2019
DOI: 10.1007/s12083-019-00739-x
|View full text |Cite
|
Sign up to set email alerts
|

P2P networking based internet of things (IoT) sensor node authentication by Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
45
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 59 publications
(45 citation statements)
references
References 20 publications
0
45
0
Order By: Relevance
“…Also, IoT devices are manufactured by different vendors, which hinders interoperability because nodes do not trust each other. Authors tackle interoperability issues through an authentication mechanism [36]. Moreover, there is a need for secure and uninterrupted communication among the devices in the IoT environment.…”
Section: ) Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, IoT devices are manufactured by different vendors, which hinders interoperability because nodes do not trust each other. Authors tackle interoperability issues through an authentication mechanism [36]. Moreover, there is a need for secure and uninterrupted communication among the devices in the IoT environment.…”
Section: ) Methodsmentioning
confidence: 99%
“…So, falsifying its identity or submitting incorrect data is difficult. In addition, the authors in [36] propose peerto-peer authentication protocols, in which blockchain is used to authenticate nodes at different levels. The blockchain uses Merkel tree algorithm to store the nodes' credentials and take action in case of a dispute.…”
Section: ) Methodsmentioning
confidence: 99%
“…5G enables IoT to have higher transmission speed and capacity and lower transmission delay and can provide high coverage and massive device deployment for the Internet of ings applications [2,3]. ese massively connected terminal devices simultaneously initiate authentication requests, which will have a serious impact on the authentication server [9][10][11]. In traditional authentication mechanisms, a centralized mechanism is usually used, as in Figure 1(a), where all devices are authenticated through a centrally located authentication server.…”
Section: Motivation and Basicmentioning
confidence: 99%
“…Traditional authentication schemes are usually centralized, which has high latency and untimely response problems in the 5G mass IoT device access scenario [6]. On the one hand, the authentication server or network node will have serious network congestion when massive IoT devices ask for authentication in this era where IoT devices are ubiquitous, and this will seriously affect the service quality of IoT applications [7][8][9][10][11]. On the other hand, centralized authentication usually requires the authentication center to respond to the authentication request of the IoT device.…”
Section: Introductionmentioning
confidence: 99%
“…A summary is executed in the server, and more tasks can be performed given the user's limited device resources. The paper by Hong [7], a P2P networking-based IoT sensor node proof using a block chain is proposed. M2M has a variety of senor nodes and is vulnerable to jamming and tampering attacks.…”
mentioning
confidence: 99%