2020
DOI: 10.3390/s20082231
|View full text |Cite
|
Sign up to set email alerts
|

Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access

Abstract: Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios. Existing IoT systems generally adopt lightweight security protocols that lead to compromise and privacy leakage. Edge computing enables better access control and privacy protection, furthermore, blockchain architecture has achieved a trusted store of value by open-source and distributed consensus mechanisms. To embrace these new paradigms, we propose a schem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Moreover, based on PoS, the DPoS mechanism solves the high-energy consumption problem of POW and avoids the "trust-balance" bias possible under PoS, but is not decentralized enough. In addition, the zero-knowledge proof algorithm [18,19] simplifies the PoW and also increases the difficulty of attacks, which further enhances the privacy and security of consensus strings.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, based on PoS, the DPoS mechanism solves the high-energy consumption problem of POW and avoids the "trust-balance" bias possible under PoS, but is not decentralized enough. In addition, the zero-knowledge proof algorithm [18,19] simplifies the PoW and also increases the difficulty of attacks, which further enhances the privacy and security of consensus strings.…”
Section: Related Workmentioning
confidence: 99%
“…The node passes the data it receives to the management plane, which determines how the node processes the data. The management plane is responsible for detecting and controlling nodes so that they work correctly [5].…”
Section: Some Key Problems Of Wireless Sensor Networkmentioning
confidence: 99%
“…These consensus results facilitate the formation of long-term stable strategies for organizations. In addition, we are motivated by the need for reliability of data sources with edge nodes and the requirement of an authenticity mechanism involving zero-knowledge proof [6].…”
Section: Introductionmentioning
confidence: 99%