Volume 14 , Issue 1 , PP: 209-220, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Akhtar Hasan Jamal Khan 1 , Syed Afzal Ahmad 2 *
Doi: https://doi.org/10.54216/JISIoT.140116
Loan frauds in India have gotten more difficult by exploiting financial system vulnerabilities. Online purchasing has exacerbated these frauds. Identity fraud, phoney paperwork, and unclear loan conditions are common. This article looks at how blockchain and IoT could make loans safer, more open, and more efficient, reducing loan fraud. On an independent blockchain network, the proposed IoTBlockFin system records all loan events. This opens up the system and prevents dishonest alterations. IoT devices verify borrower identities and property, reducing false claims. An online loan application and smartphone app allow remote loan status checks. This speeds up and simplifies client service. Blockchain's digital safety measures protect sensitive user and transaction data from unauthorised parties. This prevents data breaches and illegal access. This comprehensive approach reduces loan frauds and improves financial transactions. IoTBlockFin seeks to solve today's lending process, which will transform India's banking business.
Blockchain , Data Security , Decentralized System , Digital Identity , Fraud Prevention , IoT , Loan Scams , Smart Contracts , Transparency , Verification
[1] Smith, J., & Jones, M. (2018). Advanced Fraud Detection Systems using AI and ML. Journal of Financial Crime.
[2] Gupta, R., & Patel, S. (2019). Stringent KYC Processes. International Journal of Finance.
[3] Neha Mathur,Shweta Sinha,Rajesh Kumar Tyagi,Nishtha Jatana, Analysis of Secure Data Sharing Techniques Using Blockchain, Journal of Fusion: Practice and Applications, Vol. 10 , No. 2 , (2023) : 42-54 (Doi : https://doi.org/10.54216/FPA.100204)
[4] Brown, A., & Green, P. (2021). Enhanced Regulatory Frameworks. Journal of Financial Regulation.
[5] Davis, L., & Martinez, R. (2022). Public Awareness Campaigns. Financial Technology Review.
[6] Chen, H., & Liu, Y. (2023). Decentralized Loan Processing with Blockchain. Journal of Blockchain Technology.
[7] Thompson, S., & Allen, J. (2023). Smart Contracts for Automated Loan Agreements. Journal of Financial Services.
[8] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved from https://bitcoin.org/bitcoin.pdf
[9] Irina V. Pustokhina, Blockchain technology in the international supply chains, International Journal of Wireless and Ad Hoc Communication, Vol. 1 , No. 1 , (2020) : 16-25 (Doi : https://doi.org/10.54216/IJWAC.010103).
[10] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing Privacy: Using Blockchain to Protect Personal Data. IEEE Security & Privacy, 14(5), 92-96. https://doi.org/10.1109/MSP.2016.49
[11] Szabo, N. (1996). Smart Contracts: Building Blocks for Digital Markets. Extropy Journal, 16. Retrieved from http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_2.html
[12] Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. (2016). Blockchain Technology: Beyond Bitcoin. Applied Innovation, 2(6), 71-81. https://doi.org/10.1016/j.apin.2016.10.001
[13] Buterin, V. (2014). Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform. Ethereum Project Yellow Paper, 151. Retrieved from https://ethereum.github.io/yellowpaper/paper.pdf
[14] Mougayar, W. (2016). The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology. Wiley.
[15] Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved from https://bitcoin.org/bitcoin.pdf
[16] Tapscott, D., & Tapscott, A. (2016). Blockchain Revolution: How the Technology Behind Bitcoin and Other Cryptocurrencies Is Changing the World. Penguin Random House.
