A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain
2021
Security and Communication Networks
To solve this problem, in this article, we propose a privacy protection identity authentication scheme based on the blockchain. ...
Due to the open and decentralized nature of the blockchain, the existing identity verification schemes are difficult to apply well in the blockchain. ...
After that, they proposed an authentication scheme for blockchain-based EHRs. e proposed scheme is an identity-based signature scheme with multiple authorities which can resist the collusion attack out ...
doi:10.1155/2021/9992353
fatcat:k7ydyqoag5g4bhxkkwnf4df2be
Design and Implementation of Port Video Terminals Security Access Authentication System Using Blockchain Technology
2021
E3S Web of Conferences
In order to improve the security factor of terminal access in the edge computing environment, this paper proposes a decentralized terminal security access authentication system based on blockchain, which ...
realizes the identity registration, revocation and mutual authentication of two interfaces between terminal devices and edge computing through the smart contract technology of blockchain, and establishes ...
Traditional identity authentication schemes include the following three types: authentication based on symmetric keys [2] , authentication based on public key infrastructure (PKI) [3] , and identity-based ...
doi:10.1051/e3sconf/202125303086
doaj:0fb6897edd3e43bd9bad9ed6e1f5c371
fatcat:6njrx3elcng4rmyf5cjxdnp7se
Internet of Things Device Identification Algorithm considering User Privacy
2022
Computational Intelligence and Neuroscience
based on the public key address of the blockchain is used on the chain, and the group signature is used off the chain. ...
To protect the privacy data of Internet of Things users, a specific solution using blockchain technology is proposed; for the identity authentication problem of Internet of Things users, the identity authentication ...
Research on IoT Privacy Data Protection Scheme V i − V ilim V imax − V imin 2 . ( 6 ) Blockchain can be used as authentication, and users register their identity on the blockchain using their key ...
doi:10.1155/2022/6173185
pmid:35510052
pmcid:PMC9061015
fatcat:ur5yt7aj4zewldhv62xclvsxqq
Privacy-Preserving Scheme in the Blockchain Based on Group Signature with Multiple Managers
2021
Security and Communication Networks
In the traditional blockchain privacy-preserving scheme based on the group signature, there is only one group manager to revoke the anonymity. ...
To solve these problems, we propose a privacy-preserving scheme in the blockchain based on the group signature with multiple managers. ...
Pulagara and Alphonse [23] proposed an identity-based conditional privacy-preserving authentication method based on elliptic curve cryptography and proposed a group key management scheme. ...
doi:10.1155/2021/7094910
fatcat:no6qcucpqfbcpbpnhktmypffgi
Risk-Based Dynamic Identity Authentication Method Based on the UCON Model
2022
Security and Communication Networks
For these reasons, we propose a risk-based dynamic identity authentication method based on the Usage Control (UCON) model. ...
Our scheme represents an improvement in traditional identity authentication, resulting in higher continuity and mutability. We also prove that the scheme has high security and scalability. ...
, based on the Usage Control (UCON) model [10] , our scheme proposes a riskbased dynamic identity authentication method using blockchain technology to improve security via a decentralized network environment ...
doi:10.1155/2022/2509267
fatcat:qts4brhnmjchratvzoxcqnie34
Blockchain Technologies for the Internet of Things: Research Issues and Challenges
2018
IEEE Internet of Things Journal
Based on the current survey, we highlight open research challenges and discuss possible future research directions in the blockchain technologies for IoT. ...
Moreover, we provide a classification of threat models, which are considered by blockchain protocols in IoT networks, into five main categories, namely, identity-based attacks, manipulation-based attacks ...
Authentication In [78] , Lin et al. proposed a novel transitively closed undirected graph authentication scheme that can support blockchain-based identity management systems. ...
doi:10.1109/jiot.2018.2882794
fatcat:xt2oh3dmozgrjg3n42xsdgm7f4
A novel authentication scheme based on edge computing for blockchain-based distributed energy trading system
2020
EURASIP Journal on Wireless Communications and Networking
In this paper, we design an authentication scheme for blockchain-based energy trading systems by using edge computing, including journalizing processes, registration, and identity authentication. ...
However, blockchain is without any identity authentication and legitimate user identities are possibly forged if there is not any user identity authentication procedure in a trading system. ...
