AI-Blockchain Integrated Trusted Interaction Mechanism... Informatica 50 (2026) 411–426 411 AI-Blockchain Integrated Trusted Interaction Mechanism for Enhanced Network Security
Abstract
This paper proposes an AI–blockchain integrated trusted interaction mechanism for network security. The mechanism combines a deep-learning anomaly detector with a permissioned blockchain and smart contracts to provide real-time threat analysis, decentralized authentication and tamper-resistant trust management. The AI module is a two-branch neural network that processes network-traffic features and interaction-behavior graphs and outputs an anomaly score for each event. The blockchain layer adopts a consortium architecture with PBFT-style consensus, and smart contracts implement identity verification, trust update rules and access control.Experiments are conducted on labeled network-traffic traces and an enterprise-like testbed. We compare the proposed mechanism with an AI-only baseline (deep model with centralized control) and a blockchain-only baseline (rule-based smart contracts without AI) using detection-level metrics—accuracy, precision, recall, F1-score, false positive rate (FPR) and false negative rate (FNR)—and system-level metrics—response time and throughput. Under low load, the system reaches 180 ms response time and 5000 requests/s throughput; under high load, response time is 300 ms and throughput is 4200 requests/s. Compared with the strongest baseline, throughput increases by 42.8% and FPR is reduced by 60.9%, while FNR remains low across diverse attack scenarios. These results confirm that the mechanism supports trusted interaction in dynamic network environments.References
[1] Goundar S, Gondal I. AI-Blockchain Integration for Real-Time Cybersecurity: System Design and Evaluation[J]. Journal of Cybersecurity and Privacy, 2025, 5(3): 59.https://doi.org/10.3390/jcp5030059
[2] Kshetri N. Building Trust in AI: How Blockchain Enhances Data Integrity, Security, and Privacy[J]. Computer, 2025, 58(2): 63-70.https://doi.org/10.1109/MC.2024.3505012
[3] Ruzbahani A M. Ai-protected blockchain-based iot environments: Harnessing the future of network security and privacy[J]. arXiv preprint arXiv:2405.13847,2024.https://doi.org/10.48550/arXiv.2405.13847
[4] D’aniello G, Fotia L. Blockchain and AI-based methods for trust management in IoT: A comprehensive survey[J]. Internet of Things, 2025: 101755.https://doi.org/10.13140/RG.2.2.23305.97124
[5] Pan Q, Wu J, Li J, et al. Blockchain and AI empowered trust-information-centric network for beyond 5G[J]. IEEE network, 2020, 34(6): 38-45.https://doi.org/10.1109/MNET.021.1900608
[6] Saleh A M S. Blockchain for secure and decentralized artificial intelligence in cybersecurity: A comprehensive review[J]. Blockchain: Research and Applications, 2024, 5(3): 100193.https://doi.org/10.1016/j.bcra.2024.100193
[7] Zhang F, Wang H, Zhou L, et al. A blockchain-based security and trust mechanism for AI-enabled IIoT systems[J]. Future Generation Computer Systems, 2023, 146: 78-85.https://doi.org/10.1016/j.future.2023.03.011
[8] Luo H, Luo J, Vasilakos A V. Bc4llm: Trusted artificial intelligence when blockchain meets large language models[J]. arXiv preprint arXiv:2310.06278, 2023.https://doi.org/10.48550/arXiv.2310.06278
[9] Atlam H F, Azad M A, Alzahrani A G, et al. A Review of Blockchain in Internet of Things and AI[J]. Big Data and Cognitive Computing, 2020, 4(4): 28.https://doi.org/10.3390/bdcc4040028
[10] Zhang X, Miao X, Xue M. A Reputation‐Based Approach Using Consortium Blockchain for Cyber Threat Intelligence Sharing[J]. Security and Communication Networks, 2022, 2022(1): 7760509.https://doi.org/10.48550/arXiv.2107.06662
[11] Dunnett K, Pal S, Putra G D, et al. A trusted, verifiable and differential cyber threat intelligence sharing framework using blockchain[C]//2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2022: 1107-1114.https://doi.org/10.48550/arXiv.2208.12031
[12] Yang Z, Shi Y, Zhou Y, et al. Trustworthy federated learning via blockchain[J]. IEEE Internet of Things Journal, 2022, 10(1): 92-109.https://doi.org/10.48550/arXiv.2209.04418
[13] Islam R, Bose R, Roy S, et al. Decentralized trust framework for smart cities: a blockchain-enabled cybersecurity and data integrity model[J]. Scientific Reports, 2025, 15(1): 23454.https://doi.org/10.1038/s41598-025-06405-y
[14] Zhang R, Xue R, Liu L. Security and privacy on blockchain[J]. ACM Computing Surveys (CSUR), 2019, 52(3): 1-34.https://doi.org/10.1145/3316481
[15] Alevizos L. Automated cybersecurity compliance and threat response using AI, blockchain and smart contracts[J]. International Journal of Information Technology, 2025, 17(2): 767-781.https://doi.org/10.1007/s41870-024-02324-9
[16] Guo H, Liu X. Exploring trust dynamics in finance: the impact of blockchain technology and smart contracts[J]. Humanities and Social Sciences Communications, 2025, 12(1): 1-10.https://doi.org/10.1057/s41599-025-05473-9
DOI:
https://doi.org/10.31449/inf.v50i12.13836Keywords:
AI Integration; Blockchain Security; Trusted Interaction;Network DefenseDownloads
Published
How to Cite
Issue
Section
License
Authors retain copyright in their work. By submitting to and publishing with Informatica, authors grant the publisher (Slovene Society Informatika) the non-exclusive right to publish, reproduce, and distribute the article and to identify itself as the original publisher.
All articles are published under the Creative Commons Attribution license CC BY 3.0. Under this license, others may share and adapt the work for any purpose, provided appropriate credit is given and changes (if any) are indicated.
Authors may deposit and share the submitted version, accepted manuscript, and published version, provided the original publication in Informatica is properly cited.