[17] Esmeralda Kazia, Blockchain-based Model for Image Encryption in IoT Communication Environment, International Journal of Wireless and Ad Hoc Communication, Vol. 5 , No. 1 , (2022) : 54-64 (Doi : https://doi.org/10.54216/IJWAC.050105)
[18] Tamarah Alaa Diame, M. Abdul Jaleel M., Sajad Ali Ettyem, Raaid Alubady, Mohaned Adile, Mohd K. Abd Ghani, Hatıra Gunerhan, Data Management and Decision-Making Process Using Machine Learning Approach for Enterprises, Journal of Intelligent Systems and Internet of Things, Vol. 8 , No. 1 , (2023) : 75-88 (Doi : https://doi.org/10.54216/JISIoT.080107)
[19] Hasan, A. Afzal, S. (2024). Innovative Approaches to Bank Security in India: Leveraging IoT, Blockchain, and Decentralized Systems against Loan Scams. Journal of Intelligent Systems and Internet of Things, 13( 2), 256-271. DOI: https://doi.org/10.54216/JISIoT.130221
[20] Hosny. H. Abo Emira, Authenticating IoT Devices issues based on Blockchain, Journal of Cybersecurity and Information Management, Vol. 1 , No. 2 , (2020) : 35-40 (Doi : https://doi.org/10.54216/JCIM.010202)
[21] Mustafa Tanriverdi, A Systematic Review of Privacy Preserving Healthcare Data Sharing on Blockchain, Journal of Cybersecurity and Information Management, Vol. 4 , No. 2 : Special No.-RIDAPPH , (2020) : 31-37 (Doi : https://doi.org/10.54216/JCIM.040203)
[22] Mahmud Alosta , Alireza Souri, Design of Effective Lossless Data Compression Technique for Multiple Genomic DNA Sequences, Fusion: Practice and Applications, Vol. 6 , No. 1 , (2021) : 17-25 (Doi : https://doi.org/10.54216/FPA.060103)
[23] P. Sheela Rani,Harini M.,Nandhitha N.,Teena A. Naahz G., A Decentralized and Cooperative Methodology For Organ Donation Management Based on Ethereum Blockchain, Journal of Cognitive Human-Computer Interaction, Vol. 6 , No. 1 , (2023) : 08-17 (Doi : https://doi.org/10.54216/JCHCI.060101)
[24] M. Sumithra , B. Buvaneswari , Sangeetha , Shalini , Sundareswari , Vishnu PriyVishnu Priya, Artificial Intelligence Based Accident Detection and Alert System, Journal of Cognitive Human-Computer Interaction, Vol. 2 , No. 1 , (2022) : 29-33 (Doi : https://doi.org/10.54216/JCHCI.020104)
[25] Zyskind, G., Nathan, O., & Pentland, A. (2015). Decentralizing Privacy: Using Blockchain to Protect Personal Data. IEEE Security & Privacy, 14(5), 92-96. https://doi.org/10.1109/MSP.2016.49
[26] Sheeba, P. (2014). An approach to evaluate subjective questions for online examination system. International Journal of Innovative Research in Computer and Communication Engineering, 2(11), 6410-6413.
[27] Praveen, S., & Beg, R. Object oriented Full Function Point Analysis: A Model for Real Time Application.
[28] Devi, L. V., Praveen, S., & Beg, R. (2011). Standard activities of wireless mesh networks. International Journal of Computer Applications, 12(10), 12-16.
[29] Surekha, N., Sangeetha, R., Aarthy, C., Kavitha, R., Anuradha, R. (2022). Leveraging Blockchain Technology for Internet of Things Powered Banking Sector. In: De, D., Bhattacharyya, S., Rodrigues, J.J.P.C. (eds) Blockchain based Internet of Things. Lecture Notes on Data Engineering and Communications Technologies, vol 112. Springer, Singapore. https://doi.org/10.1007/978-981-16-9260-4_8
[30] Khan, A. H. J., Ahmad, S. A., & Farooque, A. (2023). A STUDY TO INVESTIGATE THE REASONS FOR BANK FRAUDS IN INDIAN BANKING INDUSTRY. Journal of Research Administration, 5(2), 4709-4721.