.org/10.1038/s41598-026-38035-3

Download citation

  • Received: 16 October 2025

  • Accepted: 28 January 2026

  • Published: 17 February 2026

  • DOI: https://doi.org/10.1038/s41598-026-38035-3

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • ECDH
  • D2D
  • Communication
  • Key exchange
  • Blockchain
  • Smart contract
  • Merkle tree
  • Verkle tree
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com sitemap

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics