2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA) 2018
DOI: 10.1109/aiccsa.2018.8612856
|View full text |Cite
|
Sign up to set email alerts
|

A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
124
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 203 publications
(125 citation statements)
references
References 10 publications
0
124
0
1
Order By: Relevance
“…Blockchain is the underlying technology for bitcoins; however, it has been foreseen as a distributed ledger that can provide decentralised storage for data generated by IoT devices. Data are stored in a blockchain ledger with high integrity, authenticity, resiliency and trust [116]. All transactions are cryptographically signed by IIoT devices and validated in a decentralised manner without an intermediary.…”
Section: Emerging and Complimentary Technologies For Iiot Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Blockchain is the underlying technology for bitcoins; however, it has been foreseen as a distributed ledger that can provide decentralised storage for data generated by IoT devices. Data are stored in a blockchain ledger with high integrity, authenticity, resiliency and trust [116]. All transactions are cryptographically signed by IIoT devices and validated in a decentralised manner without an intermediary.…”
Section: Emerging and Complimentary Technologies For Iiot Systemsmentioning
confidence: 99%
“…Smart contracts are basically codes that are executed by all blockchain miners, and the execution outcome is verified and agreed upon by all mining nodes. Furthermore, given the limited computing, networking and storage capacities of IIoT devices, fog nodes are envisioned to be equipped with cloud and blockchain interfaces in the future to communicate and interface with the cloud environment and the blockchain network [116].…”
Section: Emerging and Complimentary Technologies For Iiot Systemsmentioning
confidence: 99%
“…In the IoT, the identity authentication of nodes is required to ensure the security and reliability of data transmission, and the combination of blockchain technology can eliminate the need for trusted third parties to participate in authentication. Almadhoun et al [11] proposed a user authentication scheme using blockchain atomized nodes, combined with Ethereum smart contracts to implement blockchain-based large-scale IoT device authentication without the need for an intermediate third party. The fog node is used to reduce the processing load of the IoT device during the authentication process and reduce the overhead of connecting to the Ethereum blockchain network interface.…”
Section: Related Workmentioning
confidence: 99%
“…This scheme ensures availability, scalability, decentralization and is tamper proof. However, the main drawback of using Ethereum smart contracts is the Ethereum price fluctuations, which is challenging for the users. Almadhoun et al proposed a user authentication scheme of IoT devices using BC‐enabled fog nodes This scheme is also based on Ethereum's smart contracts. With the help of smart contracts, fog nodes have been used for the authentication of a large scale of IoT devices. Alblooshi et al proposed BC‐based ownership management for medical IoT (MIoT) devices .…”
Section: Existing Workmentioning
confidence: 99%