Our contribution In order to solve the problem of identity authentication in blockchain-based energy trading system, we design an edge computing-based authentication scheme for blockchainbased distributed ...
doi:10.1186/s13638-020-01762-w
fatcat:s5is54furff3fhpiuyjprmimza
A Secure and Trusted Fog Computing Approach based on Blockchain and Identity Federation for a Granular Access Control in IoT Environments
2022
International Journal of Advanced Computer Science and Applications
To deal with these gaps, we present in this paper a secure and trusted Fog Computing approach based on Blockchain and Identity Federation technologies for a granular access control in IoT environments. ...
to make an access decision. ...
Existing authentication schemes are generally built on three main concepts that are based on the following [24] : (i) Something an entity knows; known as a knowledge-based authentication, this method ...
doi:10.14569/ijacsa.2022.0130368
fatcat:k4cmktt2qvflzggxvtorw4zt7m
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT
2022
Security and Communication Networks
In this paper, we propose a lightweight authentication scheme based on consortium blockchain and design a cryptocurrency-like digital token to build trust. ...
Recently, certificate-based authentication schemes have been extensively studied. ...
As our work is still an early study in the field of blockchain-based IoT authentication, there remains some open challenges that can be considered. ...
doi:10.1155/2022/9686049
fatcat:bnu26nbmdzhrdmnhrwmfqee6ju
IRBA: An Identity-Based Cross-Domain Authentication Scheme for the Internet of Things
2020
Electronics
This paper proposes an identity-based cross-domain authentication scheme for the Internet of Things. ...
This scheme uses the Blockchain as a decentralized trust anchor instead of the traditional certificate of authority, and uses the identity-based self-authentication algorithm to replace the traditional ...
[40] and Li et al [41] proposed the identity-based signature scheme without trusted PKG. Inspired by their work, we design an identity-based authentication scheme. ...
doi:10.3390/electronics9040634
fatcat:5qo4sa5awvei7pg5jgbafdflb4
Cross-heterogeneous Domain Authentication Scheme Based on Blockchain
2021
Journal of Artificial Intelligence and Technology
process and present a cross-domain authentication protocol based on blockchain. ...
Using the distributed and tamper-resistant characteristics of the blockchain, we design a cross-domain authentication model based on blockchain to guarantee the security of the heterogeneous authentication ...
Peng [13] proposed an identity-based signcryption scheme and presented a model for multidomain mutual authentication on this foundation. ...
doi:10.37965/jait.2020.0060
fatcat:a5e6gkxg6bauvptpq3dhdwh4s4
A Traceable Blockchain-based Access Authentication System with Privacy Preservation in VANETs
2019
IEEE Access
In this paper, based on blockchain technique, we propose a traceable and decentralized the Internet of Vehicle system framework for communication among smart vehicles by employing of a secure access authentication ...
On the other hand, the transparency of vehicles in authentication and announcement is preformed efficiently by the blockchain technology. ...
VEHICLE The privacy-preserving authentication scheme is running based on the blockchain. ...
doi:10.1109/access.2019.2936575
fatcat:ygc4vxmaevhwzctifndwy6rqba
A Secure Charging System for Electric Vehicles Based on Blockchain
2019
Sensors
We propose a secure charging system for electric vehicles based on blockchain to resolve these security flaws. ...
The blockchain-based charging systems have been proposed to resolve these problems. In 2018, Huang et al. proposed the electric vehicle charging system using lightning network and smart contract. ...
Each participant is required to register in the open blockchain system. In Huang et al.'s scheme, lightning network transaction management system adopts an internet based cloud platform. ...
doi:10.3390/s19133028
fatcat:w4ejidplmzgptf7yilavn5mb2a
An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology
2019
IEEE Access
To guarantee the safety of mobile services, we propose an effective decentralized authentication mechanism for IoV on the basis of the consensus algorithm of blockchain technology. ...
Due to the openness and self-organization of IoV, there are enormous malicious attackers. ...
s [20] scheme represents the vehicle authentication efficiency scheme based on Lightweight Scalable Blockchain (LSB) proposed by Dorri et al [20] . ...
doi:10.1109/access.2019.2909004
fatcat:ggjwin6o2fd4fjo3t7rptqxbdu
A Comparative Study Of Traditional Authentication And Authorization Methods With Block Chain Technology For E Governance Services
2018
Zenodo
The multi factor authentication (MF) provides better protection effectively than the age old password based authentication. ...
Governments are making efforts to establish multi factor authentication without comprising on provisioning the e-services. https://journalnx.com/journal-article/20150679 ...
Open challenges for IA research and finally provided an open source implementation of the IA schemes evaluated in this work that can be used for performance benchmarking by future IA research [7] . ...
doi:10.5281/zenodo.1410224
fatcat:yd43fx5umrgcbhlttuj4o54f4y
« Previous
Showing results 1 — 15 out of 4,452 results