4,452 Hits in 3.6 sec

A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain

Sheng Gao, Qianqian Su, Rui Zhang, Jianming Zhu, Zhiyuan Sui, Junsheng Wang, James Ying
2021 Security and Communication Networks  
To solve this problem, in this article, we propose a privacy protection identity authentication scheme based on the blockchain.  ...  Due to the open and decentralized nature of the blockchain, the existing identity verification schemes are difficult to apply well in the blockchain.  ...  After that, they proposed an authentication scheme for blockchain-based EHRs. e proposed scheme is an identity-based signature scheme with multiple authorities which can resist the collusion attack out  ... 
doi:10.1155/2021/9992353 fatcat:k7ydyqoag5g4bhxkkwnf4df2be

Design and Implementation of Port Video Terminals Security Access Authentication System Using Blockchain Technology

Tang Chunming, Ma Yuyu, Yu Xiang
2021 E3S Web of Conferences  
In order to improve the security factor of terminal access in the edge computing environment, this paper proposes a decentralized terminal security access authentication system based on blockchain, which  ...  realizes the identity registration, revocation and mutual authentication of two interfaces between terminal devices and edge computing through the smart contract technology of blockchain, and establishes  ...  Traditional identity authentication schemes include the following three types: authentication based on symmetric keys [2] , authentication based on public key infrastructure (PKI) [3] , and identity-based  ... 
doi:10.1051/e3sconf/202125303086 doaj:0fb6897edd3e43bd9bad9ed6e1f5c371 fatcat:6njrx3elcng4rmyf5cjxdnp7se

Internet of Things Device Identification Algorithm considering User Privacy

Lin Wang, Vijay Kumar
2022 Computational Intelligence and Neuroscience  
based on the public key address of the blockchain is used on the chain, and the group signature is used off the chain.  ...  To protect the privacy data of Internet of Things users, a specific solution using blockchain technology is proposed; for the identity authentication problem of Internet of Things users, the identity authentication  ...  Research on IoT Privacy Data Protection Scheme V i − V ilim V imax − V imin 􏼢 􏼣 2 . ( 6 ) Blockchain can be used as authentication, and users register their identity on the blockchain using their key  ... 
doi:10.1155/2022/6173185 pmid:35510052 pmcid:PMC9061015 fatcat:ur5yt7aj4zewldhv62xclvsxqq

Privacy-Preserving Scheme in the Blockchain Based on Group Signature with Multiple Managers

Fei Tang, Zhuo Feng, Qianhong Gong, Yonghong Huang, Dong Huang, Youwen Zhu
2021 Security and Communication Networks  
In the traditional blockchain privacy-preserving scheme based on the group signature, there is only one group manager to revoke the anonymity.  ...  To solve these problems, we propose a privacy-preserving scheme in the blockchain based on the group signature with multiple managers.  ...  Pulagara and Alphonse [23] proposed an identity-based conditional privacy-preserving authentication method based on elliptic curve cryptography and proposed a group key management scheme.  ... 
doi:10.1155/2021/7094910 fatcat:no6qcucpqfbcpbpnhktmypffgi

Risk-Based Dynamic Identity Authentication Method Based on the UCON Model

Jing Liu, Rongchao Liu, Yingxu Lai, Kaitai Liang
2022 Security and Communication Networks  
For these reasons, we propose a risk-based dynamic identity authentication method based on the Usage Control (UCON) model.  ...  Our scheme represents an improvement in traditional identity authentication, resulting in higher continuity and mutability. We also prove that the scheme has high security and scalability.  ...  , based on the Usage Control (UCON) model [10] , our scheme proposes a riskbased dynamic identity authentication method using blockchain technology to improve security via a decentralized network environment  ... 
doi:10.1155/2022/2509267 fatcat:qts4brhnmjchratvzoxcqnie34

Blockchain Technologies for the Internet of Things: Research Issues and Challenges

Mohamed Amine Ferrag, Makhlouf Derdour, Mithun Mukherjee, Abdelouahid Derhab, Leandros Maglaras, Helge Janicke
2018 IEEE Internet of Things Journal  
Based on the current survey, we highlight open research challenges and discuss possible future research directions in the blockchain technologies for IoT.  ...  Moreover, we provide a classification of threat models, which are considered by blockchain protocols in IoT networks, into five main categories, namely, identity-based attacks, manipulation-based attacks  ...  Authentication In [78] , Lin et al. proposed a novel transitively closed undirected graph authentication scheme that can support blockchain-based identity management systems.  ... 
doi:10.1109/jiot.2018.2882794 fatcat:xt2oh3dmozgrjg3n42xsdgm7f4

A novel authentication scheme based on edge computing for blockchain-based distributed energy trading system

Yan Ren, Qiuxia Zhao, Haipeng Guan, Zhiqiang Lin
2020 EURASIP Journal on Wireless Communications and Networking  
In this paper, we design an authentication scheme for blockchain-based energy trading systems by using edge computing, including journalizing processes, registration, and identity authentication.  ...  However, blockchain is without any identity authentication and legitimate user identities are possibly forged if there is not any user identity authentication procedure in a trading system.  ...  Our contribution In order to solve the problem of identity authentication in blockchain-based energy trading system, we design an edge computing-based authentication scheme for blockchainbased distributed  ... 
doi:10.1186/s13638-020-01762-w fatcat:s5is54furff3fhpiuyjprmimza

