2019 IEEE International Conference on Consumer Electronics (ICCE) 2019
DOI: 10.1109/icce.2019.8662009
|View full text |Cite
|
Sign up to set email alerts
|

Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems

Abstract: Resource -constrained distributed systems such as the Internet of Things (IoT), edge computing and fog computing are deployed for real-time monitoring and evaluation. Current security solutions are problematic when there is a centralized controlling entity. The blockchain provides decentralized security architectures using proof-of-work (PoW). Proof-of-work is an expensive process for IoT and edge computing due to the deployment of resource-constrained devices. This paper presents a novel consensus algorithm c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 71 publications
(41 citation statements)
references
References 12 publications
0
41
0
Order By: Relevance
“…A "Transaction" is requested by a Computing Machine (i.e. "Node") Peer-to-Peer (P2P) network of "Nodes" Oldest Block [1,34,33,9,38].…”
Section: Transaction Completementioning
confidence: 99%
See 1 more Smart Citation
“…A "Transaction" is requested by a Computing Machine (i.e. "Node") Peer-to-Peer (P2P) network of "Nodes" Oldest Block [1,34,33,9,38].…”
Section: Transaction Completementioning
confidence: 99%
“…of blockchain technology which either prevent its application or make it computationally and energy demanding are shown in Fig. 6 [1,34,33].…”
Section: Transaction Completementioning
confidence: 99%
“…In [17], a lightweight (energy efficient) algorithm named as proof of authentication (PoAh) for IoT blockchains is introduced. Since the devices in an IoT blockchain are restricted with minimal battery resources, therefore, traditional PoW and PoS algorithms cannot be applied directly.…”
Section: Proof Of Authentication (Poah) [17]mentioning
confidence: 99%
“…Above discussion is a mixture of articles from both academia and industry. References [18] [19] rely on the smart contract protocol, [9] uses PoS, [17] proposes PoAh, [20] relies on PoG, and [21] is based on Intel's PoE algorithms, respectively. In most of the approaches, hashrate is considered to be the main design, voting, and decision making parameter.…”
Section: Intel's Proof-of-elapsed (Poe) [21]mentioning
confidence: 99%
“…In a distributed network, communication should operate with minimum delay. Distributed networks are also susceptible to security threats [3] arising the need for high-security mechanisms to secure IoT systems in the network [4]. However, traditional mechanisms and centralized security authorization are inadequate due to scalability problems [5,6] and there is thus a need for decentralized access control and delay-sensitive authentication for IoT devices to operate optimally [7].…”
Section: Introductionmentioning
confidence: 99%