2018 IEEE Conference on Dependable and Secure Computing (DSC) 2018
DOI: 10.1109/desec.2018.8625141
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Authentication in IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(16 citation statements)
references
References 9 publications
0
16
0
Order By: Relevance
“…However, its characteristics such as unforgeability, decentralized nature and fault tolerance make it suitable for the cybersecurity ecosystem. Currently, there are several security mechanisms [11,26,27] including authentication and access control that use the blockchain technology to provide the essential security parameters to secure a system. The ledger includes the number of blocks that are chained together with a hash mechanism.…”
Section: Blockchainmentioning
confidence: 99%
“…However, its characteristics such as unforgeability, decentralized nature and fault tolerance make it suitable for the cybersecurity ecosystem. Currently, there are several security mechanisms [11,26,27] including authentication and access control that use the blockchain technology to provide the essential security parameters to secure a system. The ledger includes the number of blocks that are chained together with a hash mechanism.…”
Section: Blockchainmentioning
confidence: 99%
“…We compare related schemes [12,14,22,30] with our scheme from multisecurity perspectives, as shown in Table 4.…”
Section: Comparisons With Relative Schemesmentioning
confidence: 99%
“…e processing method is to assign a unique ID for each individual device, recording them into the blockchain so that they can authenticate each other without a central authority. Lau et al [14] use blockchain technology to authenticate IoT devices before it joins an IoTnetwork. Based on the characteristics of blockchain, this method can be used to create the digital identification of IoT devices and authenticate them.…”
Section: Introductionmentioning
confidence: 99%
“…[119] Practical Byzantine fault tolerance consensus algorithm is implemented in an optimized manner to construct a consortium blockchain. [120] The proposed software system consists of ADCP handler, software firewall, WebSocket server, and blockchain database. [121] Reduces the latency in block validation and energy consumption.…”
Section: Authenticationmentioning
confidence: 99%