2020
DOI: 10.1016/j.cose.2020.101958
|View full text |Cite
|
Sign up to set email alerts
|

Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 66 publications
(16 citation statements)
references
References 24 publications
0
16
0
Order By: Relevance
“…This in turn would reduce the demand on the throughput of the public blockchain. In the experiment, we considered seven aggregation levels, from each block including 1024 (i.e., 2 10 ) samples, to 2048 (i.e., 2 11 ), 4096 (i.e., 2 12 ), 8192 (i.e., 2 13 ), 16384 (i.e., 2 14 ), 32768 (i.e., 2 15 ), 65536 (i.e., 2 16 ), and 131072 (i.e., 2 17 ) samples. The results are shown in Fig.…”
Section: A Raw Sensing Data Aggregation and Loggingmentioning
confidence: 99%
“…This in turn would reduce the demand on the throughput of the public blockchain. In the experiment, we considered seven aggregation levels, from each block including 1024 (i.e., 2 10 ) samples, to 2048 (i.e., 2 11 ), 4096 (i.e., 2 12 ), 8192 (i.e., 2 13 ), 16384 (i.e., 2 14 ), 32768 (i.e., 2 15 ), 65536 (i.e., 2 16 ), and 131072 (i.e., 2 17 ) samples. The results are shown in Fig.…”
Section: A Raw Sensing Data Aggregation and Loggingmentioning
confidence: 99%
“…They failed to prioritize network security, resulting in unauthorized data access and intruder attacks on sensed data. The BC-based authentication models [43][44][45][46][47][48][49][50][51] failed to address the better security issue and achieve a higher data integrity rate and a shorter processing time. Furthermore, they were unable to implement a robust cryptographic mechanism to ensure the security of transmitted data.…”
Section: Problem Statementmentioning
confidence: 99%
“…Finally, the paper analyzes the performance of the proposed BC-based data storage system by comparing the model with the existing BC model. The models used for comparison are PUF-based BC, 43 hybrid BC, 44 and signature-based BC, 45 and the metrics used for comparison are data integrity rate (DIR) and processing time (PT). Table 4 (A) shows the DIR of the techniques.…”
Section: Performance Analysis Of Bc Based Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…Evaluation on the computational and communication overhead of these two methods are provided to show their potential. Recently, Patil et al [52] proposed a blockchain-based protocol that utilizes the Physically Unclonable Function (PUF) model to achieve better authentication process whilst still preserving user privacy. In [53], Jones et al compared the use of trusted third parties, cryptographic techniques, and blockchain smart contracts and concluded that each alone does not ensure privacy preservation.…”
Section: ) Security Enhancement Techniquesmentioning
confidence: 99%