2018
DOI: 10.1016/j.jnca.2018.05.005
|View full text |Cite
|
Sign up to set email alerts
|

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
201
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 356 publications
(203 citation statements)
references
References 16 publications
0
201
0
2
Order By: Relevance
“…TrustChain protocol [40] Overlay attack -Every transaction is embedded with a Time-Stamp to mark the uniqueness Wang et al's protocol [41] Double-spending attack -Multi signatures and anonymous encrypted message propagation streams Aitzhan and Svetinovic's protocol [22] -Time-Stamp and the Proof-of-Work mechanism Wang et al's protocol [41] Modification attack -Elliptic curve encryption is used to calculate the hash functions LNSC protocol [10] -The attribute signature and the MAC BSeIn protocol [39] Collusion attack -Blockchain-based incentive mechanism He et al's protocol [42] Whitewashing attack -Lower priorities are given to the agents of new identities TrustChain protocol [40] Quantum attack -Lattice-based signature scheme Yin et al's protocol [43] Man-in-the-middle attack -Elliptic curve encryption is used to calculate the hash functions LNSC protocol [10] -Secure mutual authentication BSeIn protocol [39] Sybil attack -An immutable chain of temporally ordered interactions is created for each agent TrustChain protocol [40] et al [20] introduced a monitoring system on Smart Grid, named GridMonitoring, for ensuring transparency, provenance, and immutability. The GridMonitoring system is based on four layers, namely, 1) Registration and authentication layer, 2) Smart meter, 3) Processing and consensus nodes, and 4) Data processing on the smart grid network.…”
Section: Internet Of Energymentioning
confidence: 99%
“…TrustChain protocol [40] Overlay attack -Every transaction is embedded with a Time-Stamp to mark the uniqueness Wang et al's protocol [41] Double-spending attack -Multi signatures and anonymous encrypted message propagation streams Aitzhan and Svetinovic's protocol [22] -Time-Stamp and the Proof-of-Work mechanism Wang et al's protocol [41] Modification attack -Elliptic curve encryption is used to calculate the hash functions LNSC protocol [10] -The attribute signature and the MAC BSeIn protocol [39] Collusion attack -Blockchain-based incentive mechanism He et al's protocol [42] Whitewashing attack -Lower priorities are given to the agents of new identities TrustChain protocol [40] Quantum attack -Lattice-based signature scheme Yin et al's protocol [43] Man-in-the-middle attack -Elliptic curve encryption is used to calculate the hash functions LNSC protocol [10] -Secure mutual authentication BSeIn protocol [39] Sybil attack -An immutable chain of temporally ordered interactions is created for each agent TrustChain protocol [40] et al [20] introduced a monitoring system on Smart Grid, named GridMonitoring, for ensuring transparency, provenance, and immutability. The GridMonitoring system is based on four layers, namely, 1) Registration and authentication layer, 2) Smart meter, 3) Processing and consensus nodes, and 4) Data processing on the smart grid network.…”
Section: Internet Of Energymentioning
confidence: 99%
“…The proposed method helps carry out appropriate attack mitigation measures. In [360], the authors establish a secure remote user authentication with finegrained access control for IIoT, by proposing a blockchainbased framework. The proposed framework leverages the underpinning characteristics of blockchain as well as several cryptographic materials to realize a decentralized, privacypreserving solution.…”
Section: Computation and Data Analytics Articlesmentioning
confidence: 99%
“…It can be used in blockchain to provide integrity of smart contracts or network data. A blockchain-based system for secure mutual authentication (BSeIn) [189] uses MAC for the authentication.…”
Section: Other Techniquesmentioning
confidence: 99%