A Secure and Trusted Fog Computing Approach based on Blockchain and Identity Federation for a Granular Access Control in IoT Environments

2022 International Journal of Advanced Computer Science and Applications  
To deal with these gaps, we present in this paper a secure and trusted Fog Computing approach based on Blockchain and Identity Federation technologies for a granular access control in IoT environments.  ...  to make an access decision.  ...  Existing authentication schemes are generally built on three main concepts that are based on the following [24] : (i) Something an entity knows; known as a knowledge-based authentication, this method  ... 
doi:10.14569/ijacsa.2022.0130368 fatcat:k4cmktt2qvflzggxvtorw4zt7m

A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT

Yujian Zhang, Yuhao Luo, Xing Chen, Fei Tong, Yuwei Xu, Jun Tao, Guang Cheng, Wenjuan Li
2022 Security and Communication Networks  
In this paper, we propose a lightweight authentication scheme based on consortium blockchain and design a cryptocurrency-like digital token to build trust.  ...  Recently, certificate-based authentication schemes have been extensively studied.  ...  As our work is still an early study in the field of blockchain-based IoT authentication, there remains some open challenges that can be considered.  ... 
doi:10.1155/2022/9686049 fatcat:bnu26nbmdzhrdmnhrwmfqee6ju

IRBA: An Identity-Based Cross-Domain Authentication Scheme for the Internet of Things

Xudong Jia, Ning Hu, Shen Su, Shi Yin, Yan Zhao, Xinda Cheng, Chi Zhang
2020 Electronics  
This paper proposes an identity-based cross-domain authentication scheme for the Internet of Things.  ...  This scheme uses the Blockchain as a decentralized trust anchor instead of the traditional certificate of authority, and uses the identity-based self-authentication algorithm to replace the traditional  ...  [40] and Li et al [41] proposed the identity-based signature scheme without trusted PKG. Inspired by their work, we design an identity-based authentication scheme.  ... 
doi:10.3390/electronics9040634 fatcat:5qo4sa5awvei7pg5jgbafdflb4

Cross-heterogeneous Domain Authentication Scheme Based on Blockchain

Jing Liu, Yixin Liu, Yingxu Lai, Rongchen Li, Siyu Wu, Sami Mian
2021 Journal of Artificial Intelligence and Technology  
process and present a cross-domain authentication protocol based on blockchain.  ...  Using the distributed and tamper-resistant characteristics of the blockchain, we design a cross-domain authentication model based on blockchain to guarantee the security of the heterogeneous authentication  ...  Peng [13] proposed an identity-based signcryption scheme and presented a model for multidomain mutual authentication on this foundation.  ... 
doi:10.37965/jait.2020.0060 fatcat:a5e6gkxg6bauvptpq3dhdwh4s4

A Traceable Blockchain-based Access Authentication System with Privacy Preservation in VANETs

Dong Zheng, Chunming Jing, Rui Guo, Shiyao Gao, Liang Wang
2019 IEEE Access  
In this paper, based on blockchain technique, we propose a traceable and decentralized the Internet of Vehicle system framework for communication among smart vehicles by employing of a secure access authentication  ...  On the other hand, the transparency of vehicles in authentication and announcement is preformed efficiently by the blockchain technology.  ...  VEHICLE The privacy-preserving authentication scheme is running based on the blockchain.  ... 
doi:10.1109/access.2019.2936575 fatcat:ygc4vxmaevhwzctifndwy6rqba

A Secure Charging System for Electric Vehicles Based on Blockchain

MyeongHyun Kim, KiSung Park, SungJin Yu, JoonYoung Lee, YoungHo Park, Sang-Woo Lee, BoHeung Chung
2019 Sensors  
We propose a secure charging system for electric vehicles based on blockchain to resolve these security flaws.  ...  The blockchain-based charging systems have been proposed to resolve these problems. In 2018, Huang et al. proposed the electric vehicle charging system using lightning network and smart contract.  ...  Each participant is required to register in the open blockchain system. In Huang et al.'s scheme, lightning network transaction management system adopts an internet based cloud platform.  ... 
doi:10.3390/s19133028 fatcat:w4ejidplmzgptf7yilavn5mb2a

An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology

Xiaoliang Wang, Pengjie Zeng, Nick Patterson, Frank Jiang, Robin Doss
2019 IEEE Access  
To guarantee the safety of mobile services, we propose an effective decentralized authentication mechanism for IoV on the basis of the consensus algorithm of blockchain technology.  ...  Due to the openness and self-organization of IoV, there are enormous malicious attackers.  ...  s [20] scheme represents the vehicle authentication efficiency scheme based on Lightweight Scalable Blockchain (LSB) proposed by Dorri et al [20] .  ... 
doi:10.1109/access.2019.2909004 fatcat:ggjwin6o2fd4fjo3t7rptqxbdu

A Comparative Study Of Traditional Authentication And Authorization Methods With Block Chain Technology For E Governance Services

2018 Zenodo  
The multi factor authentication (MF) provides better protection effectively than the age old password based authentication.  ...  Governments are making efforts to establish multi factor authentication without comprising on provisioning the e-services.  ...  Open challenges for IA research and finally provided an open source implementation of the IA schemes evaluated in this work that can be used for performance benchmarking by future IA research [7] .  ... 
doi:10.5281/zenodo.1410224 fatcat:yd43fx5umrgcbhlttuj4o54f4y
« Previous Showing results 1 — 15 out of 4,452 results